Security Engineer jobs at The Blackstone - 105 jobs
Cyber Security - ISSO
Blackstone Talent Group 4.1
Security engineer job at The Blackstone
Blackstone Talent Group, an award-winning technology consulting and talent agency is seeking a Cyber Security - ISSO to join our Client's team.
The Cybersecurity Engineer - ISSO supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract.
The candidate will:
Develop and provide RMF Assessment and Authorization (A&A) documentation in accordance DoD, NIST, and other governing documents
Maintain the current, approved Authorization to Operate (ATO) for assigned system. Gather and/or develop any needed A&A artifacts. Update artifacts as required ensuring that they are current and document findings in the approved Risk Management Framework (RMF) or similar A&A documentation format provided
Assist with monitoring and the implementation of security controls
Experience with incident management, response, and response coordination
Gathering artifacts/data to support cybersecurity metrics and reporting
Understanding of cybersecurity tools (ACAS, Trellix ePO, Elasticsearch) and verification of operation in accordance with requirements
Perform accurate and verified risk assessments that cover all of the security controls and policies for key stakeholders
Track, monitor, and manage the information system's Plan of Action and Milestones (POA&M) and provide technical assistance as required
Analyze, verify and update PPSMs as required for programs
Provide artifacts that support the maintenance of security packages
Evaluate NIST 800-53 controls for applicability, generate implementation statements, and get implementations approved
Prepare documents in support of Control Validation Tests (CVTs) to confirm compliance of ATOs submitted for RMF packages
The successful candidate will:
Be detail oriented
Be highly motivated
Be able to efficiently and effectively discover and research supporting documents
Basic Requirements:
Must have 4, or more, years of general (full-time) work experience
May be reduced with completion of advanced education
Must have 2, or more, years of cyber security experience
Must have a high level of understanding for computer systems, operating systems, and network architecture
Must have a firm understanding and experience with Microsoft Office Suite
Must have experience with Configuration Management processes and workflows
Must have a current DoD 8570 IAT Level II certification (ex: Security+)
Must have an active DoD Top Secret Security Clearance with SCI eligibility
Desired Requirements:
Have experience with conducting system and log auditing
Have experience with endpoint security enforcement and validation
Have experience with vulnerability management
Be familiar with Joint SAP Implementation Guide (JSIG)
Be familiar with Security Controls Traceability Matrix (SCTM)
Security Clearance Required: TS/SCI
Blackstone Talent Group is a wholly owned subsidiary of Blackstone Technology Group, a global IT services and software firm that implements technological solutions across commercial industry verticals and the US Federal Government. Blackstone's global talent augmentation practice was founded in 1998. Blackstone Talent Group has offices in San Francisco, Denver, Houston, Colorado Springs, and Washington, DC. We specialize in providing clients the best talent across a variety of industries and sectors.
EOE of Minorities/Females/Veterans/Disabilities
$80k-110k yearly est. 2d ago
Looking for a job?
Let Zippia find it for you.
Audio Systems Engineer
Sesame 4.7
San Francisco, CA jobs
Sesame believes in a future where computers are lifelike - with the ability to see, hear, and collaborate with us in ways that feel natural and human. With this vision, we're designing a new kind of computer, focused on making voice companions part of our daily lives. Our team brings together founders from Oculus and Ubiquity6, alongside proven leaders from Meta, Google, and Apple, with deep expertise spanning hardware and software. Join us in shaping a future where computers truly come alive.
About the Role
Join our team to craft a unique take on smart wearable devices with incredibly compact audio capabilities. We're looking for an experienced Audio System Engineer to define, tune, evaluate, and ship high‑quality speech reproduction systems and spatialized audio capture solutions.
Responsibilities
Own all aspects of shipping consumer electronic products with market‑leading audio performance independently or with the support of the Audio Lead, depending on experience level.
Create the transfer function from Product Level Requirement Documents to audio systems and transducer requirements to ensure product success.
Design, analyze, and refine real‑time audio capture and render systems.
Research and implement advanced technologies to optimize audio system integration.
Continuously learn and explore new technologies, setting benchmarks for user experiences.
Collaborate on system architecture, including algorithms and tools, and oversee implementation.
Evaluate third‑party audio technologies and keep abreast of industry developments.
Understand the trade‑offs in various DSP and ML approaches/platforms for embedded solutions.
Work with the cross‑functional team to innovate on audio solutions.
Factory testing and build support throughout the product development cycle.
Required Qualifications
4+ years of experience in audio hardware development.
Experience in designing, tuning, and testing microphone arrays and real‑time audio capture.
Proven track record in developing comprehensive audio solutions encompassing acoustics, transducers, digital interfaces, audio ICs, and DSPs.
Extensive experience with audio testing systems (e.g., SoundCheck, Audio Precision, HATS testing).
Strong background in DSP techniques (e.g., FIR/IIR filter design, beamforming, echo cancellation).
Effective independent operation and teamwork in a dynamic, cross‑functional setting.
Experience with acoustic simulation software, e.g., COMSOL.
Bachelor's degree in Electrical Engineering, Computer Science, Acoustics, or similar.
Preferred Qualifications
8+ years of experience in audio hardware development.
Proficiency in a high‑level programming language (e.g., MATLAB, Python).
Familiarity with human perception of sound.
Experience with psycho‑acoustic metrics and evaluation of speech quality and intelligibility.
Familiarity with audio rendering techniques and speaker technologies.
Experience in acoustics and consumer audio EE architecture.
Familiarity with audio algorithm development, ML techniques, and/or NN implementations.
M.Sc. or Ph.D. in EE, Comp.Sci., Acoustic, or related disciplines.
Sesame is committed to a workplace where everyone feels valued, respected, and empowered. We welcome all qualified applicants, embracing diversity in race, gender, identity, orientation, ability, and more. We provide reasonable accommodations for applicants with disabilities-contact ****************** for assistance.
Full‑time Employee Benefits
401k matching
100% employer‑paid health, vision, and dental benefits
Unlimited PTO and sick time
Flexible spending account matching (medical FSA)
Benefits do not apply to contingent/contract workers.
#J-18808-Ljbffr
$62k-77k yearly est. 3d ago
Staff Security Engineer (Blue Team)
Olo 4.3
New York jobs
Olo is a leading SaaS platform accelerating digital transformation in the restaurant industry, by helping customers deliver more personalized and profitable guest experiences. As a result, our digital ordering, payment, and guest engagement solutions enable brands to do more with less and make every guest feel like a regular.
Reporting to the SecurityEngineering Director, the Staff SecurityEngineer will act as technical lead of the Olo Security Blue Team and work on security defences that allow our systems to keep running while protecting the data of our clients and their customers.
Additionally, you will help in the identification and prioritization of future project initiatives based on risk and execute on cross-functional projects with a high degree of ownership and excellence, all while actively mentoring other team members and elevating the collective team's capabilities and skill sets. If you are passionate about reducing risk while supporting innovation we encourage you to apply!
You can work remotely from anywhere in the U.S. or at Olo's headquarters in NYC.What You'll Do
Guide and coach Olo's Blue Team on Information Protection, Incident Detection and Response and Service Delivery.
You will provide strategic and technical oversight to the team and the program.
Technically lead a team of securityengineers and analysts who hunt, detect, and respond to internal and external threats.
Collaborate with customers and partners to strengthen their security posture.
Drive ongoing optimizations by implementing new technologies, replacing technologies, addressing evolving threats, scaling practices and automating security activities.
Ultimately you will keep team member and customers data safe by identifying and mitigating vulnerabilities and risks by providing actionable guidance to product teams.
Information Protection
Lead Olo's Information Protection program including the selection, testing, implementation and maintenance of security tools and services, security awareness, service provider management and the ongoing testing of those controls.
Oversee Vulnerability Management program including vulnerability assessments, risk scoring and vulnerability resolution.
Oversee Threat Hunting program to detect and mitigate advanced threats.
Manage non-event driven security reviews, including concept reviews, design reviews, patching, firewall rules and system configuration checks.
Apply Web application and API security principles and techniques, such as zero trust, RBAC, authentication, authorization, auditing, rate limiting, challenges, etc., to protect our cloud-based services from unauthorized access and abuse.
Incident Detection and Response
Oversee Incident Detection and Response program including ownership of incident response processes, tools and services and the ongoing continuous improvement of those controls.
Coordinate the detection and response to attacks through all incident phases.
Ensure incident reports are accurate, detailed and relevant.
Monitor, detect, and remediate misconfigurations and security risks across our cloud environments.
Participate in a 24/7 on-call rotation.
Security Services
Oversee Security Services program including security support requests, risk assessments, vendor assessments, PCI and SOC audit support and service provider management.
What We'll Expect from You
5+ years of SecurityEngineering, Security Operations or Security Architecture experience.
CISSP, GCIH or similar certification preferred.
Experience acting as technical lead to distributed teams consisting largely of remote engineers.
Experience complying with PCI-DSS and other compliance and regulatory standards.
Experience with attacker tactics, techniques and procedures.
Knowledge of information technology, evolving threats, attack patterns, incident response and cyber security standards.
Experience developing and leading incident response, remediation and mitigation activities, and providing status updates and reports.
Experience analyzing security events to discern events that qualify as a legitimate security incident as opposed to non-incidents (ie. incident investigation, implementing countermeasures, and conducting incident response).
Deep understanding of operating system, networking and application concepts.
Experience hardening Windows, MacOS, Linux Containers and Kubernetes.
Familiarity with AWS security best practices and Infrastructure-as-Code.
Experience deploying and maintaining security technologies. (e.g. Access Proxies, API Gateway, Anti-Malware, Application Control, Cloud Security Posture, Data Leak Prevention, Data Mapping, Endpoint Detection & Response, Intrusion Detection System, File Integrity Monitoring, Firewalls, Mobile Device Management, Multi Factor Authentication, SIEM, Static Inspection, Vulnerability Assessment, Web Proxies, WAF and Zero Trust).
Adept at working with internal Product & Engineering, Legal, People & Culture, Finance and GTM teams and external partners, auditors and customers.
Ability to work during critical incidents or to support coverage requirements.
Strong English writing and verbal communication skills
About Olo
Olo is a leading restaurant technology provider with ordering, payment, and guest engagement solutions that help brands increase orders, streamline operations, and improve the guest experience. Each day, Olo processes millions of orders on its open SaaS platform, gathering the right data from each touchpoint into a single source-so restaurants can better understand and better serve every guest on every channel, every time. Over 800 restaurant brands trust Olo and its network of more than 400 integration partners to innovate on behalf of the restaurant community, accelerating technology's positive impact and creating a world where every restaurant guest feels like a regular. Learn more at olo.com.
We're remote-friendly. Since 2015, we have been evolving our culture to continue to support a more distributed workforce and now over 75% of our team works remotely across the U.S. If you're in the New York City area, you can choose to work remotely or from Olo's headquarters.
We offer great benefits, such as 20 days of paid time off, 10 sick days, 11 holidays, plus year-end closure, health, dental, and vision coverage for yourself and your family, a 401k match, remote-office stipend, a generous parental leave plan, volunteer time off, gift matching policy, and more!
Our best estimate of the compensation range for this opportunity is $161,000-$220,000 annually, depending on the experience you bring and your location. We look forward to discussing your salary expectations and our full total rewards offerings throughout the interview process.
We encourage you to apply!
At Olo, we believe bringing together people with varied experiences and viewpoints leads to better results. Don't check every box in the job description? Research shows many qualified candidates hold back from applying unless they meet all listed requirements. We're committed to creating a genuine workplace where everyone can contribute their best work-this improves our decision-making and helps us better serve our communities. So if you're enthusiastic about this role but your background doesn't align perfectly with every qualification, we encourage you to apply anyway. You might be exactly the right fit for this or other positions.
All applicants receive consideration for employment. We do not discriminate on the basis of race, religion, colour, national origin, gender identity, sexual orientation, pregnancy, age, marital status, veteran status, or disability status.
California Residents: CCPA notice We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$161k-220k yearly Auto-Apply 41d ago
Staff Security Engineer (Blue Team)
OLO 4.3
New York, NY jobs
Olo is a leading SaaS platform accelerating digital transformation in the restaurant industry, by helping customers deliver more personalized and profitable guest experiences. As a result, our digital ordering, payment, and guest engagement solutions enable brands to do more with less and make every guest feel like a regular.
Reporting to the SecurityEngineering Director, the Staff SecurityEngineer will act as technical lead of the Olo Security Blue Team and work on security defences that allow our systems to keep running while protecting the data of our clients and their customers.
Additionally, you will help in the identification and prioritization of future project initiatives based on risk and execute on cross-functional projects with a high degree of ownership and excellence, all while actively mentoring other team members and elevating the collective team's capabilities and skill sets. If you are passionate about reducing risk while supporting innovation we encourage you to apply!
You can work remotely from anywhere in the U.S. or at Olo's headquarters in NYC.
What You'll Do
* Guide and coach Olo's Blue Team on Information Protection, Incident Detection and Response and Service Delivery.
* You will provide strategic and technical oversight to the team and the program.
* Technically lead a team of securityengineers and analysts who hunt, detect, and respond to internal and external threats.
* Collaborate with customers and partners to strengthen their security posture.
* Drive ongoing optimizations by implementing new technologies, replacing technologies, addressing evolving threats, scaling practices and automating security activities.
* Ultimately you will keep team member and customers data safe by identifying and mitigating vulnerabilities and risks by providing actionable guidance to product teams.
Information Protection
* Lead Olo's Information Protection program including the selection, testing, implementation and maintenance of security tools and services, security awareness, service provider management and the ongoing testing of those controls.
* Oversee Vulnerability Management program including vulnerability assessments, risk scoring and vulnerability resolution.
* Oversee Threat Hunting program to detect and mitigate advanced threats.
* Manage non-event driven security reviews, including concept reviews, design reviews, patching, firewall rules and system configuration checks.
* Apply Web application and API security principles and techniques, such as zero trust, RBAC, authentication, authorization, auditing, rate limiting, challenges, etc., to protect our cloud-based services from unauthorized access and abuse.
Incident Detection and Response
* Oversee Incident Detection and Response program including ownership of incident response processes, tools and services and the ongoing continuous improvement of those controls.
* Coordinate the detection and response to attacks through all incident phases.
* Ensure incident reports are accurate, detailed and relevant.
* Monitor, detect, and remediate misconfigurations and security risks across our cloud environments.
* Participate in a 24/7 on-call rotation.
Security Services
* Oversee Security Services program including security support requests, risk assessments, vendor assessments, PCI and SOC audit support and service provider management.
What We'll Expect from You
* 5+ years of SecurityEngineering, Security Operations or Security Architecture experience.
* CISSP, GCIH or similar certification preferred.
* Experience acting as technical lead to distributed teams consisting largely of remote engineers.
* Experience complying with PCI-DSS and other compliance and regulatory standards.
* Experience with attacker tactics, techniques and procedures.
* Knowledge of information technology, evolving threats, attack patterns, incident response and cyber security standards.
* Experience developing and leading incident response, remediation and mitigation activities, and providing status updates and reports.
* Experience analyzing security events to discern events that qualify as a legitimate security incident as opposed to non-incidents (ie. incident investigation, implementing countermeasures, and conducting incident response).
* Deep understanding of operating system, networking and application concepts.
* Experience hardening Windows, MacOS, Linux Containers and Kubernetes.
* Familiarity with AWS security best practices and Infrastructure-as-Code.
* Experience deploying and maintaining security technologies. (e.g. Access Proxies, API Gateway, Anti-Malware, Application Control, Cloud Security Posture, Data Leak Prevention, Data Mapping, Endpoint Detection & Response, Intrusion Detection System, File Integrity Monitoring, Firewalls, Mobile Device Management, Multi Factor Authentication, SIEM, Static Inspection, Vulnerability Assessment, Web Proxies, WAF and Zero Trust).
* Adept at working with internal Product & Engineering, Legal, People & Culture, Finance and GTM teams and external partners, auditors and customers.
* Ability to work during critical incidents or to support coverage requirements.
* Strong English writing and verbal communication skills
About Olo
Olo is a leading restaurant technology provider with ordering, payment, and guest engagement solutions that help brands increase orders, streamline operations, and improve the guest experience. Each day, Olo processes millions of orders on its open SaaS platform, gathering the right data from each touchpoint into a single source-so restaurants can better understand and better serve every guest on every channel, every time. Over 800 restaurant brands trust Olo and its network of more than 400 integration partners to innovate on behalf of the restaurant community, accelerating technology's positive impact and creating a world where every restaurant guest feels like a regular. Learn more at olo.com.
We're remote-friendly. Since 2015, we have been evolving our culture to continue to support a more distributed workforce and now over 75% of our team works remotely across the U.S. If you're in the New York City area, you can choose to work remotely or from Olo's headquarters.
We offer great benefits, such as 20 days of paid time off, 10 sick days, 11 holidays, plus year-end closure, health, dental, and vision coverage for yourself and your family, a 401k match, remote-office stipend, a generous parental leave plan, volunteer time off, gift matching policy, and more!
Our best estimate of the compensation range for this opportunity is $161,000-$220,000 annually, depending on the experience you bring and your location. We look forward to discussing your salary expectations and our full total rewards offerings throughout the interview process.
We encourage you to apply!
At Olo, we believe bringing together people with varied experiences and viewpoints leads to better results. Don't check every box in the job description? Research shows many qualified candidates hold back from applying unless they meet all listed requirements. We're committed to creating a genuine workplace where everyone can contribute their best work-this improves our decision-making and helps us better serve our communities. So if you're enthusiastic about this role but your background doesn't align perfectly with every qualification, we encourage you to apply anyway. You might be exactly the right fit for this or other positions.
All applicants receive consideration for employment. We do not discriminate on the basis of race, religion, colour, national origin, gender identity, sexual orientation, pregnancy, age, marital status, veteran status, or disability status.
California Residents: CCPA notice
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$161k-220k yearly 43d ago
Platform Security Engineer
Akka 3.9
San Francisco, CA jobs
Akka's platform for agentic AI systems simplifies building new classes of applications, enabled by AI - based on our experience of building distributed systems
We are seeking a hands-on Platform SecurityEngineer to join our team. You will help architect, implement, and maintain security solutions that safeguard our systems, applications, and data. You'll partner closely with development, operations, and product teams to build secure services from the ground up, detect and respond to threats, and continuously improve our security posture.
Responsibilities
Harden Akka's PaaS for the bring your own cloud deployment model
Review existing security infrastructure, identify critical systems and data flows, and understand current compliance requirements.
Conduct AI threat modeling and improve our adversarial robustness
Maintain CNAPP solution to manage and secure cloud infrastructure, Kubernetes deployments, and applications. Establish policies and alerting mechanisms within the CNAPP.
Develop plans to integrate telemetry data and configure processing for use in security analysis.
Utilize next-gen SIEM platform. Optimize the existing SIEM, ensuring data integrity and compliance.
Integrate security practices into the software development lifecycle. Implement measures to secure the software supply chain and develop secure development policies.
Create and implement security policies as code to automate and enforce security controls.
Identify and implement automation opportunities for collecting evidence required for compliance.
Analyze findings and implement improvements to the organization's security posture, remediating vulnerabilities and deploying additional security controls.
Create comprehensive documentation for all configurations, processes, and procedures. Provide training and knowledge sharing with other team members.
Qualifications
CISSP, OSCP, AWS Security Specialty, or GCP Cloud Security preferred
AWS/Azure/GCP security services; Kubernetes hardening
Solid understanding of cloud security principles and practices
Familiarity with modern security tools and methodologies
Strong analytical and problem-solving skills
The team is distributed, which means that a very high degree of both autonomy and teamwork skills are required
Excellent verbal and written communication skills (English)
Frequently cited statistics show that women and underrepresented groups apply to jobs only if they meet 100% of the qualifications. Akka encourages you to break that statistic and to apply. No one ever meets 100% of the qualifications. We look forward to your application.
Location
This is a remote position where the candidate can be located anywhere in the world. We would like some overlap with America to allow proper cooperation with our current team.
What We Offer
Akka is a welcoming, transparent, and highly distributed company dedicated to creating high-performance distributed systems that bring success to all who use them. With a strong focus on work-life balance, our company offers a fast-paced, collaborative environment mixed with challenging and engaging work. This combination has attracted and retained some of the brightest minds in our technology communities.
Benefits:
Competitive salary with performance-based incentives.
Remote-first, flexible work environment.
Comprehensive health and wellness benefits.
Opportunities for professional development and continuous learning.
Collaborative, inclusive, and innovative company culture.
Our Core Values:
We're Authentic: We value transparency and genuine communication, without politics or games. We're honest and assume good intentions, cultivating trust and accountability within our organization and in our interactions with others outside of Akka.
We're Customer-Focused: We value customer outcomes above all else. By prioritizing our customers' interests, and meeting them where they are today, we help ensure their success. We are dedicated to deeply understanding our customer's needs, anticipating challenges, navigating time constraints and striving to exceed expectations.
We're Nonconventional: We value fearless innovation by challenging the status quo and embracing alternative approaches. Continuous learning and a growth mindset aimed at improving ourselves, our company, and our products, drives us to push boundaries and explore new solutions. Guided by a bias for action, we leverage industry and customer insights to inspire fresh ideas, enabling optimal future offerings.
We're Persistent: We value excellence through continuous experimentation and courageous problem-solving. We recognize that achieving success often demands approaching challenges with tenacity and taking calculated risks to achieve leading-edge solutions.
Akka is an Equal Opportunity Employer.
$126k-179k yearly est. Auto-Apply 59d ago
Product Security Engineer
Movable 4.1
Remote
Movable Ink scales content personalization for marketers through data-activated content generation and AI decisioning. The world's most innovative brands rely on Movable Ink to maximize revenue, simplify workflow and boost marketing agility. Headquartered in New York City with close to 600 employees, Movable Ink serves its global client base with operations throughout North America, Central America, Europe, Australia, and Japan.
Movable Ink is hiring a Product SecurityEngineer to help secure our codebases, CI/CD pipelines, and development practices. To succeed in this role, you'll balance a security-first mindset with a practical understanding of how engineering teams ship software-finding ways to reduce risk without slowing down delivery. This is a hands-on opportunity to build and improve the automation that keeps our code and infrastructure safe, working closely with both the Security and Engineering teams. As AI coding tools and supply chain attacks increase risk across the industry, this role is critical to staying ahead of vulnerabilities before they reach production.
Responsibilities:
Implement and maintain static application security testing (SAST) using Semgrep across our repositories
Configure and improve software composition analysis (SCA) tooling (Dependabot) to identify vulnerable dependencies
Manage secrets detection scanning (Trufflehog) and respond to findings
Integrate security scanning into CI/CD pipelines (GitHub Actions) to catch issues before code is merged
Triage and prioritize vulnerability findings, working with engineering teams to drive remediation
Support dynamic application security testing (DAST) efforts using tools like ZAP
Contribute to our Application Security Posture Management (ASPM) platform to centralize findings and track remediation
Set up and configure automation scripts to support our vulnerability management practices
Document secure coding guidelines and help educate developers on security best practices
Evaluate and recommend new security tools as the landscape evolves
Qualifications:
2+ years of experience in application security, DevSecOps, or a security-focused software engineering role
Hands-on experience with SAST, SCA, or secrets scanning tools (Semgrep, Dependabot, Snyk, or similar)
Familiarity with CI/CD pipelines and GitHub Actions
Understanding of common web application vulnerabilities (OWASP Top 10) and how to detect/prevent them
Experience reading and reviewing code in at least one language (Ruby, Python, JavaScript, or Go preferred)
Comfortable navigating codebases and working with engineering teams to explain and prioritize security findings
Strong written communication skills for documentation and customer-facing security responses
Self-motivated and able to manage competing priorities in a fast-paced environment
The base pay range for this position is $170,000-$200,000/year, which can include additional bonus depending on the position ultimately offered, in addition to a full range of medical, financial, and/or other benefits. The base pay offered may vary depending on job-related knowledge, skills, and experience.
Studies have shown that women, communities of color, and historically underrepresented people are less likely to apply to jobs unless they meet every single qualification. We are committed to building a diverse and inclusive culture where all Inkers can thrive. If you're excited about the role but don't meet all of the abovementioned qualifications, we encourage you to apply. Our differences bring a breadth of knowledge and perspectives that makes us collectively stronger.
We welcome and employ people regardless of race, color, gender identity or expression, religion, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, ethnicity, family or marital status, physical and mental ability, political affiliation, disability, Veteran status, or other protected characteristics. We are proud to be an equal opportunity employer.
$170k-200k yearly Auto-Apply 6d ago
Security Engineer (Security Operations, Zero Trust)
Blackcloak LLC 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.
What you will do
*
Security Operations & Incident Response (Primary)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.Assist in development of new threat detections, playbooks, and automated response/remediation Support triage and response of security alerts, as an escalation point from the broader team.Participate in supporting security on-call rotation
Zero Trust & Network Security (Secondary)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDMSupport design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, ZitadelMature Zero Trust alerts and controls across risk-based alerting, posture checks Incorporation of Zero Trust principles into new programs and architecture designs
Application Security (Support)
Support application security program strategy and implementation, including but not limited to various controls towards a "shift-left" security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Support)
Partner with Engineering, DevOps, to secure GCP, AWS environments Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.Support development and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.Incorporation of shift-left security tests and controls, into CI/CD pipelines Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats.
What You Need to be Successful
*
* 3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
* Deep experience building or contributing to a Security Operations program, leveraging/administering SIEM, EDR, CNAAP, Email Security, and SOAR tools.
* Hands-on experience building and tuning threat detections, partnering with Security Analysts to improve/automate runbooks and response actions.
* Demonstrated experience implementing tools and controls to support Zero Trust, with tools such as Cloudflare, IAM architecture and protocols, risk and posture based alerting, and workforce/customer identity solutions.
* Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes, ability to implement and support detection-as-code and infrastructure-as-code where applicable.
* Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
* Ability to drive new projects, self-starter, with minimal supervision
* A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Nice to have
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSFFamiliarity with common application development languages such as Java or JavaScriptUnderstanding of system and architecture design principles, from code to cloud Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloak
BlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
* 100% Remote Company, within the USA
* Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents.
* Health Savings Account with company contribution for eligible medical plans.
* Flexible Vacation Plan
* 10 Paid Company Holidays
* 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance
* 401k with Traditional and Roth options, including employer match.
* Company Equity
* Paid Parental and Pregnancy Recovery Leave
* Company and team off-sites and virtual events throughout the year
* Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about Us
Website: *********************
LinkedIn: /blackcloak
Twitter: @BlackCloakCyber
White Paper: *******************************************************************************************************
#liremote
$100k-140k yearly 60d+ ago
Security Engineer (Product/Cloud Security)
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.
What you will do
Application Security (Primary)
Champion application security program strategy and implementation, including but not limited to various controls towards a “shift-left” security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.
Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.
Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.
Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Secondary)
Partner with Engineering, DevOps, to secure GCP, AWS environments
Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.
Develop and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.
Incorporation of shift-left security tests and controls, into CI/CD pipelines
Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats
Zero Trust & Network Security (Support)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles
Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDM
Support design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, Zitadel
Security Operations & Incident Response (Support)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.
Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.
Assist in development of new threat detections, playbooks, and automated response/remediation
Support triage and response of security alerts, as an escalation point from the broader team.
Participate in supporting security on-call rotation
What You Need to be Successful
3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
Experience building or contributing to a Secure SDLC program, leveraging application security tools, supporting security architecture reviews
Demonstrated experience securing public cloud environments, with a strong preference for Google Cloud Platform (GCP).
Experience building or contributing to a Secure SDLC program.
Hands-on experience with modern security tooling, including
SAST/SCA: Snyk, Checkmarx, Veracode, or similar.
CNAPP: Wiz, Prisma Cloud, or similar.
EDR: SentinelOne, CrowdStrike, or similar.
SIEM: Google SecOps, Splunk, or other modern platforms.
A solid understanding of Zero Trust, IAM principles and practical experience implementing solutions with tools like Cloudflare.
Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes.
Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Preferred Candidate will have:
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).
Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSF
Familiarity with common application development languages such as Java or JavaScript
Understanding of system and architecture design principles, from code to cloud
Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-140k yearly Auto-Apply 60d+ ago
Security Engineer (Security Operations, Zero Trust)
Blackcloak 3.5
Remote
BlackCloak's mission is to protect corporate executives and high-profile individuals in their personal lives, mitigating risks to their families, companies, reputation, and finances. We defend our clients' digital lives from hackers, privacy leaks, and identity theft. If you are passionate about helping to protect others, then keep reading - this may be your next great opportunity.
As a SecurityEngineer, you will be part of BlackCloak's internal technology team supporting corporate security, information technology operations, and compliance. This is a critical role that is both hands-on and strategic, influencing and driving success for BlackCloak and its clients by designing, deploying, and supporting technology solutions for all areas of the business.What you will do
Security Operations & Incident Response (Primary)
Review, design, and implementation of new Security Tools - support administration across tools such as SIEM, EDR, CNAAP, Email Security, and others.
Support security and risk assessments for new tools, vendors, and relationships with broader Security and IT team.
Assist in development of new threat detections, playbooks, and automated response/remediation
Support triage and response of security alerts, as an escalation point from the broader team.
Participate in supporting security on-call rotation
Zero Trust & Network Security (Secondary)
Strengthen Zero Trust posture by expanding usage of Cloudflare WARP, WAF, other Zero Trust tooling and principles
Collaborate with the IT team to enhance endpoint security policies within EDR tools such as SentinelOne, Crowdstrike, as well as secure hardening standards into MDM
Support design and implementation of IAM best practices/principles for workforce and client identity, leveraging tools such as; Google IDP, Okta, Auth0, Zitadel
Mature Zero Trust alerts and controls across risk-based alerting, posture checks
Incorporation of Zero Trust principles into new programs and architecture designs
Application Security (Support)
Support application security program strategy and implementation, including but not limited to various controls towards a “shift-left” security model, Security Champions program, adoption and implementation of SAST, DAST, other application security tools.
Assist in maturation of the Secure SDLC, including threat modeling, security architecture and requirements guidance, as well as secure code development training.
Work directly with developers to triage findings, provide remediation guidance, and foster a security-first culture.
Manual testing support for light red teaming such as POC'ing vulnerabilities, leading penetration tests via vendor engagements and/or internally led testing, and validating security findings.
Cloud & Infrastructure Security (Support)
Partner with Engineering, DevOps, to secure GCP, AWS environments
Leverage Cloud Security tools such as CNAAP, to remediate discovered misconfigurations, vulnerabilities, and triage of Cloud Security alerts.
Support development and implement secure infrastructure baselines, vulnerability management processes, secrets managements, IAM, and hardening standards within the cloud environment.
Incorporation of shift-left security tests and controls, into CI/CD pipelines
Help expand monitoring capabilities within tools such as SIEM, CNAAP, including implementation of required cloud architecture/logging, onboarding of log sources to security tools, and detection rules for cloud-based threats.
What You Need to be Successful
3-5 years of hands-on experience in a securityengineering role, preferably within a cloud-native, startup environment
Deep experience building or contributing to a Security Operations program, leveraging/administering SIEM, EDR, CNAAP, Email Security, and SOAR tools.
Hands-on experience building and tuning threat detections, partnering with Security Analysts to improve/automate runbooks and response actions.
Demonstrated experience implementing tools and controls to support Zero Trust, with tools such as Cloudflare, IAM architecture and protocols, risk and posture based alerting, and workforce/customer identity solutions.
Proficiency in at least one scripting language (e.g., Python, Bash) to automate security tasks and processes, ability to implement and support detection-as-code and infrastructure-as-code where applicable.
Excellent problem-solving skills and the ability to work collaboratively with both technical (Engineering) and non-technical (GTM) teams.
Ability to drive new projects, self-starter, with minimal supervision
A proactive, "builder" mindset with a passion for improving processes, reducing risk.
Nice to have
Familiarity with Infrastructure as Code (IaC) and its security implications (e.g., Terraform).
Knowledge of compliance frameworks such as SOC 2, GDPR, NIST CSF
Familiarity with common application development languages such as Java or JavaScript
Understanding of system and architecture design principles, from code to cloud
Relevant industry certifications (e.g., GCLD, GCP Cloud SecurityEngineer, GCSA).
$100,000 - $140,000 a year
Final offer amounts are determined by multiple factors, including but not limited to geographic location as well as candidate experience and expertise, and may vary from the amounts listed above.
About BlackCloakBlackCloak is an extremely fast-growing company in an entirely new product category. We have amazing product fit validated by industry awards and an impressive client base of Fortune 500 companies across all industries.
BlackCloak offers a competitive salary, exceptional benefits, and a dynamic work environment. Below is a quick summary of BlackCloak's generous benefits package for full-time employees includes:
- 100% Remote Company, within the USA - Comprehensive Medical, Dental, and Vision plans with a 100% employer-paid monthly premium option for employees & 50% employer-paid monthly premiums for dependents. - Health Savings Account with company contribution for eligible medical plans. - Flexible Vacation Plan - 10 Paid Company Holidays - 100% employer-paid Life, AD&D and Short- and Long-Term Disability Insurance - 401k with Traditional and Roth options, including employer match. - Company Equity - Paid Parental and Pregnancy Recovery Leave - Company and team off-sites and virtual events throughout the year - Home office stipend
We are an equal opportunity employer. We do not discriminate on the basis of race, color, religion, sex, sexual orientation, gender identity, marital status, age, disability, national or ethnic origin, military service status, citizenship, or other protected characteristic.
Learn More about UsWebsite: ********************* LinkedIn: /blackcloak Twitter: @BlackCloakCyberWhite Paper: *******************************************************************************************************
#liremote
$100k-140k yearly Auto-Apply 60d+ ago
Security Detection Engineer
Movable 4.1
Remote
Movable Ink scales content personalization for marketers through data-activated content generation and AI decisioning. The world's most innovative brands rely on Movable Ink to maximize revenue, simplify workflow and boost marketing agility. Headquartered in New York City with close to 600 employees, Movable Ink serves its global client base with operations throughout North America, Central America, Europe, Australia, and Japan.
Movable Ink is hiring a Security Detection Engineer to strengthen our security monitoring and detection capabilities. To succeed in this role, you'll combine deep technical curiosity with a methodical approach to threat detection, helping protect our platform and the hundreds of enterprise customers who depend on it. This is a hands-on opportunity to own and evolve our detection engineering practice, working closely with our SecurityEngineering team. You'll play a critical role in ensuring we can identify and respond to security threats quickly-whether they target our employees, infrastructure, or cloud environments.
Responsibilities:
Build, tune, and maintain detection rules and alerts in Splunk to identify security threats, suspicious activity, and policy violations
Reduce alert fatigue by continuously improving detection logic to minimize false positives while maintaining coverage
Monitor and develop detections for cloud security events across AWS and GCP using our CSPM tooling (Prisma Cloud)
Collaborate with the Security team to develop detection strategies based on threat intelligence and the MITRE ATT&CK framework
Investigate alerts and escalate confirmed incidents according to our incident response procedures
Set up and configure automation scripts and tooling for alert triage, ticket creation, and incident workflows
Create dashboards and reports to provide visibility into security posture and detection effectiveness
Document detection logic, runbooks, and response procedures
Support EDR (CrowdStrike) monitoring and investigate endpoint-related alerts
Identify opportunities to use Splunk for operational and product monitoring beyond pure security use cases
Qualifications:
2+ years of experience in a security operations, detection engineering, or SIEM-focused role
Hands-on experience writing and tuning SPL queries in Splunk
Familiarity with common attack techniques and the MITRE ATT&CK framework
Experience with cloud platforms (AWS or GCP) and understanding of cloud-specific threats
Exposure to EDR platforms (CrowdStrike preferred) and CSPM tools
Understanding of log sources such as Okta, Google Workspace, endpoint logs, and network traffic
Strong analytical and troubleshooting skills with attention to detail
Clear written and verbal communication skills; ability to document findings and escalate effectively
Self-motivated and comfortable working autonomously with a distributed team
The base pay range for this position is $110,000-$130,000/year, which can include additional bonus depending on the position ultimately offered, in addition to a full range of medical, financial, and/or other benefits. The base pay offered may vary depending on job-related knowledge, skills, and experience.
Studies have shown that women, communities of color, and historically underrepresented people are less likely to apply to jobs unless they meet every single qualification. We are committed to building a diverse and inclusive culture where all Inkers can thrive. If you're excited about the role but don't meet all of the abovementioned qualifications, we encourage you to apply. Our differences bring a breadth of knowledge and perspectives that makes us collectively stronger.
We welcome and employ people regardless of race, color, gender identity or expression, religion, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, ethnicity, family or marital status, physical and mental ability, political affiliation, disability, Veteran status, or other protected characteristics. We are proud to be an equal opportunity employer.
$110k-130k yearly Auto-Apply 6d ago
Senior Cyber Defense Analyst
Abnormal Security 4.5
Remote
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a “click-through-the-console” SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
At Abnormal AI, certain roles are eligible for a bonus, restricted stock units (RSUs), and benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications and other job-related reasons.
Base salary range:$144,500-$170,000 USD
Abnormal AI is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status or other characteristics protected by law. For our EEO policy statement please
click here
. If you would like more information on your EEO rights under the law, please
click here
.
$144.5k-170k yearly Auto-Apply 3d ago
Principal Security Engineer, Emerging Technology
Draftkings 4.0
Remote
At DraftKings, AI is becoming an integral part of both our present and future, powering how work gets done today, guiding smarter decisions, and sparking bold ideas. It's transforming how we enhance customer experiences, streamline operations, and unlock new possibilities. Our teams are energized by innovation and readily embrace emerging technology. We're not waiting for the future to arrive. We're shaping it, one bold step at a time. To those who see AI as a driver of progress, come build the future together.
The Crown Is Yours
As a Principal SecurityEngineer, you'll shape how DraftKings uses emerging technology securely and responsibly. You'll work at the highest strategic level, partnering with engineering, product, and research teams to build secure, scalable systems that power our platforms. You'll apply deep technical expertise to evaluate and influence the security of new tools, workflows, and architectures. With a cross-disciplinary team at your side, you'll lead by example designing smarter automation, scaling secure infrastructure, and mentoring peers through complex challenges.
What you'll do as a Principal SecurityEngineer
Lead large-scale security reviews of new capabilities at DraftKings with your deep experience building and deploying code and systems leading the way
Design, build and implement tools to support the safe use of new technology, such as proxies that help implement security functionality or modify existing systems to make them safer.
Spearhead the automation of security processes, reducing the time to deploy across the entire engineering organization.
Drive remediation efforts of complex, cross-functional security issues.
Apply subject matter expertise to identify potential security issues, tools, mitigations and processes, staying current with the evolving security landscape and sharing expertise with others through coaching.
Collaborate across a range of technical and non-technical contributors, providing insights on security designs that balance usability and safety.
Share knowledge and provide guidance to team members, fostering a culture of continuous learning and collaboration.
What you'll bring
8+ years experience in engineering, building and operating systems in production.
5+ years experience contributing and advising on security design.
Experience writing high quality code in a typed and untyped programming language.
A constructive attitude to help others raise the bar.
Varied knowledge across system fundamentals, how multiple operating systems and file systems work, networking and common protocols, public cloud security, and automation.
An understanding of how organizations use AI foundation models and how to reason about safely using AI in business contexts.
Empathy, strong communication skills and a deep respect for the power of collaboration.
Ability to manage competing priorities and thrive in a fast-paced, dynamic environment.
Join Our Team
We're a publicly traded (NASDAQ: DKNG) technology company headquartered in Boston. As a regulated gaming company, you may be required to obtain a gaming license issued by the appropriate state agency as a condition of employment. Don't worry, we'll guide you through the process if this is relevant to your role.
The US base salary range for this full-time position is 183,200.00 USD - 229,000.00 USD, plus bonus, equity, and benefits as applicable. Our ranges are determined by role, level, and location. The compensation information displayed on each job posting reflects the range for new hire pay rates for the position across all US locations. Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training. Your recruiter can share more about the specific pay range and how that was determined during the hiring process. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
$93k-132k yearly est. Auto-Apply 60d+ ago
Product Security Engineer
Movable Ink 4.1
New York, NY jobs
Movable Ink scales content personalization for marketers through data-activated content generation and AI decisioning. The world's most innovative brands rely on Movable Ink to maximize revenue, simplify workflow and boost marketing agility. Headquartered in New York City with close to 600 employees, Movable Ink serves its global client base with operations throughout North America, Central America, Europe, Australia, and Japan.
Movable Ink is hiring a Product SecurityEngineer to help secure our codebases, CI/CD pipelines, and development practices. To succeed in this role, you'll balance a security-first mindset with a practical understanding of how engineering teams ship software-finding ways to reduce risk without slowing down delivery. This is a hands-on opportunity to build and improve the automation that keeps our code and infrastructure safe, working closely with both the Security and Engineering teams. As AI coding tools and supply chain attacks increase risk across the industry, this role is critical to staying ahead of vulnerabilities before they reach production.
Responsibilities:
Implement and maintain static application security testing (SAST) using Semgrep across our repositories
Configure and improve software composition analysis (SCA) tooling (Dependabot) to identify vulnerable dependencies
Manage secrets detection scanning (Trufflehog) and respond to findings
Integrate security scanning into CI/CD pipelines (GitHub Actions) to catch issues before code is merged
Triage and prioritize vulnerability findings, working with engineering teams to drive remediation
Support dynamic application security testing (DAST) efforts using tools like ZAP
Contribute to our Application Security Posture Management (ASPM) platform to centralize findings and track remediation
Set up and configure automation scripts to support our vulnerability management practices
Document secure coding guidelines and help educate developers on security best practices
Evaluate and recommend new security tools as the landscape evolves
Qualifications:
2+ years of experience in application security, DevSecOps, or a security-focused software engineering role
Hands-on experience with SAST, SCA, or secrets scanning tools (Semgrep, Dependabot, Snyk, or similar)
Familiarity with CI/CD pipelines and GitHub Actions
Understanding of common web application vulnerabilities (OWASP Top 10) and how to detect/prevent them
Experience reading and reviewing code in at least one language (Ruby, Python, JavaScript, or Go preferred)
Comfortable navigating codebases and working with engineering teams to explain and prioritize security findings
Strong written communication skills for documentation and customer-facing security responses
Self-motivated and able to manage competing priorities in a fast-paced environment
The base pay range for this position is $170,000-$200,000/year, which can include additional bonus depending on the position ultimately offered, in addition to a full range of medical, financial, and/or other benefits. The base pay offered may vary depending on job-related knowledge, skills, and experience.
Studies have shown that women, communities of color, and historically underrepresented people are less likely to apply to jobs unless they meet every single qualification. We are committed to building a diverse and inclusive culture where all Inkers can thrive. If you're excited about the role but don't meet all of the abovementioned qualifications, we encourage you to apply. Our differences bring a breadth of knowledge and perspectives that makes us collectively stronger.
We welcome and employ people regardless of race, color, gender identity or expression, religion, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, ethnicity, family or marital status, physical and mental ability, political affiliation, disability, Veteran status, or other protected characteristics. We are proud to be an equal opportunity employer.
$170k-200k yearly Auto-Apply 4d ago
Partime Secutity / Engineer
Blue Sky Hospitality Solutions 3.6
Houston, TX jobs
The Maintenance Engineer is responsible for the repair and maintenance of the hotel's facility in accordance with Brand standards for quality, cleanliness, guest satisfaction, safety and security.
CANDIDATE PROFILE
Experience
• High School or equivalent; at least one (1) year of related general repair experience is preferred.
JOB ESSENTIALS
• Respond and attend to guest repair requests. Adhere to quality expectations and standards.
• Communicate with guests/customers to resolve maintenance issues with little to no supervision.
• Manage guest requests, inquiries, and complaints promptly and completely. Ensure follow up with guest are performed in a timely manner to maintain a high level of guest satisfaction and quality service. In the event of dissatisfaction, negotiate compromise in accordance to the “Make it Right” established guidelines.
• Performing preventative maintenance, to maintain the upkeep of the property, both inside and out.as scheduled by Chief Engineer.
• Maintain maintenance inventory and requisition parts and supplies as needed.
• Document each day's activities and problems that occur are communicated to the other shifts using approved communication programs and standards.
• Safely perform highly complex repairs of the physical property, electrical, plumbing and mechanical equipment, air conditioners, refrigeration and pool heaters - ensuring all methods, materials and practices meet company standards and Local and National codes - with little or no supervision.
• Troubleshoot and perform repairs on all types of equipment (e.g., pump and motor replacement), plumbing (e.g., plunge toilets and unclog drains), electrical equipment including lamps, air conditioners, HVAC equipment, cosmetic items, extension cords, vacuum cleaners, internet devices, replace electrical switches and outlets, and program TV's;. Use the Lockout/Tag out system before performing any maintenance work.
• Follow proper Hotel safety policies and procedures and use safety equipment as needed to ensure the safety of all team members during each shift. Reports all accidents and injuries in a timely manner.
• Report any maintenance problems, safety hazards, and properly store flammable materials.
• Ensure work area is clean and clear of standing water, debris or any objects that can obstruct the job duties from being performed safely, efficiently and effectively
• Perform any other job related duties as assigned.
• Ensure protection and preservation of hotel, guest, and employee property.
• Performs Security rounds of the hotel, to include of front of house and heart of house areas. Checking the doors and stairwells to make sure the locks are secure and no danger is lurking.
• Protects hotel from admission of undesirables and others not conducting legitimate business within the premises.
• Familiar with all emergency situations, including fire alarms, according to procedure and with an appropriate sense of urgency.
• Responds immediately to emergency incidents and Security requests to which he or she is assigned.
• Record and report any unsafe conditions while patrolling hotel property.
• Prepare incident and accident reports accurately and in the format
• Ensure Lobby presence especially when large groups arrive and during busy overnight and morning to provide guests with a sense of security.
• Patrol outdoors as well as room hallways and activity areas, such as the pool and spa.
• Respond to complaints and calls for help. Calm guests or control a situation until the local police can arrive.
• Escort unruly patrons and/or loiterers from the property.
• Complete activity report and communicate all activity encountered during the shift.
• Document and store all guest packages received.
• Ensures all communication containing Company, hotel, brand and guest information is consistent with privacy policies, practices and regulations.
• Leads team to meet/exceed guests' expectations with quality and timely service in a pleasant and friendly manner.
• Escorts customers to accommodations upon request, visually inspects room and telephone and deficiencies such as towels to housekeeping immediately. Points out room features and directory for reference.
• Manage guest requests, inquiries, and complaints promptly and completely. Ensure follow up with guest are performed in a timely manner to maintain a high level of guest satisfaction and quality service. In the event of dissatisfaction, negotiate compromise in accordance to the “Make it Right” established guidelines.
• Follow proper Hotel safety policies and procedures and use safety equipment as needed to ensure the safety of all team members during each shift. Reports all accidents and injuries in a timely manner.
• Provides for a safe work environment by following all safety and security procedures and rules. Ensure work area is clean and clear of standing water, debris or any objects that can obstruct the job duties from being performed safely, efficiently and effectively
• Perform any other job-related duties as assigned
•
Other
• Identify, locate, and operate all shut-off valves for equipment.
• Display above average engineering operations skills and strong general mechanical ability. Display proficiency in at least three of the following categories, above average skills in three more of the following categories and basic skills in the remaining categories: air conditioning and refrigeration, electrical, mechanical, plumbing, pneumatic/electronic systems and controls, carpentry and finish skills, kitchen equipment, vehicles, energy conservation, and/or general building management.
• Working knowledge and skill in the safe use of hand and power tools and other materials required to perform repair and ability to work in a fast-pace, high-energy and demanding work environment.
• Display advanced knowledge of all engineering computer programs related to preventative maintenance, energy management, and other systems, including devices that interact with such programs.
• Ability to perform Engineer on Duty responsibilities, including readings and rounds.
• Regular attendance in conformance with the standards is essential to the successful performance of this position.
• Comply with attendance rules and be available to work on a regular basis. Able to work varied shifts, including Weekday, Evenings, weekends and holidays.
$90k-117k yearly est. Auto-Apply 60d+ ago
Security Detection Engineer
Movable Ink 4.1
New York, NY jobs
Movable Ink scales content personalization for marketers through data-activated content generation and AI decisioning. The world's most innovative brands rely on Movable Ink to maximize revenue, simplify workflow and boost marketing agility. Headquartered in New York City with close to 600 employees, Movable Ink serves its global client base with operations throughout North America, Central America, Europe, Australia, and Japan.
Movable Ink is hiring a Security Detection Engineer to strengthen our security monitoring and detection capabilities. To succeed in this role, you'll combine deep technical curiosity with a methodical approach to threat detection, helping protect our platform and the hundreds of enterprise customers who depend on it. This is a hands-on opportunity to own and evolve our detection engineering practice, working closely with our SecurityEngineering team. You'll play a critical role in ensuring we can identify and respond to security threats quickly-whether they target our employees, infrastructure, or cloud environments.
Responsibilities:
Build, tune, and maintain detection rules and alerts in Splunk to identify security threats, suspicious activity, and policy violations
Reduce alert fatigue by continuously improving detection logic to minimize false positives while maintaining coverage
Monitor and develop detections for cloud security events across AWS and GCP using our CSPM tooling (Prisma Cloud)
Collaborate with the Security team to develop detection strategies based on threat intelligence and the MITRE ATT&CK framework
Investigate alerts and escalate confirmed incidents according to our incident response procedures
Set up and configure automation scripts and tooling for alert triage, ticket creation, and incident workflows
Create dashboards and reports to provide visibility into security posture and detection effectiveness
Document detection logic, runbooks, and response procedures
Support EDR (CrowdStrike) monitoring and investigate endpoint-related alerts
Identify opportunities to use Splunk for operational and product monitoring beyond pure security use cases
Qualifications:
2+ years of experience in a security operations, detection engineering, or SIEM-focused role
Hands-on experience writing and tuning SPL queries in Splunk
Familiarity with common attack techniques and the MITRE ATT&CK framework
Experience with cloud platforms (AWS or GCP) and understanding of cloud-specific threats
Exposure to EDR platforms (CrowdStrike preferred) and CSPM tools
Understanding of log sources such as Okta, Google Workspace, endpoint logs, and network traffic
Strong analytical and troubleshooting skills with attention to detail
Clear written and verbal communication skills; ability to document findings and escalate effectively
Self-motivated and comfortable working autonomously with a distributed team
The base pay range for this position is $110,000-$130,000/year, which can include additional bonus depending on the position ultimately offered, in addition to a full range of medical, financial, and/or other benefits. The base pay offered may vary depending on job-related knowledge, skills, and experience.
Studies have shown that women, communities of color, and historically underrepresented people are less likely to apply to jobs unless they meet every single qualification. We are committed to building a diverse and inclusive culture where all Inkers can thrive. If you're excited about the role but don't meet all of the abovementioned qualifications, we encourage you to apply. Our differences bring a breadth of knowledge and perspectives that makes us collectively stronger.
We welcome and employ people regardless of race, color, gender identity or expression, religion, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, ethnicity, family or marital status, physical and mental ability, political affiliation, disability, Veteran status, or other protected characteristics. We are proud to be an equal opportunity employer.
$110k-130k yearly Auto-Apply 5d ago
Lead Security Engineer IV
Arrivia 4.7
Scottsdale, AZ jobs
At arrivia, we are on a mission to help people travel better and experience more. To support this mission, we are seeking a Lead SecurityEngineer (Level 4) to serve as a technical cornerstone for our corporate and product security posture. In this role, you will harden system boundaries, build advanced security tooling, and stay ahead of emerging threats. As a lead-level professional, you will act as a force-multiplier within the organization, mentoring less experienced staff and fostering a culture of security across our global workforce.
Primary Responsibilities
* Technical Leadership: Provide hands-on technical services to teams of specialists working on the integration of shared, centralized, and networked systems.
* System Hardening: Manage the secure deployment and maintenance of critical security systems, including EDR, DLP, CASB, SIEM, and network anomaly detection.
* AI Security Integration: Ensure responsible AI use by integrating security into the AI lifecycle and managing AI-related risks.
* Threat Detection and Automation: Utilize AI/ML to automate the detection of malware, phishing, and unusual network behavior in real-time.
* Research and Defense: Study new AI threats, such as prompt injection, and create innovative defensive techniques.
* Vulnerability Management: Lead vulnerability identification efforts using tools like Qualys and Microsoft Purview to highlight configuration errors and patch requirements.
* Incident Response: Serve as an active member of the incident response team, providing in-depth knowledge of security systems, exploits, and countermeasures for forensic analysis.
* Collaboration: Offer technical security services to network, systems, and database administrators, translating complex technology issues into understandable language for all stakeholders.
Required Qualifications
* 7+ years of dedicated experience in SecurityEngineering.
* Professional certification required: CISSP or CCNP-Security.
* Expert-level proficiency with Microsoft Defender, Microsoft Sentinel, Intune, CSPM, and Azure security services.
* Significant experience with security and compliance tools, specifically Qualys and Microsoft Purview.
* Bachelor's degree in MIS, Computer Science, Cybersecurity, or Engineering (or a minimum of 7 years in a dedicated IT Security position).
* Deep technical knowledge of API Security Architecture and technologies (OAuth2, Spring Security, HMAC, WS-Security).
* Comprehensive knowledge of security standards and guidelines, such as OWASP and CIS.
* Significant experience in at least two application security domains, such as Secure Coding, Cryptography, or Penetration Testing.
* Hands-on experience with AI projects, either in a professional or personal capacity.
* Expertise in SIEM systems and network/web protocols (TCP, UDP, ICMP, IPSEC, HTTP, HTTPS).
* Proven experience in incident management and threat remediation (isolation, identification, and eradication).
Preferred Qualifications
* CISM or CISA certification is preferred but not required.
* Strong understanding of ISO 27001/27701, HIPAA, PII, and PCI security principles.
* Experience with Privileged Identity Management (PIM) tools such as Microsoft PIM, CyberArk, or Thycotic.
Who We Are
Welcome to arrivia. We specialize in making brands better through the power of travel. With more than 55 years of combined experience, we are a merger of three powerhouse brands-ICE, SOR Technology, and WMPH Vacations. With offices on both coasts of the US and around the world, we embrace diversity and a passion for travel across our global staff. We are focused on building a customer-first culture and delivering innovative solutions.
Our Core Values
* Stay Curious: Explore new challenges and make space to learn, grow, and improve.
* Keep it Real: Earn trust through open, honest, and clear communication.
* Own it: Seek ways to make an impact and take action.
* Win Together: Create a culture of connection and inclusion where everyone can be their best.
$97k-127k yearly est. Auto-Apply 8d ago
Senior Cyber Defense Analyst
Abnormal 4.5
San Francisco, CA jobs
About the Role
We at Abnormal AI are looking for a hands-on Security Operations/ Cyber Defense Analyst who thrives in a fast-paced, engineering-driven environment. You'll be responsible for monitoring, investigating, and responding to security alerts across cloud, endpoint, identity, and application layers. You'll work closely with detection engineers, cloud security, and IT teams to protect our hybrid environment from threats in real time.
This is not a "click-through-the-console" SOC role - we're looking for someone who can think critically, automate relentlessly, and own incidents end-to-end.
Key Responsibilities
Detection & Triage:
Monitor alerts from tools like SIEM, EDR, IAM, CSPM, CDR etc.
Perform initial triage, enrichment, and correlation across multiple data sources.
Identify false positives and fine-tune rules with detection engineering.
Incident Response:
Lead containment, eradication, and recovery for endpoint, cloud, and identity incidents.
Document and communicate incidents through SOAR/Jira/ServiceNow workflows.
Perform root cause analysis and propose permanent preventive controls.
Threat Hunting & Analysis:
Proactively hunt using hypotheses mapped to MITRE ATT&CK.
Investigate anomalies across CloudTrail, Okta, GitHub, and other telemetry sources.
Collaborate with threat intelligence to identify emerging TTPs.
Automation & Process Improvement:
Build or enhance playbooks in SOAR (Torq or equivalent).
Create custom enrichment scripts and automations (Python, Bash, etc.).
Suggest new detection logic and operational improvements.
Reporting & Metrics:
Track and report operational metrics (MTTD, MTTR, incident categories).
Maintain documentation and lessons learned.
Required Skills & Qualifications
5-7 years of hands-on SOC or Incident Response experience in a cloud-first or hybrid environment.
Strong understanding of attacker lifecycle, MITRE ATT&CK, and threat actor TTPs.
Experience with EDR (CrowdStrike preferred), SIEM (Splunk preferred), and SOAR (Torq, XSOAR, or Phantom).
Familiarity with AWS, Okta, and SaaS platforms.
Proficiency in writing queries and automations using Python, SPL, or equivalent.
Excellent analytical and investigative skills - capable of operating independently with minimal hand-holding.
Strong documentation and communication skills for technical and executive audiences.
Nice to Have
Experience with CSPM/CDR/VM tools.
Knowledge of Containers and Kubernetes security.
Relevant certifications like CEH, Security+, GCIH, GCIA, or AWS Security Specialty.
What Success Looks Like
You consistently deliver high-quality triage with minimal false positives.
You automate repetitive tasks instead of manually doing them twice.
You can take a vague alert and turn it into a well-documented case with actionable findings.
#LI-EM5
You make measurable improvements to detection coverage, response time, or tooling maturity.
$89k-122k yearly est. Auto-Apply 60d+ ago
Information Security Risk Analyst
The Cheesecake Factory 4.2
Calabasas, CA jobs
Compensation Range $123,000 - $134,000 / Year Eligible for a hybrid work schedule split between home & office, with a minimum of 3 days in the office each week. You may be familiar with our extensive menu of delectable dishes and our recognition by Fortune Magazine as one of the "100 Best Companies to Work For" since 2014! But what you might not know is that we're a company driven by cutting-edge technology.
As an Information Security Risk Analyst reporting to the Information Security Manager, you'll be at the center of enterprise risk, compliance, and third-party oversight. This role is instrumental in building scalable security and governance processes that support growth, enhance resilience, and enable teams across the organization to move faster with confidence.
You'll thrive in this role if you are:
Stakeholder Savvy: You work confidently with auditors and senior leaders, communicating with clarity and professionalism that strengthens collaboration and drives alignment.
Precision Driven: You thrive in structured environments, bringing a process minded approach that ensures accurate, consistent, and high quality work every time.
Business Focused Translator: You turn complex security and risk concepts into clear business insights, helping leaders make informed, practical decisions with confidence.
Governance Minded: You're energized by policy, structure, and accountability-preferring governance, compliance, and risk work over hands on securityengineering.
Here's more of what you'll get to do:
Enterprise Governance & Compliance
* Lead and support audits including PCI DSS, SOX, and NIST CSF
* Coordinate evidence collection, control testing, and remediation tracking
* Maintain and enhance security policies, procedures, and audit documentation
* Partner with Internal Audit and Accounting on annual and quarterly audit requirements
Third-Party Risk Management (TPRM)
* Own the end-to-end third-party risk lifecycle
* Perform security assessments for new and existing vendors
* Partner with Legal, Procurement, and business teams on vendor risk decisions
* Develop risk scoring, reporting, and ongoing monitoring processes
Identity, Access & Directory Risk Oversight
* Review and analyze Active Directory and Entra ID access reports
* Support SOX access reviews and privilege validation
* Identify access anomalies and partner with IT/Security for remediation
* Ensure access changes follow approval and ticketing workflows
Risk Reporting, Automation & Insights
* Produce risk assessment and audit reports for leadership
* Assist with automating recurring audit and compliance reporting
* Track control failures, root causes, and remediation plans
What we require:
* 3+ years of experience in Governance, Risk & Compliance, IT Audit, or Security Risk
* Hands-on experience with at least one framework: PCI DSS, SOX, or NIST
* Working knowledge of identity governance concepts
* Strong analytical, documentation, and communication skills
What we prefer:
* Experience with TPRM programs or GRC platforms
* Exposure to public accounting, consulting, or regulated enterprises
* Relevant certifications (CISA, CISSP, ISO 27001) a plus
What we offer:
* Vacation and sick time
* Medical, Dental & Vision
* 401K with company match
* Tuition Reimbursement
* 25%-35% discount when dining as a guest
* Annual stipend for dining in our restaurants
About the Company:
Named to FORTUNE Magazine's "100 Best Companies to Work For" list every year since 2014, The Cheesecake Factory Incorporated is a leader in experiential dining. We are culinary-forward and relentlessly focused on hospitality. Delicious, memorable experiences created by passionate people-this defines who we are and where we are going.
We currently own and operate 353 restaurants throughout the United States and Canada under brands including The Cheesecake Factory, North Italia, Flower Child and a collection of other FRC brands. Internationally, 34 The Cheesecake Factory restaurants operate under licensing agreements. Our bakery division operates two facilities that produce quality cheesecakes and other baked products for our restaurants, international licensees and third-party bakery customers.
We are committed to creating an inclusive and welcoming workplace for all. We welcome applicants from a wide variety of identities, ideas, perspectives, backgrounds and experiences to apply. The Cheesecake Factory offers reasonable accommodations to job applicants with disabilities.
#SoCheesecake #LifeAtCheesecake
To notify of a non-compliant job posting, please send a notice to ****************************.
* 3+ years of experience in Governance, Risk & Compliance, IT Audit, or Security Risk
* Hands-on experience with at least one framework: PCI DSS, SOX, or NIST
* Working knowledge of identity governance concepts
* Strong analytical, documentation, and communication skills
What we prefer:
* Experience with TPRM programs or GRC platforms
* Exposure to public accounting, consulting, or regulated enterprises
* Relevant certifications (CISA, CISSP, ISO 27001) a plus
Enterprise Governance & Compliance
* Lead and support audits including PCI DSS, SOX, and NIST CSF
* Coordinate evidence collection, control testing, and remediation tracking
* Maintain and enhance security policies, procedures, and audit documentation
* Partner with Internal Audit and Accounting on annual and quarterly audit requirements
Third-Party Risk Management (TPRM)
* Own the end-to-end third-party risk lifecycle
* Perform security assessments for new and existing vendors
* Partner with Legal, Procurement, and business teams on vendor risk decisions
* Develop risk scoring, reporting, and ongoing monitoring processes
Identity, Access & Directory Risk Oversight
* Review and analyze Active Directory and Entra ID access reports
* Support SOX access reviews and privilege validation
* Identify access anomalies and partner with IT/Security for remediation
* Ensure access changes follow approval and ticketing workflows
Risk Reporting, Automation & Insights
* Produce risk assessment and audit reports for leadership
* Assist with automating recurring audit and compliance reporting
* Track control failures, root causes, and remediation plans
$123k-134k yearly Auto-Apply 10d ago
Cisco Network Security Consultant
Sv Tech Systems 3.9
Fort Worth, TX jobs
SV Tech Systems prides itself in being the leading provider of recruitment and staffing services for a wide range of industries. We provide staffing services to firms throughout the United States and Canada. We attract the best pool of talent with the aim of nurturing sound work ethics and solid values amongst a highly motivated and diverse workforce.
Title : Cisco Network Security Consultant
Duration : 12 Months Contract
Location : Ft. Worth, TX 76102
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
Job Description:
Assists with the design, development and maintenance of the computer and network infrastructure. Typically has at least 3 years experience and professional degree. Expert in supporting Checkpoint/Solaris firewalls in a high-availability enterprise environment. Excellent customer service experience highly desired to fit culture. Strong Checkpoint, Solaris and Cisco network skills.
In-depth experience in Network Security technology architecture design, evaluation, deployment or support that addresses one or more of the following security areas:
• Firewalls
• VPN
• Authentication
• Encryption
• Vulnerability Assessment
• Penetration Analysis
• Intrusion Detection
Qualifications
Provide operational support and maintenance of Cisco Security Technologies. The successful candidate will have experience configuring, supporting, and maintaining with Cisco ASAs configured to provide Firewall services, VPN Services, and IPS services.
• Require excellent communication skills as this position will interface with both the customer and other IT and Non-IT organizations with the business.
• Customer first attitude.
• Ability to work in inter-departmental and intra-departmental collaborative team environments.
• Ability to deploy new Firewalls with and without the use of configuration templates.
• Ability to add, change and delet e firewall access lists .
• Understand the order of NAT operations and be able to implement the various type of NAT (PAT, Static NAT, NAT exemption, etc.).
• Troubleshoot Firewall access issues though the use of Enterprise Log Management Tool.
• Perform Intrusion Prevention System signature updates and signature filtering
• Configure SSL VPN groups and authentication methods.
• Candidate should have a firm understanding of the Multiple Context technology and its limitations; Hands-on experience preferred.
• Experience with Cisco Security Manager is desired.
• Experience with Firemon is desired.
• Generation of technology documentation and diagramming with tools such as Visio.
• Additional security-related tasks as required.
• Work hours are approx. 8:30AM - 5:30PM CST.
• Work to be onsite in downtown Fort Worth. Working remote or from home is not available.
• Part of on-call rotation approximately 1 Week Every Month; light duty.
• No travel is anticipated but should be available for light travel if required (10% or less).
• Availability to perform after hours and weekend work as required.
• Position Length: 6 - 12 Months minimum. Position is not currently expected to be converted to Full Time.
Require CCNA Security, Cisco Firewall Security Specialist, or Cisco VPN Security Specialist certifications. CCNP Security / CCSP Preferred.
• Candidate will be required to take a hands-on skill assessment.
• Start date will be 2 weeks after successful candidate accepts contract position.
Additional Information
Regards,
Praveen,
Technical Recruiter,
Office: **************
*****************************************
**********************************
$86k-114k yearly est. 3d ago
Information Security Analyst
New York Jets 3.5
Florham Park, NJ jobs
Job Summary: The New York Jets and associated Family Financial Office are seeking a motivated, detail-oriented Information Security Analyst to join our IT team and help protect the organization's digital assets, including fan data, internal systems, ticketing platforms, and operational networks. In this support role, you will assist in monitoring threats, supporting security controls, responding to incidents, facilitating audits, supervising risk assessments, and contributing to our overall cybersecurity posture. This is an excellent opportunity for someone early in their cybersecurity career to gain hands-on experience in a fast-paced, high-profile environment while working under senior guidance.
Key Responsibilities:
• Monitor security tools and dashboards (e.g., SIEM alerts, endpoint detection, network logs) for suspicious activity and escalate potential issues to senior team members.
• Assist in conducting vulnerability scans, reviewing results, and helping document findings for remediation.
• Support the implementation and maintenance of security measures, such as patch management, antivirus/endpoint protection updates, and access controls.
• Help investigate and document security incidents or alerts, following established incident response procedures.
• Participate in user awareness activities, such as creating or updating security training materials and phishing simulation support.
• Assist with compliance tasks, including data protection for sensitive information (e.g., PCI-DSS for payments, GDPR/CCPA for fan data, HIPAA) and basic audit preparation.
• Collaborate with IT staff on secure configurations for systems, cloud services (e.g., Microsoft Azure/365), and applications.
• Support the management of backup solutions, including monitoring backup jobs, validating successful backups, and assisting with periodic recovery testing and documentation.
• Stay current on emerging threats and basic cybersecurity trends through self-study and team discussions.
• Contribute to documentation of security policies, procedures, and runbooks.
Qualifications & Requirements:
Education:
• Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field (or equivalent experience/combination of education and certifications). Associate's degree with strong relevant certifications considered.
Experience:
• 2+ years of relevant experience (internships, co-ops, or IT support roles with security exposure count).
• Familiarity with IT fundamentals (e.g., networking basics, operating systems like Windows/Linux, cloud concepts) preferred.
Skills & Knowledge:
• An understanding of cybersecurity concepts (e.g., threats, vulnerabilities, encryption, firewalls, access controls).
• Familiarity with NIST standards
• Strong analytical and problem-solving skills with attention to detail.
• Excellent communication skills (written and verbal) for documenting findings and collaborating across teams.
• Ability to learn quickly in a dynamic environment.
• Proficiency with Microsoft Office 365 tools; familiarity with security tools (e.g., Microsoft Defender, Crowdstrike, ArticWolf, Cisco Umbrella, Netwrix, Thycotic, Mimecast) is a plus.
• Familiarity with Rubrik Security Cloud and related products a plus.
Certifications (Preferred):
• CompTIA Security+ (highly desired)
• CompTIA Network+ or A+
• CISSP (optional)
Other:
• Passion for cybersecurity and interest in sports/entertainment industry a plus.
• Ability to work off-hours for incident response or maintenance (on-call rotation may apply).
• This role may require occasional travel to New York City to support business or operational needs.
• Must pass background check (standard for roles handling sensitive data).
Salary range for this role: USD $80,000 - $90,000 per year and discretionary annual company bonus, dependent on the specific qualifications of the successful candidate. Company benefit programs for full-time employees include: robust medical, dental and vision insurance, flexible-spending and dependent-care account options, company-paid life, AD&D, and disability insurance plans, with additional voluntary supplemental term life & AD&D insurance options, and a variety of other health & wellbeing offerings; 401k plan participation (after 500 hours of service) with company-match and discretionary employer-funded defined contribution; PTO, sick time, paid maternity/parental leave; and access to tickets and parking for all New York Jets home games.
GENERAL INFORMATION A background check will be conducted prior to the start of the position. The New York Jets are proud to be an equal opportunity employer. It is the policy of the Company to provide equal employment opportunities to all employees and applicants for employment without regard to race, creed, color, religion, sex, national origin, age, disability, marital status, military status, genetic information, sexual orientation, gender (including gender nonconformity, status as a transgender individual, gender identity or expression), pregnancy, childbirth or related medical conditions, sexual orientation, affectional orientation, marital status, civil union status, and domestic partnership status, age, physical or mental disability, genetic information, service in the uniformed services, or any other characteristic protected by federal, state or local law. The New York Jets are committed to providing reasonable accommodations for candidates with