Machine Learning Researcher/Engineer
Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering
Our client's profound mission is to revolutionize drug discovery by seamlessly combining deep scientific insight with powerful computational tools. Their groundbreaking work has already led to the successful development of several clinical-stage drug candidates, achieved both independently and through impactful collaborations with other leading organizations.
This is a truly distinctive opportunity to collaborate closely within a dynamic, multidisciplinary team comprising brilliant chemists, biologists, and computer scientists. Together, you will advance efforts in applying cutting-edge machine learning techniques to areas such as drug discovery, intricate biomolecular simulations, and fundamental biophysics.
Location & Compensation:
- Location: New York, NY (Onsite / Hybrid - specifics to be discussed)
- Salary: USD $300,000 - $600,000 annually
What You'll Be Doing:
As a Machine Learning Researcher/Engineer, you'll be at the heart of scientific innovation, applying advanced ML to accelerate critical breakthroughs. Your responsibilities will likely include:
- ML Model Development: Designing, developing, and implementing novel machine learning models, particularly those leveraging deep learning, to address complex challenges in drug discovery and biomolecular understanding.
- Algorithmic Innovation: Innovating new algorithms and computational methods to improve the efficiency and accuracy of simulations and predictions.
- Data Integration & Analysis: Working with diverse scientific datasets, integrating molecular, biological, and simulation data to train and validate ML models.
- Cross-Disciplinary Collaboration: Collaborating intimately with chemists and biologists to translate scientific problems into machine learning challenges and to interpret model results in a meaningful biological context.
- Code Implementation: Writing clean, efficient, and robust code, primarily in Python, for both research prototyping and scalable production systems.
- Pipeline Optimization: Contributing to the optimization and scaling of machine learning pipelines for large-scale computational experiments.
- Research & Publication: Staying abreast of the latest advancements in machine learning, computational biology, and related fields, and potentially contributing to scientific publications or presentations.
What's Needed:
We're seeking a highly talented and intellectually curious individual with:
- Strong Deep Learning Foundation: A robust and demonstrated foundation in deep learning principles, methodologies, and architectures.
- Python Proficiency: Solid Python programming skills, essential for both research and engineering tasks.
- Innovation & Adaptability: A proven ability to innovate within the machine learning field, coupled with strong intellectual curiosity and adaptability to new scientific domains and technical challenges.
- Impactful Contributions: A track record of making impactful contributions in the field of machine learning, whether through academic research, open-source projects, or industry applications.
Bonus Qualifications (Beneficial, but Not Essential):
While not strictly required, experience in the following areas would be beneficial:
- Molecular Dynamics: Familiarity with molecular dynamics simulations.
- Structural Biology: Knowledge of structural biology concepts.
- Medicinal Chemistry/Cheminformatics: Background in medicinal chemistry or cheminformatics.
- Quantum Chemistry: Understanding of quantum chemistry principles.
This is a permanent opportunity to join a pioneering team in New York City that is truly revolutionizing drug discovery. If you are a passionate Machine Learning Researcher/Engineer eager to apply your skills to solve some of humanity's most challenging problems in medicine and life sciences, we encourage you to apply. We look forward to connecting with you!
Job Features
Job Category | AI, Artificial Intelligence, Engineering |
Machine Learning Researcher/Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering Our client’s profound mission is to revolutionize drug discovery by seamlessl...View more
OT Cyber Security Engineer
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
Join a Leading Force in Energy Innovation! A top-tier energy infrastructure firm is actively seeking a highly skilled and dedicated OT Cyber Security Engineer to join its dynamic team. This organization stands as a major player in the North American power and energy sector, boasting a strong and proven track record in crucial areas like power generation, robust transmission, and pioneering cutting-edge energy transition technologies. This is a unique opportunity to apply your cybersecurity expertise to critical operational technology environments.
Location & Compensation:
- Location: Austin, TX (Hybrid Work Model)
- Salary: USD $130,000 - $150,000 annually
Why You'll Love Working Here:
Our client fosters an exceptional work environment with a focus on employee well-being and impact:
- Premium Healthcare: Enjoy 100% employer-paid healthcare premiums, ensuring comprehensive coverage for you and your family.
- Generous Time Off: Benefit from paid parental leave and generous time-off policies, supporting a healthy work-life balance.
- Mission-Driven Culture: Immerse yourself in a mission-driven culture that deeply values innovation, unwavering integrity, collaborative teamwork, and strong personal ownership.
- Impactful Projects: Seize opportunities to work on highly impactful projects that directly contribute to building a cleaner, more reliable energy future for North America.
What You'll Do:
As an OT Cyber Security Engineer, you will be a critical guardian of the firm's operational technology systems. Your responsibilities will include:
- OT Security Tool Administration & Enhancement: Administering and continuously enhancing a comprehensive suite of OT security tools. This includes platforms for configuration monitoring, robust logging, targeted vulnerability assessment, and detailed asset inventory management.
- NERC CIP Compliance: Meticulously maintaining and securing critical infrastructure systems in strict compliance with NERC CIP (Critical Infrastructure Protection) standards, ensuring regulatory adherence and operational resilience.
- Security Monitoring & Response: Proactively monitoring and swiftly responding to security events within the OT environment. You'll perform thorough system audits and support essential compliance reporting activities.
- Cross-Functional Collaboration: Collaborating effectively across various functions with engineers, operators, and external vendors to design, implement, and maintain robust OT security measures.
- Automation & Continuous Improvement: Contributing actively to automation initiatives, developing comprehensive documentation, and fostering continuous improvement within security operations processes.
- Incident Investigation: Participating in investigations of security incidents affecting OT systems, helping to identify root causes and implement effective remediation.
- Security Hardening: Implementing security hardening best practices for various OT devices and systems to reduce the attack surface.
Requirements:
To be successful in this role, you should possess a strong blend of specialized expertise and practical experience:
- Experience: 4-6 years of direct experience in OT (Operational Technology) cybersecurity, with a strong preference for candidates from the electric utility sector.
- System Administration & Security Tools: A strong background in system administration for industrial control systems and proven experience with various security tools relevant to OT environments.
- Scripting Proficiency: Familiarity with scripting languages such as Python and PowerShell for automation and data analysis.
- NERC CIP Compliance: Hands-on experience and a solid understanding of compliance frameworks, particularly NERC CIP.
- Problem-Solving & Communication: Excellent problem-solving skills to diagnose complex OT security issues and strong communication skills to articulate technical concepts clearly to diverse audiences.
Additional Beneficial Experience:
Candidates with the following experience will be at a distinct advantage:
- Specific OT Security Tools: Experience with tools like Tripwire (for configuration integrity), Splunk (for SIEM/logging), BigFix (for endpoint management), or ChangeGear (for change management).
- EMS/SCADA Systems Knowledge: Familiarity with EMS (Energy Management Systems)/SCADA (Supervisory Control and Data Acquisition) systems, including their architecture and security considerations.
- Relevant Certifications: Industry certifications such as GIAC (Global Information Assurance Certification), CompTIA Security+, or Microsoft MCSA/MCSE.
If you are a passionate OT Cyber Security Engineer ready to make a significant impact within a leading energy infrastructure firm, we encourage you to apply today!
Job Features
Job Category | Hybrid, IT, Security |
OT Cyber Security Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Join a Leading Force in Energy Innovation! A top-tier energy infrastructure firm is actively seeking a high...View more
Security Software Engineer - Gen AI
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
eStreetSecurity is proudly partnered with a cutting-edge AI-powered cybersecurity startup that is at the forefront of tackling some of the most pressing digital threats in the world today. We are actively seeking a passionate and highly self-sufficient Security Software Engineer to join their innovative team. In this pivotal role, you will help develop and maintain advanced solutions focused on anti-phishing, robust fraud detection, and comprehensive identity theft prevention. If you're looking for a challenging hybrid position based in New York, and possess a strong foundation in cybersecurity, modern AI technologies, and product development, we would be eager to connect with you!
Location & Compensation:
- Location: New York, NY (Hybrid Work Model)
- Salary: USD $150,000 - $200,000 annually
Key Responsibilities:
As a Security Software Engineer specializing in Gen AI, you will be instrumental in building and enhancing core security products. Your key responsibilities will include:
- Core Security System Development: Taking a hands-on approach to building robust systems specifically designed for advanced phishing detection, comprehensive identity theft prevention, and sophisticated fraud detection within our client's state-of-the-art security platform.
- Full Software Development Lifecycle Contribution: Contributing actively across the entire software development lifecycle. This encompasses ideation and conceptualization, meticulous design, high-quality development, and seamless deployment of anti-phishing and fraud detection systems.
- Cross-Functional Collaboration: Working in close collaboration with diverse cross-functional teams, including expert cybersecurity researchers, fellow engineers, and dedicated product managers, to collectively drive the strategic development and enhancement of cutting-edge security products.
- LLM & Agent Integration: Building, meticulously fine-tuning, and strategically integrating Large Language Models (LLMs) and AI agents. The goal here is to significantly enhance threat detection accuracy, reduce false positives, and accelerate response times to emerging threats.
- Product Ownership & Quality Assurance: Taking full ownership of the quality, performance, maintainability, and scalability of your developed products. This includes ensuring they consistently meet both ambitious business objectives and stringent technical goals.
- Continuous Innovation & Best Practices: Staying consistently on top of the latest developments in cybersecurity research. You will proactively apply best practices and integrate new findings to continually evolve and improve the product's effectiveness against new threats.
- Complex Problem Solving: Solving thoughtful and inherently complex problems, often requiring you to make critical business and technology tradeoffs. Your contributions will directly and significantly contribute to reducing digital threats globally.
Skills and Experience:
We're seeking a highly skilled and motivated Security Software Engineer with:
- Software Engineering Foundation: At least 3+ years of progressive experience in software engineering, coupled with a solid background in building scalable and resilient applications.
- Cybersecurity Focus: A minimum of 2+ years of hands-on experience in cybersecurity, with specific expertise in fraud detection, anti-phishing solutions, or identity theft prevention.
- Critical Thinking & Problem-Solving: Possessing strong critical thinking and analytical problem-solving skills, with a proven ability to make thoughtful and impactful business and technology tradeoffs.
- Project Ownership: A proven track record of taking full ownership of projects, from initial inception through to successful completion. This includes a strong emphasis on delivering high-quality, maintainable, and understandable product solutions.
- Autonomy & Adaptability: Demonstrating comfort in managing ambiguity and the ability to independently execute projects while consistently delivering high-quality results in a fast-paced environment.
Bonus Skills:
Candidates with the following experience will be highly regarded:
- Startup Experience: Prior experience in a high-growth, early-stage startup environment.
- Security Application Development: Proven experience building core security applications or platforms from the ground up.
- Cloud & Deployment: Familiarity with cloud-based infrastructure (e.g., AWS, Azure, GCP) and modern deployment pipelines (e.g., CI/CD).
Benefits & Perks:
Our client offers a compelling package designed to attract and retain top talent:
- Cutting-Edge Technology: The exciting opportunity to work daily with the very latest advancements in AI, machine learning, and automation technologies, pushing the boundaries of innovation in the cybersecurity space.
- Collaborative Culture: Join a talented and passionate team that deeply values collaboration, fostering an environment where innovative ideas are encouraged, shared, and celebrated.
- Significant Growth Opportunities: Contribute directly to a rapidly growing company, with ample opportunities for professional development and substantial career advancement as the organization expands its global footprint.
- Competitive Compensation & Benefits: Receive a highly competitive base salary and equity package, alongside flexible work arrangements, comprehensive health insurance, and other valuable perks.
This is a unique and impactful permanent opportunity to join a pioneering tech company that is making a real difference in the cybersecurity sector through AI and automation. If you're a driven Security Software Engineer with a passion for AI/ML, a background in threat detection, and a desire to work with cutting-edge technology in a collaborative, high-growth environment, we strongly encourage you to apply. We look forward to connecting with you!
Job Features
Job Category | AI, Artificial Intelligence, Engineering, Hybrid, Security |
Security Software Engineer – Gen AI Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is proudly partnered with a cutting-edge AI-powered cybersecurity startup th...View more
Lead Cyber Threat Specialist
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. They are seeking a highly skilled and proactive Lead Cyber Threat Specialist. In this critical role, you will be directly responsible for identifying, analyzing, and proactively mitigating advanced cyber threats targeting our client's valuable assets. You will lead a dedicated team of threat hunters and work in close collaboration with other cybersecurity professionals to develop and implement cutting-edge threat detection and response strategies.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: USD $115,000 - $145,000 annually
What You'll Be Doing:
As the Lead Cyber Threat Specialist, you will be at the forefront of defending against sophisticated cyber adversaries. Your key responsibilities will include:
- Proactive Threat Hunting Leadership: Taking the lead on proactive threat hunting initiatives to systematically identify and mitigate Advanced Persistent Threats (APTs) and other sophisticated cyber adversaries before they can cause significant harm.
- In-Depth Threat Intelligence Analysis: Conducting comprehensive and in-depth analysis of cyber threat intelligence from various sources. This involves identifying emerging threats, pinpointing new attack vectors, and understanding the Tactics, Techniques, and Procedures (TTPs) utilized by threat actors.
- Incident Response Management: Managing and coordinating responses to complex security incidents from initial detection through full remediation. This includes performing detailed forensic analysis to determine the root cause, scope, and impact of incidents.
- Cross-Functional Threat Intelligence Sharing: Collaborating extensively with internal cybersecurity teams (e.g., Security Operations Center, Incident Response, Forensics) and broader IT teams to effectively share threat intelligence and continuously enhance the organization's detection and response capabilities.
- Security Tool Optimization: Evaluating existing and emerging security tools and technologies, recommending, and implementing optimizations to continuously improve threat detection efficacy and incident response capabilities.
- Comprehensive Reporting: Preparing and delivering comprehensive, articulate reports on threat intelligence findings, detailed incident analyses, and strategic recommendations to senior leadership, ensuring clear communication of complex security postures.
- Continuous Learning & Adaptation: Staying consistently abreast of the latest cyber threat trends, evolving attack methodologies, and advancements in security technologies to ensure the organization's defenses remain robust and current.
- Team Mentorship & Development: Providing technical mentorship and guidance to junior threat hunters and cybersecurity analysts, fostering their skills and contributing to the overall growth of the team.
Qualifications:
To excel in this critical role, you should possess a strong blend of technical expertise, analytical prowess, and leadership capabilities:
- Educational Background: A Bachelor's degree in Information Technology or a related discipline, or equivalent relevant work experience.
- Relevant Certifications: Holding one or more relevant advanced certifications, such as Splunk Enterprise Security Certified Admin, Splunk Certified Cybersecurity Defense Analyst, Certified Cyber Threat Hunting Professional (CCTHP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Cyber Threat Hunter (CCTH), or Certified Ethical Hacker (CEH).
- Extensive Cybersecurity Experience: At least 7 years of progressively responsible experience in cybersecurity, with a strong, demonstrable focus on threat hunting, incident response, and threat intelligence analysis.
- Hands-on Threat Hunting: Proven hands-on experience with various threat-hunting techniques, including anomaly detection, meticulous network traffic analysis, and deep packet inspection.
- Threat Intelligence Expertise: Extensive experience in collecting, analyzing, and effectively disseminating threat intelligence derived from multiple, diverse sources.
- Incident Response Leadership: A strong background in leading and coordinating complex security incident response activities, encompassing identification, containment, eradication, recovery, and post-incident analysis.
- SOC & IT Collaboration: Demonstrated experience working closely with Security Operations Center (SOC) teams, IT operations, and engineering to optimize security tool configurations and continuously improve detection rules and alerts.
- Security Technology Proficiency: Proficiency with a range of security technologies such as SIEM (Security Information and Event Management) systems, EDR (Endpoint Detection and Response) platforms, dedicated threat intelligence platforms, and advanced network traffic analysis tools.
- Exceptional Analytical Skills: Exceptional analytical skills with the ability to interpret complex data sets, identify subtle anomalies, and uncover sophisticated threats.
- Scripting Proficiency: Strong skills in scripting languages (e.g., Python, PowerShell) to automate threat-hunting processes, data analysis, and response actions.
If you are a driven and experienced Cyber Threat Specialist ready to lead and innovate within a prominent hospitality group, we encourage you to apply directly! We look forward to connecting with you.
Job Features
Job Category | Onsite, Security |
Lead Cyber Threat Specialist Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. T...View more
VP, Identity & Access Management Architect and Operations Lead
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
We are thrilled to be partnering with a globally leading provider of vacation ownership, rental, and resort experiences. Our client is renowned for its exclusive vacation club memberships, premier timeshare properties, and luxurious travel options spanning an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they offer highly flexible vacation solutions, including innovative points-based systems and robust exchange programs, all while operating under multiple well-known hospitality brands.
They are actively seeking a visionary Vice President, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategic planning, comprehensive evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.
The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The core objective is to dramatically enhance customer relationships and further expand accessibility across all their diverse experiences and destinations. Their ambitious goal is to solidify their position as a technology leader within the hospitality sector, and they are actively seeking seasoned professionals eager to bring their deep expertise to the organization long-term and drive this exciting evolution.
Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Crucially, the business intends to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: USD $175,000 annually
The Role:
Reporting directly to the VP of Information Security Architecture, this pivotal role will play an instrumental part in guiding and overseeing all critical IAM functions across the enterprise. This encompasses, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing intricate workflow and review certification processes, ensuring stringent audit and compliance readiness, orchestrating sophisticated hybrid cloud identity management, overseeing comprehensive privileged access management (PAM), and architecting robust authentication and authorization systems.
This leader must possess expert knowledge in modern identity management approaches, including advanced administration, innovative identity cloud services, intricate custom connector development, complex installation and configuration, meticulous performance tuning, and robust backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to seamlessly support other IT areas or functions as needed is required to navigate a dynamic and multifaceted IT landscape.
You'll also be strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, optimal scalability, and peak performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and overarching strategy specifically around business-focused identity management and comprehensive information security.
Summary of Contributions:
- Complex Analysis & Strategic Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often adeptly manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
- Proactive Problem Resolution: Responds to, skillfully solves, and makes informed, impactful decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk and ensuring swift resolution.
- Operational Enhancement & Strategic Planning Support: Assists more senior associates in achieving overarching business results by identifying compelling opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and diligently achieving results against budget within the defined scope of responsibility.
- Continuous Professional Development: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to continuously enhance and increase skills and knowledge, embodying a deep commitment to lifelong professional growth.
- Adaptive Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team, demonstrating flexibility and adaptability.
Responsibilities:
- IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions, ensuring they meet enterprise-grade requirements.
- Holistic IAM Leadership: Architecting and managing comprehensively across all critical facets of IAM: Identity Governance, Access Management, and Privileged Access Management (PAM).
- Performance & Health Optimization: Proactively identifying and addressing complex issues related to IAM system performance, ensuring high availability, responsiveness, and seamless operation.
- Technical Integration Leadership: Providing crucial technical leadership for the seamless integration of IAM systems with other enterprise applications, cloud services, and foundational IT platforms.
- Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and the overarching business objectives, translating strategic goals into actionable security frameworks.
- Policy & Procedure Development: Developing, meticulously maintaining, and continually refining comprehensive IAM policies, procedures, and standards documentation that are clear, actionable, and enforceable.
- Stakeholder Requirements Translation: Collaborating closely and effectively with various business and IT stakeholders to deeply understand their specific IAM requirements and expertly translating these into precise, actionable technical specifications.
- Audit & Compliance Assurance: Performing regular and thorough audits to ensure that all IAM systems and processes strictly comply with established IAM standards, internal policies, and external regulatory mandates.
- Team Guidance & Mentorship: Providing expert-level support and valuable technical guidance to team members regarding complex IAM challenges, troubleshooting, and best practices.
- System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain resilient and secure against potential and emerging cybersecurity threats.
- Strategic Documentation: Meticulously documenting IAM strategies, architectures, designs, and systems for comprehensive future reference, internal reviews, and effective knowledge transfer across teams.
- Secure Application Development Participation: Participating significantly in major application development projects to design inherently secure architectures and ensure that developed systems rigorously align with the organization's overarching security strategy and policy.
- Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established security standards.
- Team Capability Enhancement: Actively enhancing the Security team's capabilities by providing direct mentorship to junior team members, fostering their professional growth and knowledge expansion.
- Information Security Championing: Championing information security principles and best practices on key customer feature development projects, contributing directly to designing secure architectures and ensuring developed systems align with the organization's security strategy and policy.
- Digital Integration Methodology Leadership: Leading the definition and methodology for ensuring that applications and processes are fully and securely integrated with our digital and service delivery platforms.
- Third-Party Application Security Assurance: Ensuring that both company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications that meet these exacting standards.
- Architecture Documentation Creation: Creating detailed security architecture documentation, including comprehensive architecture frameworks, design patterns, and security standards.
- Cross-Organizational Partnerships: Partnering strategically with leaders across the Information Security and Data Privacy organization, as well as other key organizational leads, to foster a unified security approach.
- Complex Application Security Solutioning: Working directly with peers and/or third-party vendors to provide strategic mitigations and innovative solutions to overcome major application security hurdles, meticulously evaluating business strategies and requirements.
- Integration Analysis & Cost Estimation: Thoroughly studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions, aiding in strategic planning.
Skills and Attributes:
- Exceptional Critical Thinking & Thought Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the profound ability to comprehend highly complex problems, draw logical conclusions, make sound strategic decisions, develop practical and innovative solutions, and effectively negotiate to drive the closure of intricate challenges.
- Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence within a dynamic and ever-evolving environment.
- Broad IT & Security Domain Knowledge: Strong demonstrated knowledge spanning enterprise IT systems, diverse cloud solutions (IaaS, PaaS, SaaS), and a wide array of advanced security technologies.
- Superior Communication & Influence: The ability to communicate highly complex technical and strategic messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message effectively to different audiences and influencing outcomes.
- Diverse Cybersecurity Experience: Broad and diverse experience encompassing cybersecurity strategy, security operations, security architecture, cloud security, and deep, specialized expertise in identity and access management.
- Identity & Access Management Mastery: In-depth knowledge of identity management principles, various forms of role/attribute-based access control (RBAC/ABAC), and advanced authentication systems.
- Applied Cybersecurity Controls: Demonstrated technical proficiency in effectively applying cybersecurity controls within real-world, complex enterprise environments.
- Oversight of Complex Initiatives: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact and visibility.
- Executive-Level Engagement: The confidence and skill to engage executive-level stakeholders on complex security matters with limited oversight and guidance, providing strategic insights and recommendations.
- Strategic & Tactical Acumen: The capacity to think both strategically (long-term vision and planning) and tactically (immediate execution and problem-solving), combined with highly effective decision-making skills.
- Relevant Cybersecurity Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.) is a strong asset.
- Project & Problem Ownership: Demonstrable ability to independently drive projects to completion and take full ownership of complex problems within a demanding security environment, seeing them through to successful resolution.
- Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to effectively manage multiple, often competing, priorities.
Qualifications:
- Extensive Information Security Experience: A minimum of 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically focused on Information Security roles.
- IAM Management Experience: Proven experience managing mid to large-sized Identity Management operations ("shops").
- Security Frameworks Expertise: Hands-on experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
- Cloud Identity Expertise: Demonstrated hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management solutions.
- Modern IAM System Proficiency: Demonstrated proficiency with modern, enterprise-grade Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.
Education & Certifications:
- Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent relevant work experience.
- Preferred Education: A Master's degree in information security or a related discipline is highly preferred.
- Key Certifications:
- Certified Identity and Access Management (CIAM)
- Global Information Assurance Certification (GIAC) Identity Management
- OCI Oracle Identity Manager
- SailPoint IIQ Administrator
Job Features
Job Category | IT, Onsite, Security |
VP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are thrilled to be partnering with a globally leading provider o...View more
Software Engineer, AI
Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering
We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on delivering top-tier automation solutions across the healthcare space. This innovative organization successfully launched from one of New York's largest and most respected healthcare systems and is now rapidly expanding its reach and impact nationwide.
Their cutting-edge platform strategically leverages Artificial Intelligence (AI) to target critical business areas, significantly streamlining complex processes and enhancing efficiency throughout the healthcare ecosystem. The team is now looking to bring on a talented Software Engineer, AI, who will be instrumental in building the next generation of their intelligent automation capabilities.
Location & Compensation:
- Location: New York, NY (Onsite / Hybrid - specific flexibility details to be discussed)
- Salary: USD $200,000 - $260,000 annually
What You'll Be Doing:
As a Software Engineer, AI, you will be a core contributor to the development of intelligent systems that revolutionize healthcare operations. Your key responsibilities will include:
- LLM Agent Development & Integration: Building fundamental Large Language Model (LLM) agents from the ground up, and playing a crucial role in assisting with their seamless integration across the entire product suite.
- Infrastructure Support & Scalability: Providing robust support for infrastructure management, leveraging modern orchestration and deployment tools such as Kubernetes, Docker, and Terraform to ensure scalability and reliability.
- Backend Service Development: Designing, developing, and maintaining high-performance back-end services primarily using Python and the FastAPI framework, ensuring efficient data processing and robust API capabilities.
- AI/ML System Contribution: Actively contributing to the full lifecycle of AI/ML systems, from ideation and prototyping to deployment and monitoring in a production environment.
- Agentic Workflow Implementation: Playing a key role in implementing advanced agentic workflows that enable autonomous and intelligent decision-making within the platform.
What's Needed:
We're seeking a skilled and experienced AI-focused Software Engineer with:
- Backend Development Expertise: A minimum of 5+ years of extensive back-end development experience, with a strong focus on Python.
- AI/ML Systems Experience: Proven experience in building and deploying AI/ML systems in a production environment.
- RAG & Agentic Workflows: Practical experience with Retrieval-Augmented Generation (RAG) frameworks and designing/implementing agentic workflows.
- Database Technologies: A solid understanding of various database technologies, including PostgreSQL, graph databases, Elasticsearch, and Redis, and how to integrate them effectively into AI solutions.
- Containerization & Orchestration: Experience with Kubernetes, Docker, and Terraform for infrastructure management.
- Problem-Solving & Collaboration: Strong analytical skills with the ability to troubleshoot complex issues, and a collaborative mindset to work effectively within cross-functional teams.
Benefits & Perks:
Our client offers a compelling package designed to attract and retain top talent:
- Cutting-Edge Technology Exposure: Work daily with the latest advancements in AI, machine learning, and automation technologies, pushing the boundaries of innovation in healthcare.
- Collaborative & Innovative Culture: Join a talented and passionate team that deeply values collaboration, fostering an environment where innovative ideas are encouraged and celebrated.
- Significant Growth Opportunities: Contribute to a rapidly growing company, with ample opportunities for professional development and career advancement as the organization expands.
- Competitive Compensation & Benefits: Receive a highly competitive salary and equity package, alongside flexible work arrangements, comprehensive health insurance, and additional perks.
This is a unique permanent opportunity to join a pioneering tech company that is making a real difference in the healthcare sector through AI and automation. If you're a driven Software Engineer with a passion for AI/ML and a desire to work with cutting-edge technology in a collaborative environment, we encourage you to apply. We look forward to connecting with you!
Job Features
Job Category | AI, Artificial Intelligence, Engineering, Hybrid, Onsite |
Software Engineer, AI Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on...View more
Desktop Engineer - Full-Time
Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophisticated enterprise desktop environment. This critical, full-time role involves comprehensive engineering, strategic deployment, and robust support of cutting-edge desktop solutions across a complex multi-site infrastructure.
Location & Compensation:
- Location: New York, NY (Onsite)
- Salary: $170,000 - $190,000 base salary
What You'll Be Doing:
As a Desktop Engineer, you will be at the forefront of managing the firm's end-user computing landscape, ensuring seamless operations and advanced capabilities. Your key responsibilities will include:
- MECM/SCCM Infrastructure Management: Taking a lead role in the management and comprehensive support of the Microsoft Endpoint Configuration Manager (MECM), formerly SCCM, infrastructure. This includes ensuring its health, performance, and effective utilization for endpoint management.
- Application Packaging & Deployment: Expertly packaging and deploying a wide range of applications, including various formats such as EXE, MSI, and MSIX, to ensure efficient and standardized software distribution across the enterprise.
- Multi-Environment Troubleshooting: Providing advanced troubleshooting and resolution for issues across diverse desktop, mobile, and virtual environments, ensuring minimal downtime and optimal user experience.
- Cross-Functional Collaboration: Collaborating closely and effectively with various internal teams, including IT Operations, Security, and Infrastructure teams, to align desktop solutions with broader organizational goals and security mandates.
- Documentation & Change Management: Meticulously maintaining comprehensive documentation for all desktop configurations, processes, and solutions. You will also diligently enforce established change management protocols to ensure stability and control within the environment.
- User Support & Experience: While primarily an engineering role, you'll also contribute to ensuring an excellent end-user experience by implementing reliable and user-friendly desktop solutions.
What's Needed:
We're looking for a highly proficient and experienced Desktop Engineer with:
- Extensive Experience: A minimum of 5+ years of dedicated experience in a desktop engineering role or advanced IT support position within an enterprise setting.
- Scripting & Packaging Proficiency: Strong PowerShell scripting skills for automation and advanced application packaging capabilities.
- Core Desktop Technologies: Proven experience and expertise with Windows 10/11, comprehensive support of Office 365 suites, various virtualization technologies, and proficient management of Active Directory.
- Enterprise Application Familiarity: Familiarity with legal-specific applications or a broad range of other complex enterprise applications is a significant plus.
- Problem-Solving Skills: Excellent analytical and problem-solving abilities to diagnose and resolve complex technical issues efficiently.
- Communication: Strong verbal and written communication skills to effectively collaborate with teams and document procedures.
Why This Role Matters:
This is a fantastic opportunity to join a leading law firm at a senior level, where you can directly impact the daily productivity and technological advancements for a demanding professional user base. You'll work with cutting-edge tools and collaborate with dedicated IT professionals in a dynamic New York City environment.
If you're a skilled Desktop Engineer ready to enhance enterprise desktop environments and drive technological excellence, we encourage you to apply. We look forward to hearing from you!
Job Features
Job Category | IT, Onsite |
Desktop Engineer – Full-Time Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophistic...View more
Lead IAM Engineer
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
We're currently partnered with a leading energy/utilities organization that's looking to bring on a highly skilled Lead IAM Engineer. This is a pivotal, senior-level role that combines hands-on technical expertise with critical leadership responsibilities. You'll lead the design, implementation, and ongoing management of advanced enterprise-wide Identity and Access Management (IAM) solutions, directly contributing to securing systems, enforcing robust security policies, and driving the overall IAM strategy across the organization.
Location & Compensation:
- Location: New Jersey/New York (Offers Hybrid/Remote flexibility)
- Compensation: USD $140,000 - $165,000 annually
- Employment Type: Full-time
What You'll Be Doing:
As a Lead IAM Engineer, you'll be at the forefront of securing digital identities and access within a complex enterprise environment. Your key responsibilities will include:
- IAM Architecture & Implementation Leadership: You'll lead the design, architecture, and implementation of cutting-edge IAM solutions, encompassing Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) systems.
- Identity Governance Oversight: You'll oversee the entire identity lifecycle management, from robust provisioning to secure deprovisioning processes, ensuring accuracy and efficiency.
- Advanced Access Control Enforcement: You'll implement and enforce stringent access control mechanisms, including least privilege principles, Just-In-Time (JIT) access, and core Zero Trust security architectures.
- Directory & Federation Services Management: You'll manage and optimize critical directory services like Active Directory and Azure AD, traditional LDAP, and various identity federation protocols such such as SAML, OAuth, and OpenID Connect.
- Cloud IAM Security: You'll secure access across diverse cloud platforms, specifically AWS and Azure, by implementing proper identity federation and granular role management strategies.
- Compliance & Risk Management: You'll ensure strict alignment with key regulatory frameworks and standards like SOX and NIST. This involves conducting thorough audits and risk assessments to maintain a strong compliance posture.
- Incident Response Collaboration: You'll collaborate closely with broader security teams to swiftly detect, analyze, and remediate IAM-related security incidents, minimizing potential impact.
- Automation & Scripting: You'll develop efficient scripts and workflows using languages like PowerShell, Python, or similar tools to automate routine IAM tasks and enhance operational efficiency.
- Strategic Stakeholder Engagement: You'll actively partner with various IT, security, and business teams to collaboratively define, refine, and successfully implement comprehensive IAM strategies that meet evolving organizational needs.
What's Needed:
We're looking for an experienced and technically astute individual with strong leadership capabilities:
- Educational Background: A Bachelor's degree in a related field is required, or a minimum of 10 years of relevant cybersecurity experience can be considered in lieu of a degree.
- Extensive IAM Engineering Experience: A minimum of 6 years of dedicated experience in IAM engineering, security architecture, or a closely related cybersecurity field.
- Deep IAM Expertise: Profound expertise in various IAM platforms, a wide array of authentication protocols, and robust cloud security principles.
- Scripting Proficiency: Demonstrated proficiency in scripting languages such as PowerShell, Python, and Bash.
- Advanced Security Understanding: A strong, in-depth understanding of Zero Trust security models, identity-centric security approaches, and risk-based authentication methodologies.
- Problem-Solving & Leadership: Excellent problem-solving skills, strong communication abilities (both verbal and written), and proven leadership capabilities.
Preferred Qualifications:
Candidates with the following qualifications will be highly regarded:
- Relevant Certifications: Possessing relevant industry certifications such as CISSP, CISM, or various IAM-specific credentials.
- DevSecOps Integration: Experience integrating IAM solutions with CI/CD pipelines and familiarity with DevSecOps practices.
- API Security & SDKs: Familiarity with securing APIs and practical experience utilizing IAM Software Development Kits (SDKs).
This is a fantastic opportunity to take on a leadership role within a critical cybersecurity domain for a major energy/utilities organization. If you possess the required IAM expertise and are ready to drive strategic initiatives, we encourage you to apply.
Job Features
Job Category | IT, Security |
Lead IAM Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We’re currently partnered with a leading energy/utilities organization that’s looking to bring on a high...View more
Lead Cyber Security Analyst
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry? Our client, a recognized leader in their field, is actively seeking an experienced Lead Cyber Security Analyst to join their dynamic team. This pivotal, senior-level role is crucial for driving the company's IT security initiatives, maintaining robust security systems, and providing leadership to a skilled team of professionals dedicated to safeguarding critical organizational assets.
Location & Compensation:
- Location: Primarily Remote, with required in-person/on-site presence a few days every month at either the Newark, NJ, or Bethpage, Long Island, NY office.
- Base Compensation: $150,000 - $180,000 annually, plus a 15% Annual Target Bonus.
Summary:
As the Lead Cyber Security Analyst, you'll be at the forefront of the client's defense strategies. This role demands a proactive and hands-on leader who can not only manage complex security projects but also provide technical guidance and foster best practices within the team. You'll be instrumental in identifying vulnerabilities, mitigating risks, and implementing comprehensive security measures to protect the organization's information systems effectively in an evolving threat landscape.
Role Responsibilities:
Your contributions in this leadership role will include:
- Cyber Security Project Leadership: Taking the helm as a project lead for critical cybersecurity initiatives. This includes demonstrating expertise in managing and implementing a wide array of security technologies such as antivirus solutions, Intrusion Detection/Prevention Systems (IDS/IPS), and advanced endpoint detection & response (EDR) platforms.
- Comprehensive Data Protection: Spearheading efforts in data protection. This involves applying proficiency in data loss prevention (DLP) strategies and various data encryption techniques to ensure that all sensitive information remains consistently protected throughout its lifecycle.
- Hands-on Technical Leadership: Providing proven, hands-on technical guidance and invaluable mentorship to team members. You'll ensure that best practices are rigorously followed, fostering a culture of continuous learning and excellence within the security operations team.
- Proactive Problem Solving & Risk Mitigation: Displaying adeptness at swiftly identifying security vulnerabilities, effectively mitigating identified risks, and proactively implementing robust security measures to comprehensively protect information systems from evolving threats.
- Security Operations Enhancement: Collaborating closely with cross-functional teams to implement and oversee advanced cybersecurity protocols, ensuring robust protection at every level of the organization's IT infrastructure.
Skills Required:
To excel in this role, you should possess a strong blend of technical expertise and leadership qualities:
- Technology Proficiency: A minimum of 8+ years of experience in security IT, with a strong preference for experience gained within cloud computing environments and a proven track record of implementing security measures within cloud-forward architectures.
- Cybersecurity Analyst Expertise: Employing deep analytical expertise in leveraging various security technologies, including Security Information and Event Management (SIEM) systems, firewalls, IDS, and other critical security tools.
- Team Collaboration: A demonstrated ability to collaborate effectively with diverse teams, ensuring seamless integration and oversight of cybersecurity protocols across the enterprise.
- Educational Background: A Bachelor's degree in a related field is preferred, or a minimum of 12+ years of experience in an IT-related field will be considered as equivalent work experience.
Benefits & Additives:
Our client values their employees and offers a comprehensive benefits package:
- Health, Medical, Dental, and Vision healthcare plans.
- 401K Match program.
- Approximately 5% travel required for on-site presence and other business needs.
If you are a driven and experienced cybersecurity professional ready to lead and innovate within a forward-thinking organization, we encourage you to apply now! We look forward to discussing this great opportunity with you.
Job Features
Job Category | IT, Security |
Lead Cyber Security Analyst Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry...View more
AVP, Identity & Access Management Architect and Operations Lead
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
We are excited to be partnering with a leading global provider in the vacation ownership, rental, and resort experiences industry. Our client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxury travel options across an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and exchange programs, all while operating under multiple well-known hospitality brands.
Our client is seeking a visionary AVP, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategy, comprehensive planning, rigorous evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.
The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The goal is to dramatically enhance relationships with customers and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader in hospitality, and they are actively seeking seasoned professionals eager to bring their expertise to the organization for the long term and drive this exciting evolution.
Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Critically, the business intends to double its spending on Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive innovation through advanced technology adoption.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: USD $175,000 annually
The Role:
Reporting directly to the VP of Information Security Architecture, this pivotal role will be instrumental in guiding and overseeing all IAM functions across the enterprise. This includes, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing workflow and review certification processes, ensuring audit and compliance readiness, orchestrating hybrid cloud identity management, overseeing privileged access management (PAM), and architecting robust authentication and authorization systems.
This leader must possess expert knowledge in modern identity management approaches, including administration, identity cloud services, custom connector development, complex installation and configuration, performance tuning, and advanced backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to support other areas or functions as needed is required to navigate a dynamic IT landscape.
You'll also be responsible for strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, scalability, and optimal performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and strategy specifically around business-focused identity management and comprehensive information security.
Summary of Contributions:
- Complex Analysis & Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
- Problem Resolution & Proactive Solutions: Responds to, skillfully solves, and makes informed decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk.
- Operational Enhancement & Planning: Assists more senior associates in achieving overarching business results by identifying opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and achieving results against budget within the defined scope of responsibility.
- Self-Improvement & Continuous Learning: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to enhance and increase skills and knowledge, embodying a commitment to continuous professional development.
- Ad Hoc Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team.
Responsibilities:
- IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions.
- Holistic IAM Management: Architecting and managing across all facets of IAM: Governance, Access Management, and Privileged Access Management.
- Performance Optimization: Identifying and proactively addressing issues related to IAM performance, ensuring high availability and responsiveness.
- Technical Integration Leadership: Providing technical leadership for the seamless integration of IAM systems with other enterprise applications and platforms.
- Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and overarching business objectives.
- Policy & Procedure Development: Developing and meticulously maintaining comprehensive IAM policies, procedures, and standards documentation.
- Stakeholder Requirements Translation: Collaborating closely with various stakeholders to deeply understand their IAM requirements and expertly translate them into precise technical specifications.
- Audit & Compliance: Performing regular audits to ensure that IAM systems and processes strictly comply with established IAM standards and organizational policies.
- Team Guidance & Support: Providing expert support and valuable guidance to team members regarding complex IAM challenges and best practices.
- System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain secure against potential and emerging threats.
- Strategic Documentation: Documenting IAM strategies, architectures, and systems thoroughly for future reference, review, and knowledge transfer.
- Secure Application Development: Participating significantly in application development projects to design secure architectures and ensure that developed systems rigorously align with the MVW security strategy and policy.
- Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established standards.
- Mentorship: Enhancing the Security team's capabilities by actively mentoring junior team members, fostering their growth and knowledge.
- Security Championing: Championing information security principles and best practices on key customer feature development projects to help design inherently secure architectures and ensure developed systems align with the MVW security strategy and policy.
- Digital Integration Leadership: Leading the definition and methodology for ensuring applications and processes are fully integrated with our digital and service delivery platforms.
- Third-Party Application Security: Ensuring that company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications to meet these standards.
- Architecture & Solution Documentation: Creating detailed security architecture documentation, including architecture frameworks, patterns, and standards.
- Cross-Organizational Partnerships: Partnering strategically with leaders across our Information Security and Data Privacy organization, as well as other key organizational leads.
- Complex Security Solutioning: Working directly with peers and/or third parties to provide strategic mitigations and innovative solutions to overcome major application security hurdles by evaluating complex business strategies and requirements.
- Integration Analysis & Cost Estimates: Studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions.
Skills and Attributes:
- Exceptional Critical Thinking & Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the ability to comprehend highly complex problems, draw logical conclusions, make sound decisions, develop practical solutions, and effectively negotiate to drive the closure of complex challenges.
- Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence in a dynamic and evolving environment.
- Broad IT & Security Knowledge: Strong demonstrated knowledge of enterprise IT systems, diverse cloud solutions, and a wide array of security technologies.
- Clear Communication: The ability to communicate highly complex technical messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message to the audience.
- Diverse Cybersecurity Experience: Broad and diverse experience spanning cybersecurity strategy, operations, security architecture, cloud security, and deep expertise in identity and access management.
- Identity & Access Expertise: In-depth knowledge of identity management principles, role/attribute-based access control (RBAC/ABAC), and various authentication systems.
- Cybersecurity Controls Application: Demonstrated technical proficiency in applying cybersecurity controls effectively within real-world environments.
- Complex Initiative Oversight: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact.
- Executive Engagement: The ability to confidently engage executive-level stakeholders on complex security matters with limited oversight and guidance.
- Strategic & Tactical Thinking: The capacity to think both strategically (long-term vision) and tactically (immediate execution), combined with effective decision-making skills.
- Relevant Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.).
- Project & Ownership Drive: Able to drive projects independently and own problems end-to-end within a demanding security environment.
- Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to handle multiple priorities effectively.
- Problem Ownership: Proven experience driving projects and owning problems completely within a security environment, seeing them through to successful resolution.
Qualifications:
- Extensive Information Security Experience: 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically in Information Security roles.
- Identity Management Leadership: Proven experience managing mid to large-sized Identity Management operations ("shops").
- Security Frameworks: Experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
- Cloud Identity Expertise: Hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management.
- Modern IAM System Proficiency: Demonstrated proficiency with modern Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.
Education & Certifications:
- Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent work experience.
- Preferred Education: Master's degree in information security or a related discipline is preferred.
- Key Certifications:
- Certified Identity and Access Management (CIAM)
- Global Information Assurance Certification (GIAC) Identity Management
- OCI Oracle Identity Manager
- SailPoint IIQ Administrator
Job Features
Job Category | IT, Onsite, Security |
AVP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are excited to be partnering with a leading global provider in ...View more
Senior Manager, Security Risk Analyst IV
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
Phaidon International is partnered with a leading global provider in the vacation ownership, rental, and resort experiences industry. This client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxurious travel options across an impressive portfolio of high-end resorts and destinations. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and robust exchange programs, operating under multiple globally recognized hospitality brands.
Our client is currently embarking on a significant technology transformation initiative, with a primary focus on modernization. The goal is to dramatically enhance customer relationships and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader within the hospitality sector, and they are actively seeking visionary individuals eager to contribute their expertise and drive long-term innovation within the organization.
Under the reinvigorated leadership of their new CIO, the entire Global Technology organization is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. The business has a clear intent to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.
Location & Compensation:
- Location: Orlando, FL (Onsite)
- Salary: $115,000 - $125,000 + bonus + benefits
What You'll Be Doing:
In this high-impact role as a Senior Manager, Security Risk Analyst IV, you will be primarily responsible for creating and executing strategic initiatives that robustly protect the organization's critical information systems and technology assets. Your focus will be on securing digital resources and meticulously maintaining a strong, adaptive security framework. You will provide crucial oversight for security efforts and assessment outcomes, ensuring the effective implementation of comprehensive security governance, enterprise risk management, and compliance programs. This includes identifying, evaluating, and strategically mitigating security risks across the entire technology landscape. Key responsibilities include:
- Strategic Security Alignment: Partnering closely with IT leadership and various business units to ensure that all security strategies are meticulously aligned with overarching business goals, objectives, and growth initiatives.
- Risk Identification & Evaluation: Proactively identifying and rigorously evaluating security risks present within the organization's complex technology infrastructure, applications, and operational processes.
- Risk Assessment Oversight & Guidance: Offering expert guidance and providing strategic oversight on all security risk assessments, ensuring they strictly adhere to industry standards, best practices, and established company policies.
- GRC Tool Utilization: Expertly leveraging various tools and software solutions to facilitate efficient governance, comprehensive risk assessment, and meticulous compliance management. This includes utilizing specialized risk assessment systems, compliance tracking platforms, and developing insightful reporting dashboards.
- Cybersecurity Control Review & Enhancement: Continuously reviewing and evaluating the effectiveness of existing cybersecurity controls. You will ensure their ongoing compliance with key policies and lead efforts to identify and address any existing gaps or weaknesses.
- Internal & External Risk Mitigation: Taking a lead role in identifying, assessing, and mitigating both internal and external risks that could impact the organization's information assets and operations.
- Advanced Quantitative & Qualitative Analysis: Conducting more advanced quantitative and qualitative analysis for complex business processes and/or strategic projects. This often involves overseeing smaller projects, specific business processes, or significant segments of larger organizational initiatives.
- Leadership in Risk Assessment Projects: Providing strong leadership and direct oversight for security risk assessment projects, ensuring all activities meticulously follow industry best practices and company-specific policies.
- Collaboration with Legal & Compliance: Collaborating closely and effectively with legal, compliance, and regulatory teams to ensure unwavering adherence to all relevant industry standards, regulations, and data protection requirements (e.g., GDPR, CCPA, HIPAA).
- GRC Process Enhancement: Identifying critical opportunities to enhance processes within the GRC (Governance, Risk, and Compliance) development lifecycle, recommending and implementing tangible improvements to optimize workflows and increase overall efficiency.
- Security Standards Development: Developing and meticulously maintaining technical security configuration standards across various platforms and technologies.
- Policy & Procedure Communication: Creating and clearly communicating comprehensive security policies, standards, and procedures to ensure consistent and uniform security practices across the entire organization.
- Regulatory Monitoring & Adaptation: Staying continuously informed about relevant regulations, industry standards, and emerging best practices. You will implement necessary updates to GRC systems to ensure ongoing compliance and adaptability.
- Audit & Assessment Management: Coordinating and actively participating in security audits and assessments, and effectively managing responses to audit findings and recommendations.
Required Experience:
We're seeking a highly experienced and credentialed professional with a proven track record in information security risk management:
- Educational Background: A Bachelor's degree in an IT-related field or equivalent relevant work experience (preferred).
- Advanced Security Certification: Possession of an advanced security certification is highly preferred, such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), or CGEIT (Certified in the Governance of Enterprise IT).
- Extensive Information Security Experience: Six to eight years of progressively responsible experience in diverse information security roles.
- Technical Audit/Compliance Experience: At least five years of experience in a technical audit, security compliance, or a similar dedicated risk management role.
- Security Framework Expertise: Deep and comprehensive understanding of leading security frameworks (e.g., NIST, ISO 27001, CIS), various regulatory requirements, and established industry standards.
- Risk Assessment Mastery: Strong expertise in various risk assessment methodologies and proficiency with associated tools.
- Vulnerability & Threat Knowledge: Extensive knowledge of security risk assessment techniques, robust vulnerability management processes, and effective threat modeling methodologies.
- Database & Data Modeling: Familiarity with various database management systems (SQL, NoSQL) and strong understanding of data modeling principles.
- Workflow & API Integration: Experience with workflow design, basic development concepts, and API integration functionality.
- GRC/ERM Tool Proficiency: Demonstrated proficiency in using GRC/ERM (Governance, Risk, and Compliance / Enterprise Risk Management) tools.
- Core IT Infrastructure Knowledge: Solid knowledge of IP networking concepts, major operating systems, and diverse cloud computing environments.
- Broad Technology Acumen: General working knowledge of web application and network technologies, various programming languages, databases, and a range of operating systems (Linux, Unix, Mac OS X, Windows).
- Advanced Security Principles: An advanced and nuanced understanding of core security principles, standards, and processes, including but not limited to authentication and access control, secure configurations, network traffic analysis, endpoint security, platform architecture, application security, encryption and key management, and robust cloud security.
Job Features
Job Category | IT, Onsite, Security |
Senior Manager, Security Risk Analyst IV Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Phaidon International is partnered with a leading global provider in the vacation ownership, ...View more
Vice President of Information Security
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
Are you a seasoned cybersecurity professional with a profound passion for cybersecurity, governance, and enterprise risk management? A leading global organization is actively seeking a dynamic and strategic leader to join its executive-level technology risk and governance team. In this pivotal role, you will be instrumental in shaping and advancing the firm's comprehensive cybersecurity and technology control frameworks. You'll operate across diverse global teams, driving strategic policy development, enhancing crucial regulatory alignment, and significantly strengthening the organization's defense posture against an ever-evolving threat landscape.
Location & Compensation:
- Location: Dallas, TX
- Salary: USD $180,000 - $200,000 annually
Key Responsibilities:
As the Vice President of Information Security, you will lead critical initiatives that safeguard the organization's digital assets and ensure operational resilience. Your core responsibilities will include:
- Policy & Standards Leadership: Leading the end-to-end development, implementation, and rigorous governance of enterprise-wide cybersecurity and technology risk policies and standards. This includes ensuring they are robust, current, and effectively communicated.
- Strategic Control Framework Enhancement: Driving strategic initiatives aimed at continuously improving the organization's technology control frameworks and ensuring unwavering regulatory compliance across all operations and jurisdictions.
- Global Project Collaboration: Collaborating extensively with cross-functional and global teams on high-impact cybersecurity projects. You'll provide expert guidance and leadership to ensure secure and compliant project delivery.
- Regulatory Integration & Analysis: Analyzing external regulations and industry frameworks (such as NIST, ISO 27001, and CIS Controls) to strategically integrate them into the organization's internal governance models and operational procedures.
- Control Assessment Oversight: Overseeing the methodologies for control assessments, ensuring their effectiveness and driving continuous improvement in how controls are evaluated and managed. This includes identifying gaps and recommending remediation strategies.
- Risk Mitigation Strategy: Contributing to the overall technology risk strategy by identifying emerging threats and vulnerabilities, and working with stakeholders to develop proactive mitigation plans.
- Executive Advisory: Providing expert advice and recommendations to senior leadership on critical cybersecurity matters, risk posture, and strategic investments in security technologies.
What We're Looking For:
We're seeking an influential leader with a deep understanding of the cybersecurity landscape and a proven track record:
- Extensive Experience: A minimum of 8+ years of progressive experience in cybersecurity, technology risk management, compliance, or a closely related field, with a significant portion in a leadership capacity.
- Global Regulatory & Framework Expertise: A strong, in-depth understanding of global regulatory environments and leading security frameworks, including NIST, ISO 27001, and CIS Controls.
- Proven Leadership: Demonstrated leadership capabilities in policy development, control governance, and successfully engaging with and influencing diverse stakeholders at all organizational levels.
- Exceptional Communication & Analytical Skills: Possessing excellent communication skills, both verbal and written, coupled with strong analytical and complex problem-solving abilities.
- Relevant Certifications: Holding relevant industry certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) are highly advantageous.
This is a rare and significant opportunity to directly influence cybersecurity strategy at an executive level within a complex, global organization. If you're a visionary leader ready to make a profound impact in a forward-thinking environment, we would be eager to hear from you. Sources
Job Features
Job Category | IT, Onsite, Security |
Vice President of Information Security Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Are you a seasoned cybersecurity professional with a profound passion for cybersecurity, govern...View more
Senior Data Security Architect
Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity
eStreetSecurity is partnering with a major mutual life insurance company, actively seeking a highly experienced and strategic Senior Data Security Architect. This pivotal role will involve leading the design and implementation of robust data protection frameworks across their expansive enterprise. You'll be instrumental in shaping the client's overall data security posture, ensuring stringent compliance with global regulations, and safeguarding sensitive information throughout its entire lifecycle. The ideal candidate will possess deep technical expertise in advanced data security technologies, a strong understanding of emerging AI/ML security risks, and the proven ability to influence executive stakeholders and drive collaboration across diverse cross-functional teams.
Location & Compensation:
- Location: This is a hybrid role, requiring 3 days per week in the office. Potential office locations include Manhattan, NY; Stamford, CT; Holmdel, NJ; Bethlehem, PA; or Pittsfield, MA.
- Salary: USD $170,000 - $190,000 annually.
Please note: Our client is unable to sponsor visas now or in the future for this role. Candidates must be fully authorized to work in the United States.
Core Responsibilities:
As a Senior Data Security Architect, you will be a key leader in defining and executing the strategy to protect the organization's most valuable asset – its data. Your responsibilities will include:
- Data Protection Strategy & Alignment: Designing and implementing comprehensive data protection strategies that are meticulously aligned with critical business objectives and evolving regulatory requirements.
- Secure Data Lifecycle Architecture: Developing and maintaining secure data lifecycle architectures, which encompass robust data classification methodologies, clear retention policies, and secure destruction procedures.
- Governance, Privacy & Audit Readiness: Leading initiatives in data governance, privacy protection, and ensuring a state of continuous audit readiness. This includes guaranteeing full compliance with regulations like HIPAA, CCPA, and other relevant jurisdictional privacy laws.
- Reference Architectures & Blueprints: Creating and maintaining detailed reference architectures and prescriptive blueprints for designing and deploying secure data environments across the enterprise.
- Executive Reporting: Providing high-level, executive-focused reporting on the organization's data security posture, identified risks, and implemented mitigation strategies, effectively communicating complex concepts to senior leadership.
- Cloud Data Security Collaboration: Collaborating extensively with engineering, data science, and compliance teams to secure cloud data services. This includes platforms such as AWS, Databricks, and Snowflake, ensuring data remains protected in cloud-native environments.
- Data Protection Technologies Implementation: Implementing and managing a suite of data protection technologies, including encryption (in transit, at rest, in use), tokenization, data masking, and anonymization techniques.
- Data Loss Prevention (DLP) Oversight: Overseeing and optimizing Data Loss Prevention (DLP) programs and associated tools to prevent sensitive data from leaving authorized environments.
- Data Governance Platform Integration: Evaluating and integrating advanced data governance platforms such as Collibra, Informatica, and Microsoft Purview to enhance data discovery, quality, and policy enforcement.
- AI/ML Pipeline Security Leadership: Leading security efforts specifically for AI/ML pipelines. This critical area includes focusing on agentic security, robust model governance, and implementing protections against sophisticated threats like adversarial attacks, prompt injection, data leakage, and model inversion.
- Vendor & Stakeholder Partnership: Partnering strategically with external vendors and internal stakeholders to influence technology roadmaps, ensuring that future solutions align seamlessly with the organization's security best practices and strategic vision.
Qualifications:
We're seeking a highly seasoned professional with a deep technical background and proven leadership capabilities:
Required:
- Extensive Data Security Experience: A minimum of 8+ years of experience specifically in data security architecture or closely related roles.
- Data Protection Expertise: Proven expertise in advanced cryptography, comprehensive data protection strategies, and robust cloud security principles.
- AI/ML Security Knowledge: Strong, demonstrated knowledge of AI/ML security, including specific experience with Generative AI (GenAI) systems, Large Language Model (LLM) pipelines, and an understanding of emerging threats in the AI landscape.
- Cloud Data & MLOps: Hands-on experience with secure data lakes, building and securing MLOps pipelines, and designing/implementing cloud-native architectures.
- Compliance & Legal Understanding: Familiarity with various compliance frameworks and a strong understanding of legal considerations surrounding data jurisdiction and privacy.
- Executive Communication: Excellent communication skills, with a proven ability to distill complex technical topics into clear, concise presentations suitable for executive leadership and non-technical audiences.
- Collaboration & Vendor Management: Demonstrated ability to lead cross-functional collaboration efforts and effectively manage critical vendor relationships.
Preferred Certifications:
Candidates holding the following certifications will be highly regarded:
- CISSP - Certified Information Systems Security Professional
- CISM - Certified Information Security Manager
- CCSP - Certified Cloud Security Professional
- CIPP/US - Certified Information Privacy Professional (US)
- GIAC Data Protection (GDAT)
- AWS Certified Security - Specialty
If you are a driven Senior Data Security Architect ready to lead critical initiatives within a global financial institution, and you meet these extensive qualifications, we encourage you to apply directly! We look forward to connecting with professionals who are eager to make a significant impact on data security.
Job Features
Job Category | IT, Security |
Senior Data Security Architect Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a major mutual life insurance company, actively seeking a highly exp...View more
Staff Deep Learning Engineer
Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering
Our client, an innovative Silicon Valley-based biotech startup, is at the forefront of pioneering AI-driven models to simulate and program complex biological systems. With strategically located global hubs spanning Europe and the Middle East, this forward-thinking company seamlessly blends cutting-edge machine learning techniques with deep molecular biology insights to significantly accelerate breakthroughs in medicine and the life sciences.
They're looking to expand their dynamic teams by bringing on a Staff Deep Learning Engineer who can drive innovation and contribute to groundbreaking research and development.
Location & Compensation:
- Location: Palo Alto, CA (Onsite)
- Salary: USD $170,000 - $210,000 annually
What You'll Be Doing:
As a Staff Deep Learning Engineer, you will be a pivotal technical contributor, responsible for advancing the core AI models that power our client's biological simulations. Your responsibilities will likely include:
- Model Development & Optimization: Designing, developing, and optimizing advanced deep learning models tailored for complex biological simulations and programming.
- GPU Accelerated Computing: Leveraging GPU tools such as CUDA and cuDNN to build high-performance computing solutions for deep learning workloads.
- Library & Framework Utilization: Working extensively with leading deep learning libraries like PyTorch and HuggingFace to implement and refine neural network architectures.
- Distributed Systems & Scalability: Contributing to the development and scaling of distributed deep learning systems, ensuring models can be trained and deployed efficiently across large datasets and computational resources.
- Backend & Database Integration: Engaging in robust back-end development using frameworks like Django, Flask, and Node.js, and integrating with databases such as PostgreSQL and MongoDB to manage and serve model data.
- Containerization & Orchestration: Utilizing containerization technologies (e.g., Docker) and orchestration platforms (e.g., Kubernetes, SLURM) to ensure reproducible and scalable deployment of models and related services.
- Cloud Platform Integration: Working with major cloud platforms such as AWS and GCP for deploying and managing deep learning infrastructure.
- Collaboration & Innovation: Collaborating closely with molecular biologists, data scientists, and other engineers to translate biological challenges into AI solutions and push the boundaries of scientific discovery.
Qualifications:
To be successful in this role, you should possess a strong blend of technical expertise and practical experience:
- Education: A Bachelor's degree in Computer Science, Engineering, or a closely related field. Experience in life sciences is a significant plus.
- Programming Proficiency: Proficient in JavaScript, Python, and modern web frameworks relevant to deep learning and backend services.
- GPU & Deep Learning Libraries: Demonstrated experience with GPU tools (CUDA, cuDNN) and a strong command of deep learning libraries (PyTorch, HuggingFace).
- Orchestration & Cloud: Familiarity with SLURM, Kubernetes, and major cloud platforms (AWS, GCP).
- Backend & Database Skills: Skilled in back-end development using frameworks like Django, Flask, Node.js, and experience with databases such as PostgreSQL, MongoDB.
- Distributed Systems & Containerization: A strong background in designing and implementing distributed systems and utilizing containerization technologies (Docker, Kubernetes).
Preferred Qualifications:
Candidates with the following qualifications will be highly regarded:
- Advanced Degree: A Ph.D. in Computer Science, Engineering, or a related field; continued experience in life sciences is a plus.
- Large Language/Foundation Models: Experience with large language models (LLMs) or other foundation models and complex deep learning workflows.
- Biological Data & Bioinformatics: Familiarity with biological data, experience with bioinformatics tools, and understanding of ML pipelines in a life sciences context.
- Development Practices: Proficient in using Git for version control, experience with CI/CD pipelines for automated deployment, and designing/consuming RESTful APIs.
This is a permanent opportunity to join a pioneering biotech startup where your deep learning expertise will directly contribute to accelerating scientific breakthroughs. If you are passionate about the intersection of AI and life sciences, we encourage you to apply!
Job Features
Job Category | AI, Artificial Intelligence, Engineering |
Staff Deep Learning Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering Our client, an innovative Silicon Valley-based biotech startup, is at the forefront of pion...View more
VP, Network Security Engineer
Posted: June 18, 2025
Job Type: Permanent
Industry: Cybersecurity
eStreetSecurity is partnering with a dominating commercial bank based out of NYC to recruit a highly skilled and experienced Vice President, Network Security Engineer. In this critical leadership role, you will lead the strategic design, robust implementation, and continuous improvement of the bank's entire network security infrastructure. This position carries significant responsibility for ensuring the paramount confidentiality, integrity, and availability of critical systems and sensitive data across both on-premise data centers and dynamic cloud environments. The ideal candidate will bring deep technical expertise in core security technologies, strong leadership capabilities, and a proactive, threat-mitigation-focused approach, essential for success in a highly regulated financial environment.
Location & Compensation:
- Location: Midtown Manhattan, New York City (This is a hybrid role with required onsite presence.)
- Salary: USD $140,000 - $160,000 annually
Please note: Our client is unable to sponsor visas now or in the future for this role. Candidates must be fully authorized to work in the United States.
What You'll Be Doing:
As a VP, Network Security Engineer, you will be a pivotal leader in fortifying the bank's digital defenses. Your key responsibilities will include:
- Security Solution Architecture & Management: You will architect, deploy, and manage enterprise-grade security solutions. This includes core technologies such as F5 BIG-IP (APM, LTM, SWG modules), Checkpoint firewalls, RSA Multi-Factor Authentication (MFA), VPNs, secure proxies, and Intrusion Detection/Prevention Systems (IDS/IPS), ensuring their optimal configuration and performance.
- Web Proxy & Alerting Optimization: Administering and continuously optimizing web proxy services, comprehensive logging systems, and robust alerting mechanisms to ensure real-time threat detection, rapid response capabilities, and detailed forensic analysis.
- Secure Networking Protocol Implementation: Implementing and meticulously maintaining secure networking protocols including TCP/IP, SSL/TLS, DNS, HTTP/HTTPS, and IPsec, enforcing secure communication across the network.
- Incident Response & Vulnerability Leadership: Leading critical incident response efforts, overseeing comprehensive vulnerability management programs, and driving initiatives focused on continuous improvement of the overall security posture.
- Encryption & Hardening Enforcement: Enforcing stringent encryption standards (PKI, AES, RSA) and implementing robust security hardening measures across all systems and applications to minimize attack surfaces.
- Cross-Functional Collaboration: Collaborating extensively with various internal teams including IT operations, compliance departments, and diverse business units to support secure project delivery and ensure strict adherence to all regulatory compliance requirements within the financial sector.
- Security Design & Documentation: Taking the lead in designing and meticulously documenting secure network architectures, developing detailed project plans, and creating clear technical diagrams to guide implementation and operational teams.
- Cloud Security & Virtualization Management: Managing cloud-based security controls (e.g., AWS Security Groups, Azure Network Security Groups - NSGs) and overseeing security configurations on virtualization platforms such as VMware and Hyper-V.
- Mentorship & Subject Matter Expertise: Providing critical mentorship and guidance to junior engineers, fostering their growth and skill development. You will also serve as a definitive subject matter expert (SME) in all facets of network security.
What's Needed:
We're looking for a highly experienced and technically profound individual with:
- Educational Foundation: A Bachelor's degree in Computer Science, Cybersecurity, or a closely related technical field.
- Extensive Network/Security Experience: A minimum of 5+ years of progressive experience in network and security engineering roles, with a strong preference for experience gained within a highly regulated industry such as financial services.
- Enterprise Security Platform Expertise: Strong hands-on experience with F5 BIG-IP, Checkpoint firewalls, RSA MFA, and other enterprise-grade security platforms.
- Automation & Scripting Proficiency: Proven proficiency in scripting and automation using languages and tools such as Python, Ansible, and Terraform.
- Network Security Fundamentals: A solid and in-depth understanding of core network security principles, common attack vectors, and established incident response methodologies.
- OS & Security Tooling Experience: Hands-on experience with Windows and Linux operating systems, certificate management (PKI), and URL/content filtering solutions.
- Cloud & Hybrid Infrastructure Knowledge: Familiarity with cloud security concepts and practical experience working with hybrid infrastructure models that integrate on-premise and cloud environments.
- Certifications: Relevant industry certifications are highly preferred, including CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), F5 certifications, and Checkpoint certifications.
- Communication & Problem-Solving: Excellent communication skills (both verbal and written), strong documentation abilities, and exceptional problem-solving capabilities for complex technical challenges.
- Autonomy & Confidentiality: The ability to work independently, effectively manage multiple competing priorities, and maintain the highest level of confidentiality with sensitive information.
If you are a driven Network Security Engineer seeking a leadership role within a prominent financial institution, and you meet these qualifications, we encourage you to apply directly! We look forward to connecting with you.
Job Features
Job Category | Security |
VP, Network Security Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a dominating commercial bank based out of NYC to recruit a highly ski...View more