Sign In

Current Jobs


A rapidly growing cybersecurity company, focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers is looking for an Infrastructure/DevOps Engineer to join their IT team. This full-time, remote role is open to candidates living in the United States or Canada. In this high-impact position, you will be instrumental in enabling AI software engineers to move fast by building and maintaining reliable, scalable, and secure infrastructure. You will partner closely with IT, security, and AI/ML engineering teams, ensuring that foundational systems robustly support the experimentation, deployment, and monitoring of advanced AI tools and solutions.

This role is ideal for someone who thrives at the intersection of systems engineering and AI enablement, and who loves solving complex operational challenges to unlock innovation across the company. You'll contribute directly to protecting the modern workplace from sophisticated threats with AI-native technology, working alongside talented colleagues in a culture of learning, ownership, and high performance.


Who You Are: A Collaborative, Security-Minded Builder

You're a skilled Infrastructure/DevOps Engineer with a solid background in cloud infrastructure and platform engineering. You love building scalable systems that empower other engineers to work faster and more efficiently. You thrive in collaborative, cross-functional environments and embody a customer-first mindset – your internal teams are your customers, and your goal is to remove blockers and boost their productivity. You're passionate about automation, self-service tools, and building highly reliable systems. You deeply value security, observability, and operational excellence, and you communicate clearly through both meticulous documentation and effective collaboration. You consistently stay up-to-date with the latest trends in DevOps and AI infrastructure, and you're driven by impact, ownership, and continuous improvement, always moving fast without sacrificing quality.


What You Will Do: Accelerating AI/ML Development at Scale

As an Infrastructure/DevOps Engineer, you'll be at the forefront of designing, implementing, and optimizing the foundational systems that power advanced AI/ML initiatives. Your responsibilities will blend architecture, automation, security, and performance tuning in a dynamic cloud environment.

  • Architect and Manage Infrastructure for AI/ML: You will architect and manage the foundational infrastructure that specifically supports AI/ML pipelines, critical AI tools, and vast data platforms. This involves designing scalable, resilient, and high-performance environments that meet the unique computational and data storage demands of machine learning and artificial intelligence workloads.
  • Implement and Maintain Containerization and Orchestration: You will actively implement and maintain containerization technologies like Docker (for packaging applications into portable containers) and orchestration platforms like Kubernetes (for managing, scaling, and deploying containerized applications). Your expertise ensures efficient resource utilization and reliable application delivery for AI/ML solutions.
  • Develop CI/CD Systems for Reproducible AI: You will be instrumental in developing robust CI/CD (Continuous Integration/Continuous Delivery) systems that are meticulously integrated with ML workflows. This ensures reproducible AI experiments by automating the build, test, and deployment processes for machine learning models and applications, promoting consistency and accelerating the iteration cycle.
  • Collaborate on Data Protection Standards: You will collaborate closely with security and compliance teams to ensure that all infrastructure components and configurations meet stringent data protection standards. This involves implementing security controls, adhering to regulatory requirements, and safeguarding sensitive AI/ML data throughout its lifecycle.
  • Automate Provisioning and Deployment with IaC Tools: You will drive automation by automating provisioning and deployment processes using cutting-edge Infrastructure as Code (IaC) tools such as Terraform or Pulumi. Your proficiency in IaC ensures that infrastructure can be deployed consistently, rapidly, and reliably across various environments, reducing manual effort and potential errors.
  • Monitor and Troubleshoot Infrastructure Issues: You will continuously monitor and troubleshoot infrastructure issues using industry-leading tools like Prometheus (for metrics collection), Grafana (for data visualization and dashboards), and the ELK stack (Elasticsearch, Logstash, Kibana) for centralized logging and analysis. Your proactive monitoring and expert troubleshooting will ensure high availability and performance of foundational systems.
  • Partner with AI and Software Engineers for Optimization: You will partner closely with AI and software engineers to optimize platform performance and resource utilization. This involves understanding their specific needs, identifying bottlenecks in AI/ML workloads, and implementing solutions (e.g., resource allocation adjustments, infrastructure scaling) that enhance the efficiency and speed of AI development and deployment.
  • Maintain Clear, Accessible Documentation: You will meticulously maintain clear, accessible documentation to effectively scale platform knowledge across the organization. This includes creating architectural diagrams, operational runbooks, troubleshooting guides, and best practices, empowering other teams to leverage the infrastructure effectively and ensuring long-term maintainability.

Must Haves: Your Essential Qualifications

To excel as an Infrastructure/DevOps Engineer, you'll need extensive experience in DevOps, SRE, or infrastructure engineering roles, with strong cloud, containerization, scripting, and automation skills.

  • Extensive DevOps, SRE, or Infrastructure Experience: You possess 4+ years of demonstrable experience in DevOps, SRE (Site Reliability Engineering), or Infrastructure Engineering roles. This background indicates a solid understanding of building and maintaining scalable, reliable, and efficient IT infrastructure.
  • Cloud Providers, Kubernetes, and Docker Proficiency: You have strong proficiency with cloud providers (AWS preferred), indicating hands-on experience with core cloud services. Crucially, you are proficient with Kubernetes (for container orchestration) and Docker (for containerization), demonstrating your ability to manage modern application deployment environments.
  • Infrastructure as Code Tools Experience: You have hands-on experience with infrastructure as code tools such as Terraform, Ansible, or Pulumi. This demonstrates your ability to provision and manage infrastructure declaratively and automate deployment processes effectively.
  • Strong Scripting Skills: You possess strong scripting skills in Python, Bash, or similar languages. This proficiency is essential for automating administrative tasks, building custom tools, and streamlining operational workflows.
  • Familiarity with CI/CD Systems: You have familiarity with CI/CD (Continuous Integration/Continuous Delivery) systems such as GitHub Actions, Jenkins, or CircleCI. This indicates your understanding of automated build, test, and deployment pipelines.
  • Understanding of Cloud Networking, Security, and Identity Management: You have a solid understanding of networking, security, and identity management in cloud environments. This includes knowledge of virtual networks, security groups, firewalls, IAM roles, and best practices for securing cloud resources.
  • Experience Supporting ML Workloads and GPU Infrastructure: You have practical experience supporting ML workloads (machine learning models and applications) and GPU-based infrastructure. This demonstrates your ability to manage specialized hardware and software environments required for computationally intensive AI tasks.
  • Ability to Troubleshoot Complex System Issues: You possess the ability to troubleshoot complex system issues effectively within a distributed environment. This indicates strong analytical and problem-solving skills for diagnosing and resolving intricate technical problems.
  • Comfort Working Across Functional Teams: You are comfortable working across functional teams and communicating effectively with both technical and non-technical stakeholders. This includes translating complex technical concepts into understandable terms for various audiences, fostering collaboration.

Nice to Have: Enhancing Your AI Infrastructure Profile

  • MLOps Tools Familiarity: Familiarity with MLOps tools like MLflow, Kubeflow, or SageMaker would be a plus, indicating a deeper understanding of machine learning operations workflows.
  • AI Platform Infrastructure Experience: Experience with AI platform infrastructure, including model serving (deploying trained models for inference) and feature stores (managing reusable features for ML models), would be highly desirable.
  • Logging and Monitoring Frameworks Knowledge: Knowledge of logging and monitoring frameworks such as Fluentd or Loki (for collecting and aggregating log data) would be beneficial.
  • Data Platform Support Background: A background in supporting data platforms like Snowflake, Databricks, or Hadoop would be a plus, indicating broader data engineering capabilities.
  • Startup or High-Growth Tech Experience: Experience working in high-growth startups or tech companies, where ambiguity and rapid change are common, would be advantageous.
  • AWS Certified: Holding an AWS certification (e.g., Solutions Architect, DevOps Engineer) is a significant plus, validating your expertise in AWS cloud services.

Compensation & Benefits: Rewarding Your Impact

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $127,500—$150,000 USD. For positions based in San Francisco/New York, the base pay range is $140,300—$165,000 USD.

Our client's compensation and benefits philosophy is designed to attract, motivate, and retain top talent. They pay competitively, and equity is an important and exciting part of their total compensation strategy as a pre-IPO startup, guided by the belief that team members should share in the financial success of the company. They offer flexible PTO, observe 12 paid holidays, and provide generous healthcare coverage (100% of employee healthcare premium costs in the US, and up to 100% for dependents, depending on the plan). As a globally-distributed, majority remote company, they prioritize a balance of deep focus time with virtual meetings and regular in-person events. As a fast-growing startup, they continuously review, improve, and personalize their benefits offerings based on team input.


If this Infrastructure/DevOps Engineer role aligns with your passion for building scalable, secure, and reliable infrastructure for AI platforms, your expertise in cloud environments and automation, and your drive to unlock innovation, we encourage you to learn more about this exciting full-time, remote opportunity.

Are you ready to accelerate AI/ML development in a leading cybersecurity company?

Job Features

Job CategoryEngineering, IT

A rapidly growing cybersecurity company, focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers is looking for an Infrastr...View more


A security MSSP focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers, is on the hunt for a visionary Senior Cyber Security Engineer to help build the next generation of security capabilities at scale. This full-time, remote position in the USA is a senior individual contributor (IC)-level role that perfectly blends deep technical security expertise with strong engineering fundamentals. You'll be instrumental in building integrations between infrastructure and security tooling, automating crucial security workflows, and partnering with cloud and platform engineering teams to harden the cloud environment.

As a technical lead, you'll own the architecture and development of systems that enhance both preventative guardrails and detective capabilities, all while ensuring security is a proactive partner to stakeholders. You'll also mentor junior engineers, act as a vital technical liaison across teams, and contribute directly to keeping our client's platforms and customers secure. This is the ideal role for engineers who are intellectually curious and highly motivated to bridge the gap between security principles and practical engineering execution.


Who You Are: A Security-Minded Engineering Leader

You're an intellectually curious, solution-focused engineer with a strong security mindset who thrives in fast-paced environments. You are:

  • A technical leader who can architect scalable security solutions while maintaining engineering velocity.
  • Someone who thinks like an attacker but builds like a defender, possessing a deep understanding of both offensive and defensive security principles.
  • A collaborative engineer who can seamlessly translate complex security requirements into actionable engineering tasks.
  • A dedicated mentor who genuinely enjoys teaching security best practices and automation techniques to junior engineers, fostering their growth and expertise.

What You Will Do: Architecting and Automating Cloud Security at Scale

As a Senior Cyber Security Engineer, your responsibilities will involve a strategic blend of security architecture, hands-on automation, incident response, and continuous improvement, all focused on strengthening cloud security within a dynamic environment.

  • Lead Threat Modeling and Security Design Discussions: You'll take the lead in threat modeling and security design discussions with platform teams. This involves proactively identifying potential threats and vulnerabilities in new and existing systems, and meticulously translating these risks into actionable engineering tasks and secure architectural designs. Your input ensures security is embedded from the earliest stages of development.
  • Build Scalable Preventative Controls via Infrastructure-as-Code (IaC): You will collaborate extensively with Platform, Infrastructure, and DevOps teams to build scalable preventative controls primarily leveraging Infrastructure-as-Code (IaC). This includes using Terraform as a primary tool, with experience in CloudFormation also being welcome. Your work will ensure security guardrails are automatically enforced, preventing misconfigurations and vulnerabilities at scale.
  • Evaluate and Uplift Security Tooling: You'll be responsible for meticulously evaluating and uplifting existing security tooling across both commercial and cloud-native capabilities. Your focus will be on enhancing their scale, efficiency, and precision, ensuring that the security team has the most effective and performant tools to detect, prevent, and respond to threats across a large, dynamic environment.
  • Mentor and Support Junior Engineers: You will play a crucial role in mentoring and supporting junior engineers by sharing your deep expertise in automation best practices, secure architecture principles, and tooling integrations. Your guidance will foster their professional development and contribute to the overall strength and capability of the engineering teams.
  • Design and Deploy Automation Workflows for Incident Response: You will architect, design, and deploy advanced automation workflows to significantly enhance incident response capabilities. This involves building systems that can automatically correlate security signals, enrich alerts with contextual information, and auto-remediate known failure patterns, minimizing manual intervention and accelerating response times during security incidents.
  • Architect, Build, and Maintain Integrations: You will architect, build, and maintain crucial integrations between cloud-native infrastructure and various security tooling. This includes seamlessly connecting cloud services with SIEM (Security Information and Event Management) systems for centralized logging and analysis, SOAR (Security Orchestration, Automation, and Response) platforms for automated responses, and IAM (Identity and Access Management) tooling for robust access controls.
  • Serve as a Hands-on Technical Contributor During Security Incidents: You will serve as a vital hands-on technical contributor during security incidents. This involves actively participating in incident response efforts by meticulously tracing system-level behavior, performing forensic analysis, identifying root causes, and contributing to the enhancement of response processes to improve future incident handling.
  • Stay Current with Emerging AI Platforms: You will proactively stay current with emerging AI platforms, including generative AI models and related technologies. This involves evaluating their security implications, assessing their business applicability, and planning for their secure integration into the existing infrastructure.
  • Partner with Cloud Infrastructure Teams on Security Controls: You will actively partner with cloud infrastructure teams to implement and maintain security controls across AWS accounts and services. This collaborative effort ensures consistent security configurations, adherence to best practices, and robust protection of cloud resources against evolving threats.
  • Build Security Telemetry Pipelines and Log Correlation: Prior experience in building security telemetry pipelines or log correlation frameworks is a highly desirable skill. This involves designing and implementing systems that efficiently collect, process, and analyze security logs from various sources to detect anomalies and identify potential threats.
  • Integrate Security Checks into Developer Workflows: Familiarity with CI/CD (Continuous Integration/Continuous Delivery) systems and experience in integrating security checks into developer workflows is beneficial. This includes implementing automated security testing (SAST/DAST), vulnerability scanning, and policy enforcement directly into the development pipeline, shifting security left.

Must-Haves: Your Core Security Engineering Arsenal

To excel as a Senior Cyber Security Engineer, you'll need extensive experience in security engineering, deep cloud expertise, strong programming skills, and a solid understanding of security tooling and practices.

  • Proven Delivery in Security Engineering or Infrastructure Security: You must have a proven track record of successful delivery in security engineering or infrastructure security roles, ideally within cloud-native environments. This demonstrates your practical ability to design, build, and implement robust security solutions in modern, scalable infrastructures.
  • Hands-on AWS Native Tooling Expertise: You bring extensive hands-on experience with AWS Native tooling, specifically including:
    • IAM (Identity and Access Management): For managing user identities and access controls.
    • KMS (Key Management Service): For managing cryptographic keys.
    • Config: For compliance auditing and configuration management.
    • Lambda: For serverless compute in automation.
    • EKS (Elastic Kubernetes Service): For managed Kubernetes services.
    • A strong working knowledge of Azure and GCP is also highly valued, indicating multi-cloud familiarity.
  • Strong Scripting and Dev Skills: You possess strong scripting and development skills in Python and/or Go. This coding proficiency is essential for building automation tools, security utilities, and integrating diverse systems. You also have proven proficiency with Git for version control, Linux for system administration, and a solid understanding of infrastructure automation patterns.
  • Expertise in Integrating/Building Security Tooling: You have expertise in integrating or building tooling for critical security platforms. This includes SIEM (Security Information and Event Management), SOAR (Security Orchestration, Automation, and Response), vulnerability management, and CSPM (Cloud Security Posture Management) platforms. Your experience ensures these tools are effectively deployed and utilized.
  • Experience Deploying Security Controls via Infrastructure-as-Code (IaC): You have proven experience deploying security controls via Infrastructure-as-Code (IaC), specifically using Terraform or CloudFormation. This demonstrates your ability to define and manage security configurations declaratively and automate their deployment.
  • Comfort with Incident Analysis and Logging: You are comfortable investigating logs, tracing events, and contributing to incident analysis workflows. This indicates strong diagnostic skills and familiarity with security incident response processes.
  • Proven Cross-Functional Influence and Collaboration: You have a proven ability to influence and collaborate cross-functionally with engineering, infrastructure, and IT teams. Your communication and interpersonal skills enable seamless teamwork and drive shared security objectives.
  • Strong Written Communication and Documentation Skills: You possess strong written communication and documentation skills, with the ability to convey complex designs clearly and concisely. This is crucial for creating robust architectural diagrams, security policies, and operational procedures.
  • Experience with Container Orchestration Security: You bring a strong background with using and securing container orchestration platforms like Kubernetes, including expertise in workload security (e.g., Pod Security Standards) and service mesh controls (e.g., Istio, Linkerd) for secure microservices communication.

Nice to Have: Enhancing Your Security Engineering Profile

  • Startup Environment Experience: Experience working in fast-paced or startup environments with sometimes ambiguous ownership lines, demonstrating adaptability and resilience.
  • JavaScript or TypeScript Familiarity: Familiarity with JavaScript or TypeScript, particularly in the context of DevOps tooling or plugins.
  • Commercial Cloud Security Tools: Hands-on experience with commercial Cloud Security tools like CNAPP (Cloud-Native Application Protection Platform), CSPM (Cloud Security Posture Management), DSPM (Data Security Posture Management), and KSPM (Kubernetes Security Posture Management).
  • Compliance Frameworks Exposure: Exposure to compliance frameworks such as SOC 2 and ISO 27001, and an understanding of how engineering decisions affect auditability.

Compensation & Benefits: Rewarding Your Expertise

Certain roles are eligible for a bonus, restricted stock units (RSUs), and comprehensive benefits. Individual compensation packages are based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $175,000—$200,000 USD. For positions based in San Francisco/New York, the base pay range is $191,300—$225,050 USD.


If this Senior Cyber Security Engineer role aligns with your passion for building scalable security capabilities, your expertise in cloud-native environments and automation, and your drive to bridge security principles with engineering execution, we encourage you to learn more about this exciting full-time, remote opportunity.

Are you ready to think like an attacker but build like a defender for a leading AI security firm?

Job Features

Job CategoryIT, Security

A security MSSP focused on protecting organizations from sophisticated email attacks like phishing, business email compromise, and account takeovers, is on the hunt for a visionary Senior Cyber Securi...View more

Permanent, Remote
Remote
Posted 3 weeks ago

An AI security focused agency, operating in the Computer and Mathematical industry, is seeking a Security Analyst to join their team. This full-time position is 100% remote within the USA, offering exceptional flexibility. The ideal candidate is detail-oriented with a passion for cybersecurity and a positive attitude, comfortable working in a fast-paced virtual environment, and able to communicate clearly both verbally and in writing.


About You: Passion for Cybersecurity and Problem-Solving

You are a highly detail-oriented individual with a genuine passion for cybersecurity and a consistently positive attitude. You thrive in fast-paced and virtual work environments, demonstrating the ability to adapt quickly and manage tasks effectively. Furthermore, you possess excellent communication skills, enabling you to convey complex information clearly through both verbal and written methods, and you are an active listener, ensuring you fully understand requests and issues.

In this role, you will leverage your foundational skills, which typically include:

  • Less than 1 year of related experience.
  • A Bachelor's degree, or actively working towards a Bachelor's degree.
  • Proficiency with G Suite (Google) applications (e.g., Gmail, Google Docs, Google Sheets).
  • Familiarity with Zoom for virtual collaboration.

Role Responsibilities: Safeguarding Against Cyber Threats

As a Security Analyst, you'll be instrumental in supporting critical cybersecurity operations, focusing on protecting against email fraud and other sophisticated attack strategies. Your responsibilities will blend operational tasks with proactive improvement initiatives and investigative support.

  • Perform Operational Tasks: You will perform operational tasks essential to the security function, such as efficiently handling high-volume intake queues of security alerts or requests. You'll also be responsible for accurately labeling machine learning data, which is crucial for training and improving AI-powered security systems. All tasks must be completed in a timely manner to maintain operational efficiency.
  • Propose Improvements for Processes and Policies: You will actively propose improvements for existing processes, workflows, products, and policies related to cybersecurity. Your proactive mindset will help identify inefficiencies, potential vulnerabilities, or areas where current practices can be enhanced to strengthen the overall security posture and streamline operations.
  • Support Investigation Efforts: You will provide vital support for investigation efforts across a range of critical issues. This includes assisting senior analysts or incident response teams in gathering information, analyzing data, and documenting findings related to security incidents, ensuring thorough and timely resolution of threats.
  • Learn About Email Fraud Attack Strategies: You will continuously learn about various email fraud attack strategies and patterns (e.g., phishing, business email compromise, impersonation). This in-depth knowledge is crucial for proactively identifying potential threats and implementing preventative measures to effectively prevent an event from occurring, safeguarding the organization and its customers from financial and reputational damage.
  • Work on Specialized Security Areas: You will contribute to specific, critical areas of cybersecurity operations. This includes working on a subset of tasks related to the Live Queue (real-time incident handling), POV (Proof of Value) data sets (analyzing data from potential new security solutions), ATO (Account Takeover) cases (investigating compromised user accounts), and VAC (Voice/SMS Authentication Bypass) cases (addressing authentication bypass attempts).
  • Contribute to Team Growth and Scale: You will actively engage in task work to help the team grow, scale, and mature. This involves contributing to automation initiatives, developing new documentation, cross-training, and participating in efforts that enhance the team's overall capabilities and efficiency in a rapidly evolving cybersecurity landscape.

Compensation & Benefits: Rewarding Your Contributions

Certain roles are eligible for a bonus, restricted stock units (RSUs), and a comprehensive benefits package. Individual compensation packages are tailored based on factors unique to each candidate, including their skills, experience, qualifications, and other job-related reasons. The base salary range for this position is $20.19—$20.19 USD (note: this appears to be a placeholder and actual compensation will vary). Benefits are recognized as an important piece of your total compensation package, reflecting a commitment to overall employee well-being.


Additional Information: Commitment to Security and Compliance

Our client is an equal opportunity employer, committed to diversity and inclusion. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or other legally protected characteristics.

This position involves access to technology subject to the U.S. Export Administration Regulations (EAR). Therefore, candidates offered employment must be eligible to access controlled technology under U.S. export control laws. Employment is conditioned on the availability of government authorization. The company reserves the right to delay commencement of employment, rescind an offer, or terminate employment to ensure compliance with applicable government access control restrictions.

As part of our client's secure hiring practices, they conduct video interviews and validate applicant identity at various stages through their recruitment process. If your application is successful and a conditional offer of employment is made, pre-employment checks will be carried out, which must be successfully completed to progress to a final offer. All processes and pre-employment checks align with prevailing legislation and our client's policies relevant to their security and privacy standards. Our client is committed to protecting your privacy; please review their Applicant Privacy Policy for full information on how your personal information is used. By submitting an application, you confirm that you have read and understand the Applicant Privacy Policy.

Job Features

Job CategoryIT, Security

An AI security focused agency, operating in the Computer and Mathematical industry, is seeking a Security Analyst to join their team. This full-time position is 100% remote within the USA, offering ex...View more

Contract, Remote
Raleigh, NC
Posted 3 weeks ago

Our client is seeking a highly skilled Senior Project Manager to join their team. This long-term contract position is 100% remote, based out of Raleigh, North Carolina, offering exceptional flexibility for the right candidate.


What's the Job? Driving Project Success in a Remote Environment

As a Senior Project Manager, you'll be instrumental in leading complex initiatives from inception to successful completion. Your responsibilities will revolve around meticulous planning, vigilant oversight, and proactive problem-solving to ensure projects meet their objectives, even within a fully remote setting.

  • Maintain Project Workstream Timeframes and Budgeting Estimates: You will meticulously maintain project workstream timeframes, ensuring that all project phases and tasks adhere to established schedules. You'll also rigorously manage budgeting estimates, tracking financial expenditures against plans to ensure projects remain within their allocated financial parameters. Your diligence in these areas is crucial for project efficiency and financial accountability.
  • Develop Roadmaps/Schedules and Track Progress: You will be responsible for developing comprehensive roadmaps and detailed schedules for various projects. This involves outlining key milestones, dependencies, and resource allocations. You will then vigilantly track progress against these plans, proactively identifying any deviations and implementing corrective actions to keep projects on course.
  • Utilize Project Management Tools for Performance and Adherence: You will expertly utilize a range of industry-standard project management tools to track project performance and ensure schedule adherence. This includes proficiency with platforms such as MS Project, Jira, M&A Accelerator, Clarity, and Planview. Your command of these tools will provide real-time visibility into project health and enable data-driven decision-making.
  • Schedule and Facilitate Discussions, Track Minutes: You will expertly schedule and facilitate crucial discussions with stakeholders, project teams, and external partners. Your facilitation skills will ensure productive meetings, leading to clear decisions and actionable outcomes. You will meticulously track minutes in a standard, predefined format, capturing key agreements, decisions, and action items for clear accountability and future reference.
  • Generate Weekly Program Management Reports: You will be responsible for preparing and delivering weekly report-outs to program management. These reports will provide concise and accurate updates on project status, progress, upcoming activities, and any identified risks or issues, ensuring consistent communication and transparency at the program level.
  • Conduct Risk Assessments for Projects: You will systematically conduct thorough risk assessments for projects. This involves identifying potential threats, evaluating their likelihood and impact, and developing proactive mitigation strategies. Your foresight in risk management is crucial for minimizing negative impacts and ensuring project resilience.
  • Establish and Maintain Project's RAID Log: You will be responsible for the establishment and ongoing maintenance of a project's RAID log (Risks, Assumptions, Issues, Dependencies). This critical document will capture all relevant project dynamics, enabling proactive management of potential blockers, clear communication of assumptions, and efficient resolution of issues.
  • Identify and Organize Working Sessions: You will proactively identify and organize necessary working sessions to meet project goals and drive progress. This involves recognizing when cross-functional collaboration, technical deep-dives, or strategic planning meetings are required, and efficiently coordinating these sessions to ensure impactful outcomes.
  • Identify Project Goals, Needs, and Scope: You will play a crucial role in the initial project phases by clearly identifying project goals, defining specific needs, and meticulously outlining the project scope. This foundational work ensures that all stakeholders are aligned from the outset, preventing scope creep and setting clear boundaries for project execution.
  • Plan, Monitor/Control, and Document Tasks: You will engage in the core project management functions of planning, monitoring/controlling, and meticulously documenting tasks throughout the project lifecycle. This includes creating detailed task breakdowns, assigning responsibilities, tracking progress, managing changes, and ensuring all activities are recorded for auditability and future reference.
  • Ensure Timely Delivery of Tasks, Deliverables, and Materials: You are accountable for ensuring all tasks, deliverables, and project materials are delivered promptly. You will also take proactive steps in reporting any delays in a timely fashion to relevant stakeholders, allowing for swift adjustments and transparent communication regarding project status.
  • Manage Resources for Project Execution: You will efficiently manage all resources necessary for project execution in conjunction with program management and delivery leadership. This involves optimizing resource allocation, addressing any resource constraints, and ensuring that teams have the necessary tools and support to achieve project objectives.
  • Foster Effective Communication with Stakeholders: You will cultivate and foster effective communication and meetings with stakeholders concerning project status. This ensures that all key parties are regularly informed about progress, challenges, and next steps, building trust and maintaining alignment throughout the project's duration.
  • Foresee and Strategically Eliminate Blockers and Potential Risks: You possess a proactive mindset, enabling you to foresee and strategically eliminate blockers and potential risks before they impact project timelines or objectives. Your ability to anticipate challenges and implement preventive measures is crucial for smooth project execution.
  • Work Effectively with Program Manager and Leads: You will work effectively with the Program Manager and various leads (e.g., technical leads, functional leads) to ensure the successful delivery of project goals and objectives. This collaborative approach ensures seamless integration of efforts across different project workstreams.
  • Document Each Step of the Process: You will rigorously document each step of the process using various project management tools. This meticulous approach ensures complete traceability, auditability, and provides a clear record of all project activities, decisions, and outcomes.
  • Ensure Top-Quality Results and Project Success: Your ultimate responsibility is to ensure top-quality results and overall project success. This commitment to excellence drives high standards in deliverables, processes, and stakeholder satisfaction, delivering tangible value to the business.

What's Needed? Your Qualifications for Senior Project Management

To excel as a Senior Project Manager in this remote role, you'll need extensive experience in project management, a strong understanding of project tools, and exceptional communication and leadership skills.

  • Extensive Project Management Experience: You possess extensive experience in project management, demonstrating a proven track record of successfully leading complex projects from initiation to closure. This includes managing schedules, resources, and budgets for diverse IT initiatives.
  • Proficiency in Project Management Tools: You are highly proficient in using various project management tools such as MS Project, Jira, M&A Accelerator, Clarity, and Planview. Your expertise ensures effective tracking of project performance, schedule adherence, and robust reporting.
  • Strong Communication Skills: You have strong written and verbal communication skills, essential for developing roadmaps, documenting schedules, facilitating discussions, tracking minutes, and providing clear report-outs to program management and stakeholders.
  • Risk Assessment and Management Expertise: You possess proven expertise in conducting risk assessments for projects and establishing/maintaining a project's RAID log. This includes foreseeing and strategically eliminating blockers and potential risks.
  • Independent Work and Proactive Problem-Solving: You demonstrate the ability to work independently while also being proactive in identifying project goals, needs, and scope. Your self-starting approach enables you to quickly identify and resolve potential issues without constant oversight.
  • Experience in Cross-Functional Coordination: You are adept at identifying and organizing working sessions necessary to meet project goals and drive progress, demonstrating strong cross-functional coordination skills in a remote environment.
  • Resource Management Expertise: You have experience managing all resources necessary for project execution in conjunction with program management and delivery leadership, ensuring optimal team allocation and efficient project delivery.
  • Stakeholder Communication and Expectation Management: You are skilled at fostering effective communication and meetings with stakeholders concerning project status, ensuring transparency and managing expectations effectively in a remote setting.

Job Features

Job CategoryEngineering, IT

Our client is seeking a highly skilled Senior Project Manager to join their team. This long-term contract position is 100% remote, based out of Raleigh, North Carolina, offering exceptional flexibilit...View more

Contract, Hybrid, Remote
Charlotte, NC, Raleigh, NC
Posted 3 weeks ago

Our client, operating in the Finance & Insurance sector, is seeking a highly skilled Program Manager to oversee critical command center operations and technology systems. This 12-month contract position, based hybrid in Charlotte, North Carolina, offers a unique opportunity to ensure seamless integration and functionality within a complex environment. The ideal candidate will have robust experience in the financial industry, proven leadership skills, and an extremely organized and detailed-oriented approach.


What You'll Be Doing: Orchestrating Command Center Excellence

As a Program Manager, you'll be instrumental in leading the development, implementation, and coordination of advanced command center operations and technology systems. Your responsibilities will blend strategic planning, meticulous project management, and effective cross-functional collaboration.

  • Develop and Execute a Strategic Roadmap: You'll create and execute a comprehensive strategic roadmap specifically designed for integrating systems, processes, and technology within the command center. This involves outlining long-term goals, identifying key initiatives, and planning the sequence of activities to achieve optimal performance and seamless functionality.
  • Set Program Goals and Manage Schedules: You'll define clear program goals, develop detailed program plans and schedules to ensure those goals are met, and provide timely reports on any delays. This proactive approach ensures projects stay on track and stakeholders are always informed of progress and potential challenges.
  • Prioritize Tasks and Allocate Resources: You'll effectively prioritize project tasks based on strategic importance and operational needs. You'll also skillfully allocate project team members and manage all necessary resources for project execution in conjunction with program management and delivery leadership, ensuring optimal resource utilization and efficient delivery.
  • Manage Program Budget and Timelines: You'll meticulously manage the program budget and timelines, ensuring financial adherence and timely delivery. You'll also oversee the consolidation of workstream status reports, providing a unified view of overall program progress.
  • Coordinate Project Teams and Responsibilities: You'll be responsible for coordinating project team members across various workstreams, fostering collaboration and clear communication. You'll also develop detailed schedules and individual responsibilities, ensuring everyone understands their role in achieving project objectives.
  • Track Project Performance with Management Tools: You'll leverage various project management tools such (as MS Project, Jira, M&A Accelerator, Clarity, and Planview) to meticulously track project performance and schedule adherence. This ensures real-time visibility into project health and enables proactive adjustments to keep initiatives on track.
  • Facilitate Discussions and Track Minutes: You'll expertly schedule and facilitate discussions, ensuring productive meetings with internal teams, external vendors, and stakeholders. You'll also diligently track minutes in a standard, predefined format, capturing key decisions, action items, and next steps for clear accountability.
  • Conduct Risk Assessments and Manage RAID Logs: You'll perform thorough risk assessments for projects, identifying potential threats and vulnerabilities. You'll also establish and maintain a project's RAID log (Risks, Assumptions, Issues, Dependencies), proactively foreseeing and strategically eliminating blockers and potential risks to ensure project success.
  • Foster Effective Communication with Leadership and Stakeholders: You'll cultivate and foster effective communication and meetings with executive sponsors and stakeholders concerning project status. This ensures transparency, manages expectations, and secures buy-in for critical decisions related to program progress and budget spend, including weekly and monthly report-outs.
  • Collaborate for Goal Delivery: You'll work effectively with workstream leads and program management to ensure the successful delivery of project goals and objectives. This collaborative approach ensures that all contributing parties are aligned and working cohesively towards common strategic aims.
  • Act as Primary Point of Contact: You'll serve as the primary point of contact between technical teams, key stakeholders, and external vendors. Your role as a central communication hub ensures seamless information flow and coordination across all project facets.
  • Ensure SDLC Adherence and Operational Readiness: You'll be instrumental in ensuring strict SDLC (Software Development Life Cycle) adherence throughout the project lifecycle. You'll also confirm that testing validation occurs to verify operational readiness, guaranteeing that all deployed systems are stable, secure, and ready for production use.
  • Ensure Compliance with Regulations and Best Practices: You'll verify and confirm compliance with relevant regulations, standards, and best practices pertinent to command center operations and technology systems. This vigilance ensures legal adherence, operational integrity, and alignment with industry benchmarks in the financial sector.
  • Facilitate Cross-Functional Collaboration: You'll actively facilitate cross-functional collaboration across various departments to meet integration goals. This involves breaking down silos, fostering teamwork, and ensuring that all contributing teams work cohesively towards shared objectives.
  • Ensure Top-Quality Results: You'll consistently ensure top-quality results and success for every project. This commitment to excellence drives high standards in deliverables, processes, and overall project outcomes.
  • Manage Systems Integration and Business Process Improvement Projects: You bring direct experience managing systems integration projects, ensuring seamless data flow and interoperability between disparate technology systems. You also have direct experience managing business process improvement projects, focusing on analyzing and formulating "As-Is" and "To-Be" processes to optimize operational efficiency.
  • Partner with Vendors and Team Members: You have significant experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative approach ensures effective external and internal coordination for project success.

What's Needed: Your Profile for Program Leadership

To excel as a Program Manager, you'll need a unique blend of extensive experience in the financial industry, strong project management skills, and a deep understanding of command center operations and technology.

  • Extensive Financial Industry Experience: You have 8+ years of experience in the financial industry and/or equivalent business and enterprise systems experience. This deep domain knowledge provides critical context for managing complex projects within a regulated financial environment.
  • Direct Experience Managing Systems Integration Projects (Preferred): Direct experience managing systems integration projects is preferred. This highlights your ability to oversee projects that connect diverse technology systems, ensuring seamless data flow and interoperability.
  • Direct Experience Managing Business Process Improvement Projects (Preferred): Direct experience managing business process improvement projects is preferred. This demonstrates your ability to analyze existing workflows, identify inefficiencies, and design optimized "to-be" processes.
  • Extremely Organized and Detailed-Oriented: You are extremely organized and detailed-oriented. This meticulous approach is crucial for managing complex project plans, tracking numerous tasks, and ensuring accuracy in documentation and reporting.
  • Self-Motivated: You are self-motivated, demonstrating initiative and a proactive approach to identifying challenges, developing solutions, and driving projects to completion independently.
  • Proven Leadership Skills: You possess proven leadership skills, capable of guiding project teams, influencing stakeholders, and driving consensus towards shared goals.
  • Strong Written and Verbal Communications: You have strong written and verbal communication skills. This is crucial for articulating complex project details, reports, and strategic plans to diverse audiences, including executive sponsors and technical teams.
  • Strong Interpersonal Skills: You possess strong interpersonal skills, enabling you to build rapport, foster collaboration, and manage conflicts effectively within and across teams.
  • Business, Financial, and Technical Acumen: You bring a robust blend of business, financial, and technical acumen. This allows you to understand the strategic, budgetary, and technical aspects of projects, ensuring holistic problem-solving and decision-making.
  • Assertive and Action-Oriented: You are assertive and action-oriented, taking decisive steps to move projects forward, overcome obstacles, and ensure timely delivery of results.
  • Manages Conflict: You are skilled at managing conflict constructively, mediating disagreements, and finding resolutions that maintain positive working relationships and keep projects on track.
  • Collaborative: You are inherently collaborative, valuing teamwork and actively seeking input from others to achieve project objectives.
  • Experience Partnering with Vendors and Team Members: You have extensive experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative leadership ensures effective coordination with external partners and internal teams.

If this Program Manager role in Charlotte, NC, aligns with your experience in leading complex integration projects, your expertise in command center operations, and your strong project management acumen within the financial industry, we encourage you to learn more about this exciting hybrid contract opportunity. This is a fantastic chance to make a significant impact on critical technology systems.


Job Features

Job CategoryIT

Our client, operating in the Finance & Insurance sector, is seeking a highly skilled Program Manager to oversee critical command center operations and technology systems. This 12-month contract po...View more


Our client, a prominent organization in the Information Technology sector, is seeking a highly experienced and motivated Senior Infrastructure Administrator. This permanent position, based hybrid in Phoenix, Arizona, requires 3 days a week in the office. You’ll play a critical role in managing and maintaining the organization's complex IT infrastructure. You'll be responsible for the design, implementation, optimization, and security of server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure the high availability, performance, and security of the IT environment, while also mentoring junior staff and contributing to the overall success of IT operations.

At AAA, their team members strive to deliver amazing service and help their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work. They're working to transform AAA for the next century with a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.


Why Work For This Organization?

  • Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
  • 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
  • Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and more.
  • Paid Holidays: Enjoy paid holidays, promoting work-life balance.
  • Paid Time Off: Team Members accrue paid time off monthly, and depending on position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
  • Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
  • AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
  • Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Summary: Leading IT Infrastructure Management

We are seeking a highly experienced and motivated Senior Infrastructure Administrator to play a critical role in managing and maintaining our organization's complex IT infrastructure. In this role, you will be responsible for the design, implementation, optimization, and security of our server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure high availability, performance, and security of our IT environment, while also mentoring junior staff and contributing to the overall success of our IT operations.

Responsibilities / Job Duties: Driving Infrastructure Excellence

As a Senior Infrastructure Administrator, you'll oversee and contribute to all facets of the IT infrastructure, ensuring its stability, performance, and security across diverse platforms. Your duties will blend hands-on technical work with strategic planning and mentorship.

  • Infrastructure Management: You will comprehensively manage and maintain all aspects of our IT infrastructure, which includes physical and virtual servers, network devices, storage systems, and various cloud platforms. Your primary goal is to proactively identify and resolve potential issues to ensure the unwavering stability, optimal performance, and robust security of the entire infrastructure. You'll also be instrumental in implementing and maintaining sophisticated infrastructure monitoring and alerting systems to guarantee proactive identification of any issues before they impact operations.
  • Server Administration: You will demonstrate expert-level administration of Windows Server and/or Linux environments. This includes meticulous installation, configuration, security hardening, performance tuning, and advanced troubleshooting. You will also manage and maintain critical core infrastructure services such as Active Directory, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol), ensuring seamless user authentication, resource resolution, and network address management.
  • Network Management: You will expertly manage and maintain the network infrastructure, encompassing routers, switches, firewalls, and VPNs (Virtual Private Networks). Your responsibilities include continuously monitoring network performance to identify bottlenecks, swiftly troubleshooting network connectivity issues to restore service, and implementing robust network security measures to protect against unauthorized access and cyber threats.
  • Storage Administration: You will diligently manage and maintain storage systems, including both SAN (Storage Area Network) and NAS (Network Attached Storage) devices. Your critical tasks involve ensuring data integrity through various validation methods, guaranteeing data availability through redundancy and replication, and ensuring security through robust backups, replication strategies, and disaster recovery planning to protect against data loss and ensure business continuity.
  • Cloud Infrastructure: You bring extensive experience with leading cloud platforms such as Google Cloud, Azure, and AWS (Amazon Web Services). This includes deep knowledge of cloud architecture, managing virtualization in cloud environments, implementing and maintaining hybrid environments (connecting on-premises to cloud), and ensuring comprehensive cloud security. You will manage and maintain various cloud resources, including virtual machines, storage accounts, and networking components within these cloud ecosystems.
  • Infrastructure Projects: You will take a leading role in leading and managing complex infrastructure projects. These projects include vital initiatives such as large-scale system migrations (e.g., to cloud, new hardware), significant upgrades (e.g., OS, hardware, software versions), and large-scale deployments of new systems or services. You will meticulously develop project plans, timelines, and budgets, ensuring all projects are completed on time and within financial parameters.
  • Automation and Scripting: You will actively develop and maintain scripts using languages such as PowerShell, Bash, or Python. These scripts are designed to automate administrative tasks, streamline the deployment of infrastructure components, and develop custom solutions that address specific operational needs. Your efforts in automation will significantly improve operational efficiency and reduce manual effort across the IT environment.
  • Mentorship: You will provide invaluable guidance and mentorship to junior infrastructure administrators, sharing your extensive knowledge and expertise. Your contributions to their professional development will strengthen the overall capabilities of the IT team, fostering a culture of continuous learning and growth.

Knowledge / Skills / Abilities: Your Core Competencies

  • Server Administration: You possess expert-level proficiency with Windows Server and/or Linux administration, including in-depth knowledge of configuration, security hardening, performance tuning, and advanced troubleshooting for enterprise environments. You have a proven track record of managing complex server ecosystems.
  • Network Management: You have a strong understanding of networking concepts (e.g., TCP/IP, VLANs, routing protocols, firewalls, VPNs) and extensive experience with managing network devices and infrastructure, ensuring robust and secure connectivity.
  • Storage Administration: You bring extensive experience with storage technologies (e.g., SAN, NAS, object storage) and advanced storage administration tasks, including data replication, backup/recovery, and disaster recovery planning.
  • Cloud Platforms: You possess a deep understanding of cloud platforms (e.g., Google Cloud, Azure, AWS), including cloud architecture, virtualization strategies for hybrid environments, and comprehensive cloud security best practices.
  • Scripting: You have strong scripting skills in PowerShell, Bash, or Python for automating administrative tasks and developing custom solutions, driving efficiency and consistency.
  • System Monitoring: You have hands-on experience with infrastructure monitoring tools (e.g., Nagios, Zabbix, SolarWinds, cloud-native monitoring) and the ability to interpret monitoring data to proactively identify and troubleshoot complex issues.
  • Troubleshooting: You possess expert analytical and problem-solving skills that enable you to quickly diagnose and resolve complex infrastructure issues, often under pressure, minimizing downtime and impact.
  • Security: You have a strong understanding of infrastructure security principles and best practices, including vulnerability management, access control, and threat mitigation strategies.
  • Communication: You demonstrate excellent communication skills, both written and verbal, allowing you to effectively interact with diverse technical teams, non-technical audiences, and leadership.
  • Leadership: You have a proven ability to lead and mentor junior staff, fostering their growth and contributing to a high-performing team.
  • Project Management Track Record: You have a proven track record of managing complex infrastructure projects from initiation to successful completion.
  • High-Availability and Disaster Recovery: You possess expertise in managing Windows Server and/or Linux environments, with extensive experience in high-availability solutions, meticulous disaster recovery planning, and advanced performance tuning techniques to ensure continuous operation and optimal system responsiveness.

Education, Competencies, Certifications/Licenses: Your Foundational Expertise

  • Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related field is required, coupled with 8 years of experience in IT infrastructure administration. This experience must encompass server and network management, storage solutions, system optimization, and infrastructure security. Alternatively, a High School Diploma and 12 years of equivalent experience in these domains will be considered.
  • Preferred Certifications: Industry certifications are highly preferred, validating your expertise. This includes credentials such as Microsoft MCSE (Microsoft Certified Solutions Expert), various Linux certifications (e.g., Red Hat Certified Engineer - RHCE), and AWS Certified Solutions Architect.

Work Environment:

This position operates in a professional office environment with standard office equipment, including computers, telephones, photocopiers, and filing cabinets.


Job Features

Job CategoryIT

Our client, a prominent organization in the Information Technology sector, is seeking a highly experienced and motivated Senior Infrastructure Administrator. This permanent position, based hybrid in P...View more

Hybrid, Permanent
La Mirada, CA
Posted 3 weeks ago

Join the team that connects California to the world! Our client is dedicated to advancing education and research statewide by providing a world-class computing network essential for innovation, collaboration, and economic growth. Their organization operates the California Research and Education Network (CalREN), a high-capacity computer network spanning over 8,000 miles of optical fiber. CalREN serves over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.

Our client is seeking a highly experienced and proactive Senior Cybersecurity Analyst. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $115.5K/yr - $144.3K/yr. Reporting to the Manager, Information Security Office, you'll actively serve as a crucial cybersecurity resource on multiple complex projects. You'll initiate and drive security activities to ensure our client's networks, systems, and data are protected and readily available to support the organization's mission to serve the California educational community. Working as part of the core security team, you'll collaborate with members of our client's Security Advisory Committee, peer staff throughout the organization, and external solution partners to establish and enhance security tools, resources, and processes. Your responsibilities will cover data protection, incident response, vulnerability management, email gateway security, identity and access management security architecture, network security monitoring, malware defense, and security awareness training. This position also functions as a vital point of cybersecurity expertise for internal staff and may involve representing our client in technical forums, panel discussions, and conference presentations.


What You Will Do: Driving Comprehensive Cybersecurity for a Critical Network

As a Senior Cybersecurity Analyst, you'll be at the forefront of protecting California's vital Research and Education Network. Your role demands broad cybersecurity expertise, from threat analysis and incident response to vulnerability management and strategic security enhancements.

  • Lead Security Activities and Solutions: You'll actively work under limited supervision with members of the Information Security Office (ISO) and extended teams on security solutions and implementations. This involves initiating and driving security activities to ensure our client's networks, systems, and data are robustly protected and continuously available to support the organization's mission to serve the California educational community.
  • Serve as a Core ISO Team Member: You'll function as a core member of our client's Information Security Office (ISO), performing diverse security duties. This includes maintaining threat awareness, conducting proactive network traffic analysis to detect anomalies, leading incident response efforts, performing detailed forensic analysis to understand security breaches, and driving the resolution of security incidents. Your vigilance ensures network integrity.
  • Collaborate on Security Operations Center (SOC) Development: You will collaborate extensively with our client's Security Advisory Committee, segment leaders, and other security experts around the state to develop strategic plans for establishing and enhancing a Security Operations Center (SOC), ensuring a centralized and proactive approach to network defense.
  • Integrate Security into Network Environment: You'll integrate deep knowledge of network protocols, services, threats, vulnerabilities, mitigation strategies, and hardware capabilities. This comprehensive understanding will allow you to build a security environment that effectively reduces and mitigates risk while simultaneously allowing our client’s open science mission to succeed without unnecessary hindrance.
  • Evaluate Data for Incident Detection: You'll meticulously evaluate a wide range of security data from various sources, including Zeek (Bro) logs, email security logs, netflow data, centralized syslog, authentication logs, and others, to effectively detect security incidents. Upon detection of suspicious activity, you'll take timely action, which may include blocking problem traffic, sending immediate alerts, and/or initiating in-depth investigations.
  • Maintain ISO Documentation and Lead New Projects: You will meticulously maintain ISO documentation and perform updates as needed, ensuring all security processes, configurations, and incident responses are accurately recorded. You'll also work with internal and external stakeholders to lead and complete new ISO projects and initiatives, driving continuous improvement in our client's security posture.
  • Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with our client's network security monitoring and SIEM services. This proactive measure ensures that our client's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
  • Design and Implement Secure Email Gateway Services: You'll work closely with ISO staff and peer teams to design and implement secure email gateway services. This involves configuring email security solutions to filter malware, phishing attempts, spam, and other email-borne threats, protecting users and systems from a primary attack vector.
  • Design and Implement Secure Identity and Access Management Services: You'll collaborate with ISO staff and peer teams to design and implement secure identity and access management (IAM) services. This ensures robust user authentication, authorization, and privileged access management, controlling who can access what resources and safeguarding sensitive data.
  • Perform Threat Hunting for Anomalous Activity: You will regularly perform threat hunting to proactively search for anomalous activity within our client's network and systems. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
  • Monitor and Respond to Security Alerts: You'll be responsible for monitoring and responding to security alerts generated by various tools. This involves triaging alerts, assessing their severity, and initiating appropriate response actions to mitigate potential threats quickly.
  • Maintain Vulnerability Management Asset Inventory: You'll meticulously maintain the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
  • Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report, summarizing key findings from regular vulnerability scans for internal and external stakeholders.
  • Create Monthly Enterprise Vulnerability Risk Status Report: You'll prepare a comprehensive monthly enterprise vulnerability risk status report, providing a broader overview of the organization's vulnerability posture, trends, and mitigation efforts to executive leadership.
  • Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis, ensuring your cybersecurity skills remain current with the latest industry trends and threat landscapes.
  • Lead Incident Response Efforts: You'll take a leading role in incident response efforts, coordinating with internal and external security personnel and system administrators to contain, eradicate, and recover from security incidents.
  • Respond to Complaints and Notifications: You'll respond appropriately to internal and/or external complaints and notifications related to security issues (e.g., scanning, hacking, spamming), ensuring proper investigation and resolution.
  • Promote a Strong Security Culture: You will actively promote a strong security culture throughout our client’s internal network, consulting with our client's management and staff to foster security awareness and best practices.
  • On-Call Availability: You must have the ability to be ‘on call’ outside of regular business hours on a regular and recurring basis, ensuring 24/7/365 readiness for critical incident response.

Key Success Factors: Cultivating Operational Excellence and Innovation

Your success in this role will be defined by a powerful combination of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for our client and its mission.

  • Prioritization and Timely Completion: You possess the ability to prioritize and complete tasks assigned in a timely manner, even in a fast-paced environment with rapidly changing priorities.
  • Strong Interpersonal and Teamwork Skills: You bring strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships. You are also capable of leading teams to reach consensus on complex security issues.
  • Working Knowledge of IP-Based Networking: You have a working knowledge of IP-based networking, understanding fundamental concepts, protocols, and architectures essential for network security.
  • Scripting and Data Manipulation Proficiency: You have a working knowledge of scripting using regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
  • Background in Statistics and Analytics: You have a background in basic statistics and analytics, and experience with modern analytic and visualization packages (e.g., Tableau, Power BI), enabling data-driven security insights and reporting.
  • Adept at Understanding and Learning Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
  • Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
  • Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of work, ensuring precision in security implementations and analyses.
  • Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
  • Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with our client.
  • Experience Streamlining Operations: You have experience streamlining operational capabilities through standardization and automation, enhancing security operations and reducing manual effort.
  • Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for our client's security services, influencing future architectural decisions and technology roadmaps.
  • Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize our client's security profile while remaining sensitive to its mission.
  • Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
  • Knowledge of Encryption Techniques: You have knowledge of public-key and private-key encryption techniques, including DES, RSA, and PGP/GPG.
  • Strong Understanding of Complex TCP/IP Networks: You possess a strong understanding of complex TCP/IP networks.
  • Knowledge of Layer 2, Wireless, Switching, and Routing Protocols: You have knowledge of Layer 2 protocols, Wireless networking, Switching, and Routing Protocols.
  • Familiarity with Virtualized Environments: You have familiarity with securing virtualized environments.
  • Familiarity with Research and Education Networks: You have familiarity and experience working on research and education networks, and within Research and Education networking communities in the US or abroad.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
  • Information Security Experience (7+ years): You must have a minimum of 7 years of experience in information security, cybersecurity, or network security engineering design, deployment, and implementation of security solutions. This includes continuous monitoring and making improvements to those solutions, working with the information security and security operations teams.
  • Mid-Level Cybersecurity Certification: Certifications and/or equivalent training in a technical security specialty (e.g., GIAC, CISSP) are required, validating your expertise.
  • SIEM Experience (4+ years): A minimum of 4 years of experience running and supporting Security Information and Event Management (SIEM) services is required.
  • Vulnerability Management Experience (4+ years): A minimum of 4 years of experience running and supporting vulnerability management services is required.

Preferred Education And/Or Experience: Enhancing Your Profile

  • Advanced Security Education: A Bachelor's degree in cybersecurity, information assurance, or a related field is preferred.
  • SOAR Experience: Experience configuring and supporting security orchestration and automated response (SOAR) services is a plus.
  • Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred.
  • Unix/Linux Administration: A minimum of 4 years of experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.

Why Work at Our Client? Making a Meaningful Impact

Working at our client offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: Our client provides generous medical, dental, vision, and life insurance benefits, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: Our client demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours a day, 7 days a week, 365 days a year availability for incident response needs. An employee’s work shift is based on our client’s business needs.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. Our client is unable to sponsor or take over sponsorship of an employment Visa at this time.

Job Features

Job CategoryIT, Security

Join the team that connects California to the world! Our client is dedicated to advancing education and research statewide by providing a world-class computing network essential for innovation, collab...View more


Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving more than 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.

CENIC is seeking an Associate Director of Network Operations to oversee the strategic direction, performance, and modernization of its vital Network Operations function. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $170K/yr - $200K/yr. While the shift leads manage the day-to-day operations on their respective shifts, the Associate Director provides the strategic leadership, structure, and oversight necessary to enhance service reliability, performance, and accountability across CENIC's network operations. This role is ideal for a seasoned leader with a track record of transforming teams, combining technical fluency, operational discipline, and people-first leadership to build high-performing, responsive, and metrics-driven teams within a culture of continuous improvement.


What You'll Be Doing: Leading Network Operations and Driving Modernization

As the Associate Director of Network Operations, you'll be instrumental in shaping the future of CENIC's world-class network. Your role is a blend of strategic leadership, operational oversight, and continuous improvement, all focused on enhancing service reliability and performance for millions of users.

  • Leadership & Organizational Development: You will lead OKR (Objectives and Key Results) activities, offering strategic guidance and enforcing rigor in their implementation across the Network Operations team. You'll actively promote a culture of professionalism, accountability, and collaboration, fostering an environment where team members thrive. Furthermore, you'll provide robust support for staff development through personalized coaching, targeted training initiatives, and effective performance management practices, all designed to foster continuous learning, skill development, and career growth within the team. You'll also engage directly with the HR team and senior leadership to address legacy challenges and strengthen overall team dynamics, ensuring a cohesive and high-performing unit.
  • Operational Oversight & Strategy: You will oversee all aspects of network operations, including the 24/7/365 Network Operations Center (NOC). Your leadership will ensure strict alignment with organizational goals and service expectations, guaranteeing that the network delivers on its mission-critical role. You'll meticulously define, implement, and monitor key performance indicators (KPIs), establish robust service level agreements (SLAs), and conduct thorough post-incident reviews (PIRs) to drive accountability and continuous improvement. You'll also spearhead initiatives to improve incident response, problem management, and root cause analysis, identifying areas for greater operational alignment with best practices, such as ITIL and ITSM (IT Service Management) frameworks, and implementing processes to enhance this alignment.
  • Tools & Automation: You'll develop a working familiarity with the current toolset used in network operations. Your strategic insight will then guide efforts to assess requirements for enhancing, supplementing, and/or replacing tools in support of more effective monitoring, alerting, and escalation processes. You'll collaborate closely with the engineering team to enhance observability and telemetry across the entire network infrastructure, ensuring comprehensive data collection for proactive management. Furthermore, you'll champion process efficiency, including advocating for and implementing appropriate automation solutions to improve operational outcomes, reduce manual effort, and increase system reliability.
  • Cross-Functional Engagement: You will actively review and refine processes to ensure close coordination with other internal functional groups. This includes collaborating seamlessly with teams responsible for network design, cybersecurity, project management, asset management, finance, and member relations, ensuring integrated workflows and shared objectives. You will serve as the primary escalation point of contact and leadership liaison during a major network incident, providing critical guidance and communication during high-impact events. You'll also collaborate with the rest of the management team on broader process improvements to ensure timely communication and strong accountability both within and across various teams.

Key Success Factors: Cultivating Operational Excellence and Innovation

Your success in this role will hinge on a powerful combination of leadership, technical depth, and a commitment to continuous improvement, all within the context of a vital educational and research network.

  • Strong Organizational and Leadership Skills: You possess strong organizational and leadership skills, with a proven ability to effectively manage multiple competing priorities in a fast-paced, dynamic environment. Your leadership will inspire confidence and drive results.
  • Deep Technical Expertise in Network Operations: You bring deep technical expertise in network operations, encompassing WAN (Wide Area Network), MAN (Metropolitan Area Network), and optical transport environments. This includes a comprehensive understanding of their design, implementation, and troubleshooting.
  • Proven Track Record in Managing Operational Teams: You have a proven track record of effectively managing operational teams and fostering a collaborative culture. Your experience demonstrates your ability to build, motivate, and guide high-performing teams to achieve ambitious goals.
  • Exceptional Problem-Solving Skills: You possess exceptional problem-solving skills, with a distinct focus on proactive issue resolution. You're adept at diagnosing complex network problems, identifying root causes, and implementing effective, long-term solutions.
  • Excellent Communication Skills: You have excellent communication skills, enabling you to articulate complex technical concepts clearly to diverse stakeholders at all levels, from engineers to executive leadership and external partners.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related technical field (or equivalent experience) is required. This academic foundation provides the essential theoretical knowledge for advanced network operations and management.
  • Extensive Network Experience with Management Focus: You must possess a minimum of 10 years of experience in network engineering or operations, with at least 5 years in a management role. This extensive background demonstrates a seasoned professional capable of both deep technical understanding and effective team leadership within complex network environments.
  • Expertise in Managing Live Production Networks: You have expertise in managing live production networks in dynamic environments, including advanced troubleshooting skills. This highlights your ability to ensure continuous availability and performance of critical network infrastructure under real-world operating conditions.
  • Experience with Key Tools and Methodologies: You bring practical experience with monitoring tools (for network health and performance), automation frameworks (for streamlining operations), and change management processes (for controlled deployments and updates).
  • Network Security Principles: You have proven experience in applying network security principles and practices, ensuring that network operations are conducted with a strong focus on data protection and threat mitigation.
  • Standards-Based Frameworks: You have experience implementing a standards-based framework, such as ITIL (Information Technology Infrastructure Library), to promote best practices in IT service management and operational efficiency.

Preferred Education And/Or Experience: Enhancing Your Leadership Profile

  • Large Commercial Service Provider Networks: Experience working with large commercial service provider networks is a plus, providing valuable context on high-scale, carrier-grade operations.
  • High-Performance Research Networks: Experience working with high-performance research networks is desirable, indicating familiarity with cutting-edge networking demands and innovative applications.
  • Deep Networking Protocol Knowledge: Familiarity with operating and troubleshooting networks at Layers 1-3 (Physical, Data Link, Network layers), as well as with advanced networking protocols, is preferred, demonstrating a comprehensive understanding of network fundamentals.
  • Master's Degree: A Master's degree in a related technical or management field is a plus, indicating advanced academic specialization and leadership potential.

Why Work at CENIC? Making a Meaningful Impact

Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The regular workweek is Monday through Friday, 8:00 a.m. to 5:00 p.m. The Network Operations Center is a 24-hour per day/7 days per week/365 days per year operation, meaning evening and weekend work may be required based on CENIC’s business demands.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.

Job Features

Job CategoryIT, Security

Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). ...View more


Our client, a prominent organization in the Information Technology sector, is looking for a skilled IAM Cybersecurity Engineer. This permanent position is based hybrid in Walnut Creek, California, requiring 3 days in the office per week. This role is crucial for leading projects to design, implement, and enhance cybersecurity controls, thereby protecting a large and complex IT environment. You'll be a key player in ensuring ongoing support, mentoring junior team members, and fulfilling routine cybersecurity tasks.

At AAA, their team members strive to deliver exceptional service, helping their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work, fostering a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.


Why Work For This Organization?

  • Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
  • 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
  • Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and other comprehensive benefits.
  • Paid Holidays: Enjoy paid holidays, promoting work-life balance.
  • Paid Time Off: Team Members accrue paid time off monthly, and depending on your position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
  • Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
  • AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
  • Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Summary: Leading Cybersecurity Controls and Mentoring Talent

The IAM Cybersecurity Engineer plays a pivotal role in strengthening the overall cybersecurity posture of Mountain West Group. Reporting to the Director, Cyber Security and Network Engineering, this position demands proficiency across all aspects of information security. You will provide ongoing support and mentorship to more junior team members, ensuring their growth and development, while also expertly fulfilling routine cybersecurity tasks. A core responsibility includes rigorously testing the effectiveness of security controls and providing strategic advice to business partners on a wide range of cybersecurity topics.

Responsibilities / Job Duties: Driving Security Enhancements and Compliance

As an IAM Cybersecurity Engineer, your responsibilities will blend hands-on technical execution with strategic oversight and cross-functional collaboration, ensuring the robust protection of a complex IT environment.

  • Respond to Cybersecurity-Related Requests: You will be the primary point of contact for responding to cybersecurity-related requests, taking appropriate action, which includes meticulously approving, fulfilling, or rejecting requests. This requires careful assessment of security implications and working closely with business partners to meet their legitimate needs while maintaining security standards. Your judgment ensures that all access and changes adhere to strict security protocols.
  • Manage and Maintain Cybersecurity Tools: You will be responsible for the full lifecycle of managing and maintaining cybersecurity tools. This encompasses applying necessary patches to keep tools updated and secure, as well as overseeing the onboarding and offboarding of these tools within the security ecosystem. Your diligence ensures that security tools are always operational, effective, and fully integrated into the security infrastructure.
  • Manage Projects, Initiatives, and Changes: You will take a leading role in managing cybersecurity projects, initiatives, and changes. This involves comprehensive planning to define scope and objectives, meticulous scheduling to ensure timely delivery, seamless implementation of new security controls or systems, and rigorous reporting of status to all relevant stakeholders. Your project management skills will be crucial for successful security enhancements.
  • Audit and Improve Security Controls: You will actively audit various security controls, including firewall rules, cloud and SaaS security configurations, and API controls. Through these audits, you will meticulously recommend improvements to enhance their effectiveness, mitigate risks, and ensure compliance with internal policies and industry best practices. Your proactive approach strengthens the organization's defense mechanisms.
  • Detect and Remediate Vulnerabilities: You will work in close collaboration with application, cloud, and infrastructure teams to effectively detect and remediate vulnerabilities. This includes identifying weaknesses in system configurations and in-house developed software. Your efforts will minimize the attack surface and strengthen the overall security posture by ensuring that known flaws are addressed promptly and effectively.
  • Conduct Periodic Testing of Security Controls and Establish Metrics: You will regularly conduct periodic testing of security controls to evaluate their effectiveness. This involves performing various assessments to ensure controls are functioning as intended and providing the expected level of protection. Based on these evaluations, you will recommend improvements and establish and collect risk-based metrics to measure control effectiveness and overall security posture, informing data-driven security decisions.
  • Assist with Development of Security Requirements: You will provide crucial assistance in the development of security requirements and assessment procedures for business use of technologies. This involves translating business needs into actionable security mandates, ensuring that new technologies and applications are securely designed and implemented from the outset.
  • Other Duties as Assigned: You will be flexible and willing to perform other duties as assigned by the Director, Cyber Security and Network Engineering, contributing to the overall success and adaptability of the cybersecurity department.

Knowledge, Skills, and Abilities: Your Core Competencies

  • Ability to Lead Individual Projects: You possess the proven ability to lead individual projects from conception to completion, demonstrating strong project management and ownership skills.
  • Strong Oral and Written Communication Skills: You have strong oral and written communication skills, essential for articulating complex cybersecurity concepts clearly to technical teams, business partners, and leadership.
  • Act as a Team Player: You are a natural team player, demonstrating a collaborative spirit and contributing positively to group efforts and shared security goals.
  • Act with a Sense of Urgency: You act with a sense of urgency to effectively resolve requests and respond to incidents, recognizing the critical nature of cybersecurity operations.
  • Ability to Weigh Request Reasonableness: You have the discerning ability to weigh whether a request is reasonable before fulfilling it, ensuring that security is balanced with operational needs and that exceptions are justified.

Education, Competencies, Certifications/Licenses: Your Foundational Expertise

  • Educational Background: A Bachelor’s Degree in Information Technology or a related field, or equivalent work experience and education, is required.
  • Information Technology Field Experience (5+ years): You must have 5+ years of experience in the information technology field, demonstrating a broad understanding of IT systems and operations.
  • Cybersecurity Experience (4-7 years): You possess 4-7 years of dedicated cybersecurity experience, indicating significant practical knowledge of security principles and practices.
  • Core Security Concepts Application (1+ year): You have at least one year of experience in one or two applications of core security concepts, including:
    • Security Operations and Administrations: Daily management and oversight of security tools and processes.
    • Access Controls: Managing and enforcing user permissions and system access.
    • Risk Identification, Monitoring, and Analysis: Proactively identifying, tracking, and assessing security risks.
    • Incident Response and Recovery: Handling security breaches and restoring systems.
    • Cryptography: Understanding encryption and secure communication.
    • Network and Communications Security: Securing network infrastructure and data in transit.
    • Systems and Application Security: Protecting operating systems and software applications from vulnerabilities.
  • Information or Cyber Security Certification: You hold a valid Information or Cyber Security Certification (e.g., CompTIA Security+, CySA+, CEH).

Preferred Qualifications: Enhancing Your Profile

  • Project Management Experience: 2 years of project management experience is preferred, further strengthening your ability to lead initiatives.
  • Advanced Certifications: Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) certifications are highly preferred, validating expert-level knowledge in information security and cloud security respectively.

What We Offer: Rewarding Your Contributions

  • Competitive Salary and Incentives: Enjoy competitive pay with the opportunity to participate in a discretionary annual incentive plan or other incentive plans, reflecting the value of your contributions. The compensation range is targeted between Min: $129,223.00 - Mid: $161,528.00 - Max: $193,834.00, with all offers subject to a fair pay analysis.
  • Robust 401k Matching: Benefit from a strong 401k matching program, with $1 for $1 company match up to 6% of eligible earnings per pay period, significantly boosting your retirement savings.
  • Comprehensive Benefits Package: Access robust medical, dental, and vision coverage, along with a wellness program and more, ensuring your health and well-being are prioritized.
  • Paid Time Off and Holidays: Enjoy generous paid holidays and monthly accrual of paid time off. Additionally, 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
  • Collaborative Environment: Work in a highly collaborative environment where your contributions to providing exceptional service to members are genuinely valued.
  • Free AAA Classic Membership and Product Discounts: Receive a complimentary AAA Classic Membership and enjoy discounts on various AAA products, providing extra perks.
  • Tuition Reimbursement Program: Take advantage of a Tuition Reimbursement Program, supporting your continuous learning and professional development.

Job Features

Job CategoryIT, Security

Our client, a prominent organization in the Information Technology sector, is looking for a skilled IAM Cybersecurity Engineer. This permanent position is based hybrid in Walnut Creek, California, req...View more


Cybersecurity Engineer (Permanent - Hybrid - La Mirada, CA)

Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.


Position Summary: Advancing Cybersecurity for California's Research & Education Network

This is a full-time, permanent position within the CENIC Information Security Office (ISO), offering a hybrid work model based out of La Mirada, California. The Cybersecurity Engineer reports directly to the Manager of the Information Security Office, undertaking a broad and critical range of technical cybersecurity, operational cybersecurity, and general administrative support duties. You'll be instrumental in diverse areas, including vulnerability management, ticket handling, security documentation, email gateway security, identity and access management security, network security monitoring, and various security audit and administrative tasks. The successful Cybersecurity Engineer will play a pivotal role in advancing CENIC's ISO team efforts, providing essential information security services and support to CENIC and its Charter Associate members, thereby safeguarding a network vital to millions.

Supervisory Responsibility: None.


What You Will Do: Core Functions in Network Security & Operations

As a Cybersecurity Engineer, you'll be on the front lines of protecting a critical research and education network. Your responsibilities will span system implementation, threat mitigation, incident response, and continuous improvement in security practices.

  • Build and Implement Enterprise-Class Security Systems: You'll be responsible for meticulously building and implementing enterprise-class security systems within a live production environment. This involves deploying robust security controls, tools, and platforms designed to protect a high-capacity, high-traffic network serving millions of users. Your work ensures that the network's defenses are continuously strengthened against evolving threats.
  • Align Security with Business and Technology Strategy: You'll actively align security standards, frameworks, and practices with the overall business and technology strategy of CENIC. This involves understanding organizational goals, technical roadmaps, and ensuring that security initiatives are integrated seamlessly, contributing to strategic objectives while meeting critical customer and regulatory requirements.
  • Implement Security Processes to Mitigate Emerging Threats: You'll design and implement proactive security processes specifically aimed at identifying and mitigating emerging threats. This includes developing procedures for threat intelligence integration, vulnerability assessment, incident response, and continuous monitoring to ensure that CENIC's defenses can adapt rapidly to new attack vectors and evolving cyber risks.
  • Code, Test, and Debug Applications for Security Solutions: You'll leverage current programming languages and technologies to write code, complete programming tasks, and perform rigorous testing and debugging of applications. This coding capability will be applied directly to developing and enhancing security solutions, automating security processes, and ensuring the reliability and performance of tools used in cybersecurity operations.
  • Support Security Implementations Under Senior Guidance: You'll work under the limited direction and supervision of senior members of the ISO team on complex security solutions and implementations. This collaborative approach allows you to contribute to high-impact projects while gaining valuable mentorship and technical guidance from experienced cybersecurity professionals, ensuring successful project outcomes.
  • Process and Update Service Desk Tickets: You'll be responsible for efficient service desk ticket processing and updates related to information security. This involves receiving, categorizing, prioritizing, and diligently resolving security-related incidents and service requests, ensuring timely resolution and clear communication with affected users and teams.
  • Administer and Utilize Information Security Tools: You'll actively use and administer a wide range of information security tools and services. This includes platforms for vulnerability management, network security monitoring (NSM), Endpoint Detection and Response (EDR), email security gateways, Security Information and Event Management (SIEM) systems, alert management platforms, and Identity Management (IdM) security tools. You'll also utilize network analysis tools like nmap, tcpdump, and Wireshark for deep packet inspection and network forensics.
  • Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with CENIC's network security monitoring and SIEM services. This proactive measure ensures that the organization's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
  • Perform Threat Hunting for Anomalous Activity: You'll regularly perform threat hunting to proactively search for anomalous activity within CENIC's network and systems during standard ISO business hours. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
  • 24/7 Monitoring and Incident Response (On-Call Rotation): You'll be responsible for 24/7 monitoring and responding to security alerts as a rotating member of the ISO escalations team. This critical on-call duty ensures that security incidents are addressed promptly around the clock, minimizing potential impact on CENIC's network and services, and maintaining continuous security vigilance.
  • Maintain Vulnerability Management Asset Inventory: You'll be responsible for meticulously maintaining the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
  • Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report. This involves generating and analyzing reports from regular vulnerability scans, summarizing key findings, and presenting them in a clear and actionable format for relevant stakeholders.
  • Create Monthly Enterprise Vulnerability Risk Status Report: You'll meticulously create the monthly enterprise vulnerability risk status report. This comprehensive report provides a broader overview of the organization's overall vulnerability posture, trends, identified risks, and the effectiveness of mitigation efforts to executive leadership and other key stakeholders.
  • Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis. This commitment to continuous learning ensures that your cybersecurity skills remain current with the latest industry trends, technologies, and threat landscapes, supporting your professional development.
  • Provide Other CENIC Business User Security Assistance: You'll provide other CENIC business user security assistance as needs dictate. This involves offering guidance on secure practices, addressing user-specific security concerns, and supporting the broader user community in maintaining a secure digital environment.
  • Improve CENIC's Privacy and Security Practices: You'll continuously look for opportunities, procedures, and tools to improve CENIC's privacy and security practices. This proactive mindset drives innovation, streamlines processes, and enhances the overall security and privacy profile of the organization, aligning with best practices.
  • Collaborate on Software Tools and Solutions: You'll work closely with the CENIC Security Team to identify, discuss, and implement software tools and solutions in support of CENIC’s networks, network security designs, and the effective implementation of network security policies, procedures, and technologies. This ensures a collaborative and integrated approach to security enhancement.

Key Success Factors: Driving Security Excellence

Success in this role will be defined by a blend of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for CENIC.

  • Consulting and Engineering Security Best Practices: You'll excel at consulting and engineering in the development and design of security best practices and the implementation of solid security principles across the organization. Your contributions will help meet business goals, stringent customer demands, and evolving regulatory requirements.
  • Understanding Cloud Computing Security Considerations: You possess a deep understanding of security considerations related to cloud computing. This includes knowledge of risks such as data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, Advanced Persistent Threats (APTs), data loss, and Denial of Service (DoS) attacks, enabling you to design secure cloud solutions.
  • Expertise in Identity and Access Management (IAM): You have expert knowledge of Identity and Access Management (IAM)—the comprehensive framework of security policies and technologies that limit and meticulously track the access of individuals and entities within an organization to sensitive technology resources.
  • Security-Centric Software Development: You have proven experience developing software and proficiency in coding, using a security-centric approach. This means integrating security considerations throughout the software development lifecycle, building secure applications, and conducting security testing.
  • Experience using Zeek network security monitoring (NSM) and host intrusion detection systems (HIDS) is crucial.
  • IDS Script and Signature Development: You possess skills in IDS (Intrusion Detection System) script and signature development, enabling you to create custom rules for detecting specific threats or anomalous behaviors.
  • Hands-on Network/Packet Level Examination: You are adept at hands-on network/packet level examination using tools such as tcpdump or Wireshark. This allows for deep forensic analysis of network traffic to diagnose security incidents and understand attack methodologies.
  • Data and Text Manipulation Proficiency: You have a working knowledge of regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
  • Operational Streamlining through Standardization and Automation: You have proven experience streamlining operational capabilities through standardization and automation. This demonstrates your ability to identify inefficiencies and implement automated solutions that enhance security operations and reduce manual effort.
  • Multi-Tasking and Adaptability: You are highly adept at working on multiple tasks concurrently and can respond effectively to rapidly changing priorities in a fast-paced security environment.
  • Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for CENIC's security services, influencing future architectural decisions and technology roadmaps.
  • Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize CENIC's security profile while remaining sensitive to its mission.
  • Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
  • Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
  • Strong Interpersonal and Teamwork Skills: You possess strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships.
  • Working Knowledge of IP-Based Networking: You have a solid working knowledge of IP-based networking, including fundamental concepts, protocols, and architectures, crucial for network security.
  • Background in Basic Statistics and Analytics: You have a background in basic statistics and analytics and experience with modern analytics and visualization packages (e.g., Tableau, Power BI). This enables data-driven security insights and reporting.
  • Adept at Understanding Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
  • Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of your work, ensuring precision in security implementations and analyses.
  • Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
  • Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with CENIC.

Required Education And/Or Experience: Your Foundation

  • Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
  • Information Security Experience (2-4 years): You must have 2-4 years of experience in information security, cybersecurity, or network security engineering, specifically focusing on the design, deployment, and implementation of security solutions. Alternatively, an equivalent combination of education, certifications, and experience will be considered.
  • Mid-Level Cybersecurity Certification: A mid-level cybersecurity certification like CompTIA CySA+, SANS GSEC, or an equivalent credential, is required, validating your foundational and practical cybersecurity knowledge.

Preferred Education And/Or Experience: Enhancing Your Profile

  • Advanced Security Education: A BA/BS in information security, information assurance, cybersecurity, or equivalent experience is preferred, indicating a specialized academic focus.
  • Working Knowledge of Computer and Network Security: A strong working knowledge of computer and network security principles is desirable.
  • Advanced-Level Cybersecurity Certification: An advanced-level cybersecurity certification like (ISC)2 CISSP (Certified Information Systems Security Professional), SANS GCIA (GIAC Certified Intrusion Analyst), or an equivalent is highly preferred, demonstrating expert-level security knowledge.
  • Logging Environment Experience: Experience with logging environments such as Elastic (ELK Stack) or Splunk for security information and event management is a plus.
  • Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred, enhancing automation and tool development capabilities.
  • Unix/Linux Administration: A minimum of 2 years experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.
  • Distributed Team Interpersonal Skills: Strong interpersonal skills and the ability to work effectively in a distributed team environment are desirable for this position.

Why Work at CENIC? Making a Meaningful Impact

Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.

  • Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
  • Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
  • Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
  • Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
  • Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.

Work Environment & Hours:

This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours per day/7 days per week/365 days per year availability for incident response needs. An employee’s work shift is based on CENIC’s business needs.

Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.

Cybersecurity Engineer (Permanent – Hybrid – La Mirada, CA) Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewi...View more

We're partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They're looking for a highly skilled Software Systems Developer to join their team. This permanent position, based fully onsite in Gray, Tennessee, is critical for optimizing internal systems and enhancing performance through custom software development and robust IT infrastructure.

As a Software Systems Developer, you'll be responsible for designing, planning, and implementing technical solutions based on cross-functional requirements. You'll work closely with various teams to understand operational needs and translate them into scalable, maintainable software systems.


What You'll Be Doing: Building Integrated Technology Solutions

As a Software Systems Developer, you'll be at the heart of developing and enhancing the custom software that drives the client's business operations. Your role will blend technical design, hands-on development, and deep collaboration to create scalable, maintainable, and efficient systems.

  • Gather Requirements and Implement Tailored Software Solutions: You'll start by meticulously gathering requirements from various business stakeholders, thoroughly understanding their operational needs and challenges. You'll then translate these requirements into detailed technical specifications and proceed to implement tailored software solutions that precisely address those needs, ensuring the delivered software directly optimizes business processes.
  • Collaborate with the IT Team on Infrastructure: You'll work in close collaboration with the IT team to ensure that the underlying infrastructure effectively supports the software solutions you develop. This involves ensuring that network, server, and other IT components are configured for optimal performance, security, and scalability, guaranteeing that applications run efficiently and reliably.
  • Maintain, Extend, and Integrate Internal Software Systems: You'll be responsible for the ongoing maintenance, extension, and integration of various internal software systems. This includes debugging existing code, adding new features to enhance functionality, and ensuring seamless communication and data exchange between different applications across the organization's technology landscape.
  • Design, Administer, and Optimize MS SQL Server Databases: A core responsibility will involve deep engagement with data. You'll design, administer, and optimize MS SQL Server databases, ensuring they are structured for efficiency, scalability, and data integrity. This includes schema design, writing complex queries, optimizing stored procedures, managing user access, and performing routine maintenance to ensure peak database performance.
  • Develop and Maintain Custom Reports: You'll be instrumental in enabling data-driven decision-making by developing and maintaining custom reports. This involves extracting data using various methods, creating insightful dashboards, and building reports using specialized tools like SSRS (SQL Server Reporting Services) and Crystal Reports. Your work will provide critical business intelligence, transforming raw data into actionable insights.
  • Automate Business Processes: You'll drive operational efficiency by automating business processes. This involves leveraging your technical skills in SQL for data-driven automation, integrating solutions via APIs, and building custom applications that streamline workflows, reduce manual effort, and enhance productivity across various departments.
  • Manage Source Control and Maintain Codebase: You'll meticulously manage source control for software projects, ensuring proper versioning, branching, and merging of code. Your commitment to maintaining a clean, extensible codebase will promote long-term maintainability, facilitate team collaboration, and support future enhancements.
  • Document System Modifications and Customizations: You'll thoroughly document all system modifications and customizations for future reference. This includes creating technical specifications, architectural diagrams, user guides, and troubleshooting procedures. High-quality documentation is vital for knowledge transfer, onboarding new team members, and ensuring the long-term supportability of the developed systems.

What's Needed: Your Technical Qualifications

To excel as a Software Systems Developer, you'll need strong expertise in SQL Server, object-oriented programming, full-stack development, and a solid understanding of IT infrastructure.

  • Strong Expertise in SQL Server Development and Architecture: You must possess strong expertise in SQL Server development and architecture. This includes advanced proficiency in writing T-SQL, designing database schemas, optimizing queries and stored procedures, and understanding SQL Server's architectural components for high performance and scalability.
  • Proficiency in Object-Oriented Programming and Software Design: You're required to have proficiency in object-oriented programming (OOP) principles and strong knowledge of software design principles. This ensures you can build modular, maintainable, and scalable software solutions.
  • Full-Stack Development Experience: You have proven experience with full-stack development, demonstrating your ability to contribute across all layers of a software application. This includes expertise in database technologies (SQL Server), server-side logic (C#, VB.Net, MVC/Web API), and client-side technologies (JavaScript, HTML5).
  • Ability to Debug and Test Applications: You possess the ability to debug and test applications effectively within various integrated development environments (IDEs) and web browsers. This includes utilizing debugging tools, writing unit tests, and performing integration testing to ensure software quality and functionality.
  • Solid Understanding of IT Infrastructure: You have a solid understanding of core IT infrastructure, including networking fundamentals (TCP/IP, LAN/WAN), operating systems (Windows, Linux), databases (SQL Server), and Active Directory (identity and access management). This holistic view enables you to design and troubleshoot integrated solutions.
  • Excellent Communication and Interpersonal Skills: You bring excellent communication and interpersonal skills. This is crucial for effectively gathering requirements from diverse teams, collaborating with technical and non-technical stakeholders, and presenting solutions clearly.
  • Self-Motivated with Strong Time Management: You are self-motivated with strong time management and task prioritization abilities. This indicates your capacity to manage your workload effectively, meet deadlines, and drive projects to completion independently.
  • Capable of Providing Project Updates: You are capable of providing clear and concise project updates and timelines to leadership, ensuring proper visibility and alignment on project status and progress.

Education & Technical Skills:

  • Bachelor's Degree: A Bachelor's degree in Information Technology or a related field, or equivalent experience, is required.
  • MS SQL Development, Management, and Administration: Proficiency in MS SQL development, management, and administration.
  • Programming Languages: Experience with C#, VB.Net, JavaScript, and HTML5.
  • Web Development: Familiarity with MVC/Web API development.
  • Source Control: Experience with source control systems and version management.

Job Features

Job CategoryEngineering

We’re partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They’re looking for a highly skilled Softwar...View more

A leading financial firm is looking for a highly skilled and strategic Senior Infrastructure Security Engineer to join their vital Information Security team. This permanent position, based onsite in New York, NY, is crucial for strengthening and continuously evolving the company's robust infrastructure security within a complex, high-stakes, and fast-paced IT environment.


What You'll Do: Driving Advanced Infrastructure Security

As a Senior Infrastructure Security Engineer, you'll be on the front lines, designing, implementing, and enhancing the security posture of critical systems. Your role blends deep technical expertise with strategic leadership and cross-functional collaboration, ensuring top-tier security within a demanding financial landscape.

  • Collaborate Across Teams to Enhance Security: You'll be instrumental in collaborating across various teams to proactively support and continuously enhance the company's overall security posture. This involves engaging with development, operations, cloud engineering, and other IT departments to embed security throughout the entire system lifecycle, ensuring a cohesive and strong defense strategy.
  • Conduct Thorough Security Assessments: You'll regularly conduct comprehensive security assessments for both new and existing systems. This includes meticulously evaluating infrastructure components, applications, and configurations for vulnerabilities, misconfigurations, and adherence to security best practices. Your assessments will identify potential risks and inform remediation efforts, hardening the firm's digital defenses.
  • Design, Develop, and Maintain Security Tools: You'll take a hands-on approach to security by actively designing, developing, and maintaining custom tools that improve internal security operations. This involves automating security tasks, building dashboards for monitoring security metrics, and creating utilities that enhance vulnerability management, threat detection, or incident response capabilities, thereby increasing the efficiency and effectiveness of the security team.
  • Lead Strategic Security Initiatives: You'll spearhead critical and strategic security initiatives that directly shape the firm's defense capabilities. This includes:
    • Implementing Zero Trust architecture in Linux environments: Leading the design and deployment of Zero Trust principles within the Linux ecosystem, ensuring no user or device is trusted by default, regardless of whether they are inside or outside the network.
    • Shaping security frameworks for AI infrastructure: Developing and defining robust security frameworks specifically tailored for the unique challenges and risks associated with Artificial Intelligence (AI) infrastructure, ensuring the integrity, confidentiality, and availability of AI models and data.
    • Integrating TLS client authentication into existing systems: Leading efforts to integrate TLS (Transport Layer Security) client authentication into existing systems, enhancing cryptographic security and ensuring mutual authentication between clients and servers.

What You'll Bring: Essential Expertise for Security Leadership

To excel as a Senior Infrastructure Security Engineer, you'll need extensive experience in infrastructure or site reliability engineering, a strong grasp of security fundamentals, and proficiency in programming.

  • Extensive Infrastructure or Site Reliability Engineering Experience: You must possess 10+ years of verifiable experience in infrastructure or Site Reliability Engineering (SRE), coupled with a strong track record of hands-on security implementation. This extensive background demonstrates your ability to build, maintain, and secure complex, highly available systems at scale.
  • Strong Grasp of Security Fundamentals: You're required to have a strong, in-depth grasp of security fundamentals, including:
    • Protocols: Deep understanding of secure communication protocols such as TLS (Transport Layer Security) for encryption, OIDC (OpenID Connect) for identity verification, and FIDO2 for strong, passwordless authentication.
    • Cryptography: Solid knowledge of cryptographic principles, including encryption algorithms, hashing, digital signatures, and key management best practices.
    • Access Control: Expertise in various access control models (e.g., RBAC, ABAC), privilege management, and securing access to critical resources.
    • Application Security: A thorough understanding of common application security vulnerabilities and remediation techniques, including familiarity with concepts like the OWASP Top 10 web application security risks.
  • Proficiency in Programming and Modern Development Practices: You must be proficient in at least one programming language (e.g., Python, Go, Java, C++), enabling you to develop security tools, automate processes, and conduct code reviews. This is coupled with familiarity with modern development practices such as DevOps, CI/CD, and Infrastructure as Code.
  • Eagerness to Learn and Contribute: You demonstrate a genuine eagerness to learn and contribute beyond your core responsibilities, especially in rapidly evolving and emerging areas like AI security. This proactive mindset and commitment to continuous learning are vital in the dynamic cybersecurity landscape.
  • Strong Communication Skills: You possess strong communication skills, both verbal and written, with the crucial ability to explain complex technical concepts clearly to non-technical stakeholders. This ensures that security risks and recommendations are understood across all levels of the organization, facilitating informed strategic decision-making.

Why This Role? Impact, Growth, and Exceptional Compensation

This permanent Senior Infrastructure Security Engineer position in New York, NY, offers a compelling environment for professional growth and significant impact within a leading financial firm.

  • Exceptional Compensation Package: You'll receive a competitive base salary ranging from USD $250,000 to $300,000, reflecting the senior-level expertise and critical nature of this role. This is complemented by a first-year guaranteed bonus, providing immediate recognition for your contributions.
  • Comprehensive Benefits: Access a comprehensive benefits package that prioritizes your well-being, including robust health and prescription coverage, generous 401(k) matching to support your long-term financial goals, wellness and family support programs, and charitable donation matching, allowing you to contribute to causes you care about.
  • Pivotal Role in Financial Security: You'll play a pivotal role in strengthening and evolving infrastructure security for a leading financial firm. Your work directly protects highly sensitive data and critical financial systems from sophisticated cyber threats, offering a profound sense of purpose and high-impact contributions.
  • Exposure to Complex IT Environment: You will gain extensive exposure to a complex and fast-paced IT environment, challenging your skills and deepening your expertise in securing distributed systems, cloud infrastructure, and cutting-edge technologies.
  • Leadership in Strategic Initiatives: You'll have the opportunity to lead strategic initiatives such as implementing Zero Trust architecture and shaping security frameworks for AI infrastructure, positioning you at the forefront of cybersecurity innovation.

Job Features

Job CategoryIT, Security

A leading financial firm is looking for a highly skilled and strategic Senior Infrastructure Security Engineer to join their vital Information Security team. This permanent position, based onsite in N...View more

Hybrid, Permanent
North Bergen, NJ, North Bergen, NJ)
Posted 3 weeks ago

Glocomms has partnered with a leading financial systems firm to find a security-focused engineer who will support their enterprise encryption and digital identity systems. This permanent position, based hybrid in North Bergen, New Jersey, centers on managing certificate-based authentication, maintaining secure key infrastructure, and automating related processes to support internal and external communications.


What You'll Be Doing: Safeguarding Digital Identity and Encryption

As a Security Engineer specializing in Digital Identity & Encryption, you'll be instrumental in protecting sensitive financial data and communications. Your responsibilities will blend technical administration with proactive problem-solving and automation, ensuring the integrity and confidentiality of critical information.

  • Administer and Monitor Digital Certificate Systems: You'll meticulously administer and monitor digital certificate systems. This involves managing the issuance, renewal, revocation, and overall lifecycle of X.509 certificates used for various authentication and encryption purposes across the enterprise. Your vigilance ensures that all digital identities are valid and secure.
  • Maintain Internal Encryption Infrastructure: You'll be responsible for maintaining the internal encryption infrastructure and its related services. This includes overseeing Hardware Security Modules (HSMs), key management systems (KMS), and other cryptographic solutions. Your work ensures that data remains protected, whether in transit or at rest, safeguarding sensitive financial information.
  • Implement and Enforce Secure Key Usage Policies: You will develop, implement, and rigorously enforce policies for secure key usage and lifecycle management. This involves defining standards for key generation, storage, distribution, rotation, and destruction, ensuring that cryptographic keys are protected throughout their entire lifecycle and used in compliance with best practices and regulatory requirements.
  • Troubleshoot and Resolve Certificate-Based Authentication Issues: You'll expertly troubleshoot and resolve issues related to certificate-based authentication. This involves diagnosing problems with client authentication, server authentication, VPNs, web applications, or other systems relying on digital certificates for secure access. Your problem-solving skills will be crucial for quickly restoring secure connectivity.

What's Needed: Your Qualifications for Encryption and Identity Security

To excel as a Security Engineer, you'll need a solid background in cybersecurity or infrastructure, familiarity with key management, and proficiency in automation.

  • Cybersecurity or Infrastructure Experience (2+ years): You must possess 2 or more years of verifiable experience in cybersecurity, infrastructure, or closely related fields. This foundational experience demonstrates your understanding of IT environments and security principles.
  • Educational Background: A degree in Information Technology, Computer Science, or equivalent experience is required. This academic or practical background provides the essential knowledge for understanding complex technical systems.
  • Familiarity with Certificate Authorities and Key Management: You have familiarity with certificate authorities (CAs), understanding their role in issuing and managing digital certificates. You also have knowledge of key management systems (KMS), which secure and manage cryptographic keys, and familiarity with automation tools used in security operations.
  • Scripting and Infrastructure Automation Experience: You have hands-on experience with scripting and infrastructure automation. This indicates your ability to write scripts (e.g., PowerShell, Python) to automate routine security tasks, manage configurations, and streamline processes related to digital certificates and encryption.
  • Industry Certifications (Plus): Industry certifications like Security+ or CISSP (Certified Information Systems Security Professional) are a significant plus. These certifications validate your expertise and commitment to the cybersecurity field.
  • Strong Problem-Solving Skills and Attention to Detail: You will possess strong problem-solving skills to diagnose and resolve complex security issues effectively. Coupled with this, meticulous attention to detail is crucial for ensuring the accuracy of configurations and compliance with security policies.
  • Comfort in a Collaborative, Fast-Paced Environment: You are comfortable working in a collaborative, fast-paced environment. This indicates your adaptability, teamwork abilities, and capacity to manage multiple priorities effectively in a dynamic setting.

What We Offer: Benefits and Growth in Financial Systems Security

This permanent Security Engineer role offers a compelling environment for professional growth and significant impact within a leading financial systems firm.

  • Competitive Compensation and Incentives: You'll receive a competitive salary complemented by performance-based incentives, directly rewarding your contributions to strengthening the firm's security posture.
  • Comprehensive Benefits: Access robust benefits including health, dental, and life insurance options, along with retirement savings plans, ensuring your well-being and financial future are supported.
  • Paid Time Off and Family Leave: Benefit from paid time off and family leave policies, promoting work-life balance and supporting your personal and family needs.
  • Flexible Hybrid Work Schedule: Enjoy a flexible hybrid work schedule, balancing onsite collaboration with remote flexibility, providing greater autonomy in managing your work environment.
  • Professional Development Opportunities: You'll have opportunities for professional development and training, allowing you to continuously enhance your skills and expertise in cutting-edge digital identity and encryption technologies.

If this Security Engineer, Digital Identity & Encryption role in North Bergen, NJ, aligns with your experience in cybersecurity, your expertise in certificate systems and key management, and your passion for financial systems security, we encourage you to learn more about this exciting permanent, hybrid opportunity.

Ready to safeguard critical financial communications through advanced encryption and digital identity?

profile picture

Job Features

Job CategoryIT, Security

Glocomms has partnered with a leading financial systems firm to find a security-focused engineer who will support their enterprise encryption and digital identity systems. This permanent position, bas...View more


Our client, a leader in the Beverage industry, is seeking an experienced Operational Technology (OT) Engineer to shape and maintain a secure and efficient OT framework across their North American clients. This permanent, onsite position in Fort Smith, Arkansas, is instrumental in building a dependable manufacturing technology environment, aligning with internal best practices and contributing to a broader global knowledge-sharing network. The role emphasizes a strong commitment to quality, safety, environmental stewardship, and product integrity within a 24/7 manufacturing setting.


What You'll Be Doing: Core Responsibilities in Operational Technology

As an OT Engineer, you'll be a pivotal figure in ensuring the secure, reliable, and high-performing operation of the client's manufacturing technology environment. Your responsibilities will span network architecture, cybersecurity, systems administration, and continuous improvement for industrial automation.

  • OT Network Oversight: You will be responsible for meticulously architecting, overseeing, and safeguarding the OT network infrastructure. This includes expert administration of firewall configurations tailored for industrial environments, managing secure remote connectivity solutions to OT systems, maintaining resilient wireless systems on the plant floor, and optimizing switch settings for industrial protocols. You'll continuously monitor network health, swiftly respond to hardware issues (e.g., servers, switches, firewalls), and manage critical firmware/OS updates to ensure maximum uptime and security.
  • Security & Patch Management: You will lead robust security and patch management efforts across the converged OT/IT landscape. This involves staying continuously informed on security advisories relevant to industrial control systems and enterprise IT, meticulously evaluating patching requirements, and then thoroughly testing and implementing updates across various OT/IT systems, including industrial workstations and network devices. You'll also diligently track and manage updates for OT applications and control systems, minimizing vulnerabilities and strengthening defenses against cyber threats.
  • OT Systems Administration: You will expertly manage virtual environments that support crucial OT systems. This encompasses designing virtual machine (VM) templates, provisioning new VMs, and implementing robust backup strategies to ensure data recovery and business continuity for industrial applications. You'll also ensure comprehensive endpoint security across OT devices and enforce strict compliance with local OT standards, safeguarding system integrity.
  • Security Operations & Governance: You will play a key role in security operations and governance within the OT domain. This includes guaranteeing the continuous availability of critical OT applications and meticulously managing data backup and recovery processes for industrial data. You'll support secure third-party integrations with OT systems and maintain comprehensive OT network documentation. Furthermore, you will actively integrate security considerations into project planning and execution for all new automation initiatives, embedding security by design.
  • Active Directory & Domain Services: You will maintain the domain infrastructure for OT systems. This includes managing Active Directory (AD), overseeing Group Policy Objects (GPOs) for centralized configuration and security, maintaining DNS (Domain Name System) for name resolution, and managing organizational unit (OU) structures to ensure efficient identity and access management within the OT environment.
  • Incident Response: You will be on the front lines, leading response efforts for both cybersecurity events and operational incidents that impact OT systems. This requires rapid communication, effective containment, swift recovery actions, and meticulous documentation. You'll address both cyber and non-cyber incidents, diligently validate disaster recovery protocols, and proactively analyze logs and correlate data to identify potential threats, minimizing downtime in a 24/7 manufacturing setting.
  • Continuous Improvement & Collaboration: You will be a champion for continuous improvement, actively engaging with global OT experts across the organization to share insights, leverage best practices, and drive operational enhancements. This collaborative approach fosters a global knowledge-sharing network, ensuring the evolution of the OT framework.
  • Industrial Automation & IIoT Initiatives: You will support and lead various digital transformation efforts within manufacturing, such as Industry 4.0, MES (Manufacturing Execution Systems), and IIoT (Industrial Internet of Things) initiatives. You'll also lead or assist in automation and instrumentation projects, meticulously maintaining flexibility and strategic direction of site automation systems. This includes developing and troubleshooting PLC/HMI (Programmable Logic Controller/Human-Machine Interface) systems, overseeing project implementation, and designing and supervising the installation and commissioning of new automation infrastructure, ensuring robust and efficient production lines.

What You Bring: Essential Qualifications for OT Excellence

To excel as an Operational Technology Engineer, you'll need extensive hands-on experience with enterprise and industrial technology platforms, a deep understanding of OT cybersecurity, and a proactive, collaborative mindset.

  • Extensive Hands-on Platform Experience: You possess hands-on experience with enterprise and industrial technology platforms, including:
    • Network Hardware: Proficiency with network hardware (e.g., Cisco routers, switches, firewalls).
    • Server Environments: Experience with server environments (e.g., Microsoft Server).
    • Virtualization Tools: Familiarity with virtualization tools (e.g., VMware).
    • Automation Systems: Expertise with automation systems from vendors like Rockwell, Siemens, and Allen Bradley. This breadth of experience is crucial for managing diverse OT and IT components.
  • Deep Familiarity with Rockwell's Software Suite: You have deep familiarity with Rockwell's suite of tools, including FactoryTalk components (e.g., Directory, View SE/ME for HMI/SCADA, AssetCentre for centralized asset management and version control). This indicates specialized knowledge in industrial control and visualization.
  • Microsoft SQL Database Management: You are skilled in managing Microsoft SQL databases, including tasks like user access control, data recovery, and report generation. A working knowledge of Oracle systems and Microsoft Reporting Services is also beneficial, demonstrating versatility in database management.
  • Basic Linux Administration: You are comfortable with basic administration of Linux-based operating systems, enabling you to manage and troubleshoot various industrial servers or specialized applications.
  • Automation Systems Experience (5+ years): You bring over five years of verifiable experience designing, implementing, and maintaining automation systems in manufacturing or industrial settings. This extensive background showcases your practical expertise in bringing industrial processes to life and optimizing them.
  • Proven Cybersecurity Measures Track Record: You have a proven track record in developing and executing cybersecurity measures specifically tailored to Operational Technology environments. This highlights your understanding of unique OT risks and your ability to implement effective security controls in industrial settings.
  • Solid IT Fundamentals Understanding: You possess a solid understanding of IT fundamentals across the platforms mentioned, with the critical ability to bridge IT and OT domains. This enables seamless communication and integration between enterprise IT and industrial control systems.
  • Proactive and Independent Problem-Solving: You are highly proactive and capable of independently identifying technical needs, meticulously planning and executing tests, effectively resolving issues, and delivering robust solutions. Your self-sufficiency is vital for continuous improvement in a dynamic environment.
  • Collaborative Mindset with Operational Acumen: You exhibit a collaborative mindset, working effectively across teams. You have the ability to balance operational priorities in continuous production environments, ensuring system integrity and minimizing downtime even while implementing changes or resolving issues.
  • Strong Communication Skills (Technical to Non-Technical): You are a strong communicator who can effectively translate complex technical changes and risks into clear, actionable insights for non-technical audiences (e.g., plant managers, operations staff). This bridges the communication gap between engineering and business.

Work Authorization:

Candidates must be eligible to work in the United States without sponsorship OR hold an existing employer-sponsored visa (e.g., H1b). The employer is unable to accommodate education or training visas (F1, OPT, CPT, etc.).


Make an Impact: Why Join This Team

This is a profound opportunity to work in a technically sophisticated environment where Operational Technology (OT) and Information Technology (IT) converge, shaping the future of manufacturing in the beverage industry. You'll be part of a forward-thinking team that values operational excellence, innovation, and continuous improvement, directly influencing the efficiency and security of 24/7 manufacturing operations. The organization offers a strong commitment to safety, quality, and sustainability, with a culture that encourages initiative and professional growth. Your contributions will be instrumental in building a dependable manufacturing technology environment that contributes to a broader global knowledge-sharing network.


Our client, a leader in the Beverage industry, is seeking an experienced Operational Technology (OT) Engineer to shape and maintain a secure and efficient OT framework across their North American clie...View more

We are seeking a highly skilled Fullstack Engineer (C#/Angular) to join our client's dynamic development team. This permanent position, based hybrid in Raleigh, North Carolina (requiring 2 days onsite per week), is crucial for building and maintaining high-performance applications that manage large-scale data operations and deliver seamless user experiences. Our client is a world-renowned provider of security services within the Cybersecurity industry.


What You'll Be Doing: Crafting Secure, High-Performance Applications

As a Fullstack Engineer, you'll be instrumental in developing and optimizing applications that form the core of the client's cybersecurity offerings. Your work will span both front-end and backend development, ensuring scalability, efficiency, and a seamless user experience for critical security services.

  • Design, Develop, and Maintain Scalable Web Applications: You will be responsible for meticulously designing, developing, and maintaining scalable web applications. This involves utilizing C# for robust backend logic and Angular for responsive frontend user interfaces. Your work will ensure applications can handle large data operations and deliver consistent performance even with increasing user loads.
  • Build Efficient Backend Systems for Data Collection and Processing: A core responsibility will be to build efficient backend systems specifically designed for large-scale data collection and processing. This includes designing database interactions, implementing data pipelines, and optimizing server-side logic to handle vast amounts of security-related data quickly and reliably.
  • Develop and Maintain Front-End Interfaces for Smooth User Experience: You will actively develop and maintain front-end interfaces to ensure a smooth and intuitive user experience. This involves crafting responsive and interactive UIs using Angular and modern JavaScript tools, focusing on usability, accessibility, and visual appeal to provide users with clear insights into complex security data.
  • Collaborate in a Dynamic Agile/Scrum Environment: You will be an active participant in a dynamic Agile/Scrum environment. This involves engaging in sprint planning, daily stand-ups, sprint reviews, and retrospectives. Your collaboration will ensure rapid development cycles, continuous feedback, and effective delivery of high-quality software solutions.
  • Write Clean, Testable, and Reusable Code: You will consistently write clean, testable, and reusable code. This commitment to coding best practices ensures that your solutions are maintainable, extensible, and contribute to the long-term health of the codebase. Your code will be robust and reliable for critical cybersecurity applications.
  • Optimize Applications for Speed and Scalability: You will continuously optimize applications for speed and scalability. This involves analyzing performance bottlenecks, fine-tuning code and database queries, and implementing architectural improvements to ensure that applications can handle high data volumes and user traffic efficiently. Your focus on optimization directly impacts application responsiveness and user satisfaction.
  • Work Cross-Functionally with Internal Teams and Stakeholders: You will foster strong relationships and work cross-functionally with various internal teams and stakeholders. This collaboration is essential for gathering requirements, aligning on technical designs, integrating solutions, and ensuring that developed applications meet the needs of all relevant parties within the cybersecurity domain.

What You Bring: Essential Skills for a Fullstack Engineer

To excel as a Fullstack Engineer in this role, you'll need a strong foundation in C# and Angular development, coupled with practical experience in multithreading and adaptable problem-solving.

  • Backend Development with C# (3+ years): You must possess 3+ years of verifiable backend development experience with C#. This demonstrates strong proficiency in building server-side logic, APIs, and data processing components using the C# language and its associated frameworks.
  • Front-End Development with Angular and JavaScript (2+ years): You are required to have 2+ years of front-end development experience with Angular and modern JavaScript tools. This indicates strong proficiency in building interactive user interfaces, managing state, and consuming APIs from the frontend.
  • Bachelor's Degree in Computer Science or Related Field: You must hold a Bachelor's degree in Computer Science or a related field. This academic background provides the foundational knowledge in programming, algorithms, and software design essential for this role.
  • Experience with Multithreaded/Asynchronous Programming: You have proven experience with multithreaded/asynchronous programming. This is crucial for building high-performance applications that can handle concurrent operations efficiently, preventing blocking and ensuring responsiveness, especially for data-intensive tasks.
  • Ability to Adapt to Various Roles: You demonstrate a strong ability to adapt to various roles within the software development lifecycle. This includes contributing effectively to design, performing rigorous testing, and skillfully troubleshooting complex issues across the application stack. Your versatility ensures comprehensive problem-solving capabilities.
  • Strong Communication and Collaboration Skills: You possess strong communication and collaboration skills. This is crucial for articulating technical concepts clearly, engaging effectively with cross-functional teams, participating in Agile ceremonies, and providing constructive feedback in code reviews.

Preferred Skills: Enhancing Your Fullstack Profile

While the above are essential, the following skills would further enhance your application:

  • Python Development Experience: Experience with Python development is a plus. This indicates versatility and could be valuable for scripting, data analysis, or backend services.
  • Familiarity with Microsoft APIs: Familiarity with Microsoft APIs such as Graph, REST, and CSOM (Client-Side Object Model) is desirable. This is particularly useful for integrating with Microsoft ecosystem services and platforms.
  • Cloud Platform Experience: Experience with Azure or other cloud platforms (e.g., AWS, GCP) is a plus. This indicates an understanding of cloud-native development and deploying scalable applications in the cloud.
  • Proficiency with Source Control Tools: Proficiency with source control tools like TFS (Team Foundation Server) or Git. This ensures familiarity with version control best practices and collaborative development workflows.
  • Integration of Third-Party APIs: Experience with the integration of third-party APIs is a plus. This demonstrates your ability to connect and exchange data with external services, expanding application functionalities.
  • Performance Optimization (CPU, memory, network): Strong skills in performance optimization at various levels, including CPU utilization, memory management, and network communication, are highly valued for high-performance applications.
  • Automation Testing and SQL Performance Tuning: Experience with automation testing (e.g., unit, integration, UI automation) and SQL performance tuning is a plus. These skills contribute to robust application quality and efficient data operations.

If this Fullstack Engineer (C#/Angular) role in Raleigh, NC, aligns with your expertise in C# and Angular, your passion for building high-performance, secure applications, and your desire to work in the cybersecurity industry, we encourage you to learn more about this exciting permanent, hybrid opportunity. This is a fantastic chance to contribute to cutting-edge security services.

Job Features

Job CategoryEngineering

We are seeking a highly skilled Fullstack Engineer (C#/Angular) to join our client’s dynamic development team. This permanent position, based hybrid in Raleigh, North Carolina (requiring 2 days ...View more