Manager, IT Security Readiness
Security architect job at Vanguard Services
As a security readiness manager, you will drive proactive risk assurance across the organization embedding security readiness into every layer of the enterprise. In this role, you'll lead a skilled team focused on delivering robust security assessments that protect systems, architectures, and configurations from emerging threats. You'll drive improvements in risk assessment processes and collaborate across functions to ensure resilience against evolving threats, and champion security-first practices that protect critical assets and enable business continuity. This Hybrid role (in office Tues-Wed-Thurs) can be based in Charlotte, NC, Dallas, TX, or Malvern, PA (HQ)
Responsibilities:
* Team Development: Hire, evaluate, and supervise team members. Provide coaching, mentorship, and training to build skills and foster growth.
* Performance Management: Set clear performance standards, conduct reviews, and make informed compensation decisions in alignment with HR policies.
* Culture & Engagement: Promote a collaborative, high-performance culture focused on security excellence.
* Risk Identification: Lead and conduct security assessments to evaluate the adequacy of existing controls and identify vulnerabilities, integration requirements, and emerging risks.
* Corrective Actions: Recommend and oversee implementation of remediation measures for identified risks.
* Continuous Improvement: Maintain and enhance processes for evaluating security requirements across systems, networks, and applications.
* Policy Alignment: Ensure security plans, risk assessments, and control techniques comply with organizational policies and regulatory requirements.
* Process Assurance: Validate adequacy of development, testing, and implementation processes for security initiatives.
* Security Solutions: Drive adoption of new security technologies and initiatives to strengthen enterprise resilience.
* Technical Support: Guide the team in providing technical expertise for risk assessments and secure implementation of systems and products.
* Stakeholder Engagement: Coordinate with IT divisions, business units, and third-party partners to assess the impact of technology changes on operations.
* Vendor Management: Assist in managing vendor relationships and participate in vulnerability mitigation and acceptance processes.
* Reporting: Oversee reporting on information security risks and communicate findings to leadership.
* Special Projects: Participate in enterprise-wide initiatives and other duties as assigned.
Education & Experience:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
Minimum 5 years of relevant work experience, including 3 years in IT security or application development.
Supervisory experience preferred.
Certifications (Preferred):
CISSP, CRISC, CCSP, GSEC, GPEN, GWPN, CEH, or equivalent security certifications.
Skills & Competencies:
Strong knowledge of security frameworks (e.g., NIST, ISO 27001).
Expertise in vulnerability assessment tools and methodologies.
Ability to lead teams and manage cross-functional initiatives.
Excellent analytical, problem-solving, and communication skills.
Experience assessing risk for AI/GenAI platforms, applications, and solutions.
Special Factors
Sponsorship
Vanguard is not offering visa sponsorship for this position.
About Vanguard
At Vanguard, we don't just have a mission-we're on a mission.
To work for the long-term financial wellbeing of our clients. To lead through product and services that transform our clients' lives. To learn and develop our skills as individuals and as a team. From Malvern to Melbourne, our mission drives us forward and inspires us to be our best.
How We Work
Vanguard has implemented a hybrid working model for the majority of our crew members, designed to capture the benefits of enhanced flexibility while enabling in-person learning, collaboration, and connection. We believe our mission-driven and highly collaborative culture is a critical enabler to support long-term client outcomes and enrich the employee experience.
Auto-ApplyApplication Security Engineer
Manhattan Beach, CA jobs
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
IT Network / Security Analyst
Fort Worth, TX jobs
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Sr. Cloud Security Architect-(GPC) San Antonio, Dallas, Austin, TX
San Antonio, TX jobs
Responsibilities Our Partners thrive The H-E-B Way. As a Cloud Security Architect, you would have a… HEART FOR PEOPLE… you have a passion for mentorship and guidance, and love for the direct person-to-person interactions that create strong bonds between teams
HEAD FOR BUSINESS… you have an ownership mentality and a consistent track record of timely delivery of high-quality software
PASSION FOR RESULTS… the ability to guide the discussion, remove roadblocks, and provide guardrails for your team as they identify challenges and propose solutions
Cloud Security Architects create and drive the architecture and design patterns for H-E-B's cloud security architecture, for both hybrid and cloud-first models. Cloud Security Architects will perform analysis of existing cloud security and ancillary service configurations, design and create new or enhanced security improvements. Cloud Security Architects also provide consultative services and work with internal business team members and external vendors to collect requirements, design specifications, and create solutions that are aligned with H-E-B cloud security strategy.
ROLE
* Serves as a subject matter expert for cloud security, providing guidance on industry best practices and defense in-depth strategies for the security posture of H-E-B cloud-based digital platforms.
* Works with project teams to measure the testing and evaluation of new solutions ensuring satisfaction of H-E-B security requirements.
* Works with internal Information Systems teams to design security controls and improve cloud security infrastructure to support business/engineering needs.
* Creates best-of-class security architecture designs and patterns for H-E-B, using defensible industry reference architectures and standards.
* Works to measure and design tests of cloud configurations and infrastructure for vulnerabilities and security relevant defects.
* Works to ensure all cloud infrastructure designs and implementations follow security and compliance control requirements, and to resolve any configuration gaps or defects through collaboration with respective stakeholders.
* Designs, develops, documents, automates, and implements security infrastructure in code.
* Creates and maintains security architecture specifications and design documentation.
* Supports setting the strategic security direction and approach for utilizing cloud-relevant technologies.
REQUIRED
* 7+ years of experience with the design and implementation of complex solutions in medium to large enterprises.
* 5+ years of experience building and integrating systems in public or hybrid cloud environments.
* 3+ years of experience with information security.
* Experienc with Google Cloud Platform and preferred working knowledge of the security tools and practices offered by the platforms.
* Working knowledge of Terraform, Cloud Formation, Azure ARM Template, Pulumi, and/or Ansible with demonstrable proficiency with at least one.
* Solid understanding of web applications, web servers, application firewalls, frameworks, and protocols with respect to web application development, deployment, and operation in the cloud.
* Proficiency with cloud resources such as virtual networking, access controls (security groups and ACLs), service endpoints, application and network load balancing, API gateways, service meshes, service principals, functions/serverless, storage buckets, containers, block storage and file shares.
* Working knowledge of information security controls, guidelines and standards (e.g., ISO27000 series, OWASP, CSA CCM, CIS 20 Critical Security Controls, SOC 2, and NIST).
* Experience and at least basic understanding of privacy and data protection regulations (e.g., PCI DSS and HIPAA/HITECH).
* Proficiency with one of: Python, Golang, JavaScript, PowerShell, Perl, or *nix Shell scripting.
* Proficiency with secrets management and vaulting technologies.
* Familiarity with Agile and other project methodologies.
* Ability to work well under pressure and have great organizational and interpersonal skills.
* Familiarity with CSPM/CNAPP
RECOMMENDED
* A Bachelor's degree in Computer Science or Software Engineering.
* One or more professional security certifications such as CISSP, CISA, CEH, GIAC; and cloud certifications from AWS, Azure and/or GCP.
* Experience with cloud security tools for discovery, compliance, and vulnerability detection.
JDSECURITY
ISSEC3232
SAP BODS Administrator
Los Angeles, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
8+ Years of SAP BODS Experience. Good understanding in reporting concepts, upgrade BODS to the latest version, Installation, configuration and fixing jobs.
2 Years of Experience in Information steward & BODS Upgrade Experience
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: Phone & Skype
SAP BODS Administrator
Los Angeles, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
8+ Years of SAP BODS Experience. Good understanding in reporting concepts, upgrade BODS to the latest version, Installation, configuration and fixing jobs.
2 Years of Experience in Information steward & BODS Upgrade Experience
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: Phone & Skype
SAP BI 4.0 Administrator
Dallas, TX jobs
Job Description & Expectations
Be a self starter on a team of highly qualified and knowledgable employees and consultants who have years of SAP BOBJ experience and need you to assist them in the move to BI 4.0.
The Business Objects Administrator will be responsible for the implementation and support of Business Objects Suite of tools
Mentor and provide expertise to team members when it comes to the differences in the BI 4.0 environment when compared with the XI3.1 environment.
Provide support for SAP Business Objects Suite - Includes installation, configuration, monitoring and upgrade management.
·
Provide expertise in undocumented challenges with BI 4.0 configuration and content migrations (Crystal, WEBI, Universes and Dashboards)
Assist in the setting up of a new BI 4.0 Environment.
Contribute to client satisfaction by providing timely and responsive value added business solutions and work products.
Business requirements analyst. Analyze and evaluate requests for new or modified reporting access needs to determine feasibility, cost and time required, compatibility with current system.
Required Skills
Business Objects Administration in BI 4.0 and XI3.1
Technical Architecture Design with Business Objects
Required Experience
Demonstrated success in building, implementing and supporting BI enterprise
Demonstrated proficiency using BI tools (Business Objects Suite 4.0, Business Objects Suite XI R3.1).
Experience upgrading BusinessObjects XI 3.1 to BI 4.0
Knowledge and Experience in sizing BI 4.0.
Experience as a Business Objects administrator in an organization with at least 500 users
Experience in a technical advisory and implementation role with at least one major release upgrade of Business Objects.
Experience in a technical advisory and implementation role for a Business Objects upgrade in which an upgraded system is to be run in parallel with legacy system for an extended period of time.
Preferred Skills & Experience
Installing BI 4.0 in a virtualized enivironment, a plus.
Ability to communicate effectively and efficiently with team, management, customers and vendors
Experience with Tomcat (preferred) or other java web application server.
Understanding of connectivity to various data sources such as BW, Oracle and SQL Server is a plus.
Experience with Crystal Reports, Universes, Webi, SAP Dashboards and Oracle a plus
Additional Information
Start date - ASAP.
6m contract
SAP GRC Security
Dallas, TX jobs
Job DescriptionWe are looking for a great SAP Security consultant who has hands on experience with GRC 10. Duration: 3m (possible extension) Location: Plano, TX Must have: GRC 10Start Date: May 1stExperience: 5-7 yrs Good communication skills
Additional Information
Contract, 3M+
Apply today!
Information Security Engineering Manager
Emeryville, CA jobs
About Grocery Outlet: * Our Mission: Touching lives for the better * Our Vision: Touching lives by being the first choice for bargain-minded consumers in the U.S. * Our Values & Behaviors: Achievement, Diversity, Entrepreneurship, Family, Fun, Integrity & Service
About the Team:
Our IT team's mission is to push the boundaries of technology with the intention of going above and beyond to aid stores and customers and deliver timely solutions to benefit all members of Grocery Outlet. Our team consists of problem solvers and go-getters who are dedicated to being service-oriented and solving important problems.
About the Role:
We are seeking a Security Engineering Manager to design, implement, and maintain robust security systems that protect Grocery Outlet's digital infrastructure and data. This is a highly technical hands-on individual contributor role. You will be responsible for identifying vulnerabilities, developing security protocols, configuring security tools, responding to security incidents while ensuring compliance with SOX and CPPA/CPRA. This role reports to the Director - Information Security.
Responsibilities:
* Provide technical leadership and oversight to overall security activities and initiatives.
* Install and maintain security products.
* Data Security Posture Management, Vulnerability Management, Cloud Security, Identity and Access Management, Web Application Firewall, Static Application Security Testing, etc.
* Harden systems for cyber resilience, create and maintain systems configuration baselines.
* Conduct gap analyses, security lifecycle and business impact assessments, design requirements assessments, along with new technology impact assessments.
* Review and respond to security findings and alerts generated by the Managed Security Services Provider (MSSP), covering system events, log files, and alerts across operating systems, networking equipment, DLP, EDR, and cloud environments.
* Ensure proper configuration and tuning of CrowdStrike and Cloudflare to align with the environment and can create and manage custom dashboards for ongoing visibility and reporting.
* Analyze network security alerts and events: analyze logfiles, packet captures, network flows and flowrates.
* Provide intelligence support during incident response and forensic security investigations.
* Lead pentest and security assessment remediation efforts in conjunction with Technology Operations team.
* Process and enrich information to ensure timely, actionable, high confidence IOCs are ingested and shareable.
* Conduct technical analysis based upon industry accepted threat intelligence analytical frameworks, tools, and standards.
* Assisting with SOX compliance efforts, including audit support and access provisioning.
* Participate in change management process as technical stakeholder.
* With guidance of the compliance team, assist with audit walkthroughs.
Environments, Tools, and Programing Languages
* Cloud Environments: Google Cloud Platform (GCP), Microsoft Azure, AWS
* Programming Languages: Python, PowerShell, Java
* Operating Systems: Windows, mac OS, Linux
* Security Tools: Data Loss Prevention (DLP), EDR, WAF, CNAPP
About The Pay:
* Base Salary Range: $130,000 - $160,000 Annually
* Annual Bonus Program
* Equity
* 401(k) Profit Sharing
* Medical, Dental, Vision & More!
* Final compensation will be determined based upon experience and skills and may vary based on location.
About You:
* Bachelors degree in Cybersecurity, Computer Science, or related field from an accredited university. Master's degree or equivalent experience preferred.
* 5 - 7 years in cybersecurity roles with hands-on experience in security architecture, security operations, incident response, and risk assessment.
* Ability to understand how different security components fit together into a cohesive defense in depth strategy, identify gaps in coverage, and design solutions that maximize detection and response capabilities across the environment.
* Ability to quickly assess alerts, separate signal from noise, conduct forensic investigation when needed, and make rapid decisions on containment and remediation.
* Proficiency with industry-standard security tools, cloud platforms (GCP/AWS/Azure).
* Expertise in Crowdstrike and Cloudflare, working knowledge of SAP HANA.
* Scripting languages: Python, PowerShell to automate repetitive tasks, build integrations, create custom tools, and enhance EDR capabilities.
* Knowledge of security frameworks like NIST CSFO, 800 Series, and CIS Critical Security Controls.
* CISSP, CISM and/or CISA certifications.
* Strong analytical and problem-solving abilities, excellent communication skills, and ability to work effectively under pressure during security incidents.
* Must be detail oriented with collaborative mindset and thrive on finding effective ways to balance security with user experience and customer needs.
To learn about how we collect, use and secure your personal information. Click here to see our privacy policy.
Global Digital Platforms Architect
Paris, TX jobs
Want to join a fast-moving company, work among convivial teams, and take part in shaping the future of the Wine & Spirits industry with cutting-edge technology? Join Pernod Ricard's Global Tech team and embark on a transformative journey aiming to support our business ambitions with valuable Tech products and services. Our global Tech team operates in an agile manner within a dynamic product organization. This is your chance to thrive in a collaborative environment, grow through upskilling and continuous development, and play a direct role in shaping the path for our industry.
Ready to make a Tech impact? Pernod Ricard is looking for a Senior Expert Platform Architect to design, develop, and maintain digital platform components and ensure alignment with global standards and business needs.
From our HQ in central Paris, connect with our experts located across the world, and start an exciting journey with international opportunities.
Your key missions:
You will:
* Design and deliver technical components for digital platforms in collaboration with agile squads, ensuring robustness, scalability, and alignment with global architecture and security standards.
* Lead technical studies and prototype solutions that address product requirements; oversee development, testing, rollout, and integration into the PR tech landscape.
* Ensure maintainability and continuous improvement of developed components; monitor performance metrics and drive redesign initiatives when needed.
* Document and share technical insights to ensure smooth knowledge transfer across delivery and proximity teams.
* Participate in transversal architecture initiatives, bring forward best practices, and coach others to continuously enhance engineering capabilities.
If you recognize yourself in the description below, don't wait to apply!
* You have proven experience in platform architecture with deep technical expertise across backend and frontend technologies.
* You are comfortable working with both Azure and AWS (50/50 exposure), and tools like Azure Functions, App Services, CloudFront, EC2, ECS, Route53, RDS, and S3.
* You are proficient in CMS platforms (e.g., Wordpress, Drupal), DevSecOps principles, web hosting, and automation for web administration.
* You have strong knowledge of API design, integration, middleware, cloud infrastructure, security, and performance monitoring.
* You're skilled in SQL, PHP and/or .Net, and understand Git and DevOps fundamentals.
* You bring strong communication skills and are able to collaborate with both technical and non-technical stakeholders across global squads.
* You have experience working with digital marketing and commerce platforms to manage and scale global websites.
Wait, there's more…
We offer you an outstanding and collaborative workplace that embodies our sharing & conviviality culture, the possibility to work remotely (up to 2 days a week), a very complete mutual insurance, an attractive compensation including profit-sharing, the possibility to train daily, employee events…
Pernod Ricard is committed to offering equal opportunities to all talents. Our recruitment methods focus on skills and competencies.
Job Posting End Date:
Target Hire Date:
2025-11-01
Target End Date:
Auto-ApplySap Security Grc
Irving, TX jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
REQUIRED SAP GRC Modules
ARA (access risk analysis)
EAM (Emergency Access Module)
WORK ACTIVITIES/CONTEXT:
Supports SAP security design for SAP ECC, Portal, and GRC to ensure that all application modules are functional and secure.
Ensures alignment with security policies, procedures, and industry standards.
Collaborates with Technology on the development and maintenance of SAP security policies and procedures based on industry-standard best practices.
Keeps current with emerging SAP Security or GRC alerts and issues.
Attends formal training sessions and/or conferences to enhance skills relevant to position.
Evaluates new processes and systems for gaps, risks, or improvements to security processes, and makes recommendations for aligning with the SAP Program and controls structure.
Stays current on upcoming system implementations and business process changes that impact SAP security or GRC processes.
Manages and supports the SAP GRC Access Risk Analysis module for segregation of duties, emergency access, and access provisioning oversight.
Troubleshoots existing user roles, security objects and authorizations to resolve issues for various SAP Landscapes (ECC, Portal, GRC)
Maintains knowledge in designated core business processes (i.e. Accounts Payable, Payroll) and is knowledgeable in how SAP facilitates those business processes from a controls perspective. Maintains an understanding of applications that interface with SAP through continuous learning, participation in user forums and “best practice” research.
Provides legendary Customer Service to Internal and External Customers by providing security process improvement guidance related to changes to existing processes or development of new processes that utilize SAP and peripheral systems.
May assist in the development of business cases to help prioritize opportunities and champion security improvement projects. May be required to facilitate discussions with various Internal Customers to facilitate business case development.
Participates heavily in SAP ECC, Portal, or GRC design, data conversion, testing, and implementation of security changes and associated documentation.
Responsible for ensuring that SAP security changes implemented adhere to Company change management policies. Documentation requirements for SAP security-related are completed timely and as expected to ensure that appropriate technical documentation exists.
Documents requirements for SAP security-related interfaces (inbound and outbound), including data mapping, functional specifications, test plans, and error handling procedures. Will be responsible for creating test data, testing interfaces, defect resolution, and ongoing production support of SAP interfaces.
Reviews test results for SAP enhancements, defects, and project implementations to ensure integrity and completeness of testing activities as it relates to security or GRC processes.
Provides timely support for SAP- incidents or service requests related to production Security or GRC issues, defects, job requests, research, or access requests.
May perform risk assessments of data integration points with SAP, and as needed, assists in the design of appropriate controls.
Serves as liaison between business users and Technology support.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
BASIC QUALIFICATIONS:
High School Diploma, GED or equivalent education required.
Must be at least 18 years of age.
Must have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
EDUCATION:
Bachelor's degree with the focus in Business Management Information Systems or Computer Science disciplines required.
WORK EXPERIENCE:
3-5 years of relevant professional work experience required.
3+ years of SAP ERP ECC Security experience required.
3+ years working across multiple financial and/or business processes (Finance, HR, Technology, etc).
SAP GRC 10.0 experience preferred.
LICENSING / CERTIFICATION:
Professional certification such as SAP Certification, PMP, or CISA preferred, but not required.
SKILLS / ABILITIES / KNOWLEDGE / WORK STYLE:
Must be able to comply with Company attendance standards as described in established guidelines.
Must be able to comply with Company attendance standards as described in established guidelines.
Extensive knowledge of SAP ECC role based security and GRC 10.0
Deep knowledge of Structural Authorization and Portal
Knowledge of Identity Manager, as it relates to automatic provisioning of access.
Ability to conduct research into security issues, standards, and products as required.
Ability to solve problems quickly and automate processes
Proficiency in areas of business continuity, security, and data privacy; ensures systems are designed and built with appropriate levels of protection.
Strong analytical and organizational skills are required
Demonstrates the ability to successfully manage multiple assignments and/or projects simultaneously.
Handles responsibilities and achieves desired results with minimal supervision.
Must have ability to perform well under pressure
Ability to use a computer with speed and accuracy sufficient to meet the demands of the job.
Demonstrates integrity in all actions and decisions.
Has demonstrated capacity to translate broad Company objectives into specific actionable items associated with designated business processes.
Maintains an understanding of end to end business processes.
Good oral and written communication skills; good meeting facilitation and presentation skills.
Strong time management and organizational skills, with the ability to manage detailed, concurrent tasks.
Ability to meet deadlines with quality results while managing risk.
Displays a sense of urgency.
Experience with SAP GRC Access Control configuration and widely accepted practices for implementing SAP GRC Access Control.
Experience with requirements gathering techniques and preparation of requirements documents.
Accurate and complete testing and documentation skills.
Ability to effectively manage projects from initiation through to implementation using SWA preferred methods.
Identifies project risks and routinely pursues mitigation strategy.
Proficiency in progress reporting methods and techniques and risk management methods and techniques.
Ability to see beyond today's activities and proactively plan for the future, aligning with Company objectives.
Strong analytical and problem-solving skills and demonstrated use of analytical and problem-solving skills.
Demonstrates strong ability to think strategically, not just the limited scope of one aspect of a project.
Demonstrated ability to assemble and organize data and lead a fact-based approach to drive an optimal solution for the Company.
Demonstrates dedicated, proactive Customer Service to all Internal and External Customers.
Willing to take responsibility for finding solutions, even if problems are not in the sphere of influence.
Knowledge of designated core business processes.
Working knowledge of SOX and internal controls compliance.
Positively influences the behavior of others and works effectively as part of a Team.
Proficiency in Microsoft Outlook, Excel, Word & PowerPoint.
OTHER QUALIFICATIONS:
Must meet confidentiality expectations as to confidential, proprietary and sensitive Company information.
Must successfully complete the evaluation period.
Occasional travel and/or extended work hours may be required with possibly increased or concentrated frequency, depending on specific assignment.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Must be a U.S. citizen or have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
SAP SECURITY GRC
Irving, TX jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
REQUIRED SAP GRC Modules
ARA (access risk analysis)
EAM (Emergency Access Module)
WORK ACTIVITIES/CONTEXT:
Supports SAP security design for SAP ECC, Portal, and GRC to ensure that all application modules are functional and secure.
Ensures alignment with security policies, procedures, and industry standards.
Collaborates with Technology on the development and maintenance of SAP security policies and procedures based on industry-standard best practices.
Keeps current with emerging SAP Security or GRC alerts and issues.
Attends formal training sessions and/or conferences to enhance skills relevant to position.
Evaluates new processes and systems for gaps, risks, or improvements to security processes, and makes recommendations for aligning with the SAP Program and controls structure.
Stays current on upcoming system implementations and business process changes that impact SAP security or GRC processes.
Manages and supports the SAP GRC Access Risk Analysis module for segregation of duties, emergency access, and access provisioning oversight.
Troubleshoots existing user roles, security objects and authorizations to resolve issues for various SAP Landscapes (ECC, Portal, GRC)
Maintains knowledge in designated core business processes (i.e. Accounts Payable, Payroll) and is knowledgeable in how SAP facilitates those business processes from a controls perspective. Maintains an understanding of applications that interface with SAP through continuous learning, participation in user forums and “best practice” research.
Provides legendary Customer Service to Internal and External Customers by providing security process improvement guidance related to changes to existing processes or development of new processes that utilize SAP and peripheral systems.
May assist in the development of business cases to help prioritize opportunities and champion security improvement projects. May be required to facilitate discussions with various Internal Customers to facilitate business case development.
Participates heavily in SAP ECC, Portal, or GRC design, data conversion, testing, and implementation of security changes and associated documentation.
Responsible for ensuring that SAP security changes implemented adhere to Company change management policies. Documentation requirements for SAP security-related are completed timely and as expected to ensure that appropriate technical documentation exists.
Documents requirements for SAP security-related interfaces (inbound and outbound), including data mapping, functional specifications, test plans, and error handling procedures. Will be responsible for creating test data, testing interfaces, defect resolution, and ongoing production support of SAP interfaces.
Reviews test results for SAP enhancements, defects, and project implementations to ensure integrity and completeness of testing activities as it relates to security or GRC processes.
Provides timely support for SAP- incidents or service requests related to production Security or GRC issues, defects, job requests, research, or access requests.
May perform risk assessments of data integration points with SAP, and as needed, assists in the design of appropriate controls.
Serves as liaison between business users and Technology support.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
BASIC QUALIFICATIONS:
High School Diploma, GED or equivalent education required.
Must be at least 18 years of age.
Must have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
EDUCATION:
Bachelor's degree with the focus in Business Management Information Systems or Computer Science disciplines required.
WORK EXPERIENCE:
3-5 years of relevant professional work experience required.
3+ years of SAP ERP ECC Security experience required.
3+ years working across multiple financial and/or business processes (Finance, HR, Technology, etc).
SAP GRC 10.0 experience preferred.
LICENSING / CERTIFICATION:
Professional certification such as SAP Certification, PMP, or CISA preferred, but not required.
SKILLS / ABILITIES / KNOWLEDGE / WORK STYLE:
Must be able to comply with Company attendance standards as described in established guidelines.
Must be able to comply with Company attendance standards as described in established guidelines.
Extensive knowledge of SAP ECC role based security and GRC 10.0
Deep knowledge of Structural Authorization and Portal
Knowledge of Identity Manager, as it relates to automatic provisioning of access.
Ability to conduct research into security issues, standards, and products as required.
Ability to solve problems quickly and automate processes
Proficiency in areas of business continuity, security, and data privacy; ensures systems are designed and built with appropriate levels of protection.
Strong analytical and organizational skills are required
Demonstrates the ability to successfully manage multiple assignments and/or projects simultaneously.
Handles responsibilities and achieves desired results with minimal supervision.
Must have ability to perform well under pressure
Ability to use a computer with speed and accuracy sufficient to meet the demands of the job.
Demonstrates integrity in all actions and decisions.
Has demonstrated capacity to translate broad Company objectives into specific actionable items associated with designated business processes.
Maintains an understanding of end to end business processes.
Good oral and written communication skills; good meeting facilitation and presentation skills.
Strong time management and organizational skills, with the ability to manage detailed, concurrent tasks.
Ability to meet deadlines with quality results while managing risk.
Displays a sense of urgency.
Experience with SAP GRC Access Control configuration and widely accepted practices for implementing SAP GRC Access Control.
Experience with requirements gathering techniques and preparation of requirements documents.
Accurate and complete testing and documentation skills.
Ability to effectively manage projects from initiation through to implementation using SWA preferred methods.
Identifies project risks and routinely pursues mitigation strategy.
Proficiency in progress reporting methods and techniques and risk management methods and techniques.
Ability to see beyond today's activities and proactively plan for the future, aligning with Company objectives.
Strong analytical and problem-solving skills and demonstrated use of analytical and problem-solving skills.
Demonstrates strong ability to think strategically, not just the limited scope of one aspect of a project.
Demonstrated ability to assemble and organize data and lead a fact-based approach to drive an optimal solution for the Company.
Demonstrates dedicated, proactive Customer Service to all Internal and External Customers.
Willing to take responsibility for finding solutions, even if problems are not in the sphere of influence.
Knowledge of designated core business processes.
Working knowledge of SOX and internal controls compliance.
Positively influences the behavior of others and works effectively as part of a Team.
Proficiency in Microsoft Outlook, Excel, Word & PowerPoint.
OTHER QUALIFICATIONS:
Must meet confidentiality expectations as to confidential, proprietary and sensitive Company information.
Must successfully complete the evaluation period.
Occasional travel and/or extended work hours may be required with possibly increased or concentrated frequency, depending on specific assignment.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Must be a U.S. citizen or have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
OT Security Engineer
Pennsylvania jobs
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are seeking an OT Security Engineer for our First Quality Enterprise working remotely. In this position, you will play a pivotal role in safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety.
Primary responsibilities include:
* Develop, configure, and maintain OT security tools and processes to improve Incident response capabilities.
* Monitor OT security events, assess threats, and respond to security incidents within the OT environment in coordination with the SOC team.
* Create and present reports, dashboards, and metrics on OT security posture and incident response activities to senior management.
* Collaborate with a multidisciplinary team to design, implement, and maintain security controls for all current and future OT environments and projects.
* Design, configure and maintain OT cybersecurity solutions, ensuring seamless integration into our industrial control systems.
* Lead threat management efforts by identifying vulnerabilities, assessing risks, performing threat modelling, identifying threat vectors, and conducting penetration tests to implement corrective actions.
* Examine and enhance processes to strengthen the OT security operations framework, including reviewing policies, updating incident response playbooks, and highlighting challenges in managing SLA's.
The ideal candidate should possess the following:
* Minimum of five (5) years of professional experience in OT security and operations.
* Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.)
* Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443
* Experience in defining and implementing security controls for OT engineering projects.
* Experience managing projects with the abilities to prioritize tasks and manage time effectively.
* Experience in developing, configuring, and maintaining OT security automation and orchestration tools.
* Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplySecurity Engineer
San Francisco, CA jobs
Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises.
At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you!
How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market.
What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time.
Core responsibilities and role responsibilities include:
Responsibilities
Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations
Identify and mitigate common and emerging threats in delegated authentication workflows
Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models
Help define system boundaries for multi-agent, multi-tenant orchestration
Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines
Convert security findings into high-signal engineering tickets with practical remediation paths
Lead lightweight, iterative threat models for new features and services
Define internal security baselines and policies, and mentor others to promote a strong security culture
Favor automation-friendly controls over burdensome manual security processes
Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs
Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems
Design secure APIs, review system architectures, and implement scalable authentication and authorization models
Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning
Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models
Requirements
5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments.
Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems.
Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models.
Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning).
Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models.
Proven success contributing to SOC 2, ISO 27001, and overall compliance programs.
Experience working with AI/ML platforms or agent-based architectures.
Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals.
Passion for mentorship, documentation, and building a strong security culture without over-engineering.
Soft Skills That Matter Here
Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity.
Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it.
Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness.
Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions.
Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking.
Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible.
Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
Auto-ApplySecurity Vulnerability Engineer 20 Positions
Eagan, MN jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Security Vulnerability Engineer - 20 Positions
Description:
Analyzes customer's system specifications and information requirements to define technical strategies and plans to remediate the network vulnerabilities.
Designs and develops written and/or visual product-related information - hard copy, web - (e.g., user/configuration/troubleshooting guides), and online information (interactive demos, help systems) for a variety of audiences (end user, system administrators, internal support engineers, product developers, training developers, executives).
Gathers or generates information for analysis to create remediation plans.
Required Skills:
3+ years' experience performing and analyzing vulnerability assessments and large vulnerability data analysis
Experience performing web application assessments
Ability to identify, recognize, respond and troubleshoot security issues in a timely manner, including experience performing malware analysis
Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, network flow systems, Anti-Virus, and/or other security logging sources in correlation with vulnerability analysis
Experience performing security analysis utilizing SIEM technologies.
Experience monitoring and providing daily security reports and develops new reports as needed by security, management, and auditors.
Experience with security event report automation and automating feeds to other security technologies
Excellent troubleshooting skills, self-motivated, results-driven and well organized.
Excellent communication skills (written and verbal) and the ability to communicate with all levels of staff and management.
Preferred Skills:
Experience with Tenable Security Center Continuous View, Log Correlation Engine, and Passive Vulnerability Scanner
Certified in one of the following:
Certified Information Systems Security Professional (CISSP)
Certified Authorization Professional (CAP)
Certified Security Analyst (CSA)
Certified Information Security Manager (CISM)
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
Security Vulnerability Engineer 20 Positions
Eagan, MN jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Security Vulnerability Engineer - 20 Positions
Description:
Analyzes customer's system specifications and information requirements to define technical strategies and plans to remediate the network vulnerabilities.
Designs and develops written and/or visual product-related information - hard copy, web - (e.g., user/configuration/troubleshooting guides), and online information (interactive demos, help systems) for a variety of audiences (end user, system administrators, internal support engineers, product developers, training developers, executives).
Gathers or generates information for analysis to create remediation plans.
Required Skills:
3+ years' experience performing and analyzing vulnerability assessments and large vulnerability data analysis
Experience performing web application assessments
Ability to identify, recognize, respond and troubleshoot security issues in a timely manner, including experience performing malware analysis
Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, network flow systems, Anti-Virus, and/or other security logging sources in correlation with vulnerability analysis
Experience performing security analysis utilizing SIEM technologies.
Experience monitoring and providing daily security reports and develops new reports as needed by security, management, and auditors.
Experience with security event report automation and automating feeds to other security technologies
Excellent troubleshooting skills, self-motivated, results-driven and well organized.
Excellent communication skills (written and verbal) and the ability to communicate with all levels of staff and management.
Preferred Skills:
Experience with Tenable Security Center Continuous View, Log Correlation Engine, and Passive Vulnerability Scanner
Certified in one of the following:
Certified Information Systems Security Professional (CISSP)
Certified Authorization Professional (CAP)
Certified Security Analyst (CSA)
Certified Information Security Manager (CISM)
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
Product Security Engineer
Hoffman Estates, IL jobs
The Product Security Engineer for Manufacturing Execution System (MES) software applications is responsible for ensuring security integrity throughout the software development lifecycle in the electronics manufacturing domain. This role combines technical software security expertise with manufacturing domain knowledge to protect critical production systems and data. This role focuses on **software product security** (experience with CICD, thread modeling, and coloration with team during development) rather than operations and IT security. This person makes sure the MES product _itself_ is built secure before shipping.
At Panasonic Connect, we connect the power of people and technology to change work, advance society and help connect to tomorrow. Empathy, results, relentlessness and teamwork are the foundations of the Panasonic Connect Culture. Our mission is to elevate the employee experience by empowering individuals to use their voice and have a positive impact on our business.
Watch this video (************************************************* to learn about Panasonic Connect and see how we connect talent to opportunity. Come join our journey!
**Responsibilities**
**General**
+ Responsible for security aspects of MES software applications in electronics manufacturing environment
+ Works directly with the development team to ensure security is built into all aspects of the software
+ Influences security design decisions across the application portfolio
**Security Assessment and Testing**
- Conduct vulnerability assessments and penetration testing on MES applications
- Identify and document security vulnerabilities and recommend remediation strategies
- Implement and maintain security testing tools and methodologies
**Security Architecture and Design**
- Help design and implement secure architecture for manufacturing software systems
- Perform security-focused code and design reviews to identify potential vulnerabilities
- Develop security standards and guidelines for the development team
- Evaluate and recommend security tools and technologies appropriate for manufacturing environments
**Security Implementation and Remediation**
- Collaborate with developers to implement security controls and fix vulnerabilities
- Lead security incident response for software-related security events
- Stay current with emerging threats and security trends in manufacturing technology
- Provide security training and guidance to the development team
**Compliance and Governance**
- Support security compliance activities and risk assessments
- Document security processes and controls for audit purposes
- Monitor and report on security metrics and KPIs
**Qualifications**
Education and Experience
+ Bachelor's degree in Computer Science, Information Security, or related field
+ 5+ years of experience in software security, with at least 2 years focused on industrial or manufacturing applications
+ Strong understanding of secure coding practices and common security vulnerabilities (OWASP Top 10)
+ Experience with secure software development lifecycle (SSDLC) practices
+ Relevant security certifications (CISSP, CEH, CSSLP, Security+) _preferred_
+ Knowledge of industrial security standards (IEC 62443, NIST 800-82) _preferred_
Key Competencies
+ Drives change through implementation of security best practices
+ Strong analytical skills and attention to detailpreferred
+ Excellent communication skills and ability to explain security concepts to varied audiences
+ Collaborative approach to working with development teams
+ Proactive identification and mitigation of security risks
+ Adaptability and continuous learning mindset
Other Requirements:
+ Travel is required 15%-25% for security assessments and industry events
+ Experience with security assessment tools (Nessus, Snyk, Black duck, Fortify etc.)
+ Knowledge of network security, authentication protocols, and encryption technologies
+ Familiarity with electronics manufacturing processes and systems
**Benefits & Perks - What's In It For You**
Panasonic is committed to supporting your total wellbeing through a wide variety of benefits and wellness programs to support your physical, emotional, financial, social, and environmental health. Here's what you can expect:
+ Health Benefits - Offering medical, dental, vision, prescription plans, plus Health Savings Account and Flexible Spending Account options.
+ Voluntary Benefits - Life, accident, critical illness, disability, legal, identity theft, and pet insurance.
+ Panasonic Retirement Savings & Investment Plan (PRSIP) - 401(k) plan with company matching contributions and immediate vesting.
+ Paid Time-Off Benefits - Vacation, holidays, personal days, sick leave, volunteer, and parental & caregiver leave.
+ Educational Assistance - Tuition reimbursement for job-related courses after six months of service.
+ Health Management and Wellbeing Programs -Lifestyle Spending Account, EAP, virtual health management, chronic condition, neurodiversity, tobacco cessation, substance abuse support, and life stage and fertility resources. Available to eligible employees starting the first day of the month following your start date. Eligibility for each benefit may vary based on employment status, location, and length of service.
**We Take Opportunity Seriously:**
At Panasonic, we are committed to a workplace that genuinely fosters inclusion and belonging. Fairness and Honesty have been part of our core values for more than 100 years and we are proud of our diverse culture as an equal opportunity employer.
The salary range listed below is just one component of Panasonic's total package. Actual compensation varies depending on the individual's knowledge, skills, experience, and location. This role may be eligible for discretionary bonuses and incentives. *The minimum hourly wage for this role will be the greater of the posted range, or minimum wage for the location where the employee will be working, subject to local minimum wage requirements.
We understand that your career search may look different than others and embrace the professional, personal, educational, and volunteer opportunities through which people gain experience. If you are actively looking or starting to explore new opportunities, send us your application!
_Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or other characteristic protected by law. All qualified individuals are required to perform the essential functions of the job with or without reasonable accommodation._
_Due to the high volume of responses, we will only be able to respond to candidates of interest. All candidates must have valid authorization to work in the U.S._
\#LI-AU1
\#LI-Hybrid
**Salary Range**
$110,000- $140,000 + Bonus REQ-151866
Security Engineer
San Francisco, CA jobs
About us
At Sierra, we're creating a platform to help businesses build better, more human customer experiences with AI. We are primarily an in-person company based in San Francisco, with growing offices in Atlanta, New York, London, and Singapore.
We are guided by a set of values that are at the core of our actions and define our culture: Trust, Customer Obsession, Craftsmanship, Intensity, and Family. These values are the foundation of our work, and we are committed to upholding them in everything we do.
Our co-founders are Bret Taylor and Clay Bavor. Bret currently serves as Board Chair of OpenAI. Previously, he was co-CEO of Salesforce (which had acquired the company he founded, Quip) and CTO of Facebook. Bret was also one of Google's earliest product managers and co-creator of Google Maps. Before founding Sierra, Clay spent 18 years at Google, where he most recently led Google Labs. Earlier, he started and led Google's AR/VR effort, Project Starline, and Google Lens. Before that, Clay led the product and design teams for Google Workspace.
What you'll do
Lead Security for Our Platform. Take charge of application, cloud, network, and AI agent security. This includes performing secure design reviews, overseeing threat modeling, and building new security primitives into our product and platform.
Collaborate with Cross-Functional Teams. Partner closely with engineering, product, and GRC to embed security throughout the software development lifecycle. Communicate risks, prioritize fixes, and ensure security requirements enable innovation.
Implement Automation & Tooling. Streamline security processes by integrating tooling into CI/CD pipelines and leveraging AI-based or next-gen solutions to automate scans, compliance checks, and infrastructure reviews.
Continuously Improve Security Posture. Conduct regular audits of our cloud environment, review IAM configurations, and stay on top of emerging AI security risks. Recommend strategic security initiatives and lead efforts to establish best practices as the company scales.
Enable Enterprise Customer Needs. Present and explain our security posture to enterprise clients, helping them understand how we secure their data. Address concerns around healthcare, financial, or other regulated data with clear, actionable insights
What you'll bring
Broad Security Expertise. Strong foundation in web application security, cloud security (AWS, Azure, or GCP), and networking principles.
Coding and DevOps Skills. Hands-on experience with programming production software, scripting, and DevOps tools for automation. Familiarity with secure coding practices, threat modeling, vulnerability scanning, and incident response processes.
Adaptability and Resilience. Comfort working in a fast-paced startup environment, ability to adapt to changing priorities and handle ambiguity with grace.
Communication and Collaboration. Strong written and verbal communication skills with the ability to clearly explain risk trade-offs and convey complex technical topics to both technical and non-technical audiences.
Curiosity & Customer-First Mindset. Passion for deeply understanding customer needs and finding the right solutions from first principles.
Even better...
Experience securing AI systems, with understanding of LLM and Agentic AI risks.
Prior success in securing cloud infrastructure with robust policies and automated enforcement, and familiarity with Infrastructure as Code (Terraform, CloudFormation).
History of building or integrating custom security tools, especially those leveraging AI/ML for detection or monitoring.
Familiarity with continuous compliance platforms and building control monitoring.
Experience designing strong foundations with secure-by-design and privacy-by-design practices such as data handling, anonymization, and de-identification
Our values
Trust: We build trust with our customers with our accountability, empathy, quality, and responsiveness. We build trust in AI by making it more accessible, safe, and useful. We build trust with each other by showing up for each other professionally and personally, creating an environment that enables all of us to do our best work.
Customer Obsession: We deeply understand our customers' business goals and relentlessly focus on driving outcomes, not just technical milestones. Everyone at the company knows and spends time with our customers. When our customer is having an issue, we drop everything and fix it.
Craftsmanship: We get the details right, from the words on the page to the system architecture. We have good taste. When we notice something isn't right, we take the time to fix it. We are proud of the products we produce. We continuously self-reflect to continuously self-improve.
Intensity: We know we don't have the luxury of patience. We play to win. We care about our product being the best, and when it isn't, we fix it. When we fail, we talk about it openly and without blame so we succeed the next time.
Family: We know that balance and intensity are compatible, and we model it in our actions and processes. We are the best technology company for parents. We support and respect each other and celebrate each other's personal and professional achievements.
What we offer
We want our benefits to reflect our values and offer the following to full-time employees:
Flexible (Unlimited) Paid Time Off
Medical, Dental, and Vision benefits for you and your family
Life Insurance and Disability Benefits
Retirement Plan (e.g., 401K, pension) with Sierra match
Parental Leave
Fertility and family building benefits through Carrot
Lunch, as well as delicious snacks and coffee to keep you energized
Discretionary Benefit Stipend giving people the ability to spend where it matters most
Free alphorn lessons
These benefits are further detailed in Sierra's policies and are subject to change at any time, consistent with the terms of any applicable compensation or benefits plans. Eligible full-time employees can participate in Sierra's equity plans subject to the terms of the applicable plans and policies.
Be you, with us
We're working to bring the transformative power of AI to every organization in the world. To do so, it is important to us that the diversity of our employees represents the diversity of our customers. We believe that our work and culture are better when we encourage, support, and respect different skills and experiences represented within our team. We encourage you to apply even if your experience doesn't precisely match the job description. We strive to evaluate all applicants consistently without regard to race, color, religion, gender, national origin, age, disability, veteran status, pregnancy, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
Auto-ApplyDirector of Information Security
Los Angeles, CA jobs
Job Description
Who We Are:
Being naked is the #1 most sustainable option. We're #2.
Since 2009, we've been on a mission to bring sustainable fashion to everyone. Named one of Fast Company's Brands That Matter and winning a Best Carbon Footprint award, we have big goals like being Climate Positive by 2025, Circular by 2030, and pushing the whole industry forward along the way. Our work has gotten love in Drapers and Sourcing Journal, and TIME wrote about how great our CEO, Hali Borenstein, is. Basically, we're saving the Earth and looking damn good doing it.
We're a global brand with 50+ stores (and counting) around the world, and our own sustainable factory in LA. We innovate across categories like accessories, swimwear, and sleepwear, and we reach millions of people with campaigns like this, this and this.
None of this work is possible without the incredible people behind it. We're a mission-based company that invests in an inclusive culture, so we can innovate together and ensure everyone has the space to grow, thrive, and belong.
And starting right now, we want to do all that with you.
Work Location: Remote, Full-time
The Role:
Director of Information Security: This is a critical, high-impact individual contributor role. You will be the sole dedicated security professional, responsible for both defining the strategy and executing the technical work. Success depends on the ability to collaborate extensively with the existing technology team (Engineers, Leadership, Helpdesk) to implement all necessary security changes. You will report directly to the CTO.
This role requires a unique "full-stack" security leader-someone who can define a multi-year security strategy (High), translate that strategy into clear projects and policies (Medium), and be technically proficient enough to implement critical changes and troubleshoot systems personally (Low).
Key Responsibilities and the H-M-L Mandate
The successful candidate will be expected to operate proficiently across three core levels of engagement:
High (Strategy & Governance)
Security Vision & Roadmap: Define and champion a comprehensive, multi-year information security strategy aligned with business objectives, risk tolerance, and industry growth.
Framework Ownership: Own the selection, implementation, and continuous auditing of the NIST Cybersecurity Framework (CSF) across the entire organization.
Board-Level Communication: Develop and present clear, concise security reports, risk posture summaries, and strategic investment requests to Executive Leadership and the Board of Directors.
Risk Management: Lead the formal security risk management program, including top-level risk assessments and prioritization.
Third-Party Oversight: Evaluate and approve security controls for all third-party vendors and key software partners, including NetSuite and other platforms.
Medium (Planning & Collaboration)
Vendor Management: Select, contract, and actively manage third-party security vendors for specialized services like penetration testing and network evaluations.
Internal Collaboration: Work closely with engineers and helpdesk staff to plan the implementation of new controls, ensuring minimal disruption to business operations and end-users.
Policy Development: Translate strategic goals into concrete security policies, standards, and procedures applicable to the organization's diverse environments.
Project Leadership: Act as the technical owner and project manager for major security initiatives (e.g., SIEM implementation, access control overhaul).
Audit & Remediation: Manage external security audits and self-assessments, planning and tracking remediation efforts based on findings.
Low (Execution & Hands-On Technical Work)
System Hardening: Directly configure and harden core corporate systems, including Google Workspace and AWS cloud environments, and corporate network infrastructure.
Tool Operation: Utilize and manage security toolsets such as CrowdStrike, JumpCloud, SIEM platforms, and open-source scanners like OpenVAS to investigate alerts, perform vulnerability scans, and conduct threat hunting.
Configuration Implementation: Execute hands-on tasks for critical security processes, such as setting up access control policies, troubleshooting security agent installations, and scripting repeatable security tasks.
ERP Security: Work directly within the NetSuite environment to manage roles, permissions, and security configurations.
Incident Response (IR) Readiness: Lead the technical planning for incident response scenarios, including ensuring logs are correctly flowing to the SIEM and actively participating in response and recovery efforts.
Qualifications
Required Experience
Minimum of 8+ years of progressive experience in Information Security, with at least 3 years in a Director or Senior-level individual contributor role.
Proven hands-on experience in a complex, multi-faceted business environment (including manufacturing, retail, or supply chain).
Deep technical experience securing modern, cloud-centric environments including Google Workspace, AWS, CrowdStrike, and Identity Providers like JumpCloud.
Expert-level knowledge and practical implementation experience with the NIST Cybersecurity Framework (CSF).
Preferred Skills & Certifications
Relevant industry certifications (CISSP, CISM, CISA, or similar).
Experience with PCI DSS compliance.
Familiarity with security configurations within NetSuite (or similar ERP systems).
Compensation:
At Reformation, we believe in transparency and equity when it comes to compensation. For this role, the anticipated base salary range is $185,000 - $200,000 + 15% bonus eligibility, depending on a variety of factors, including but not limited to relevant experience, skills, qualifications, and internal compensation equity.
This role may also be eligible for an annual discretionary bonus based on a range of factors, including company performance, department goals, and individual contributions. Bonus amounts and eligibility are not guaranteed and are determined at the company's discretion.
Please note that compensation decisions are made thoughtfully and may vary from the listed range to reflect individual circumstances and evolving business needs. Our total rewards package also includes benefits, perks, and opportunities for growth that contribute to overall compensation.
Benefits & Perks:
Eligible employees get employer-sponsored private medical, dental, and vision insurance, as well as commuter benefits to help support your travel to and from work.
We offer competitive paid time off policies including vacation, sick leave, and company holidays for eligible employees.
We offer retirement planning support for eligible employees, including the option to invest in Environmental Social Governance-aligned (fancy way to say sustainable) funds.
We're a mission-based company with offices in LA, NYC and London, as well as a global retail team, which means you'll get to collaborate with people all around the world.
You'll get access to fertility care support through Carrot, and up to a $5,000 USD reimbursement for related fertility expenses after 1 year of employment.
We care about the causes our employees care about so we donate to community efforts on a yearly basis.
We offer a clothing discount, culture events (like our annual Ref Values week and Volunteer Time Off), you know, all the meaningful and fun stuff!
Reformation is proud to be an Equal Opportunity Employer.
We're committed to building a diverse and inclusive team that reflects the world we want to live in. All qualified applicants will be considered for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, disability, age, or veteran status-in accordance with applicable international, federal, state, and local laws.
If you require accommodations during the application or interview process, please let us know. We're here to ensure you have what you need to show up as your best self.
Still don't know if you should apply?
We get it-
studies
show that many women and individuals from historically underrepresented communities hold back from applying unless they meet every single requirement. At Reformation, we're all about growth, not gatekeeping. If you're passionate about the role and excited about making fashion more sustainable, we'd love to hear from you. If this role doesn't totally excite you, consider applying to our
general application.
Want some more?! - Sustainability, Forbes, Fast Company
SAP Security Analyst
Chicago, IL jobs
Applicants outside US are encouraged to apply
SAP Security Analyst
Rate: $10-15 (Depending on your experience)
Work Authorization: Any
SAP security troubleshooting and end user support
Experience in GRC access control, mitigation and remediation
Experience with S/4 Hana
Support of SAP security in different projects stages (blueprint, QA, Go- live) and upgrades
Understands critical access restrictions and audit compliance requirement for tables and reports
Understand authorization business requirements for different SAP modules (FI/HR/MM/PM)
Perform high level support including problem determination for all SAP security needs within Development, QA, and Production SAP clients the Websphere application
Design and implement new authorization concepts along with business departments and IT stake holders.
Experience providing training on SAP Security.
Excellent communication skills is a must.