Cloud Security Engineer - Application Database Administrator
Security engineer job at Vanguard Services
Provides expert level technical support designing, implementing, and maintaining data center networks and security infrastructure. Identifies, resolves, or escalates hardware or software issues. The ideal candidate has deep expertise in database technologies, particularly Amazon Aurora PostgreSQL. The candidate will be responsible for designing, tuning, and optimizing Aurora PostgreSQL clusters to support high-performance, scalable, and secure data solutions across our cloud-native platforms.
Global Risk and Security (GR&S) at Vanguard enables business strategy, protects client and Vanguard interests (e.g., assets and data), and stewards a strong risk culture. Our teams leverage enterprise-wide insights, deep expertise, and trusted advice so that across Vanguard leaders and crew drive faster, stronger, risk-informed decisions.
Within GR&S, the Enterprise Security and Fraud (ES&F) sub-division is responsible for the global protection of Vanguard crew, property, data, and client assets. We are the trusted advisors that protect the pride of Vanguard with state-of-the-art security and fraud capabilities. We are a world-class destination of highly engaged, passionate, and diverse talent expected to continuously learn and develop in an ever-changing security landscape
Cloud Security Engineer - Application Database Administrator:
* Plans and implements new security technologies and major releases for the most critical enterprise-wide IT cloud platform projects. Designs, implements, and deploys cloud security systems to support and meet business needs. Identifies, recommends, and implements opportunities for improvement and performance issue solutions.
* Provides expert level technical support and ensures reliable operation of cloud production. Diagnoses and troubleshoots the most complex security issues for cloud computing systems. Contributes to the implementation of leading security technologies in infrastructure to improve its overall performance. Maintains comprehensive technical knowledge of software and infrastructure platforms.
* Develops auditing methodologies and architecture to manage and protect data in cloud computing environments.
* Elevates code into the development, test, and production environments on schedule. Provides follow up production support. Submits change control requests and documents.
* Learns and understands client area business functions and requirements. Determines the appropriate technical tool to address the client's business needs.
* Trains and mentors more junior staff on processes and technologies. Troubleshoots and resolves the most complex issues elevated from staff. Provides guidance and consultation as required. Updates, writes, and maintains documentation for the department.
* Administers system activities. Writes the technical portion of assigned deliverables. Performs systems analysis, including system requirements analysis and definition, and logical design.
* Provides expert level DBA services and performs physical database design and development for critical business applications and databases with the largest numbers of interfaces and users.
* Develops and maintains database logs and bug lists. Understands the business requirements for applications and implements supporting database technical capabilities.
* Performs database administration for mainframe and server databases. Performs day to day monitoring and optimizing, and provides developer support for creation of databases, tables, and indexes. Builds backup and recovery jobs.
* Conducts performance analysis of applications and database management systems. Identifies opportunities for continuous quality improvement of technical standards, processes, and technologies. Utilizes logical models to ensure efficient and reliable database performance.
* Reviews application designs for compliance with production acceptance requirements. Ensures backup, recovery, security, reliability, and performance of the systems. Develops and maintains policies and procedures for ensuring the security and integrity of a database.
* Trains and mentors staff. Resolves the most complex issues elevated from staff with less experience.
* Tests and evaluates IT vendor products.
* Participates in special projects and performs other duties as assigned.
* Design and implement Aurora PostgreSQL clusters tailored for high availability and performance.
* Perform advanced database tuning, including query optimization, indexing strategies, and memory management.
* Monitor and troubleshoot performance issues using AWS native tools such as CloudWatch, Performance Insights, and Secrets Manager.
* Collaborate with data engineering and application teams to align database performance with business requirements.
* Implement best practices for schema design, data ingestion, and transformation pipelines.
* Configure vector indexes and metadata structures for advanced querying and knowledge base integration.
* Automate database operations using AWS Lambda, Step Functions, and CI/CD pipelines.
* Ensure compliance with data governance, security, and privacy standards.
* Participates in special projects and performs other duties as assigned.
What it takes:
* Minimum of eight years related work experience in database administration, data modeling, business systems analyst, development, or related work experience
* Undergraduate degree in a related field or the equivalent combination of training and experience.
Special Factors
Sponsorship
Vanguard is not offering visa sponsorship for this position.
About Vanguard
At Vanguard, we don't just have a mission-we're on a mission.
To work for the long-term financial wellbeing of our clients. To lead through product and services that transform our clients' lives. To learn and develop our skills as individuals and as a team. From Malvern to Melbourne, our mission drives us forward and inspires us to be our best.
How We Work
Vanguard has implemented a hybrid working model for the majority of our crew members, designed to capture the benefits of enhanced flexibility while enabling in-person learning, collaboration, and connection. We believe our mission-driven and highly collaborative culture is a critical enabler to support long-term client outcomes and enrich the employee experience.
Auto-ApplyManager, IT Security Readiness
Security engineer job at Vanguard Services
As a security readiness manager, you will drive proactive risk assurance across the organization embedding security readiness into every layer of the enterprise. In this role, you'll lead a skilled team focused on delivering robust security assessments that protect systems, architectures, and configurations from emerging threats. You'll drive improvements in risk assessment processes and collaborate across functions to ensure resilience against evolving threats, and champion security-first practices that protect critical assets and enable business continuity. This Hybrid role (in office Tues-Wed-Thurs) can be based in Charlotte, NC, Dallas, TX, or Malvern, PA (HQ)
Responsibilities:
* Team Development: Hire, evaluate, and supervise team members. Provide coaching, mentorship, and training to build skills and foster growth.
* Performance Management: Set clear performance standards, conduct reviews, and make informed compensation decisions in alignment with HR policies.
* Culture & Engagement: Promote a collaborative, high-performance culture focused on security excellence.
* Risk Identification: Lead and conduct security assessments to evaluate the adequacy of existing controls and identify vulnerabilities, integration requirements, and emerging risks.
* Corrective Actions: Recommend and oversee implementation of remediation measures for identified risks.
* Continuous Improvement: Maintain and enhance processes for evaluating security requirements across systems, networks, and applications.
* Policy Alignment: Ensure security plans, risk assessments, and control techniques comply with organizational policies and regulatory requirements.
* Process Assurance: Validate adequacy of development, testing, and implementation processes for security initiatives.
* Security Solutions: Drive adoption of new security technologies and initiatives to strengthen enterprise resilience.
* Technical Support: Guide the team in providing technical expertise for risk assessments and secure implementation of systems and products.
* Stakeholder Engagement: Coordinate with IT divisions, business units, and third-party partners to assess the impact of technology changes on operations.
* Vendor Management: Assist in managing vendor relationships and participate in vulnerability mitigation and acceptance processes.
* Reporting: Oversee reporting on information security risks and communicate findings to leadership.
* Special Projects: Participate in enterprise-wide initiatives and other duties as assigned.
Education & Experience:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
Minimum 5 years of relevant work experience, including 3 years in IT security or application development.
Supervisory experience preferred.
Certifications (Preferred):
CISSP, CRISC, CCSP, GSEC, GPEN, GWPN, CEH, or equivalent security certifications.
Skills & Competencies:
Strong knowledge of security frameworks (e.g., NIST, ISO 27001).
Expertise in vulnerability assessment tools and methodologies.
Ability to lead teams and manage cross-functional initiatives.
Excellent analytical, problem-solving, and communication skills.
Experience assessing risk for AI/GenAI platforms, applications, and solutions.
Special Factors
Sponsorship
Vanguard is not offering visa sponsorship for this position.
About Vanguard
At Vanguard, we don't just have a mission-we're on a mission.
To work for the long-term financial wellbeing of our clients. To lead through product and services that transform our clients' lives. To learn and develop our skills as individuals and as a team. From Malvern to Melbourne, our mission drives us forward and inspires us to be our best.
How We Work
Vanguard has implemented a hybrid working model for the majority of our crew members, designed to capture the benefits of enhanced flexibility while enabling in-person learning, collaboration, and connection. We believe our mission-driven and highly collaborative culture is a critical enabler to support long-term client outcomes and enrich the employee experience.
Auto-ApplyIT Network / Security Analyst
Fort Worth, TX jobs
The IT Network/Security Analyst is responsible for safeguarding and supporting the organization's IT infrastructure by blending network operations expertise with cybersecurity best practices. This hybrid role ensures both the reliability of network services and the protection of data across enterprise systems and cloud services. The analyst will monitor, analyze, and respond to incidents while maintaining the performance, availability, and security of network systems in a dynamic threat landscape.
Duties and Responsibilities:
Network Operations & Monitoring
Monitor and support daily network operations, ensuring uptime, availability, and performance across routers, switches, firewalls, VPN's, and other network components.
Continuously monitor network traffic and performance metrics, using NMS (Network Management Systems), IDS/IPS, and SIEM tools to identify anomalies, outages, or threats.
Collaborate with customers to optimize configurations and resolve connectivity issues impacting business operations.
Travel as required (up to 25%) to support field locations.
Incident Response & Troubleshooting
Investigate, contain, and remediate cybersecurity incidents involving network components (e.g., DDoS attacks, unauthorized access, malware propagation).
Perform root cause analysis on network-related issues and security events to reduce recurrence and improve resilience.
Participate in on-call rotations for critical incident response.
Network Security Administration
Configure and maintain network devices i.e. firewalls, routers, switches, access points with an emphasis on security hardening and policy enforcement.
Implement and support network segmentation, access controls, and VPN technologies to protect sensitive data.
Oversee security patching and firmware upgrades across network infrastructure.
Vulnerability & Compliance Management
Conduct vulnerability assessments and penetration testing on network systems, tracking and remediating identified weaknesses.
Support compliance with frameworks such as NIST or CIS as they apply to both network and security operations.
Assist with periodic audits, reporting findings, and driving corrective actions.
Threat Intelligence & Reporting
Stay up to date on evolving attack vectors, especially those targeting enterprise networks.
Leverage threat intelligence to proactively adjust network defenses.
Produce operational dashboards and executive-level reports detailing network health, incidents, and security posture.
Collaboration & Training
Work closely with IT infrastructure, Security Architect, and Application teams to integrate security into network design and operations.
Provide guidance and training to IT staff and end-users on secure network practices, phishing awareness, and incident reporting.
Knowledge, skills, and abilities:
Technical Knowledge
Strong foundation in networking protocols (TCP/IP, BGP, OSPF, VLANs, DNS, DHCP) and enterprise network architectures.
Hands-on experience with network monitoring and analysis tools (e.g., Wireshark, SolarWinds, Nmap, Nessus).
Familiarity with security technologies such as SIEM (Splunk, ELK) a plus.
Hands-on experience with enterprise network firewalls and network equipment.
Experience with enterprise endpoint protection.
Understanding of threat detection, DDoS mitigation, VPNs, and secure remote access.
Familiarity of compliance requirements Sarbanes-Oxley Act of 2002 (SOX) as they apply to both network and security operations.
Skills
Proficiency in troubleshooting complex network and security issues in enterprise environments.
Strong analytical mindset with the ability to distinguish between performance-related issues and security threats.
Clear communication skills for cross-team collaboration and reporting to both technical and non-technical audiences.
Effective multitasking and prioritization in 24/7 operations environments.
Abilities
Ability to balance proactive network performance management with rapid cyber threat response.
Commitment to continuous learning in both network operations and cybersecurity trends.
Adaptability to shifting operational demands and evolving attack landscapes.
Strong teamwork skills with the discretion to handle sensitive information responsibly.
Education and Experience
Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or related field (or equivalent practical experience) preferred.
3-5 years of combined experience in network operations and cybersecurity, with at least 2 years in a security-focused network role preferred.
Relevant certifications highly desirable, such as:
Network-focused: CCNA, CCNP, CompTIA Network+
Security-focused: CISSP, CompTIA Security+, CEH, GIAC (GCIA, GCIH)
Equal Opportunity Employer
Prospective employees will receive consideration without discrimination because of race, color, religion, marital status, sex (including pregnancy, gender identity, and sexual orientation), national origin, age, veteran status, disability, or genetic information.
Application Security Engineer
Manhattan Beach, CA jobs
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
OT Security Engineer
Pennsylvania jobs
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are seeking an OT Security Engineer for our First Quality Enterprise working remotely. In this position, you will play a pivotal role in safeguarding our operational technology infrastructure. This role offers the flexibility to work remotely with periodic travel to our manufacturing sites. First Quality is a growing manufacturing organization that has defined security as one of its key business values. Joining our team will provide you with unique personal and professional growth opportunities where you'll be hands-on and securing cutting-edge industrial automation and technologies contributing to a growing field where cybersecurity directly protects critical processes, manufacturing, and safety.
Primary responsibilities include:
* Develop, configure, and maintain OT security tools and processes to improve Incident response capabilities.
* Monitor OT security events, assess threats, and respond to security incidents within the OT environment in coordination with the SOC team.
* Create and present reports, dashboards, and metrics on OT security posture and incident response activities to senior management.
* Collaborate with a multidisciplinary team to design, implement, and maintain security controls for all current and future OT environments and projects.
* Design, configure and maintain OT cybersecurity solutions, ensuring seamless integration into our industrial control systems.
* Lead threat management efforts by identifying vulnerabilities, assessing risks, performing threat modelling, identifying threat vectors, and conducting penetration tests to implement corrective actions.
* Examine and enhance processes to strengthen the OT security operations framework, including reviewing policies, updating incident response playbooks, and highlighting challenges in managing SLA's.
The ideal candidate should possess the following:
* Minimum of five (5) years of professional experience in OT security and operations.
* Knowledge of controls and automation equipment and principles (i.e. PLCs, SCADA, DCS, HMIs, VFDs, etc.)
* Familiarity with security frameworks and standards such as NIST, ICS Mitre ATT&CK, and IEC 62443
* Experience in defining and implementing security controls for OT engineering projects.
* Experience managing projects with the abilities to prioritize tasks and manage time effectively.
* Experience in developing, configuring, and maintaining OT security automation and orchestration tools.
* Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In lieu of degree, related experience will be considered.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplySecurity Engineer
San Francisco, CA jobs
Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises.
At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you!
How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market.
What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time.
Core responsibilities and role responsibilities include:
Responsibilities
Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations
Identify and mitigate common and emerging threats in delegated authentication workflows
Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models
Help define system boundaries for multi-agent, multi-tenant orchestration
Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines
Convert security findings into high-signal engineering tickets with practical remediation paths
Lead lightweight, iterative threat models for new features and services
Define internal security baselines and policies, and mentor others to promote a strong security culture
Favor automation-friendly controls over burdensome manual security processes
Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs
Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems
Design secure APIs, review system architectures, and implement scalable authentication and authorization models
Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning
Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models
Requirements
5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments.
Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems.
Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models.
Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning).
Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models.
Proven success contributing to SOC 2, ISO 27001, and overall compliance programs.
Experience working with AI/ML platforms or agent-based architectures.
Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals.
Passion for mentorship, documentation, and building a strong security culture without over-engineering.
Soft Skills That Matter Here
Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity.
Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it.
Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness.
Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions.
Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking.
Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible.
Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
Auto-ApplySecurity Vulnerability Engineer 20 Positions
Eagan, MN jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Security Vulnerability Engineer - 20 Positions
Description:
Analyzes customer's system specifications and information requirements to define technical strategies and plans to remediate the network vulnerabilities.
Designs and develops written and/or visual product-related information - hard copy, web - (e.g., user/configuration/troubleshooting guides), and online information (interactive demos, help systems) for a variety of audiences (end user, system administrators, internal support engineers, product developers, training developers, executives).
Gathers or generates information for analysis to create remediation plans.
Required Skills:
3+ years' experience performing and analyzing vulnerability assessments and large vulnerability data analysis
Experience performing web application assessments
Ability to identify, recognize, respond and troubleshoot security issues in a timely manner, including experience performing malware analysis
Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, network flow systems, Anti-Virus, and/or other security logging sources in correlation with vulnerability analysis
Experience performing security analysis utilizing SIEM technologies.
Experience monitoring and providing daily security reports and develops new reports as needed by security, management, and auditors.
Experience with security event report automation and automating feeds to other security technologies
Excellent troubleshooting skills, self-motivated, results-driven and well organized.
Excellent communication skills (written and verbal) and the ability to communicate with all levels of staff and management.
Preferred Skills:
Experience with Tenable Security Center Continuous View, Log Correlation Engine, and Passive Vulnerability Scanner
Certified in one of the following:
Certified Information Systems Security Professional (CISSP)
Certified Authorization Professional (CAP)
Certified Security Analyst (CSA)
Certified Information Security Manager (CISM)
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
Security Vulnerability Engineer 20 Positions
Eagan, MN jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Security Vulnerability Engineer - 20 Positions
Description:
Analyzes customer's system specifications and information requirements to define technical strategies and plans to remediate the network vulnerabilities.
Designs and develops written and/or visual product-related information - hard copy, web - (e.g., user/configuration/troubleshooting guides), and online information (interactive demos, help systems) for a variety of audiences (end user, system administrators, internal support engineers, product developers, training developers, executives).
Gathers or generates information for analysis to create remediation plans.
Required Skills:
3+ years' experience performing and analyzing vulnerability assessments and large vulnerability data analysis
Experience performing web application assessments
Ability to identify, recognize, respond and troubleshoot security issues in a timely manner, including experience performing malware analysis
Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, network flow systems, Anti-Virus, and/or other security logging sources in correlation with vulnerability analysis
Experience performing security analysis utilizing SIEM technologies.
Experience monitoring and providing daily security reports and develops new reports as needed by security, management, and auditors.
Experience with security event report automation and automating feeds to other security technologies
Excellent troubleshooting skills, self-motivated, results-driven and well organized.
Excellent communication skills (written and verbal) and the ability to communicate with all levels of staff and management.
Preferred Skills:
Experience with Tenable Security Center Continuous View, Log Correlation Engine, and Passive Vulnerability Scanner
Certified in one of the following:
Certified Information Systems Security Professional (CISSP)
Certified Authorization Professional (CAP)
Certified Security Analyst (CSA)
Certified Information Security Manager (CISM)
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
Product Security Engineer
Hoffman Estates, IL jobs
The Product Security Engineer for Manufacturing Execution System (MES) software applications is responsible for ensuring security integrity throughout the software development lifecycle in the electronics manufacturing domain. This role combines technical software security expertise with manufacturing domain knowledge to protect critical production systems and data. This role focuses on **software product security** (experience with CICD, thread modeling, and coloration with team during development) rather than operations and IT security. This person makes sure the MES product _itself_ is built secure before shipping.
At Panasonic Connect, we connect the power of people and technology to change work, advance society and help connect to tomorrow. Empathy, results, relentlessness and teamwork are the foundations of the Panasonic Connect Culture. Our mission is to elevate the employee experience by empowering individuals to use their voice and have a positive impact on our business.
Watch this video (************************************************* to learn about Panasonic Connect and see how we connect talent to opportunity. Come join our journey!
**Responsibilities**
**General**
+ Responsible for security aspects of MES software applications in electronics manufacturing environment
+ Works directly with the development team to ensure security is built into all aspects of the software
+ Influences security design decisions across the application portfolio
**Security Assessment and Testing**
- Conduct vulnerability assessments and penetration testing on MES applications
- Identify and document security vulnerabilities and recommend remediation strategies
- Implement and maintain security testing tools and methodologies
**Security Architecture and Design**
- Help design and implement secure architecture for manufacturing software systems
- Perform security-focused code and design reviews to identify potential vulnerabilities
- Develop security standards and guidelines for the development team
- Evaluate and recommend security tools and technologies appropriate for manufacturing environments
**Security Implementation and Remediation**
- Collaborate with developers to implement security controls and fix vulnerabilities
- Lead security incident response for software-related security events
- Stay current with emerging threats and security trends in manufacturing technology
- Provide security training and guidance to the development team
**Compliance and Governance**
- Support security compliance activities and risk assessments
- Document security processes and controls for audit purposes
- Monitor and report on security metrics and KPIs
**Qualifications**
Education and Experience
+ Bachelor's degree in Computer Science, Information Security, or related field
+ 5+ years of experience in software security, with at least 2 years focused on industrial or manufacturing applications
+ Strong understanding of secure coding practices and common security vulnerabilities (OWASP Top 10)
+ Experience with secure software development lifecycle (SSDLC) practices
+ Relevant security certifications (CISSP, CEH, CSSLP, Security+) _preferred_
+ Knowledge of industrial security standards (IEC 62443, NIST 800-82) _preferred_
Key Competencies
+ Drives change through implementation of security best practices
+ Strong analytical skills and attention to detailpreferred
+ Excellent communication skills and ability to explain security concepts to varied audiences
+ Collaborative approach to working with development teams
+ Proactive identification and mitigation of security risks
+ Adaptability and continuous learning mindset
Other Requirements:
+ Travel is required 15%-25% for security assessments and industry events
+ Experience with security assessment tools (Nessus, Snyk, Black duck, Fortify etc.)
+ Knowledge of network security, authentication protocols, and encryption technologies
+ Familiarity with electronics manufacturing processes and systems
**Benefits & Perks - What's In It For You**
Panasonic is committed to supporting your total wellbeing through a wide variety of benefits and wellness programs to support your physical, emotional, financial, social, and environmental health. Here's what you can expect:
+ Health Benefits - Offering medical, dental, vision, prescription plans, plus Health Savings Account and Flexible Spending Account options.
+ Voluntary Benefits - Life, accident, critical illness, disability, legal, identity theft, and pet insurance.
+ Panasonic Retirement Savings & Investment Plan (PRSIP) - 401(k) plan with company matching contributions and immediate vesting.
+ Paid Time-Off Benefits - Vacation, holidays, personal days, sick leave, volunteer, and parental & caregiver leave.
+ Educational Assistance - Tuition reimbursement for job-related courses after six months of service.
+ Health Management and Wellbeing Programs -Lifestyle Spending Account, EAP, virtual health management, chronic condition, neurodiversity, tobacco cessation, substance abuse support, and life stage and fertility resources. Available to eligible employees starting the first day of the month following your start date. Eligibility for each benefit may vary based on employment status, location, and length of service.
**We Take Opportunity Seriously:**
At Panasonic, we are committed to a workplace that genuinely fosters inclusion and belonging. Fairness and Honesty have been part of our core values for more than 100 years and we are proud of our diverse culture as an equal opportunity employer.
The salary range listed below is just one component of Panasonic's total package. Actual compensation varies depending on the individual's knowledge, skills, experience, and location. This role may be eligible for discretionary bonuses and incentives. *The minimum hourly wage for this role will be the greater of the posted range, or minimum wage for the location where the employee will be working, subject to local minimum wage requirements.
We understand that your career search may look different than others and embrace the professional, personal, educational, and volunteer opportunities through which people gain experience. If you are actively looking or starting to explore new opportunities, send us your application!
_Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, protected veteran status, or other characteristic protected by law. All qualified individuals are required to perform the essential functions of the job with or without reasonable accommodation._
_Due to the high volume of responses, we will only be able to respond to candidates of interest. All candidates must have valid authorization to work in the U.S._
\#LI-AU1
\#LI-Hybrid
**Salary Range**
$110,000- $140,000 + Bonus REQ-151866
Security Engineer
San Francisco, CA jobs
About us
At Sierra, we're creating a platform to help businesses build better, more human customer experiences with AI. We are primarily an in-person company based in San Francisco, with growing offices in Atlanta, New York, London, and Singapore.
We are guided by a set of values that are at the core of our actions and define our culture: Trust, Customer Obsession, Craftsmanship, Intensity, and Family. These values are the foundation of our work, and we are committed to upholding them in everything we do.
Our co-founders are Bret Taylor and Clay Bavor. Bret currently serves as Board Chair of OpenAI. Previously, he was co-CEO of Salesforce (which had acquired the company he founded, Quip) and CTO of Facebook. Bret was also one of Google's earliest product managers and co-creator of Google Maps. Before founding Sierra, Clay spent 18 years at Google, where he most recently led Google Labs. Earlier, he started and led Google's AR/VR effort, Project Starline, and Google Lens. Before that, Clay led the product and design teams for Google Workspace.
What you'll do
Lead Security for Our Platform. Take charge of application, cloud, network, and AI agent security. This includes performing secure design reviews, overseeing threat modeling, and building new security primitives into our product and platform.
Collaborate with Cross-Functional Teams. Partner closely with engineering, product, and GRC to embed security throughout the software development lifecycle. Communicate risks, prioritize fixes, and ensure security requirements enable innovation.
Implement Automation & Tooling. Streamline security processes by integrating tooling into CI/CD pipelines and leveraging AI-based or next-gen solutions to automate scans, compliance checks, and infrastructure reviews.
Continuously Improve Security Posture. Conduct regular audits of our cloud environment, review IAM configurations, and stay on top of emerging AI security risks. Recommend strategic security initiatives and lead efforts to establish best practices as the company scales.
Enable Enterprise Customer Needs. Present and explain our security posture to enterprise clients, helping them understand how we secure their data. Address concerns around healthcare, financial, or other regulated data with clear, actionable insights
What you'll bring
Broad Security Expertise. Strong foundation in web application security, cloud security (AWS, Azure, or GCP), and networking principles.
Coding and DevOps Skills. Hands-on experience with programming production software, scripting, and DevOps tools for automation. Familiarity with secure coding practices, threat modeling, vulnerability scanning, and incident response processes.
Adaptability and Resilience. Comfort working in a fast-paced startup environment, ability to adapt to changing priorities and handle ambiguity with grace.
Communication and Collaboration. Strong written and verbal communication skills with the ability to clearly explain risk trade-offs and convey complex technical topics to both technical and non-technical audiences.
Curiosity & Customer-First Mindset. Passion for deeply understanding customer needs and finding the right solutions from first principles.
Even better...
Experience securing AI systems, with understanding of LLM and Agentic AI risks.
Prior success in securing cloud infrastructure with robust policies and automated enforcement, and familiarity with Infrastructure as Code (Terraform, CloudFormation).
History of building or integrating custom security tools, especially those leveraging AI/ML for detection or monitoring.
Familiarity with continuous compliance platforms and building control monitoring.
Experience designing strong foundations with secure-by-design and privacy-by-design practices such as data handling, anonymization, and de-identification
Our values
Trust: We build trust with our customers with our accountability, empathy, quality, and responsiveness. We build trust in AI by making it more accessible, safe, and useful. We build trust with each other by showing up for each other professionally and personally, creating an environment that enables all of us to do our best work.
Customer Obsession: We deeply understand our customers' business goals and relentlessly focus on driving outcomes, not just technical milestones. Everyone at the company knows and spends time with our customers. When our customer is having an issue, we drop everything and fix it.
Craftsmanship: We get the details right, from the words on the page to the system architecture. We have good taste. When we notice something isn't right, we take the time to fix it. We are proud of the products we produce. We continuously self-reflect to continuously self-improve.
Intensity: We know we don't have the luxury of patience. We play to win. We care about our product being the best, and when it isn't, we fix it. When we fail, we talk about it openly and without blame so we succeed the next time.
Family: We know that balance and intensity are compatible, and we model it in our actions and processes. We are the best technology company for parents. We support and respect each other and celebrate each other's personal and professional achievements.
What we offer
We want our benefits to reflect our values and offer the following to full-time employees:
Flexible (Unlimited) Paid Time Off
Medical, Dental, and Vision benefits for you and your family
Life Insurance and Disability Benefits
Retirement Plan (e.g., 401K, pension) with Sierra match
Parental Leave
Fertility and family building benefits through Carrot
Lunch, as well as delicious snacks and coffee to keep you energized
Discretionary Benefit Stipend giving people the ability to spend where it matters most
Free alphorn lessons
These benefits are further detailed in Sierra's policies and are subject to change at any time, consistent with the terms of any applicable compensation or benefits plans. Eligible full-time employees can participate in Sierra's equity plans subject to the terms of the applicable plans and policies.
Be you, with us
We're working to bring the transformative power of AI to every organization in the world. To do so, it is important to us that the diversity of our employees represents the diversity of our customers. We believe that our work and culture are better when we encourage, support, and respect different skills and experiences represented within our team. We encourage you to apply even if your experience doesn't precisely match the job description. We strive to evaluate all applicants consistently without regard to race, color, religion, gender, national origin, age, disability, veteran status, pregnancy, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
Auto-ApplyInformation Security Analyst
San Francisco, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Responsibilities:
• Provide Subject Matter Expertise (SME) over IAM practices, policies and procedures for the Windows systems and Active Directories
• Identify process automation opportunities on existing access management practices
• Participate activities in Access Management to provide access management business requirements and insure compliance with industry and company security standards.
• Complete access request processing as per pre defined sets of procedure and within agreed Service Level Agreements (SLA), resolve problem tickets and assist other security analysts as needed
• Document access management procedures for assigned platforms, databases and applications; keep the access management procedures up to date
• Proactively identify audit and compliance access related issues to reduce the risk of security exposures on the support systems and applications; coordinate access management related audit and compliance tasks, such as user access reporting and other relevant research and investigation
• Able to understand and troubleshoot IAM issues on all platforms and tools supported, including Quest Change auditor and reporter, ARS, RMAD, RPM.
• Flexibility to work after hours and weekends to accommodate and support the existing servers/ applications maintenance windows
• Have a global mindset and collaborate effectively within and across different teams. Qualifications/Requirements:
• Detailed knowledge of the security tools supported, including Quest Change auditor and reporter, ARS, RMAD, RPM products in use on Visa Windows systems and Active Directories.
• Ability to write Windows & AD related scripting (eg Powershell, VB, WMI) is and added advantage
• Ability to gather and document business requirements and implement solutions to address them
• Good working knowledge of Identity Access Management lifecycle and processes
• Understanding of information security principles and IT infrastructure including operating systems, applications, communications and network protocols.
• The ability to work effectively with other functional areas and understand the operational and cultural issues relevant to achieving superior results
• Must be flexible and able to manage multiple tasks and priorities on very tight deadlines.
• Be a self motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
• Ability to work independently and in collaboration with others to achieve a high level of success
• Strong interpersonal and collaboration skills with the ability to develop, maintain and foster constructive relationships with others
• Dynamic, hard working and ambitious individual, with excellent oral and written communication skills
• Have an attention to detail and advanced analytical and troubleshooting skills
Qualifications
Must have skills
5 to 7 years computer security experience required.
Working knowledge of Identity Access Management lifecycle and processes.
Detailed knowledge of the security sub subsystems and 3rd party security products.
Able to use tools like Quest Change auditor and reporter, ARS, RMAD, RPM is an added advantage.
Nice to have skills
CISSP, CISA, CISM and other comparative information security certifications are preferred.
They must have the technical knowledge to act as SME on the windows platform especially active directory.
Preference on industry background or previous companies worked for? Computer Security Experience
Education/Experience:
• Bachelor degree in computer management, information security or equivalent job experience
• CISSP, CISA, CISM and other comparative information security certifications are preferred
• 5 to 7 years computer security experience required
Additional Information
Good comm skills are a big priority
Duration: 6+ months
Interview process/ Interview Mode- Phone and Face To Face
Cyber Security Analyst
Pennsylvania jobs
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
* Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
* Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
* Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
* Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
* Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
* Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
* Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
* Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
* Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
* Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
* Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
* Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
* Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
* Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
* Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
* Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
* Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
* Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
* Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
* High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
* Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
* Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
* Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyInformation Security Analyst
Foster City, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Windows and Essential Practices (Essential Practices) - Windows and Essential Practices (Essential Practices)
Responsibilities:
• Provide Subject Matter Expertise (SME) over IAM practices, policies and procedures for the Windows and Essential practices
• Experience in all aspects of Identity and Access management life cycle especially on processes for On Boarding, Off boarding, Transfers and UARs, HR driven processes, to IAM compliance issues and role engineering. • Identify process automation opportunities on existing access management practices
• Participate activities in Access Management to provide access management business requirements and insure compliance with industry and company security standards.
• Complete access request processing as per pre defined sets of procedure and within agreed Service Level Agreements (SLA), resolve problem tickets and assist other security analysts as needed
• Document access management procedures for assigned platforms, databases and applications; keep the access management procedures up to date
• Proactively identify audit and compliance access related issues to reduce the risk of security exposures on the support systems and applications; coordinate access management related audit and compliance tasks, such as user access reporting and other relevant research and investigation
• Able to use the available tools to support, including Quest Change auditor and reporter, ARS, RMAD, RPM.
• Flexibility to work after hours to accommodate when necessary.
• Have a global mindset and collaborate effectively within and across different teams.
Qualifications/Requirements:
• Knowledge of the security tools supported, including Quest Change auditor and reporter, ARS, RMAD, RPM products in use on Visa Windows systems and Active Directories.
• Ability to write Windows & AD related scripting (eg Powershell, VB, WMI) is an added advantage
• Ability to gather and document business requirements and implement solutions to address them
• Good working knowledge with Excel spreadsheets, analysis of large volume of data.
• Good working knowledge of Identity Access Management lifecycle and processes is a must.
• Understanding of information security principles and IT infrastructure including operating systems, applications, communications and network protocols.
• The ability to work effectively with other functional areas and understand the operational and cultural issues relevant to achieving superior results
• Must be flexible and able to manage multiple tasks and priorities on very tight deadlines.
• Be a self motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
• Ability to work independently and in collaboration with others to achieve a high level of success
• Strong interpersonal and collaboration skills with the ability to develop, maintain and foster constructive relationships with others
• Dynamic, hard working and ambitious individual, with excellent oral and written communication skills
• Have an attention to detail and advanced analytical and troubleshooting skills.
Qualifications
Bachelor degree in computer management, information security or equivalent job experience
CISSP, CISA, CISM and other comparative information security certifications are preferred
5 to 7 years computer security experience required
Additional Information
Good comm skills are a big priority
Duration: 12 months
Interview Mode- Phone and F2F
Work Location 800 Metro Center Blvd Foster City CA USA
Information Security Analyst
Foster City, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
Windows and Essential Practices (Essential Practices) - Windows and Essential Practices (Essential Practices)
Responsibilities:
• Provide Subject Matter Expertise (SME) over IAM practices, policies and procedures for the Windows and Essential practices
• Experience in all aspects of Identity and Access management life cycle especially on processes for On Boarding, Off boarding, Transfers and UARs, HR driven processes, to IAM compliance issues and role engineering. • Identify process automation opportunities on existing access management practices
• Participate activities in Access Management to provide access management business requirements and insure compliance with industry and company security standards.
• Complete access request processing as per pre defined sets of procedure and within agreed Service Level Agreements (SLA), resolve problem tickets and assist other security analysts as needed
• Document access management procedures for assigned platforms, databases and applications; keep the access management procedures up to date
• Proactively identify audit and compliance access related issues to reduce the risk of security exposures on the support systems and applications; coordinate access management related audit and compliance tasks, such as user access reporting and other relevant research and investigation
• Able to use the available tools to support, including Quest Change auditor and reporter, ARS, RMAD, RPM.
• Flexibility to work after hours to accommodate when necessary.
• Have a global mindset and collaborate effectively within and across different teams.
Qualifications/Requirements:
• Knowledge of the security tools supported, including Quest Change auditor and reporter, ARS, RMAD, RPM products in use on Visa Windows systems and Active Directories.
• Ability to write Windows & AD related scripting (eg Powershell, VB, WMI) is an added advantage
• Ability to gather and document business requirements and implement solutions to address them
• Good working knowledge with Excel spreadsheets, analysis of large volume of data.
• Good working knowledge of Identity Access Management lifecycle and processes is a must.
• Understanding of information security principles and IT infrastructure including operating systems, applications, communications and network protocols.
• The ability to work effectively with other functional areas and understand the operational and cultural issues relevant to achieving superior results
• Must be flexible and able to manage multiple tasks and priorities on very tight deadlines.
• Be a self motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
• Ability to work independently and in collaboration with others to achieve a high level of success
• Strong interpersonal and collaboration skills with the ability to develop, maintain and foster constructive relationships with others
• Dynamic, hard working and ambitious individual, with excellent oral and written communication skills
• Have an attention to detail and advanced analytical and troubleshooting skills.
Qualifications
Bachelor degree in computer management, information security or equivalent job experience
CISSP, CISA, CISM and other comparative information security certifications are preferred
5 to 7 years computer security experience required
Additional Information
Good comm skills are a big priority
Duration: 12 months
Interview Mode- Phone and F2F
Work Location 800 Metro Center Blvd Foster City CA USA
SAP BODS Administrator
Los Angeles, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
8+ Years of SAP BODS Experience. Good understanding in reporting concepts, upgrade BODS to the latest version, Installation, configuration and fixing jobs.
2 Years of Experience in Information steward & BODS Upgrade Experience
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: Phone & Skype
SAP BODS Administrator
Los Angeles, CA jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
8+ Years of SAP BODS Experience. Good understanding in reporting concepts, upgrade BODS to the latest version, Installation, configuration and fixing jobs.
2 Years of Experience in Information steward & BODS Upgrade Experience
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: Phone & Skype
Cyber Security Analyst Co-op - Fall 2026
Salisbury, NC jobs
Ahold Delhaize USA, a division of global food retailer Ahold Delhaize, is part of the U.S. family of brands, which includes five leading omnichannel grocery brands - Food Lion, Giant Food, The GIANT Company, Hannaford and Stop & Shop. Our associates support the brands with a wide range of services, including Finance, Legal, Sustainability, Commercial, Digital and E-commerce, Technology and more.
Co-op Program Overview:
Get an insider view of the fast-changing grocery retail industry while developing relevant business, technical and leadership skills geared towards enhancing your career. This paid Co-op experience is an opportunity to help drive business results in an environment designed to promote and reward diversity, innovation and leadership. Our mission is to create impactful early talent programs that provide cohorts with meaningful project work, learning and development sessions, and mentorship opportunities.
Applicants must be currently enrolled in a bachelor's or master's degree program. Applicants must be currently authorized to work in the United States on a full-time basis and be available from July 13, 2026 through December 4, 2026. We have a hybrid work environment that requires a minimum of three days a week in the office. Please submit your resume including your cumulative GPA. Transcripts may be requested at a future date.
* Approximate 6-month Co-op session with competitive pay
* Impactful project work to develop your skills/knowledge
* Career assistance & mentoring in obtaining full time positions within ADUSA
* Leadership speaker sessions and development activities
* One-on-one mentoring in your area of interest
* Involvement in group community service events
* Networking and professional engagement opportunities
* Access to online career development tools and resources
* Opportunity to present project work to company leaders and gain executive visibility
Department/Position Description:
The Cybersecurity team is responsible for protecting our organization's systems, and data from internal and external threats. The team monitors network activity, manages security tools, responds to incidents, and ensures compliance with regulatory standards. We also implement proactive measures such as vulnerability assessments, threat intelligence, and employee training to reduce risk and maintain a strong security posture across the enterprise. The Co-op will support the Infrastructure Services team by assisting with day-to-day operations, documentation, and project-related tasks. During their session, they will gain hands-on experience with enterprise systems, collaborate across departments, and develop a deeper understanding of IT service delivery in a large-scale environment.
Qualifications:
* Currently pursuing a degree in Cybersecurity, Information Technology, Computer Science, or a related field.
* Familiarity with basic cybersecurity concepts such as threat detection, network security, and vulnerability management through coursework or labs.
* Exposure to tools or platforms like Wireshark, Splunk, or basic scripting for security automation is a plus.
* Strong attention to detail and analytical thinking, especially when reviewing logs or identifying anomalies.
* Excellent communication skills and a collaborative mindset, with a willingness to learn in a fast-paced, security-focused environment.
Individual cohort pay rates vary based on location, academic year, and position.
ME/NC/PA/SC Salary Range: $20.90 - $35.70
IL/MA/MD Salary Range: $22.80 - $37.30
#LI-DNI
At Ahold Delhaize USA, we provide services to one of the largest portfolios of grocery companies in the nation, and we're actively seeking top talent.
Our team shares a common motivation to drive change, take ownership and enable our brands to better care for their customers. We thrive on supporting great local grocery brands and their strategies.
Our associates are the heartbeat of our organization. We are committed to offering a welcoming work environment where all associates can succeed and thrive. Guided by our values of courage, care, teamwork, integrity (and even a little humor), we are dedicated to being a great place to work.
We believe in collaboration, curiosity, and continuous learning in all that we think, create and do. While building a culture where personal and professional growth are just as important as business growth, we invest in our people, empowering them to learn, grow and deliver at all levels of the business.
SAP BI 4.0 Administrator
Dallas, TX jobs
Job Description & Expectations
Be a self starter on a team of highly qualified and knowledgable employees and consultants who have years of SAP BOBJ experience and need you to assist them in the move to BI 4.0.
The Business Objects Administrator will be responsible for the implementation and support of Business Objects Suite of tools
Mentor and provide expertise to team members when it comes to the differences in the BI 4.0 environment when compared with the XI3.1 environment.
Provide support for SAP Business Objects Suite - Includes installation, configuration, monitoring and upgrade management.
·
Provide expertise in undocumented challenges with BI 4.0 configuration and content migrations (Crystal, WEBI, Universes and Dashboards)
Assist in the setting up of a new BI 4.0 Environment.
Contribute to client satisfaction by providing timely and responsive value added business solutions and work products.
Business requirements analyst. Analyze and evaluate requests for new or modified reporting access needs to determine feasibility, cost and time required, compatibility with current system.
Required Skills
Business Objects Administration in BI 4.0 and XI3.1
Technical Architecture Design with Business Objects
Required Experience
Demonstrated success in building, implementing and supporting BI enterprise
Demonstrated proficiency using BI tools (Business Objects Suite 4.0, Business Objects Suite XI R3.1).
Experience upgrading BusinessObjects XI 3.1 to BI 4.0
Knowledge and Experience in sizing BI 4.0.
Experience as a Business Objects administrator in an organization with at least 500 users
Experience in a technical advisory and implementation role with at least one major release upgrade of Business Objects.
Experience in a technical advisory and implementation role for a Business Objects upgrade in which an upgraded system is to be run in parallel with legacy system for an extended period of time.
Preferred Skills & Experience
Installing BI 4.0 in a virtualized enivironment, a plus.
Ability to communicate effectively and efficiently with team, management, customers and vendors
Experience with Tomcat (preferred) or other java web application server.
Understanding of connectivity to various data sources such as BW, Oracle and SQL Server is a plus.
Experience with Crystal Reports, Universes, Webi, SAP Dashboards and Oracle a plus
Additional Information
Start date - ASAP.
6m contract
Sap Security Grc
Irving, TX jobs
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
REQUIRED SAP GRC Modules
ARA (access risk analysis)
EAM (Emergency Access Module)
WORK ACTIVITIES/CONTEXT:
Supports SAP security design for SAP ECC, Portal, and GRC to ensure that all application modules are functional and secure.
Ensures alignment with security policies, procedures, and industry standards.
Collaborates with Technology on the development and maintenance of SAP security policies and procedures based on industry-standard best practices.
Keeps current with emerging SAP Security or GRC alerts and issues.
Attends formal training sessions and/or conferences to enhance skills relevant to position.
Evaluates new processes and systems for gaps, risks, or improvements to security processes, and makes recommendations for aligning with the SAP Program and controls structure.
Stays current on upcoming system implementations and business process changes that impact SAP security or GRC processes.
Manages and supports the SAP GRC Access Risk Analysis module for segregation of duties, emergency access, and access provisioning oversight.
Troubleshoots existing user roles, security objects and authorizations to resolve issues for various SAP Landscapes (ECC, Portal, GRC)
Maintains knowledge in designated core business processes (i.e. Accounts Payable, Payroll) and is knowledgeable in how SAP facilitates those business processes from a controls perspective. Maintains an understanding of applications that interface with SAP through continuous learning, participation in user forums and “best practice” research.
Provides legendary Customer Service to Internal and External Customers by providing security process improvement guidance related to changes to existing processes or development of new processes that utilize SAP and peripheral systems.
May assist in the development of business cases to help prioritize opportunities and champion security improvement projects. May be required to facilitate discussions with various Internal Customers to facilitate business case development.
Participates heavily in SAP ECC, Portal, or GRC design, data conversion, testing, and implementation of security changes and associated documentation.
Responsible for ensuring that SAP security changes implemented adhere to Company change management policies. Documentation requirements for SAP security-related are completed timely and as expected to ensure that appropriate technical documentation exists.
Documents requirements for SAP security-related interfaces (inbound and outbound), including data mapping, functional specifications, test plans, and error handling procedures. Will be responsible for creating test data, testing interfaces, defect resolution, and ongoing production support of SAP interfaces.
Reviews test results for SAP enhancements, defects, and project implementations to ensure integrity and completeness of testing activities as it relates to security or GRC processes.
Provides timely support for SAP- incidents or service requests related to production Security or GRC issues, defects, job requests, research, or access requests.
May perform risk assessments of data integration points with SAP, and as needed, assists in the design of appropriate controls.
Serves as liaison between business users and Technology support.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
Must be able to meet any physical ability requirements listed on this description.
May perform other job duties as directed by Employee's Leaders.
BASIC QUALIFICATIONS:
High School Diploma, GED or equivalent education required.
Must be at least 18 years of age.
Must have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
EDUCATION:
Bachelor's degree with the focus in Business Management Information Systems or Computer Science disciplines required.
WORK EXPERIENCE:
3-5 years of relevant professional work experience required.
3+ years of SAP ERP ECC Security experience required.
3+ years working across multiple financial and/or business processes (Finance, HR, Technology, etc).
SAP GRC 10.0 experience preferred.
LICENSING / CERTIFICATION:
Professional certification such as SAP Certification, PMP, or CISA preferred, but not required.
SKILLS / ABILITIES / KNOWLEDGE / WORK STYLE:
Must be able to comply with Company attendance standards as described in established guidelines.
Must be able to comply with Company attendance standards as described in established guidelines.
Extensive knowledge of SAP ECC role based security and GRC 10.0
Deep knowledge of Structural Authorization and Portal
Knowledge of Identity Manager, as it relates to automatic provisioning of access.
Ability to conduct research into security issues, standards, and products as required.
Ability to solve problems quickly and automate processes
Proficiency in areas of business continuity, security, and data privacy; ensures systems are designed and built with appropriate levels of protection.
Strong analytical and organizational skills are required
Demonstrates the ability to successfully manage multiple assignments and/or projects simultaneously.
Handles responsibilities and achieves desired results with minimal supervision.
Must have ability to perform well under pressure
Ability to use a computer with speed and accuracy sufficient to meet the demands of the job.
Demonstrates integrity in all actions and decisions.
Has demonstrated capacity to translate broad Company objectives into specific actionable items associated with designated business processes.
Maintains an understanding of end to end business processes.
Good oral and written communication skills; good meeting facilitation and presentation skills.
Strong time management and organizational skills, with the ability to manage detailed, concurrent tasks.
Ability to meet deadlines with quality results while managing risk.
Displays a sense of urgency.
Experience with SAP GRC Access Control configuration and widely accepted practices for implementing SAP GRC Access Control.
Experience with requirements gathering techniques and preparation of requirements documents.
Accurate and complete testing and documentation skills.
Ability to effectively manage projects from initiation through to implementation using SWA preferred methods.
Identifies project risks and routinely pursues mitigation strategy.
Proficiency in progress reporting methods and techniques and risk management methods and techniques.
Ability to see beyond today's activities and proactively plan for the future, aligning with Company objectives.
Strong analytical and problem-solving skills and demonstrated use of analytical and problem-solving skills.
Demonstrates strong ability to think strategically, not just the limited scope of one aspect of a project.
Demonstrated ability to assemble and organize data and lead a fact-based approach to drive an optimal solution for the Company.
Demonstrates dedicated, proactive Customer Service to all Internal and External Customers.
Willing to take responsibility for finding solutions, even if problems are not in the sphere of influence.
Knowledge of designated core business processes.
Working knowledge of SOX and internal controls compliance.
Positively influences the behavior of others and works effectively as part of a Team.
Proficiency in Microsoft Outlook, Excel, Word & PowerPoint.
OTHER QUALIFICATIONS:
Must meet confidentiality expectations as to confidential, proprietary and sensitive Company information.
Must successfully complete the evaluation period.
Occasional travel and/or extended work hours may be required with possibly increased or concentrated frequency, depending on specific assignment.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Must be a U.S. citizen or have the authorization to work in the United States as defined by the Immigration Reform Act of 1986.
Must maintain a well-groomed appearance per Company appearance standards as described in established guidelines.
Additional Information
GOOD COMMUNICATION SKILLS
DURATION: 6+ Months Contract
INTERVIEW: PHONE & SKYPE
SAP Security Analyst
Chicago, IL jobs
Applicants outside US are encouraged to apply
SAP Security Analyst
Rate: $10-15 (Depending on your experience)
Work Authorization: Any
SAP security troubleshooting and end user support
Experience in GRC access control, mitigation and remediation
Experience with S/4 Hana
Support of SAP security in different projects stages (blueprint, QA, Go- live) and upgrades
Understands critical access restrictions and audit compliance requirement for tables and reports
Understand authorization business requirements for different SAP modules (FI/HR/MM/PM)
Perform high level support including problem determination for all SAP security needs within Development, QA, and Production SAP clients the Websphere application
Design and implement new authorization concepts along with business departments and IT stake holders.
Experience providing training on SAP Security.
Excellent communication skills is a must.