Sign In

Current Jobs

Onsite
Orlando, FL
Posted 2 weeks ago

Lead Cyber Threat Specialist

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. They are seeking a highly skilled and proactive Lead Cyber Threat Specialist. In this critical role, you will be directly responsible for identifying, analyzing, and proactively mitigating advanced cyber threats targeting our client's valuable assets. You will lead a dedicated team of threat hunters and work in close collaboration with other cybersecurity professionals to develop and implement cutting-edge threat detection and response strategies.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $115,000 - $145,000 annually

What You'll Be Doing:

As the Lead Cyber Threat Specialist, you will be at the forefront of defending against sophisticated cyber adversaries. Your key responsibilities will include:

  • Proactive Threat Hunting Leadership: Taking the lead on proactive threat hunting initiatives to systematically identify and mitigate Advanced Persistent Threats (APTs) and other sophisticated cyber adversaries before they can cause significant harm.
  • In-Depth Threat Intelligence Analysis: Conducting comprehensive and in-depth analysis of cyber threat intelligence from various sources. This involves identifying emerging threats, pinpointing new attack vectors, and understanding the Tactics, Techniques, and Procedures (TTPs) utilized by threat actors.
  • Incident Response Management: Managing and coordinating responses to complex security incidents from initial detection through full remediation. This includes performing detailed forensic analysis to determine the root cause, scope, and impact of incidents.
  • Cross-Functional Threat Intelligence Sharing: Collaborating extensively with internal cybersecurity teams (e.g., Security Operations Center, Incident Response, Forensics) and broader IT teams to effectively share threat intelligence and continuously enhance the organization's detection and response capabilities.
  • Security Tool Optimization: Evaluating existing and emerging security tools and technologies, recommending, and implementing optimizations to continuously improve threat detection efficacy and incident response capabilities.
  • Comprehensive Reporting: Preparing and delivering comprehensive, articulate reports on threat intelligence findings, detailed incident analyses, and strategic recommendations to senior leadership, ensuring clear communication of complex security postures.
  • Continuous Learning & Adaptation: Staying consistently abreast of the latest cyber threat trends, evolving attack methodologies, and advancements in security technologies to ensure the organization's defenses remain robust and current.
  • Team Mentorship & Development: Providing technical mentorship and guidance to junior threat hunters and cybersecurity analysts, fostering their skills and contributing to the overall growth of the team.

Qualifications:

To excel in this critical role, you should possess a strong blend of technical expertise, analytical prowess, and leadership capabilities:

  • Educational Background: A Bachelor's degree in Information Technology or a related discipline, or equivalent relevant work experience.
  • Relevant Certifications: Holding one or more relevant advanced certifications, such as Splunk Enterprise Security Certified Admin, Splunk Certified Cybersecurity Defense Analyst, Certified Cyber Threat Hunting Professional (CCTHP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Cyber Threat Hunter (CCTH), or Certified Ethical Hacker (CEH).
  • Extensive Cybersecurity Experience: At least 7 years of progressively responsible experience in cybersecurity, with a strong, demonstrable focus on threat hunting, incident response, and threat intelligence analysis.
  • Hands-on Threat Hunting: Proven hands-on experience with various threat-hunting techniques, including anomaly detection, meticulous network traffic analysis, and deep packet inspection.
  • Threat Intelligence Expertise: Extensive experience in collecting, analyzing, and effectively disseminating threat intelligence derived from multiple, diverse sources.
  • Incident Response Leadership: A strong background in leading and coordinating complex security incident response activities, encompassing identification, containment, eradication, recovery, and post-incident analysis.
  • SOC & IT Collaboration: Demonstrated experience working closely with Security Operations Center (SOC) teams, IT operations, and engineering to optimize security tool configurations and continuously improve detection rules and alerts.
  • Security Technology Proficiency: Proficiency with a range of security technologies such as SIEM (Security Information and Event Management) systems, EDR (Endpoint Detection and Response) platforms, dedicated threat intelligence platforms, and advanced network traffic analysis tools.
  • Exceptional Analytical Skills: Exceptional analytical skills with the ability to interpret complex data sets, identify subtle anomalies, and uncover sophisticated threats.
  • Scripting Proficiency: Strong skills in scripting languages (e.g., Python, PowerShell) to automate threat-hunting processes, data analysis, and response actions.

If you are a driven and experienced Cyber Threat Specialist ready to lead and innovate within a prominent hospitality group, we encourage you to apply directly! We look forward to connecting with you.

Job Features

Job CategorySecurity

Lead Cyber Threat Specialist Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. T...View more

VP, Identity & Access Management Architect and Operations Lead

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We are thrilled to be partnering with a globally leading provider of vacation ownership, rental, and resort experiences. Our client is renowned for its exclusive vacation club memberships, premier timeshare properties, and luxurious travel options spanning an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they offer highly flexible vacation solutions, including innovative points-based systems and robust exchange programs, all while operating under multiple well-known hospitality brands.

They are actively seeking a visionary Vice President, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategic planning, comprehensive evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.

The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The core objective is to dramatically enhance customer relationships and further expand accessibility across all their diverse experiences and destinations. Their ambitious goal is to solidify their position as a technology leader within the hospitality sector, and they are actively seeking seasoned professionals eager to bring their deep expertise to the organization long-term and drive this exciting evolution.

Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Crucially, the business intends to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $175,000 annually

The Role:

Reporting directly to the VP of Information Security Architecture, this pivotal role will play an instrumental part in guiding and overseeing all critical IAM functions across the enterprise. This encompasses, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing intricate workflow and review certification processes, ensuring stringent audit and compliance readiness, orchestrating sophisticated hybrid cloud identity management, overseeing comprehensive privileged access management (PAM), and architecting robust authentication and authorization systems.

This leader must possess expert knowledge in modern identity management approaches, including advanced administration, innovative identity cloud services, intricate custom connector development, complex installation and configuration, meticulous performance tuning, and robust backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to seamlessly support other IT areas or functions as needed is required to navigate a dynamic and multifaceted IT landscape.

You'll also be strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, optimal scalability, and peak performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and overarching strategy specifically around business-focused identity management and comprehensive information security.


Summary of Contributions:

  • Complex Analysis & Strategic Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often adeptly manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
  • Proactive Problem Resolution: Responds to, skillfully solves, and makes informed, impactful decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk and ensuring swift resolution.
  • Operational Enhancement & Strategic Planning Support: Assists more senior associates in achieving overarching business results by identifying compelling opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and diligently achieving results against budget within the defined scope of responsibility.
  • Continuous Professional Development: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to continuously enhance and increase skills and knowledge, embodying a deep commitment to lifelong professional growth.
  • Adaptive Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team, demonstrating flexibility and adaptability.

Responsibilities:

  • IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions, ensuring they meet enterprise-grade requirements.
  • Holistic IAM Leadership: Architecting and managing comprehensively across all critical facets of IAM: Identity Governance, Access Management, and Privileged Access Management (PAM).
  • Performance & Health Optimization: Proactively identifying and addressing complex issues related to IAM system performance, ensuring high availability, responsiveness, and seamless operation.
  • Technical Integration Leadership: Providing crucial technical leadership for the seamless integration of IAM systems with other enterprise applications, cloud services, and foundational IT platforms.
  • Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and the overarching business objectives, translating strategic goals into actionable security frameworks.
  • Policy & Procedure Development: Developing, meticulously maintaining, and continually refining comprehensive IAM policies, procedures, and standards documentation that are clear, actionable, and enforceable.
  • Stakeholder Requirements Translation: Collaborating closely and effectively with various business and IT stakeholders to deeply understand their specific IAM requirements and expertly translating these into precise, actionable technical specifications.
  • Audit & Compliance Assurance: Performing regular and thorough audits to ensure that all IAM systems and processes strictly comply with established IAM standards, internal policies, and external regulatory mandates.
  • Team Guidance & Mentorship: Providing expert-level support and valuable technical guidance to team members regarding complex IAM challenges, troubleshooting, and best practices.
  • System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain resilient and secure against potential and emerging cybersecurity threats.
  • Strategic Documentation: Meticulously documenting IAM strategies, architectures, designs, and systems for comprehensive future reference, internal reviews, and effective knowledge transfer across teams.
  • Secure Application Development Participation: Participating significantly in major application development projects to design inherently secure architectures and ensure that developed systems rigorously align with the organization's overarching security strategy and policy.
  • Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established security standards.
  • Team Capability Enhancement: Actively enhancing the Security team's capabilities by providing direct mentorship to junior team members, fostering their professional growth and knowledge expansion.
  • Information Security Championing: Championing information security principles and best practices on key customer feature development projects, contributing directly to designing secure architectures and ensuring developed systems align with the organization's security strategy and policy.
  • Digital Integration Methodology Leadership: Leading the definition and methodology for ensuring that applications and processes are fully and securely integrated with our digital and service delivery platforms.
  • Third-Party Application Security Assurance: Ensuring that both company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications that meet these exacting standards.
  • Architecture Documentation Creation: Creating detailed security architecture documentation, including comprehensive architecture frameworks, design patterns, and security standards.
  • Cross-Organizational Partnerships: Partnering strategically with leaders across the Information Security and Data Privacy organization, as well as other key organizational leads, to foster a unified security approach.
  • Complex Application Security Solutioning: Working directly with peers and/or third-party vendors to provide strategic mitigations and innovative solutions to overcome major application security hurdles, meticulously evaluating business strategies and requirements.
  • Integration Analysis & Cost Estimation: Thoroughly studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions, aiding in strategic planning.

Skills and Attributes:

  • Exceptional Critical Thinking & Thought Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the profound ability to comprehend highly complex problems, draw logical conclusions, make sound strategic decisions, develop practical and innovative solutions, and effectively negotiate to drive the closure of intricate challenges.
  • Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence within a dynamic and ever-evolving environment.
  • Broad IT & Security Domain Knowledge: Strong demonstrated knowledge spanning enterprise IT systems, diverse cloud solutions (IaaS, PaaS, SaaS), and a wide array of advanced security technologies.
  • Superior Communication & Influence: The ability to communicate highly complex technical and strategic messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message effectively to different audiences and influencing outcomes.
  • Diverse Cybersecurity Experience: Broad and diverse experience encompassing cybersecurity strategy, security operations, security architecture, cloud security, and deep, specialized expertise in identity and access management.
  • Identity & Access Management Mastery: In-depth knowledge of identity management principles, various forms of role/attribute-based access control (RBAC/ABAC), and advanced authentication systems.
  • Applied Cybersecurity Controls: Demonstrated technical proficiency in effectively applying cybersecurity controls within real-world, complex enterprise environments.
  • Oversight of Complex Initiatives: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact and visibility.
  • Executive-Level Engagement: The confidence and skill to engage executive-level stakeholders on complex security matters with limited oversight and guidance, providing strategic insights and recommendations.
  • Strategic & Tactical Acumen: The capacity to think both strategically (long-term vision and planning) and tactically (immediate execution and problem-solving), combined with highly effective decision-making skills.
  • Relevant Cybersecurity Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.) is a strong asset.
  • Project & Problem Ownership: Demonstrable ability to independently drive projects to completion and take full ownership of complex problems within a demanding security environment, seeing them through to successful resolution.
  • Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to effectively manage multiple, often competing, priorities.

Qualifications:

  • Extensive Information Security Experience: A minimum of 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically focused on Information Security roles.
  • IAM Management Experience: Proven experience managing mid to large-sized Identity Management operations ("shops").
  • Security Frameworks Expertise: Hands-on experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
  • Cloud Identity Expertise: Demonstrated hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management solutions.
  • Modern IAM System Proficiency: Demonstrated proficiency with modern, enterprise-grade Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.

Education & Certifications:

  • Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent relevant work experience.
  • Preferred Education: A Master's degree in information security or a related discipline is highly preferred.
  • Key Certifications:
    • Certified Identity and Access Management (CIAM)
    • Global Information Assurance Certification (GIAC) Identity Management
    • OCI Oracle Identity Manager
    • SailPoint IIQ Administrator

Job Features

Job CategoryIT, Security

VP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are thrilled to be partnering with a globally leading provider o...View more

Hybrid, Onsite, Permanent
New York City, NY
Posted 2 weeks ago

Software Engineer, AI

Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering

We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on delivering top-tier automation solutions across the healthcare space. This innovative organization successfully launched from one of New York's largest and most respected healthcare systems and is now rapidly expanding its reach and impact nationwide.

Their cutting-edge platform strategically leverages Artificial Intelligence (AI) to target critical business areas, significantly streamlining complex processes and enhancing efficiency throughout the healthcare ecosystem. The team is now looking to bring on a talented Software Engineer, AI, who will be instrumental in building the next generation of their intelligent automation capabilities.


Location & Compensation:

  • Location: New York, NY (Onsite / Hybrid - specific flexibility details to be discussed)
  • Salary: USD $200,000 - $260,000 annually

What You'll Be Doing:

As a Software Engineer, AI, you will be a core contributor to the development of intelligent systems that revolutionize healthcare operations. Your key responsibilities will include:

  • LLM Agent Development & Integration: Building fundamental Large Language Model (LLM) agents from the ground up, and playing a crucial role in assisting with their seamless integration across the entire product suite.
  • Infrastructure Support & Scalability: Providing robust support for infrastructure management, leveraging modern orchestration and deployment tools such as Kubernetes, Docker, and Terraform to ensure scalability and reliability.
  • Backend Service Development: Designing, developing, and maintaining high-performance back-end services primarily using Python and the FastAPI framework, ensuring efficient data processing and robust API capabilities.
  • AI/ML System Contribution: Actively contributing to the full lifecycle of AI/ML systems, from ideation and prototyping to deployment and monitoring in a production environment.
  • Agentic Workflow Implementation: Playing a key role in implementing advanced agentic workflows that enable autonomous and intelligent decision-making within the platform.

What's Needed:

We're seeking a skilled and experienced AI-focused Software Engineer with:

  • Backend Development Expertise: A minimum of 5+ years of extensive back-end development experience, with a strong focus on Python.
  • AI/ML Systems Experience: Proven experience in building and deploying AI/ML systems in a production environment.
  • RAG & Agentic Workflows: Practical experience with Retrieval-Augmented Generation (RAG) frameworks and designing/implementing agentic workflows.
  • Database Technologies: A solid understanding of various database technologies, including PostgreSQL, graph databases, Elasticsearch, and Redis, and how to integrate them effectively into AI solutions.
  • Containerization & Orchestration: Experience with Kubernetes, Docker, and Terraform for infrastructure management.
  • Problem-Solving & Collaboration: Strong analytical skills with the ability to troubleshoot complex issues, and a collaborative mindset to work effectively within cross-functional teams.

Benefits & Perks:

Our client offers a compelling package designed to attract and retain top talent:

  • Cutting-Edge Technology Exposure: Work daily with the latest advancements in AI, machine learning, and automation technologies, pushing the boundaries of innovation in healthcare.
  • Collaborative & Innovative Culture: Join a talented and passionate team that deeply values collaboration, fostering an environment where innovative ideas are encouraged and celebrated.
  • Significant Growth Opportunities: Contribute to a rapidly growing company, with ample opportunities for professional development and career advancement as the organization expands.
  • Competitive Compensation & Benefits: Receive a highly competitive salary and equity package, alongside flexible work arrangements, comprehensive health insurance, and additional perks.

This is a unique permanent opportunity to join a pioneering tech company that is making a real difference in the healthcare sector through AI and automation. If you're a driven Software Engineer with a passion for AI/ML and a desire to work with cutting-edge technology in a collaborative environment, we encourage you to apply. We look forward to connecting with you!

Job Features

Job CategoryAI, Artificial Intelligence, Engineering

Software Engineer, AI Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on...View more

Onsite
New York City, NY
Posted 2 weeks ago

Desktop Engineer - Full-Time

Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophisticated enterprise desktop environment. This critical, full-time role involves comprehensive engineering, strategic deployment, and robust support of cutting-edge desktop solutions across a complex multi-site infrastructure.


Location & Compensation:

  • Location: New York, NY (Onsite)
  • Salary: $170,000 - $190,000 base salary

What You'll Be Doing:

As a Desktop Engineer, you will be at the forefront of managing the firm's end-user computing landscape, ensuring seamless operations and advanced capabilities. Your key responsibilities will include:

  • MECM/SCCM Infrastructure Management: Taking a lead role in the management and comprehensive support of the Microsoft Endpoint Configuration Manager (MECM), formerly SCCM, infrastructure. This includes ensuring its health, performance, and effective utilization for endpoint management.
  • Application Packaging & Deployment: Expertly packaging and deploying a wide range of applications, including various formats such as EXE, MSI, and MSIX, to ensure efficient and standardized software distribution across the enterprise.
  • Multi-Environment Troubleshooting: Providing advanced troubleshooting and resolution for issues across diverse desktop, mobile, and virtual environments, ensuring minimal downtime and optimal user experience.
  • Cross-Functional Collaboration: Collaborating closely and effectively with various internal teams, including IT Operations, Security, and Infrastructure teams, to align desktop solutions with broader organizational goals and security mandates.
  • Documentation & Change Management: Meticulously maintaining comprehensive documentation for all desktop configurations, processes, and solutions. You will also diligently enforce established change management protocols to ensure stability and control within the environment.
  • User Support & Experience: While primarily an engineering role, you'll also contribute to ensuring an excellent end-user experience by implementing reliable and user-friendly desktop solutions.

What's Needed:

We're looking for a highly proficient and experienced Desktop Engineer with:

  • Extensive Experience: A minimum of 5+ years of dedicated experience in a desktop engineering role or advanced IT support position within an enterprise setting.
  • Scripting & Packaging Proficiency: Strong PowerShell scripting skills for automation and advanced application packaging capabilities.
  • Core Desktop Technologies: Proven experience and expertise with Windows 10/11, comprehensive support of Office 365 suites, various virtualization technologies, and proficient management of Active Directory.
  • Enterprise Application Familiarity: Familiarity with legal-specific applications or a broad range of other complex enterprise applications is a significant plus.
  • Problem-Solving Skills: Excellent analytical and problem-solving abilities to diagnose and resolve complex technical issues efficiently.
  • Communication: Strong verbal and written communication skills to effectively collaborate with teams and document procedures.

Why This Role Matters:

This is a fantastic opportunity to join a leading law firm at a senior level, where you can directly impact the daily productivity and technological advancements for a demanding professional user base. You'll work with cutting-edge tools and collaborate with dedicated IT professionals in a dynamic New York City environment.

If you're a skilled Desktop Engineer ready to enhance enterprise desktop environments and drive technological excellence, we encourage you to apply. We look forward to hearing from you!

Job Features

Job CategoryIT

Desktop Engineer – Full-Time Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophistic...View more

Hybrid, Onsite, Remote
New York City, NY, Newark, NJ
Posted 2 weeks ago

Lead IAM Engineer

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We're currently partnered with a leading energy/utilities organization that's looking to bring on a highly skilled Lead IAM Engineer. This is a pivotal, senior-level role that combines hands-on technical expertise with critical leadership responsibilities. You'll lead the design, implementation, and ongoing management of advanced enterprise-wide Identity and Access Management (IAM) solutions, directly contributing to securing systems, enforcing robust security policies, and driving the overall IAM strategy across the organization.


Location & Compensation:

  • Location: New Jersey/New York (Offers Hybrid/Remote flexibility)
  • Compensation: USD $140,000 - $165,000 annually
  • Employment Type: Full-time

What You'll Be Doing:

As a Lead IAM Engineer, you'll be at the forefront of securing digital identities and access within a complex enterprise environment. Your key responsibilities will include:

  • IAM Architecture & Implementation Leadership: You'll lead the design, architecture, and implementation of cutting-edge IAM solutions, encompassing Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) systems.
  • Identity Governance Oversight: You'll oversee the entire identity lifecycle management, from robust provisioning to secure deprovisioning processes, ensuring accuracy and efficiency.
  • Advanced Access Control Enforcement: You'll implement and enforce stringent access control mechanisms, including least privilege principles, Just-In-Time (JIT) access, and core Zero Trust security architectures.
  • Directory & Federation Services Management: You'll manage and optimize critical directory services like Active Directory and Azure AD, traditional LDAP, and various identity federation protocols such such as SAML, OAuth, and OpenID Connect.
  • Cloud IAM Security: You'll secure access across diverse cloud platforms, specifically AWS and Azure, by implementing proper identity federation and granular role management strategies.
  • Compliance & Risk Management: You'll ensure strict alignment with key regulatory frameworks and standards like SOX and NIST. This involves conducting thorough audits and risk assessments to maintain a strong compliance posture.
  • Incident Response Collaboration: You'll collaborate closely with broader security teams to swiftly detect, analyze, and remediate IAM-related security incidents, minimizing potential impact.
  • Automation & Scripting: You'll develop efficient scripts and workflows using languages like PowerShell, Python, or similar tools to automate routine IAM tasks and enhance operational efficiency.
  • Strategic Stakeholder Engagement: You'll actively partner with various IT, security, and business teams to collaboratively define, refine, and successfully implement comprehensive IAM strategies that meet evolving organizational needs.

What's Needed:

We're looking for an experienced and technically astute individual with strong leadership capabilities:

  • Educational Background: A Bachelor's degree in a related field is required, or a minimum of 10 years of relevant cybersecurity experience can be considered in lieu of a degree.
  • Extensive IAM Engineering Experience: A minimum of 6 years of dedicated experience in IAM engineering, security architecture, or a closely related cybersecurity field.
  • Deep IAM Expertise: Profound expertise in various IAM platforms, a wide array of authentication protocols, and robust cloud security principles.
  • Scripting Proficiency: Demonstrated proficiency in scripting languages such as PowerShell, Python, and Bash.
  • Advanced Security Understanding: A strong, in-depth understanding of Zero Trust security models, identity-centric security approaches, and risk-based authentication methodologies.
  • Problem-Solving & Leadership: Excellent problem-solving skills, strong communication abilities (both verbal and written), and proven leadership capabilities.

Preferred Qualifications:

Candidates with the following qualifications will be highly regarded:

  • Relevant Certifications: Possessing relevant industry certifications such as CISSP, CISM, or various IAM-specific credentials.
  • DevSecOps Integration: Experience integrating IAM solutions with CI/CD pipelines and familiarity with DevSecOps practices.
  • API Security & SDKs: Familiarity with securing APIs and practical experience utilizing IAM Software Development Kits (SDKs).

This is a fantastic opportunity to take on a leadership role within a critical cybersecurity domain for a major energy/utilities organization. If you possess the required IAM expertise and are ready to drive strategic initiatives, we encourage you to apply.

Job Features

Job CategoryIT, Security

Lead IAM Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We’re currently partnered with a leading energy/utilities organization that’s looking to bring on a high...View more

Hybrid, Onsite, Remote
New York City, NY, Newark, NJ
Posted 2 weeks ago

Lead Cyber Security Analyst

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry? Our client, a recognized leader in their field, is actively seeking an experienced Lead Cyber Security Analyst to join their dynamic team. This pivotal, senior-level role is crucial for driving the company's IT security initiatives, maintaining robust security systems, and providing leadership to a skilled team of professionals dedicated to safeguarding critical organizational assets.


Location & Compensation:

  • Location: Primarily Remote, with required in-person/on-site presence a few days every month at either the Newark, NJ, or Bethpage, Long Island, NY office.
  • Base Compensation: $150,000 - $180,000 annually, plus a 15% Annual Target Bonus.

Summary:

As the Lead Cyber Security Analyst, you'll be at the forefront of the client's defense strategies. This role demands a proactive and hands-on leader who can not only manage complex security projects but also provide technical guidance and foster best practices within the team. You'll be instrumental in identifying vulnerabilities, mitigating risks, and implementing comprehensive security measures to protect the organization's information systems effectively in an evolving threat landscape.


Role Responsibilities:

Your contributions in this leadership role will include:

  • Cyber Security Project Leadership: Taking the helm as a project lead for critical cybersecurity initiatives. This includes demonstrating expertise in managing and implementing a wide array of security technologies such as antivirus solutions, Intrusion Detection/Prevention Systems (IDS/IPS), and advanced endpoint detection & response (EDR) platforms.
  • Comprehensive Data Protection: Spearheading efforts in data protection. This involves applying proficiency in data loss prevention (DLP) strategies and various data encryption techniques to ensure that all sensitive information remains consistently protected throughout its lifecycle.
  • Hands-on Technical Leadership: Providing proven, hands-on technical guidance and invaluable mentorship to team members. You'll ensure that best practices are rigorously followed, fostering a culture of continuous learning and excellence within the security operations team.
  • Proactive Problem Solving & Risk Mitigation: Displaying adeptness at swiftly identifying security vulnerabilities, effectively mitigating identified risks, and proactively implementing robust security measures to comprehensively protect information systems from evolving threats.
  • Security Operations Enhancement: Collaborating closely with cross-functional teams to implement and oversee advanced cybersecurity protocols, ensuring robust protection at every level of the organization's IT infrastructure.

Skills Required:

To excel in this role, you should possess a strong blend of technical expertise and leadership qualities:

  • Technology Proficiency: A minimum of 8+ years of experience in security IT, with a strong preference for experience gained within cloud computing environments and a proven track record of implementing security measures within cloud-forward architectures.
  • Cybersecurity Analyst Expertise: Employing deep analytical expertise in leveraging various security technologies, including Security Information and Event Management (SIEM) systems, firewalls, IDS, and other critical security tools.
  • Team Collaboration: A demonstrated ability to collaborate effectively with diverse teams, ensuring seamless integration and oversight of cybersecurity protocols across the enterprise.
  • Educational Background: A Bachelor's degree in a related field is preferred, or a minimum of 12+ years of experience in an IT-related field will be considered as equivalent work experience.

Benefits & Additives:

Our client values their employees and offers a comprehensive benefits package:

  • Health, Medical, Dental, and Vision healthcare plans.
  • 401K Match program.
  • Approximately 5% travel required for on-site presence and other business needs.

If you are a driven and experienced cybersecurity professional ready to lead and innovate within a forward-thinking organization, we encourage you to apply now! We look forward to discussing this great opportunity with you.

Job Features

Job CategoryIT, Security

Lead Cyber Security Analyst Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry...View more

Onsite, Permanent
Orlando, FL
Posted 2 weeks ago

AVP, Identity & Access Management Architect and Operations Lead

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We are excited to be partnering with a leading global provider in the vacation ownership, rental, and resort experiences industry. Our client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxury travel options across an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and exchange programs, all while operating under multiple well-known hospitality brands.

Our client is seeking a visionary AVP, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategy, comprehensive planning, rigorous evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.

The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The goal is to dramatically enhance relationships with customers and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader in hospitality, and they are actively seeking seasoned professionals eager to bring their expertise to the organization for the long term and drive this exciting evolution.

Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Critically, the business intends to double its spending on Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive innovation through advanced technology adoption.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $175,000 annually

The Role:

Reporting directly to the VP of Information Security Architecture, this pivotal role will be instrumental in guiding and overseeing all IAM functions across the enterprise. This includes, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing workflow and review certification processes, ensuring audit and compliance readiness, orchestrating hybrid cloud identity management, overseeing privileged access management (PAM), and architecting robust authentication and authorization systems.

This leader must possess expert knowledge in modern identity management approaches, including administration, identity cloud services, custom connector development, complex installation and configuration, performance tuning, and advanced backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to support other areas or functions as needed is required to navigate a dynamic IT landscape.

You'll also be responsible for strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, scalability, and optimal performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and strategy specifically around business-focused identity management and comprehensive information security.


Summary of Contributions:

  • Complex Analysis & Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
  • Problem Resolution & Proactive Solutions: Responds to, skillfully solves, and makes informed decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk.
  • Operational Enhancement & Planning: Assists more senior associates in achieving overarching business results by identifying opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and achieving results against budget within the defined scope of responsibility.
  • Self-Improvement & Continuous Learning: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to enhance and increase skills and knowledge, embodying a commitment to continuous professional development.
  • Ad Hoc Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team.

Responsibilities:

  • IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions.
  • Holistic IAM Management: Architecting and managing across all facets of IAM: Governance, Access Management, and Privileged Access Management.
  • Performance Optimization: Identifying and proactively addressing issues related to IAM performance, ensuring high availability and responsiveness.
  • Technical Integration Leadership: Providing technical leadership for the seamless integration of IAM systems with other enterprise applications and platforms.
  • Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and overarching business objectives.
  • Policy & Procedure Development: Developing and meticulously maintaining comprehensive IAM policies, procedures, and standards documentation.
  • Stakeholder Requirements Translation: Collaborating closely with various stakeholders to deeply understand their IAM requirements and expertly translate them into precise technical specifications.
  • Audit & Compliance: Performing regular audits to ensure that IAM systems and processes strictly comply with established IAM standards and organizational policies.
  • Team Guidance & Support: Providing expert support and valuable guidance to team members regarding complex IAM challenges and best practices.
  • System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain secure against potential and emerging threats.
  • Strategic Documentation: Documenting IAM strategies, architectures, and systems thoroughly for future reference, review, and knowledge transfer.
  • Secure Application Development: Participating significantly in application development projects to design secure architectures and ensure that developed systems rigorously align with the MVW security strategy and policy.
  • Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established standards.
  • Mentorship: Enhancing the Security team's capabilities by actively mentoring junior team members, fostering their growth and knowledge.
  • Security Championing: Championing information security principles and best practices on key customer feature development projects to help design inherently secure architectures and ensure developed systems align with the MVW security strategy and policy.
  • Digital Integration Leadership: Leading the definition and methodology for ensuring applications and processes are fully integrated with our digital and service delivery platforms.
  • Third-Party Application Security: Ensuring that company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications to meet these standards.
  • Architecture & Solution Documentation: Creating detailed security architecture documentation, including architecture frameworks, patterns, and standards.
  • Cross-Organizational Partnerships: Partnering strategically with leaders across our Information Security and Data Privacy organization, as well as other key organizational leads.
  • Complex Security Solutioning: Working directly with peers and/or third parties to provide strategic mitigations and innovative solutions to overcome major application security hurdles by evaluating complex business strategies and requirements.
  • Integration Analysis & Cost Estimates: Studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions.

Skills and Attributes:

  • Exceptional Critical Thinking & Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the ability to comprehend highly complex problems, draw logical conclusions, make sound decisions, develop practical solutions, and effectively negotiate to drive the closure of complex challenges.
  • Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence in a dynamic and evolving environment.
  • Broad IT & Security Knowledge: Strong demonstrated knowledge of enterprise IT systems, diverse cloud solutions, and a wide array of security technologies.
  • Clear Communication: The ability to communicate highly complex technical messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message to the audience.
  • Diverse Cybersecurity Experience: Broad and diverse experience spanning cybersecurity strategy, operations, security architecture, cloud security, and deep expertise in identity and access management.
  • Identity & Access Expertise: In-depth knowledge of identity management principles, role/attribute-based access control (RBAC/ABAC), and various authentication systems.
  • Cybersecurity Controls Application: Demonstrated technical proficiency in applying cybersecurity controls effectively within real-world environments.
  • Complex Initiative Oversight: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact.
  • Executive Engagement: The ability to confidently engage executive-level stakeholders on complex security matters with limited oversight and guidance.
  • Strategic & Tactical Thinking: The capacity to think both strategically (long-term vision) and tactically (immediate execution), combined with effective decision-making skills.
  • Relevant Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.).
  • Project & Ownership Drive: Able to drive projects independently and own problems end-to-end within a demanding security environment.
  • Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to handle multiple priorities effectively.
  • Problem Ownership: Proven experience driving projects and owning problems completely within a security environment, seeing them through to successful resolution.

Qualifications:

  • Extensive Information Security Experience: 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically in Information Security roles.
  • Identity Management Leadership: Proven experience managing mid to large-sized Identity Management operations ("shops").
  • Security Frameworks: Experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
  • Cloud Identity Expertise: Hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management.
  • Modern IAM System Proficiency: Demonstrated proficiency with modern Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.

Education & Certifications:

  • Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent work experience.
  • Preferred Education: Master's degree in information security or a related discipline is preferred.
  • Key Certifications:
    • Certified Identity and Access Management (CIAM)
    • Global Information Assurance Certification (GIAC) Identity Management
    • OCI Oracle Identity Manager
    • SailPoint IIQ Administrator

Job Features

Job CategoryIT, Security

AVP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are excited to be partnering with a leading global provider in ...View more

Onsite
Orlando, FL
Posted 2 weeks ago

Senior Manager, Security Risk Analyst IV

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

Phaidon International is partnered with a leading global provider in the vacation ownership, rental, and resort experiences industry. This client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxurious travel options across an impressive portfolio of high-end resorts and destinations. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and robust exchange programs, operating under multiple globally recognized hospitality brands.

Our client is currently embarking on a significant technology transformation initiative, with a primary focus on modernization. The goal is to dramatically enhance customer relationships and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader within the hospitality sector, and they are actively seeking visionary individuals eager to contribute their expertise and drive long-term innovation within the organization.

Under the reinvigorated leadership of their new CIO, the entire Global Technology organization is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. The business has a clear intent to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: $115,000 - $125,000 + bonus + benefits

What You'll Be Doing:

In this high-impact role as a Senior Manager, Security Risk Analyst IV, you will be primarily responsible for creating and executing strategic initiatives that robustly protect the organization's critical information systems and technology assets. Your focus will be on securing digital resources and meticulously maintaining a strong, adaptive security framework. You will provide crucial oversight for security efforts and assessment outcomes, ensuring the effective implementation of comprehensive security governance, enterprise risk management, and compliance programs. This includes identifying, evaluating, and strategically mitigating security risks across the entire technology landscape. Key responsibilities include:

  • Strategic Security Alignment: Partnering closely with IT leadership and various business units to ensure that all security strategies are meticulously aligned with overarching business goals, objectives, and growth initiatives.
  • Risk Identification & Evaluation: Proactively identifying and rigorously evaluating security risks present within the organization's complex technology infrastructure, applications, and operational processes.
  • Risk Assessment Oversight & Guidance: Offering expert guidance and providing strategic oversight on all security risk assessments, ensuring they strictly adhere to industry standards, best practices, and established company policies.
  • GRC Tool Utilization: Expertly leveraging various tools and software solutions to facilitate efficient governance, comprehensive risk assessment, and meticulous compliance management. This includes utilizing specialized risk assessment systems, compliance tracking platforms, and developing insightful reporting dashboards.
  • Cybersecurity Control Review & Enhancement: Continuously reviewing and evaluating the effectiveness of existing cybersecurity controls. You will ensure their ongoing compliance with key policies and lead efforts to identify and address any existing gaps or weaknesses.
  • Internal & External Risk Mitigation: Taking a lead role in identifying, assessing, and mitigating both internal and external risks that could impact the organization's information assets and operations.
  • Advanced Quantitative & Qualitative Analysis: Conducting more advanced quantitative and qualitative analysis for complex business processes and/or strategic projects. This often involves overseeing smaller projects, specific business processes, or significant segments of larger organizational initiatives.
  • Leadership in Risk Assessment Projects: Providing strong leadership and direct oversight for security risk assessment projects, ensuring all activities meticulously follow industry best practices and company-specific policies.
  • Collaboration with Legal & Compliance: Collaborating closely and effectively with legal, compliance, and regulatory teams to ensure unwavering adherence to all relevant industry standards, regulations, and data protection requirements (e.g., GDPR, CCPA, HIPAA).
  • GRC Process Enhancement: Identifying critical opportunities to enhance processes within the GRC (Governance, Risk, and Compliance) development lifecycle, recommending and implementing tangible improvements to optimize workflows and increase overall efficiency.
  • Security Standards Development: Developing and meticulously maintaining technical security configuration standards across various platforms and technologies.
  • Policy & Procedure Communication: Creating and clearly communicating comprehensive security policies, standards, and procedures to ensure consistent and uniform security practices across the entire organization.
  • Regulatory Monitoring & Adaptation: Staying continuously informed about relevant regulations, industry standards, and emerging best practices. You will implement necessary updates to GRC systems to ensure ongoing compliance and adaptability.
  • Audit & Assessment Management: Coordinating and actively participating in security audits and assessments, and effectively managing responses to audit findings and recommendations.

Required Experience:

We're seeking a highly experienced and credentialed professional with a proven track record in information security risk management:

  • Educational Background: A Bachelor's degree in an IT-related field or equivalent relevant work experience (preferred).
  • Advanced Security Certification: Possession of an advanced security certification is highly preferred, such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), CRISC (Certified in Risk and Information Systems Control), CISA (Certified Information Systems Auditor), or CGEIT (Certified in the Governance of Enterprise IT).
  • Extensive Information Security Experience: Six to eight years of progressively responsible experience in diverse information security roles.
  • Technical Audit/Compliance Experience: At least five years of experience in a technical audit, security compliance, or a similar dedicated risk management role.
  • Security Framework Expertise: Deep and comprehensive understanding of leading security frameworks (e.g., NIST, ISO 27001, CIS), various regulatory requirements, and established industry standards.
  • Risk Assessment Mastery: Strong expertise in various risk assessment methodologies and proficiency with associated tools.
  • Vulnerability & Threat Knowledge: Extensive knowledge of security risk assessment techniques, robust vulnerability management processes, and effective threat modeling methodologies.
  • Database & Data Modeling: Familiarity with various database management systems (SQL, NoSQL) and strong understanding of data modeling principles.
  • Workflow & API Integration: Experience with workflow design, basic development concepts, and API integration functionality.
  • GRC/ERM Tool Proficiency: Demonstrated proficiency in using GRC/ERM (Governance, Risk, and Compliance / Enterprise Risk Management) tools.
  • Core IT Infrastructure Knowledge: Solid knowledge of IP networking concepts, major operating systems, and diverse cloud computing environments.
  • Broad Technology Acumen: General working knowledge of web application and network technologies, various programming languages, databases, and a range of operating systems (Linux, Unix, Mac OS X, Windows).
  • Advanced Security Principles: An advanced and nuanced understanding of core security principles, standards, and processes, including but not limited to authentication and access control, secure configurations, network traffic analysis, endpoint security, platform architecture, application security, encryption and key management, and robust cloud security.

Job Features

Job CategoryIT, Security

Senior Manager, Security Risk Analyst IV Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Phaidon International is partnered with a leading global provider in the vacation ownership, ...View more

Onsite, Permanent
Dallas, TX
Posted 2 weeks ago

Vice President of Information Security

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

Are you a seasoned cybersecurity professional with a profound passion for cybersecurity, governance, and enterprise risk management? A leading global organization is actively seeking a dynamic and strategic leader to join its executive-level technology risk and governance team. In this pivotal role, you will be instrumental in shaping and advancing the firm's comprehensive cybersecurity and technology control frameworks. You'll operate across diverse global teams, driving strategic policy development, enhancing crucial regulatory alignment, and significantly strengthening the organization's defense posture against an ever-evolving threat landscape.


Location & Compensation:

  • Location: Dallas, TX
  • Salary: USD $180,000 - $200,000 annually

Key Responsibilities:

As the Vice President of Information Security, you will lead critical initiatives that safeguard the organization's digital assets and ensure operational resilience. Your core responsibilities will include:

  • Policy & Standards Leadership: Leading the end-to-end development, implementation, and rigorous governance of enterprise-wide cybersecurity and technology risk policies and standards. This includes ensuring they are robust, current, and effectively communicated.
  • Strategic Control Framework Enhancement: Driving strategic initiatives aimed at continuously improving the organization's technology control frameworks and ensuring unwavering regulatory compliance across all operations and jurisdictions.
  • Global Project Collaboration: Collaborating extensively with cross-functional and global teams on high-impact cybersecurity projects. You'll provide expert guidance and leadership to ensure secure and compliant project delivery.
  • Regulatory Integration & Analysis: Analyzing external regulations and industry frameworks (such as NIST, ISO 27001, and CIS Controls) to strategically integrate them into the organization's internal governance models and operational procedures.
  • Control Assessment Oversight: Overseeing the methodologies for control assessments, ensuring their effectiveness and driving continuous improvement in how controls are evaluated and managed. This includes identifying gaps and recommending remediation strategies.
  • Risk Mitigation Strategy: Contributing to the overall technology risk strategy by identifying emerging threats and vulnerabilities, and working with stakeholders to develop proactive mitigation plans.
  • Executive Advisory: Providing expert advice and recommendations to senior leadership on critical cybersecurity matters, risk posture, and strategic investments in security technologies.

What We're Looking For:

We're seeking an influential leader with a deep understanding of the cybersecurity landscape and a proven track record:

  • Extensive Experience: A minimum of 8+ years of progressive experience in cybersecurity, technology risk management, compliance, or a closely related field, with a significant portion in a leadership capacity.
  • Global Regulatory & Framework Expertise: A strong, in-depth understanding of global regulatory environments and leading security frameworks, including NIST, ISO 27001, and CIS Controls.
  • Proven Leadership: Demonstrated leadership capabilities in policy development, control governance, and successfully engaging with and influencing diverse stakeholders at all organizational levels.
  • Exceptional Communication & Analytical Skills: Possessing excellent communication skills, both verbal and written, coupled with strong analytical and complex problem-solving abilities.
  • Relevant Certifications: Holding relevant industry certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified Information Systems Auditor) are highly advantageous.

This is a rare and significant opportunity to directly influence cybersecurity strategy at an executive level within a complex, global organization. If you're a visionary leader ready to make a profound impact in a forward-thinking environment, we would be eager to hear from you. Sources

Job Features

Job CategoryIT, Security

Vice President of Information Security Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Are you a seasoned cybersecurity professional with a profound passion for cybersecurity, govern...View more

Hybrid
Bethlehem, PA, Holmdel, NJ, Manhattan, NY, New York City, NY, Pittsfield, MA, Stamford, CT
Posted 2 weeks ago

Senior Data Security Architect

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

eStreetSecurity is partnering with a major mutual life insurance company, actively seeking a highly experienced and strategic Senior Data Security Architect. This pivotal role will involve leading the design and implementation of robust data protection frameworks across their expansive enterprise. You'll be instrumental in shaping the client's overall data security posture, ensuring stringent compliance with global regulations, and safeguarding sensitive information throughout its entire lifecycle. The ideal candidate will possess deep technical expertise in advanced data security technologies, a strong understanding of emerging AI/ML security risks, and the proven ability to influence executive stakeholders and drive collaboration across diverse cross-functional teams.


Location & Compensation:

  • Location: This is a hybrid role, requiring 3 days per week in the office. Potential office locations include Manhattan, NY; Stamford, CT; Holmdel, NJ; Bethlehem, PA; or Pittsfield, MA.
  • Salary: USD $170,000 - $190,000 annually.

Please note: Our client is unable to sponsor visas now or in the future for this role. Candidates must be fully authorized to work in the United States.


Core Responsibilities:

As a Senior Data Security Architect, you will be a key leader in defining and executing the strategy to protect the organization's most valuable asset – its data. Your responsibilities will include:

  • Data Protection Strategy & Alignment: Designing and implementing comprehensive data protection strategies that are meticulously aligned with critical business objectives and evolving regulatory requirements.
  • Secure Data Lifecycle Architecture: Developing and maintaining secure data lifecycle architectures, which encompass robust data classification methodologies, clear retention policies, and secure destruction procedures.
  • Governance, Privacy & Audit Readiness: Leading initiatives in data governance, privacy protection, and ensuring a state of continuous audit readiness. This includes guaranteeing full compliance with regulations like HIPAA, CCPA, and other relevant jurisdictional privacy laws.
  • Reference Architectures & Blueprints: Creating and maintaining detailed reference architectures and prescriptive blueprints for designing and deploying secure data environments across the enterprise.
  • Executive Reporting: Providing high-level, executive-focused reporting on the organization's data security posture, identified risks, and implemented mitigation strategies, effectively communicating complex concepts to senior leadership.
  • Cloud Data Security Collaboration: Collaborating extensively with engineering, data science, and compliance teams to secure cloud data services. This includes platforms such as AWS, Databricks, and Snowflake, ensuring data remains protected in cloud-native environments.
  • Data Protection Technologies Implementation: Implementing and managing a suite of data protection technologies, including encryption (in transit, at rest, in use), tokenization, data masking, and anonymization techniques.
  • Data Loss Prevention (DLP) Oversight: Overseeing and optimizing Data Loss Prevention (DLP) programs and associated tools to prevent sensitive data from leaving authorized environments.
  • Data Governance Platform Integration: Evaluating and integrating advanced data governance platforms such as Collibra, Informatica, and Microsoft Purview to enhance data discovery, quality, and policy enforcement.
  • AI/ML Pipeline Security Leadership: Leading security efforts specifically for AI/ML pipelines. This critical area includes focusing on agentic security, robust model governance, and implementing protections against sophisticated threats like adversarial attacks, prompt injection, data leakage, and model inversion.
  • Vendor & Stakeholder Partnership: Partnering strategically with external vendors and internal stakeholders to influence technology roadmaps, ensuring that future solutions align seamlessly with the organization's security best practices and strategic vision.

Qualifications:

We're seeking a highly seasoned professional with a deep technical background and proven leadership capabilities:

Required:

  • Extensive Data Security Experience: A minimum of 8+ years of experience specifically in data security architecture or closely related roles.
  • Data Protection Expertise: Proven expertise in advanced cryptography, comprehensive data protection strategies, and robust cloud security principles.
  • AI/ML Security Knowledge: Strong, demonstrated knowledge of AI/ML security, including specific experience with Generative AI (GenAI) systems, Large Language Model (LLM) pipelines, and an understanding of emerging threats in the AI landscape.
  • Cloud Data & MLOps: Hands-on experience with secure data lakes, building and securing MLOps pipelines, and designing/implementing cloud-native architectures.
  • Compliance & Legal Understanding: Familiarity with various compliance frameworks and a strong understanding of legal considerations surrounding data jurisdiction and privacy.
  • Executive Communication: Excellent communication skills, with a proven ability to distill complex technical topics into clear, concise presentations suitable for executive leadership and non-technical audiences.
  • Collaboration & Vendor Management: Demonstrated ability to lead cross-functional collaboration efforts and effectively manage critical vendor relationships.

Preferred Certifications:

Candidates holding the following certifications will be highly regarded:

  • CISSP - Certified Information Systems Security Professional
  • CISM - Certified Information Security Manager
  • CCSP - Certified Cloud Security Professional
  • CIPP/US - Certified Information Privacy Professional (US)
  • GIAC Data Protection (GDAT)
  • AWS Certified Security - Specialty

If you are a driven Senior Data Security Architect ready to lead critical initiatives within a global financial institution, and you meet these extensive qualifications, we encourage you to apply directly! We look forward to connecting with professionals who are eager to make a significant impact on data security.

Job Features

Job CategoryIT, Security

Senior Data Security Architect Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a major mutual life insurance company, actively seeking a highly exp...View more

Onsite
Palo Alto, CA
Posted 2 weeks ago

Staff Deep Learning Engineer

Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering

Our client, an innovative Silicon Valley-based biotech startup, is at the forefront of pioneering AI-driven models to simulate and program complex biological systems. With strategically located global hubs spanning Europe and the Middle East, this forward-thinking company seamlessly blends cutting-edge machine learning techniques with deep molecular biology insights to significantly accelerate breakthroughs in medicine and the life sciences.

They're looking to expand their dynamic teams by bringing on a Staff Deep Learning Engineer who can drive innovation and contribute to groundbreaking research and development.


Location & Compensation:

  • Location: Palo Alto, CA (Onsite)
  • Salary: USD $170,000 - $210,000 annually

What You'll Be Doing:

As a Staff Deep Learning Engineer, you will be a pivotal technical contributor, responsible for advancing the core AI models that power our client's biological simulations. Your responsibilities will likely include:

  • Model Development & Optimization: Designing, developing, and optimizing advanced deep learning models tailored for complex biological simulations and programming.
  • GPU Accelerated Computing: Leveraging GPU tools such as CUDA and cuDNN to build high-performance computing solutions for deep learning workloads.
  • Library & Framework Utilization: Working extensively with leading deep learning libraries like PyTorch and HuggingFace to implement and refine neural network architectures.
  • Distributed Systems & Scalability: Contributing to the development and scaling of distributed deep learning systems, ensuring models can be trained and deployed efficiently across large datasets and computational resources.
  • Backend & Database Integration: Engaging in robust back-end development using frameworks like Django, Flask, and Node.js, and integrating with databases such as PostgreSQL and MongoDB to manage and serve model data.
  • Containerization & Orchestration: Utilizing containerization technologies (e.g., Docker) and orchestration platforms (e.g., Kubernetes, SLURM) to ensure reproducible and scalable deployment of models and related services.
  • Cloud Platform Integration: Working with major cloud platforms such as AWS and GCP for deploying and managing deep learning infrastructure.
  • Collaboration & Innovation: Collaborating closely with molecular biologists, data scientists, and other engineers to translate biological challenges into AI solutions and push the boundaries of scientific discovery.

Qualifications:

To be successful in this role, you should possess a strong blend of technical expertise and practical experience:

  • Education: A Bachelor's degree in Computer Science, Engineering, or a closely related field. Experience in life sciences is a significant plus.
  • Programming Proficiency: Proficient in JavaScript, Python, and modern web frameworks relevant to deep learning and backend services.
  • GPU & Deep Learning Libraries: Demonstrated experience with GPU tools (CUDA, cuDNN) and a strong command of deep learning libraries (PyTorch, HuggingFace).
  • Orchestration & Cloud: Familiarity with SLURM, Kubernetes, and major cloud platforms (AWS, GCP).
  • Backend & Database Skills: Skilled in back-end development using frameworks like Django, Flask, Node.js, and experience with databases such as PostgreSQL, MongoDB.
  • Distributed Systems & Containerization: A strong background in designing and implementing distributed systems and utilizing containerization technologies (Docker, Kubernetes).

Preferred Qualifications:

Candidates with the following qualifications will be highly regarded:

  • Advanced Degree: A Ph.D. in Computer Science, Engineering, or a related field; continued experience in life sciences is a plus.
  • Large Language/Foundation Models: Experience with large language models (LLMs) or other foundation models and complex deep learning workflows.
  • Biological Data & Bioinformatics: Familiarity with biological data, experience with bioinformatics tools, and understanding of ML pipelines in a life sciences context.
  • Development Practices: Proficient in using Git for version control, experience with CI/CD pipelines for automated deployment, and designing/consuming RESTful APIs.

This is a permanent opportunity to join a pioneering biotech startup where your deep learning expertise will directly contribute to accelerating scientific breakthroughs. If you are passionate about the intersection of AI and life sciences, we encourage you to apply!

Job Features

Job CategoryAI, Artificial Intelligence, Engineering

Staff Deep Learning Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering Our client, an innovative Silicon Valley-based biotech startup, is at the forefront of pion...View more

Hybrid
New York City, NY
Posted 2 weeks ago

VP, Network Security Engineer

Posted: June 18, 2025

Job Type: Permanent

Industry: Cybersecurity

eStreetSecurity is partnering with a dominating commercial bank based out of NYC to recruit a highly skilled and experienced Vice President, Network Security Engineer. In this critical leadership role, you will lead the strategic design, robust implementation, and continuous improvement of the bank's entire network security infrastructure. This position carries significant responsibility for ensuring the paramount confidentiality, integrity, and availability of critical systems and sensitive data across both on-premise data centers and dynamic cloud environments. The ideal candidate will bring deep technical expertise in core security technologies, strong leadership capabilities, and a proactive, threat-mitigation-focused approach, essential for success in a highly regulated financial environment.


Location & Compensation:

  • Location: Midtown Manhattan, New York City (This is a hybrid role with required onsite presence.)
  • Salary: USD $140,000 - $160,000 annually

Please note: Our client is unable to sponsor visas now or in the future for this role. Candidates must be fully authorized to work in the United States.


What You'll Be Doing:

As a VP, Network Security Engineer, you will be a pivotal leader in fortifying the bank's digital defenses. Your key responsibilities will include:

  • Security Solution Architecture & Management: You will architect, deploy, and manage enterprise-grade security solutions. This includes core technologies such as F5 BIG-IP (APM, LTM, SWG modules), Checkpoint firewalls, RSA Multi-Factor Authentication (MFA), VPNs, secure proxies, and Intrusion Detection/Prevention Systems (IDS/IPS), ensuring their optimal configuration and performance.
  • Web Proxy & Alerting Optimization: Administering and continuously optimizing web proxy services, comprehensive logging systems, and robust alerting mechanisms to ensure real-time threat detection, rapid response capabilities, and detailed forensic analysis.
  • Secure Networking Protocol Implementation: Implementing and meticulously maintaining secure networking protocols including TCP/IP, SSL/TLS, DNS, HTTP/HTTPS, and IPsec, enforcing secure communication across the network.
  • Incident Response & Vulnerability Leadership: Leading critical incident response efforts, overseeing comprehensive vulnerability management programs, and driving initiatives focused on continuous improvement of the overall security posture.
  • Encryption & Hardening Enforcement: Enforcing stringent encryption standards (PKI, AES, RSA) and implementing robust security hardening measures across all systems and applications to minimize attack surfaces.
  • Cross-Functional Collaboration: Collaborating extensively with various internal teams including IT operations, compliance departments, and diverse business units to support secure project delivery and ensure strict adherence to all regulatory compliance requirements within the financial sector.
  • Security Design & Documentation: Taking the lead in designing and meticulously documenting secure network architectures, developing detailed project plans, and creating clear technical diagrams to guide implementation and operational teams.
  • Cloud Security & Virtualization Management: Managing cloud-based security controls (e.g., AWS Security Groups, Azure Network Security Groups - NSGs) and overseeing security configurations on virtualization platforms such as VMware and Hyper-V.
  • Mentorship & Subject Matter Expertise: Providing critical mentorship and guidance to junior engineers, fostering their growth and skill development. You will also serve as a definitive subject matter expert (SME) in all facets of network security.

What's Needed:

We're looking for a highly experienced and technically profound individual with:

  • Educational Foundation: A Bachelor's degree in Computer Science, Cybersecurity, or a closely related technical field.
  • Extensive Network/Security Experience: A minimum of 5+ years of progressive experience in network and security engineering roles, with a strong preference for experience gained within a highly regulated industry such as financial services.
  • Enterprise Security Platform Expertise: Strong hands-on experience with F5 BIG-IP, Checkpoint firewalls, RSA MFA, and other enterprise-grade security platforms.
  • Automation & Scripting Proficiency: Proven proficiency in scripting and automation using languages and tools such as Python, Ansible, and Terraform.
  • Network Security Fundamentals: A solid and in-depth understanding of core network security principles, common attack vectors, and established incident response methodologies.
  • OS & Security Tooling Experience: Hands-on experience with Windows and Linux operating systems, certificate management (PKI), and URL/content filtering solutions.
  • Cloud & Hybrid Infrastructure Knowledge: Familiarity with cloud security concepts and practical experience working with hybrid infrastructure models that integrate on-premise and cloud environments.
  • Certifications: Relevant industry certifications are highly preferred, including CISSP (Certified Information Systems Security Professional), CCSP (Certified Cloud Security Professional), F5 certifications, and Checkpoint certifications.
  • Communication & Problem-Solving: Excellent communication skills (both verbal and written), strong documentation abilities, and exceptional problem-solving capabilities for complex technical challenges.
  • Autonomy & Confidentiality: The ability to work independently, effectively manage multiple competing priorities, and maintain the highest level of confidentiality with sensitive information.

If you are a driven Network Security Engineer seeking a leadership role within a prominent financial institution, and you meet these qualifications, we encourage you to apply directly! We look forward to connecting with you.

Job Features

Job CategorySecurity

VP, Network Security Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a dominating commercial bank based out of NYC to recruit a highly ski...View more

Hybrid
Dallas, TX, Jersey City, NJ, Tampa, FL
Posted 2 weeks ago

Lead Identity Engineer - Secrets Management

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

eStreetSecurity is partnering with a leading financial services firm in their search for a highly skilled and experienced Lead Identity Engineer with profound expertise in HashiCorp Vault and comprehensive Identity & Access Management (IAM) principles. This is a critical and strategic hire as the firm continues to build out their next-generation Secrets Management infrastructure. The successful candidate will serve as the Lead Engineer for a dedicated team of 5-10 professionals. The ideal candidate will bring a robust background supporting the design and implementation of highly resilient and secure secrets management solutions across diverse environments including cloud, on-premises, and hybrid setups, all within a stringent Zero Trust Architecture framework.


Location & Compensation:

  • Location: Jersey City, NJ / Dallas, TX / Tampa, FL (This is a hybrid role requiring 3 days per week onsite at one of the specified locations.)
  • Compensation: Commensurate with experience and chosen location. Please note that the compensation range listed above (USD $130,000 - $160,000) is specifically applicable only to candidates for the role based in the Jersey City, NJ office.

What You'll Be Doing:

As the Lead Identity Engineer focusing on Secrets Management, you will be a pivotal technical leader, driving key initiatives to enhance the firm's security posture. Your core responsibilities will include:

  • Secrets Management SME Leadership: Acting as the definitive Subject Matter Expert (SME) for all aspects of secrets management and HashiCorp Vault. This involves leading architectural discussions, design efforts, and implementation initiatives across the enterprise.
  • Secure System Design & Maintenance: Designing, implementing, and maintaining secure and scalable secrets management systems. These solutions will be seamlessly integrated with existing enterprise IAM frameworks and CI/CD pipelines to ensure end-to-end security.
  • Zero Trust Enforcement: Actively enforcing Zero Trust principles across the entire infrastructure and application layers, ensuring that all access is verified, least privilege is applied, and security is pervasive.
  • Automation with IaC: Automating infrastructure provisioning and Vault configurations extensively using Terraform and various scripting tools, promoting efficiency, consistency, and repeatability.
  • Cross-Functional Collaboration: Collaborating closely with diverse cross-functional teams, including DevOps, Security Operations, and Application Engineering, to embed secrets management best practices directly into their workflows and development lifecycles.
  • Monitoring & Troubleshooting: Proactively monitoring and efficiently troubleshooting secrets infrastructure using a suite of powerful observability tools such as Splunk, Grafana, and Elasticsearch, ensuring high availability and rapid issue resolution.
  • Script Development & Maintenance: Developing and maintaining robust shell scripts for automation tasks and enhancing operational efficiency specifically on Linux/Unix systems.
  • Agile/Kanban Participation: Actively participating in Agile/Kanban workflows, contributing meaningfully to sprint planning, daily stand-ups, retrospectives, and fostering a culture of continuous improvement within the team.

What's Needed:

We're seeking a highly skilled and experienced professional with:

  • HashiCorp Vault Expertise: Demonstrated extensive hands-on experience as a HashiCorp Vault SME specifically within large-scale enterprise environments.
  • IAM & Zero Trust Background: A strong background in Identity and Access Management (IAM), comprehensive secrets lifecycle management, and practical experience with Zero Trust Architecture implementation.
  • Linux/Unix & Scripting Proficiency: Proven proficiency in Linux/Unix administration and strong command of shell scripting for automation and system management.
  • Terraform & IaC: Solid experience with Terraform and a deep understanding of infrastructure as code (IaC) practices.
  • Cloud & On-Prem Familiarity: Familiarity with major cloud platforms (AWS, GCP, Azure) and extensive experience supporting systems in traditional on-premises environments.
  • Networking Fundamentals: Working knowledge of essential networking fundamentals, including secure communication protocols (e.g., TLS, SSH).
  • Monitoring & Logging Tools: Practical experience with key monitoring and logging tools such as Splunk, Grafana, and Elasticsearch.
  • Agile/Kanban Experience: Comfort and experience working effectively within Agile/Kanban development methodologies.

Preferred Qualifications:

While not strictly required, candidates possessing the following will be highly regarded:

  • HashiCorp Vault Certification(s): Holding HashiCorp Vault certification(s) or demonstrating equivalent practical experience.
  • Kubernetes Integration: Experience integrating Vault with Kubernetes and other cloud-native services.
  • DevSecOps Exposure: Exposure to secure software development practices and strong familiarity with DevSecOps principles and tools.

This is a unique and impactful opportunity to join a high-performing team at the forefront of financial cybersecurity. Your specialized expertise in secrets management and IAM will directly influence the security posture of a global enterprise, protecting critical assets and data. Interested applicants should submit a concise resume with full name and contact information to be considered.

Candidates must be fully authorized to work in the United States and be located within commuting distance of Jersey City, NJ, Dallas, TX, or Tampa, FL. Unfortunately, visa sponsorship is not available at this time.

Job Features

Job CategoryIT, Security

Lead Identity Engineer – Secrets Management Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnering with a leading financial services firm in their search...View more

Hybrid, Onsite, Permanent
Jersey City, NJ, Tampa, FL
Posted 2 weeks ago

Associate Director, Blockchain Engineering

Posted: June 18, 2025

Job Type: Permanent

Industry: Development and Engineering

We're partnering with a recognized leader in post-trade market infrastructure, a powerhouse renowned for its pivotal role in streamlining and securing financial transactions across global markets. With decades of invaluable experience, this organization is critical to automating, centralizing, and standardizing the processing of financial transactions—bringing unparalleled transparency, efficiency, and resilience to the entire financial services industry.

We're actively on the lookout for a seasoned Solidity Engineer who brings a strong foundational background in Quantitative Finance (QuantFi). This individual will join a high-impact team that operates at the very forefront of decentralized finance innovation, shaping the future of institutional financial technology.


Location & Compensation:

  • Location: This role offers flexibility with primary locations in Jersey City, NJ and Tampa, Florida.
  • Salary: USD $140,000 - $160,000 annually.

What You'll Be Doing:

As an Associate Director, Blockchain Engineering, you will be a central figure in designing and implementing advanced blockchain solutions for complex financial instruments. Your key responsibilities will include:

  • Smart Contract Architecture & Deployment: You will architect, develop, and deploy sophisticated smart contracts designed to model intricate financial instruments. This includes, but isn't limited to, derivatives, swaps, and repo agreements, ensuring they are robust, secure, and performant on the blockchain.
  • Cross-Functional Integration: You'll collaborate closely with diverse cross-functional teams, integrating novel blockchain solutions seamlessly into the broader ecosystem of existing financial systems and infrastructure.
  • Cross-Chain Interoperability & Layer 1 Development: You will drive initiatives for cross-chain interoperability, and develop advanced smart contracts across multiple Layer 1 blockchain technologies, expanding our client's reach and capabilities in the decentralized space.
  • Code Review & Security Best Practices: You'll conduct rigorous code reviews, implementing and enforcing industry best practices to ensure the utmost security, efficiency, and performance of all deployed smart contracts.
  • Research & Advancement: Staying consistently ahead of the curve is crucial. You'll dedicate time to researching and applying the latest advancements in cryptography and blockchain technology, bringing cutting-edge solutions to the firm.
  • Technical Requirements & System Architecture: Partnering closely with product managers and other key stakeholders, you will define precise technical requirements and shape the overarching system architecture for new blockchain-based financial products.
  • Live Smart Contract Support & Troubleshooting: You will be responsible for troubleshooting and swiftly resolving issues in live smart contracts, ensuring minimal disruption to critical financial operations and maintaining maximum reliability and trust.

What You Bring to the Table:

We're looking for a highly skilled and experienced professional with:

  • Educational Foundation: A Bachelor's or advanced degree in Computer Science, Engineering, Finance, or a related STEM field. This academic rigor provides a strong base for complex problem-solving.
  • Extensive Software Development: A minimum of 7+ years of progressive software development experience, with a very strong emphasis and proven track record in Solidity programming and a deep understanding of blockchain technologies.
  • Proven Quantitative Finance Experience: Demonstrated, hands-on experience in Quantitative Finance (QuantFi), particularly in areas critical to financial operations such as collateral management, lending protocols, and derivatives valuation and settlement.
  • Blockchain Security Expertise: A deep and nuanced understanding of blockchain security principles, common smart contract vulnerabilities (e.g., reentrancy, integer overflow), and effective mitigation strategies.
  • Development & Security Tool Proficiency: Hands-on experience with essential blockchain development tools like Hardhat and Foundry, coupled with proficiency in security analysis tools such as Slither and Mythril.
  • Scripting Language Proficiency: Strong proficiency in scripting languages such as JavaScript or TypeScript, enabling efficient development, testing, and automation.
  • Foundational Computer Science: A solid grasp of fundamental computer science concepts, including data structures, algorithms, and modern software development methodologies (e.g., Agile, Scrum).

Bonus Qualifications:

Candidates with the following experience will be at a distinct advantage:

  • Decentralized Finance (DeFi) Infrastructure: Experience specifically in designing or managing DeFi infrastructure, especially concerning risk management and regulatory compliance within decentralized ecosystems.

Why This Role Matters:

This is far more than just a technical role—it's a unique and profound opportunity to directly shape the future of institutional finance through cutting-edge decentralized technology. You'll be working on mission-critical systems that have a direct impact on the processing and security of trillions of dollars in global financial transactions. Join us in building the next generation of financial infrastructure.

Job Features

Job CategoryEngineering

Associate Director, Blockchain Engineering Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering We’re partnering with a recognized leader in post-trade market infrastr...View more

Senior Cybersecurity Engineer - Identity & Access Management (IAM)

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

A globally leading technology company at the forefront of the payments and financial services sector is actively seeking a highly skilled and strategic Senior Cybersecurity Engineer to join its pivotal Identity & Access Management (IAM) team. This isn't just a role; it's a high-impact opportunity within a dynamic and rapidly evolving cybersecurity organization. You'll be directly responsible for designing, implementing, and maintaining secure access to vital business portals and services across a vast, complex, and global enterprise. If you're a seasoned professional passionate about securing digital identities, architecting robust access solutions, and thriving in a challenging, fast-paced environment, this opportunity in Austin, TX, is tailored for you.


Location & Compensation:

  • Location: Austin, TX (This role offers a flexible hybrid work model, blending onsite collaboration with remote work.)
  • Salary: USD $175,000 annually

About the Role:

As a Senior Cybersecurity Engineer on the IAM team, you will be a critical contributor to the strategic design, robust implementation, and ongoing maintenance of our client's core IAM solutions. Your expertise will be particularly concentrated on ForgeRock technologies, serving as a key pillar in their access management ecosystem. You'll operate within a dynamic hybrid work environment, necessitating extensive collaboration with cross-functional teams and stakeholders situated across multiple global time zones. Your overarching objective will be to ensure the seamless deployment and optimal functioning of secure, scalable, and high-performing access management systems that not only meet the current demands but also anticipate and adapt to the evolving needs of a cutting-edge global organization.


Key Responsibilities:

Your responsibilities in this crucial, high-visibility role will include:

  • Web Application Single Sign-On (SSO) Integration: You'll lead the seamless integration of diverse web applications for single sign-on (SSO) capabilities, leveraging the full power of ForgeRock solutions to streamline user experience while maintaining stringent security.
  • Identity Federation Configuration: You'll expertly configure and manage identity federation, utilizing industry-standard protocols such as SAML 2.0, OpenID Connect (OIDC), and OAuth to enable secure and efficient cross-domain access.
  • Authentication & Authorization Policy Development: You'll be instrumental in developing, implementing, and meticulously managing sophisticated authentication chains and granular authorization policies. This ensures precise control over who can access what, under what conditions, across the entire enterprise.
  • ForgeRock Core System Management: You'll be responsible for the end-to-end installation, configuration, and optimization of core ForgeRock AM (Access Management) and Directory Server (DS) components, ensuring their stability, performance, and security.
  • Session & Directory Synchronization: You will implement robust session management strategies and efficient directory synchronization processes to maintain data consistency, user attributes, and access privileges across various identity stores.
  • LDAP Policy & Custom Access Control: You'll set up and enforce advanced LDAP password policies and design intricate access control mechanisms, including leveraging custom scripts, to meet highly specific security and compliance requirements.
  • Performance Engineering & Monitoring: This role includes building and meticulously maintaining performance testing labs, alongside developing sophisticated monitoring scripts. Your efforts here will ensure the optimal health, responsiveness, and scalability of the IAM infrastructure.
  • ForgeRock Agent Deployment & Management: You'll strategically deploy and manage ForgeRock agents across a variety of web and application servers throughout the global enterprise, ensuring consistent policy enforcement.
  • Global Team Collaboration & Requirements Alignment: You'll collaborate extensively and effectively with global teams to understand their unique business needs and security requirements, translating these into actionable, secure, and scalable IAM solutions.
  • IAM Subject Matter Expertise: You'll serve as a primary subject matter expert (SME) for IAM technologies and best practices, providing critical guidance, insights, and mentorship to internal teams and projects.
  • Technical Design & Documentation: You are expected to create and maintain comprehensive technical designs, detailed infrastructure configurations, and clear operational runbooks, ensuring accuracy and facilitating effective knowledge transfer.
  • Multi-Factor Authentication (MFA) Support: You'll provide expert support for multi-factor authentication (MFA) implementations, actively enhancing the overall security posture by strengthening user identity verification.

Basic Qualifications:

Candidates are expected to meet the following foundational requirements:

  • Experience & Education: A minimum of 5+ years of directly relevant experience in cybersecurity or information technology, coupled with a Bachelor's degree. An equivalent combination of education and experience will also be considered.

Preferred Qualifications:

Highly qualified candidates will also bring the following valuable experience and attributes:

  • Extensive IAM/Cybersecurity Experience: 6+ years of dedicated experience specifically in Identity & Access Management or broader cybersecurity engineering roles.
  • ForgeRock & LDAP Mastery: Strong, in-depth knowledge and hands-on expertise with ForgeRock platforms (including Access Management, Directory Services, Identity Gateway), LDAP directories, and various authentication protocols (e.g., Kerberos, OAuth, OpenID Connect).
  • Web & Application Server Experience: Proven experience configuring and troubleshooting web and application servers such as Apache, IIS, Tomcat, and Node.js, as well as comprehensive familiarity with both Linux and Windows operating environments.
  • Agile Development Methodologies: Strong familiarity with Agile/Scrum methodologies and practical experience utilizing collaborative project management tools like Jira.
  • Security Standards & Compliance: A solid understanding of key security standards and compliance frameworks relevant to financial services, such as PCI-DSS, NIST, and FFIEC.
  • Cloud IAM & API Security: Direct experience with cloud-based IAM solutions (e.g., Azure AD, AWS IAM) and a strong grasp of API security principles, including API gateways and token-based authentication.
  • Exceptional Communication & Documentation: Outstanding communication skills, both verbal and written, coupled with a demonstrated ability to create clear, concise, and comprehensive technical documentation for diverse audiences.

This is an exceptional opportunity for a senior-level cybersecurity engineer to make a profound impact within a global leader in financial technology. If you possess the required expertise in IAM, particularly with ForgeRock, and are eager to contribute to a secure and innovative payments ecosystem, we strongly encourage you to apply. We look forward to connecting with driven professionals who are ready for their next significant challenge!

Job Features

Job CategorySecurity

Senior Cybersecurity Engineer – Identity & Access Management (IAM) Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity A globally leading technology company at the forefront of...View more