Job Archives

Hybrid
Phoenix, AZ
Posted 6 days ago

Information Security Java Developer

Reference Number: 359074 Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical

Our client is seeking a talented and detail-oriented Information Security Java Developer to join their dynamic team. As an Information Security Java Developer, you'll be an integral part of the development department, directly supporting critical secure application initiatives. The ideal candidate will possess excellent communication skills, strong adaptability to evolving threats, and a deep understanding of security best practices, ensuring a successful alignment within the organization's commitment to robust digital defense.


Location & Compensation:

  • Location: Phoenix, AZ (This is a hybrid role, requiring 3 days per week onsite.)
  • Pay Range: Competitive

What's the Job?

As an Information Security Java Developer, you will be at the forefront of building secure, resilient applications that safeguard sensitive data and systems. Your key responsibilities will include:

  • Secure Application Development: Developing highly secure applications with a specific focus on implementing robust authentication protocols and comprehensive data protection measures.
  • Encryption & Compliance Implementation: Implementing and diligently managing various encryption technologies and ensuring strict compliance measures are embedded directly within the software's architecture and functionality.
  • Backend Development with Modern Java Stack: Utilizing a modern Java backend stack, including Java, Microservices architecture, SpringBoot, and SpringCloud, to build scalable and secure services.
  • Cross-Functional Security Collaboration: Collaborating closely with cross-functional teams, including other developers, security architects, and quality assurance specialists, to ensure that leading security best practices are consistently followed throughout the development lifecycle.
  • Code Review & Performance Optimization: Conducting thorough code reviews to identify potential vulnerabilities and ensure code quality, while also optimizing the performance of existing applications to maintain efficiency and responsiveness.
  • Vulnerability Remediation: Identifying and remediating security vulnerabilities discovered through testing or audits.

What's Needed?

We're looking for a skilled Java developer with a strong security mindset:

  • Java Proficiency & APIs: Proven proficiency in Java development and extensive experience working with RESTful APIs.
  • Database Familiarity: Familiarity with various database technologies, specifically Postgres and SQL.
  • Development Tools Experience: Hands-on experience with development and collaboration tools such as JIRA for project tracking, GitHub for version control, and Jenkins for continuous integration.
  • Network Security Understanding: A solid understanding of fundamental network security concepts, including the principles of firewalls and secure network communication.
  • Debugging & Design Patterns: Strong debugging skills to efficiently diagnose and resolve complex issues, coupled with a solid knowledge of common design patterns in software development.
  • Security Practices: A demonstrated understanding of secure coding practices and common web application vulnerabilities (e.g., OWASP Top 10).

What's in it for Me?

This role offers compelling opportunities for professional growth and impact:

  • Cutting-Edge Security Technologies: The chance to work directly on cutting-edge security technologies and innovative solutions, staying at the forefront of the cybersecurity domain.
  • Collaborative Environment: Join a collaborative and inclusive work environment that fosters teamwork and mutual support.
  • Professional Growth: Access to excellent professional growth and development opportunities, supporting your continuous learning journey in security and development.
  • Meaningful Projects: Engagement in highly meaningful projects that directly enhance the organization's security measures and protect critical assets.
  • Diverse Team: Work alongside a diverse team of skilled professionals who bring a wealth of experience and perspectives.

Benefits & Additives:

Upon completion of a waiting period, consultants are eligible for a comprehensive benefits package, including:

  • Medical and Prescription Drug Plans
  • Dental Plan
  • Vision Plan
  • Health Savings Account
  • Health Flexible Spending Account
  • Dependent Care Flexible Spending Account
  • Supplemental Life Insurance
  • Short Term and Long Term Disability Insurance
  • Business Travel Insurance
  • 401(k), Plus Match
  • Weekly Pay

If this is a role that interests you and you'd like to learn more, click "apply now" and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

Job Features

Job CategoryHybrid

Information Security Java Developer Reference Number: 359074 Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical Our client is seeking a talented and detail-oriented Informati...View more

Hybrid
Atlanta, GA, New York City, NY, Palo Alto, CA, Phoenix, AZ, Salt Lake City, UT, Sillcon Valley, CA
Posted 6 days ago

GCP Cloud Security Engineer

Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical

Our client is seeking a talented and proactive GCP Cloud Security Engineer to join their dedicated Cloud Security Engineering team. In this role, you'll be instrumental in supporting various critical security initiatives. The ideal candidate will possess strong analytical skills, a proactive mindset, and excellent collaboration abilities, ensuring a successful alignment with the organization's commitment to robust cloud security.


Location:

This is a hybrid position, requiring 3 days per week onsite at one of the following primary locations: Sunrise, FL; Atlanta, GA; Phoenix, AZ; Salt Lake City, UT; Silicon Valley - Palo Alto, CA; or New York City. Remote options may be available for exceptional candidates under specific circumstances.


What's the Job?

As a GCP Cloud Security Engineer, you will play a pivotal role in ensuring the security and compliance of our client's cloud environments. Your key responsibilities will include:

  • Policy Development & Management: Developing, implementing, and meticulously managing security policies and procedures specifically for GCP (Google Cloud Platform) environments. This ensures strict compliance with internal standards and adherence to industry best practices.
  • Policy-as-Code Implementation: Utilizing Terraform Sentinel to create and enforce policy-as-code. You'll ensure that all Infrastructure as Code (IaC) initiatives align rigorously with defined security requirements, automating compliance from the ground up.
  • Security Control Design & Implementation: Designing and implementing comprehensive security controls to protect cloud-based applications and sensitive data, ensuring resilience against evolving threats.
  • Security Assessments & Risk Mitigation: Conducting regular security assessments and thorough scans to proactively identify potential risks and vulnerabilities. You'll then work to effectively mitigate these risks, strengthening the overall security posture.
  • Cloud Service Certification: Participating in the certification process for public cloud provider services. This involves defining secure configuration baselines ("configuration boxes") before these services are broadly adopted for wider organizational usage.
  • Compliance & Audit Support: Contributing to audit readiness and ensuring that GCP environments meet various regulatory and compliance mandates.
  • Collaboration & Guidance: Collaborating with development, operations, and other security teams to embed security best practices throughout the cloud lifecycle.

What's Needed?

We're looking for a skilled and experienced Cloud Security Engineer with:

  • Cloud Security Experience: A minimum of 3 years of dedicated experience in cloud security engineering, with a strong and proven focus on GCP (Google Cloud Platform).
  • GCP Expertise: A strong understanding of various GCP services and deep knowledge of security best practices specific to the Google Cloud ecosystem.
  • Frameworks & Compliance: Experience working with established security frameworks and compliance standards, such as CIS (Center for Internet Security), NIST (National Institute of Standards and Technology), and ISO 27001.
  • Core Security Knowledge: Solid knowledge of fundamental network security principles, Identity and Access Management (IAM) concepts, and encryption technologies.
  • Analytical & Proactive Mindset: Strong analytical abilities to dissect complex problems, a proactive approach to identifying and addressing security challenges, and excellent collaboration skills to work effectively within a team.

What's in it for Me?

This role offers compelling opportunities for professional growth and impact:

  • Dynamic & Inclusive Environment: The chance to work in a dynamic and inclusive environment where your contributions are highly valued.
  • Cutting-Edge Technology: Engage in hands-on engineering with cutting-edge cloud technologies, expanding your expertise in the latest security innovations.
  • Expert Collaboration: Collaborate closely with a team of seasoned experts in cloud security, fostering knowledge sharing and professional development.
  • Strategic Impact: Contribute directly to the development and implementation of security policies that will shape the organization's future cloud strategy.
  • Professional Growth: Access to excellent professional growth and development opportunities, supporting your continuous learning journey.

Benefits & Additives:

Upon completion of a waiting period, consultants are eligible for a comprehensive benefits package, including:

  • Medical and Prescription Drug Plans
  • Dental Plan
  • Vision Plan
  • Health Savings Account
  • Health Flexible Spending Account
  • Dependent Care Flexible Spending Account
  • Supplemental Life Insurance
  • Short Term and Long Term Disability Insurance
  • Business Travel Insurance
  • 401(k), Plus Match
  • Weekly Pay

If this is a role that interests you and you'd like to learn more, click "apply now" and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

Job Features

Job CategoryHybrid

GCP Cloud Security Engineer Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical Our client is seeking a talented and proactive GCP Cloud Security Engineer to join their dedica...View more

Hybrid
Atlanta, GA, Palo Alto, CA, Phoenix, AZ, Salt Lake City, UT
Posted 6 days ago

GCP Application Security Architect

Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical

Our client, a leading financial services company, is actively seeking a highly skilled GCP Application Security Architect to join their dedicated security department. In this critical role, you will be instrumental in supporting a diverse range of development and operations teams. The ideal candidate will possess strong communication skills, a collaborative mindset, and a proactive approach to problem-solving, ensuring a successful alignment within the organization's innovative and dynamic environment.


Location & Compensation:

  • Location: This is a hybrid position, requiring 3 days per week onsite at one of the following primary locations: Sunrise, FL; Atlanta, GA; Phoenix, AZ; Salt Lake City, UT; Silicon Valley - Palo Alto, CA; or New York City. (Remote options for exceptional candidates in specific circumstances will be considered.)
  • Pay Rate: $65-$70/hour on W2 Only

What's the Job?

As a GCP Application Security Architect, you will be responsible for fortifying the security posture of cloud-native applications and services within the Google Cloud Platform ecosystem. Your key responsibilities will include:

  • Application Security Architecture Design: Leading the design and implementation of robust application security architectures specifically tailored for services and applications hosted on GCP (Google Cloud Platform).
  • Secure-by-Design Initiatives: Championing and ensuring secure-by-design initiatives are embedded across the entire Software Development Lifecycle (SDLC). This includes conducting thorough threat modeling and comprehensive risk assessments from inception.
  • Cross-Functional Collaboration: Collaborating closely with software engineers, cloud architects, and other technical teams to align development practices with industry-leading security best practices for cloud-native applications.
  • Secure Coding & CI/CD Promotion: Defining and actively promoting secure coding standards across development teams. You will also design and advocate for security-focused CI/CD (Continuous Integration/Continuous Delivery) pipelines that automate security checks.
  • Emerging GCP Security Monitoring: Continuously monitoring the landscape of emerging GCP security features, services, and best practices. You will provide insightful recommendations for their strategic adoption to enhance the organization's security capabilities.
  • Security Control Implementation: Guiding teams on the effective implementation of various application-level security controls within GCP environments.
  • Documentation & Guidance: Creating and maintaining clear documentation for security architectures, standards, and guidelines for development teams.

What's Needed?

We're looking for a highly skilled and experienced professional with a deep background in application and cloud security:

  • Application Security Experience: A minimum of 7+ years of progressive experience in application security, software engineering (with a strong security focus), or security architecture roles.
  • GCP Hands-On Experience: At least 3+ years of direct, hands-on experience with Google Cloud Platform (GCP) services, specifically including IAM (Identity and Access Management) and Cloud Run.
  • SSDLC & Cloud-Native Understanding: A deep and comprehensive understanding of the Secure Software Development Lifecycle (SSDLC) and experience with designing and securing cloud-native application patterns.
  • CI/CD Security Controls: Proven experience implementing robust security controls within CI/CD pipelines, utilizing tools such as Jenkins and GitHub.
  • Risk Communication: Demonstrated ability to effectively communicate complex technical security risks to both highly technical teams and executive-level stakeholders, translating technical details into business impact.

What's in it for Me?

This role offers compelling opportunities for professional growth and impact:

  • Dynamic & Innovative Environment: The chance to work in a highly dynamic and innovative environment, contributing to cutting-edge cloud security initiatives within financial services.
  • Collaborative Team: Collaborate closely with a diverse team of dedicated professionals committed to achieving excellence in cybersecurity.
  • Continuous Learning: Engage in continuous learning and professional development, staying at the forefront of cloud security advancements.
  • Flexible Working Arrangements: Benefit from flexible working arrangements that promote a healthy work-life balance.
  • Supportive Organization: Be part of an organization that genuinely values and supports its employees through a positive work culture.

Benefits & Additives:

Upon completion of a waiting period, consultants are eligible for a comprehensive benefits package, including:

  • Medical and Prescription Drug Plans
  • Dental Plan
  • Vision Plan
  • Health Savings Account
  • Health Flexible Spending Account
  • Dependent Care Flexible Spending Account
  • Supplemental Life Insurance
  • Short Term and Long Term Disability Insurance
  • Business Travel Insurance
  • 401(k), Plus Match
  • Weekly Pay

If this is a role that interests you and you'd like to learn more, click "apply now" and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

Job Features

Job CategoryHybrid, IT, Security

GCP Application Security Architect Posted: June 19, 2025 Job Type: Contract Industry: Computer and Mathematical Our client, a leading financial services company, is actively seeking a highly skilled G...View more

Contract, Hybrid
Augusta, ME
Posted 6 days ago

Information Security Officer

Posted: June 20, 2025 Job Type: Contract Industry: Computer and Mathematical

Our client is seeking a dedicated Information Security Officer for a 12+ month contract. This crucial role offers a hybrid work opportunity, primarily remote with an on-site requirement in Augusta, Maine, typically two times per month. We are actively looking for local candidates within the New England area.


About the Job Details:

This is a unique hybrid work opportunity, predominantly remote, with a mandatory on-site presence typically every other Tuesday in Augusta, Maine. The successful candidate will be required to visit the facility upon their start to obtain equipment and complete a facility tour. There may be a few additional occasions requiring an extra on-site day, such as for on-site audits.

The Agency Information Security Officer serves a pivotal function, providing expert consultative and professional advice on security issues to agency and executive management. This individual acts as the agency's primary Subject Matter Expert (SME) on all information security matters. The position involves close collaboration with various state agencies and IT divisions to proactively identify, meticulously assess, prevent, protect, and mitigate information security risks, threats, and vulnerabilities, all aimed at safeguarding essential business operations. This individual will serve as a central point of contact for security-related matters for agencies, assisting them in their strategic planning, operational needs, incident response operations, and critical regulatory compliance efforts.


What You Will Do:

As the Agency Information Security Officer, you will be instrumental in fortifying the state's security posture:

  • Security Posture Enhancement: Collaborate extensively with various agencies and IT divisions to strengthen the state's overall security posture. This involves continuous assessment of vulnerabilities, implementing proactive security measures, and meticulously aligning security initiatives with overarching business goals.
  • Independent Security Judgment: Exercise independent judgment on critical security matters, including conducting thorough risk assessments, making informed decisions on resource allocation for security initiatives, and overseeing policy implementation. Your work will ensure that the agency’s operations and inter-agency relationships remain secure and compliant with both state and federal regulations.
  • Program Implementation & Collaboration: Work closely with different sections of the Information Security Office to effectively implement and support the comprehensive State of Maine Information Security Program Plan. You will foster robust cross-functional collaboration to proactively address emerging threats and vulnerabilities.
  • Stakeholder Engagement & Strategy Integration: Engage strategically with stakeholders across various agencies to seamlessly integrate security strategies into core business objectives. This ensures that security operations and initiatives directly support the agency’s missions, goals, and critical regulatory compliance needs.
  • Cybersecurity Issue Escalation & Resolution: Serve as the primary point of contact for the escalation of complex cybersecurity issues. You will ensure that concerns are promptly addressed and resolved in a timely, coordinated, and efficient manner to minimize risk and maintain essential business continuity.
  • Security Policies & Standards Advice: Provide expert advice on security policies and standards. This includes developing, meticulously reviewing, and rigorously enforcing security policies, standards, and best practices to ensure strict agency compliance with state and federal regulations.
  • Risk Assessment & Management: Conduct comprehensive security risk assessments, thoroughly analyze findings, and recommend effective remediation strategies to mitigate identified threats and vulnerabilities.
  • Incident Management & Response: Assist with security incident investigations, coordinate unified response efforts, and provide crucial guidance on incident containment, remediation, and required reporting procedures.
  • Third-Party Risk Management: Evaluate vendor and third-party security controls to ensure their compliance with state security requirements and industry standards, safeguarding the supply chain.
  • Audit & Compliance Support: Provide strong support for internal and external security audits by furnishing necessary documentation, offering expert guidance, and ensuring adherence to all regulatory requirements.
  • Emerging Threat & Technology Assessment: Stay continuously informed about evolving cybersecurity threats, new technologies, and emerging best practices. You will provide timely recommendations for continuously improving agency defenses.
  • Business Continuity & Disaster Recovery: Collaborate actively with agencies to develop, maintain, and rigorously test business continuity and disaster recovery plans to ensure resilience and rapid restoration of operations in the event of a significant security incident or disruption.

What Makes This Job Unique?

This is more than just a security role; it's an opportunity for significant impact:

  • Make a Difference: The broad scope of this position profoundly impacts the trajectory of application security within the state, directly ensuring the integrity and confidentiality of critical government systems and citizen data.
  • Show Your Strength: This is a prime chance to apply your deep expertise in information and application security, demonstrating your capabilities in a high-visibility, high-impact environment.
  • Experience in State Government: An invaluable opportunity to gain experience and contribute within a large IT enterprise that supports critical State applications, offering unique insights into public sector technology.
  • Selfless Service: Play a pivotal role in safeguarding the State’s critical systems, directly contributing to the public good by protecting citizens' data and ensuring the secure and continuous operation of essential government services.

Preferred Qualifications:

The ideal candidate will also possess these key attributes:

  • Proactive: Uses time effectively, demonstrates strong initiative, and makes sound decisions independently.
  • Collaborative: Builds strong coalitions and fosters effective partnerships among supported agencies for efficient and unified information security program management.
  • Expertise: Possesses subject matter expertise or demonstrates the clear capacity to quickly become an expert in all the role's essential functions.
  • Versatility: A dynamic individual capable of skillfully balancing complex information security demands with agency business functions and broader statewide risk considerations.

Why Will You Love It Here?

If you are seeking a culture that genuinely supports professional growth, fosters success, and offers a key role in maintaining the confidentiality, integrity, and availability of vital data and systems, then this IT organization is where you need to be! With the IT Information Security Office, you can expect:

  • Immersion in State Government: Immersion in the rapidly evolving issues of state government and a fast-moving organization full of opportunity for impact and learning.
  • Talented Collaboration: Direct collaboration with talented peers and exposure to creative and innovative problem-solving approaches.
  • Unique Projects: Opportunities to tackle unique and complex projects specifically in application security, pushing your skills and experience to new levels.

Minimum Qualifications:

  • Leadership Experience: A self-motivated leader with 5 to 7 years of progressive experience in a leadership role, encompassing information security, relationship management, and proven success in cross-functional goal achievement.
  • Education/Experience: A Bachelor’s degree in information technology or a related field. Four years of direct experience with information security consultancy may be used in lieu of a degree.
  • NIST Expertise: Demonstrated expertise working with Security and Privacy Controls for Information Systems and Organizations as established by the National Institute of Standards and Technology (NIST).
  • Background Check: Ability to successfully pass all required background checks.
  • Preferred Support Function Experience: While not mandatory, experience with support functions—such as consolidated data centers, shared print facilities, and disaster recovery sites—as they relate to the regulatory compliance requirements for federally protected data types is preferred.

If this is a role that interests you and you’d like to learn more, click "apply now" and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

Job Features

Job CategoryHybrid, Security

Information Security Officer Posted: June 20, 2025 Job Type: Contract Industry: Computer and Mathematical Our client is seeking a dedicated Information Security Officer for a 12+ month contract. This ...View more

Contract, Onsite
Jersey City, NJ
Posted 6 days ago

IT Project Manager V

Posted: June 18, 2025 Job Type: Contract Industry: Computer and Mathematical

Our client, a leading technology firm, is actively seeking a highly skilled IT Project Manager V to join their dynamic team. As an IT Project Manager V, you will be a pivotal member of the technology delivery department, providing essential support and leadership across various project teams. The ideal candidate will possess strong problem-solving skills, excellent communication abilities, and a self-motivated approach, ensuring successful alignment within the organization's fast-paced and results-driven environment.


Location & Compensation:

  • Location: Jersey City, NJ (Onsite)
  • Pay Range: Competitive

What's the Job?

As an IT Project Manager V, you will be responsible for driving the successful execution and delivery of critical technology initiatives. Your key responsibilities will include:

  • Project Planning & Delivery: Strategically planning, meticulously coordinating, and ensuring the successful delivery of defined project deliverables. This involves skillfully engaging and synchronizing efforts across multiple internal and external teams.
  • Risk Management & Compliance: Proactively communicating work objectives, meticulously identifying and managing project risks, and implementing controls to ensure strict compliance with established standards and best practices.
  • Cross-Organizational Facilitation: Facilitating crucial synchronization points and fostering seamless collaboration across various organizational departments to enable timely and efficient project delivery.
  • Stakeholder Communication: Gathering comprehensive project status updates and effectively communicating these to all relevant stakeholders. This includes providing clear insights into delivery progress, identified risks, and detailed schedule adherence.
  • Performance Tracking & Review: Tracking key success metrics and conducting regular performance reviews with both project stakeholders and senior leadership to ensure alignment with goals and identify areas for improvement.
  • Problem Resolution: Actively working to resolve impediments and challenges that arise during the project lifecycle, ensuring minimal disruption to progress.

What's Needed?

We're looking for a highly capable and experienced IT Project Manager with:

  • Project Management Experience: 5-7 years of progressive experience in project management, change management, or similar roles within a technology-focused environment.
  • Analytical & Presentation Skills: Strong analytical skills with the proven ability to synthesize complex data into actionable insights, combined with excellent presentation skills to convey information clearly and concisely.
  • Organizational & Prioritization Abilities: Exceptional organizational skills and a demonstrated ability to effectively manage multiple priorities simultaneously in a dynamic environment.
  • Technical Communication: Proven ability to translate complex technical concepts into easily understandable terms for non-technical clients and stakeholders.
  • Collaboration & Communication Facilitation: Extensive experience in facilitating effective communication and fostering strong collaboration across diverse technical and business teams.

What's in it for Me?

This role offers compelling opportunities for professional growth and impact:

  • Dynamic Environment: The chance to work in a dynamic and fast-paced environment where your contributions directly influence critical technology outcomes.
  • Diverse Engagement: Engagement with diverse teams and a wide range of challenging projects, expanding your experience across various technological domains.
  • Professional Growth: Significant professional growth and development opportunities, supported by a forward-thinking organization.
  • Impactful Contribution: The chance to make a significant and measurable impact on key project delivery, seeing your efforts come to fruition.
  • Collaborative Culture: Join a collaborative and inclusive workplace culture that values teamwork, initiative, and mutual support.

Benefits & Additives:

Upon completion of a waiting period, consultants are eligible for a comprehensive benefits package, including:

  • Medical and Prescription Drug Plans
  • Dental Plan
  • Vision Plan
  • Health Savings Account
  • Health Flexible Spending Account
  • Dependent Care Flexible Spending Account
  • Supplemental Life Insurance
  • Short Term and Long Term Disability Insurance
  • Business Travel Insurance
  • 401(k), Plus Match
  • Weekly Pay

If this is a role that interests you and you'd like to learn more, click "apply now" and a recruiter will be in touch with you to discuss this great opportunity. We look forward to speaking with you!

Job Features

Job CategoryIT, Onsite

IT Project Manager V Posted: June 18, 2025 Job Type: Contract Industry: Computer and Mathematical Our client, a leading technology firm, is actively seeking a highly skilled IT Project Manager V to jo...View more

Hybrid
New York City, NY
Posted 1 week ago

Machine Learning Researcher/Engineer

Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering

Our client's profound mission is to revolutionize drug discovery by seamlessly combining deep scientific insight with powerful computational tools. Their groundbreaking work has already led to the successful development of several clinical-stage drug candidates, achieved both independently and through impactful collaborations with other leading organizations.

This is a truly distinctive opportunity to collaborate closely within a dynamic, multidisciplinary team comprising brilliant chemists, biologists, and computer scientists. Together, you will advance efforts in applying cutting-edge machine learning techniques to areas such as drug discovery, intricate biomolecular simulations, and fundamental biophysics.


Location & Compensation:

  • Location: New York, NY (Onsite / Hybrid - specifics to be discussed)
  • Salary: USD $300,000 - $600,000 annually

What You'll Be Doing:

As a Machine Learning Researcher/Engineer, you'll be at the heart of scientific innovation, applying advanced ML to accelerate critical breakthroughs. Your responsibilities will likely include:

  • ML Model Development: Designing, developing, and implementing novel machine learning models, particularly those leveraging deep learning, to address complex challenges in drug discovery and biomolecular understanding.
  • Algorithmic Innovation: Innovating new algorithms and computational methods to improve the efficiency and accuracy of simulations and predictions.
  • Data Integration & Analysis: Working with diverse scientific datasets, integrating molecular, biological, and simulation data to train and validate ML models.
  • Cross-Disciplinary Collaboration: Collaborating intimately with chemists and biologists to translate scientific problems into machine learning challenges and to interpret model results in a meaningful biological context.
  • Code Implementation: Writing clean, efficient, and robust code, primarily in Python, for both research prototyping and scalable production systems.
  • Pipeline Optimization: Contributing to the optimization and scaling of machine learning pipelines for large-scale computational experiments.
  • Research & Publication: Staying abreast of the latest advancements in machine learning, computational biology, and related fields, and potentially contributing to scientific publications or presentations.

What's Needed:

We're seeking a highly talented and intellectually curious individual with:

  • Strong Deep Learning Foundation: A robust and demonstrated foundation in deep learning principles, methodologies, and architectures.
  • Python Proficiency: Solid Python programming skills, essential for both research and engineering tasks.
  • Innovation & Adaptability: A proven ability to innovate within the machine learning field, coupled with strong intellectual curiosity and adaptability to new scientific domains and technical challenges.
  • Impactful Contributions: A track record of making impactful contributions in the field of machine learning, whether through academic research, open-source projects, or industry applications.

Bonus Qualifications (Beneficial, but Not Essential):

While not strictly required, experience in the following areas would be beneficial:

  • Molecular Dynamics: Familiarity with molecular dynamics simulations.
  • Structural Biology: Knowledge of structural biology concepts.
  • Medicinal Chemistry/Cheminformatics: Background in medicinal chemistry or cheminformatics.
  • Quantum Chemistry: Understanding of quantum chemistry principles.

This is a permanent opportunity to join a pioneering team in New York City that is truly revolutionizing drug discovery. If you are a passionate Machine Learning Researcher/Engineer eager to apply your skills to solve some of humanity's most challenging problems in medicine and life sciences, we encourage you to apply. We look forward to connecting with you!

Job Features

Job CategoryAI, Artificial Intelligence, Engineering

Machine Learning Researcher/Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering Our client’s profound mission is to revolutionize drug discovery by seamlessl...View more

Hybrid, Permanent
Austin, TX
Posted 1 week ago

OT Cyber Security Engineer

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

Join a Leading Force in Energy Innovation! A top-tier energy infrastructure firm is actively seeking a highly skilled and dedicated OT Cyber Security Engineer to join its dynamic team. This organization stands as a major player in the North American power and energy sector, boasting a strong and proven track record in crucial areas like power generation, robust transmission, and pioneering cutting-edge energy transition technologies. This is a unique opportunity to apply your cybersecurity expertise to critical operational technology environments.


Location & Compensation:

  • Location: Austin, TX (Hybrid Work Model)
  • Salary: USD $130,000 - $150,000 annually

Why You'll Love Working Here:

Our client fosters an exceptional work environment with a focus on employee well-being and impact:

  • Premium Healthcare: Enjoy 100% employer-paid healthcare premiums, ensuring comprehensive coverage for you and your family.
  • Generous Time Off: Benefit from paid parental leave and generous time-off policies, supporting a healthy work-life balance.
  • Mission-Driven Culture: Immerse yourself in a mission-driven culture that deeply values innovation, unwavering integrity, collaborative teamwork, and strong personal ownership.
  • Impactful Projects: Seize opportunities to work on highly impactful projects that directly contribute to building a cleaner, more reliable energy future for North America.

What You'll Do:

As an OT Cyber Security Engineer, you will be a critical guardian of the firm's operational technology systems. Your responsibilities will include:

  • OT Security Tool Administration & Enhancement: Administering and continuously enhancing a comprehensive suite of OT security tools. This includes platforms for configuration monitoring, robust logging, targeted vulnerability assessment, and detailed asset inventory management.
  • NERC CIP Compliance: Meticulously maintaining and securing critical infrastructure systems in strict compliance with NERC CIP (Critical Infrastructure Protection) standards, ensuring regulatory adherence and operational resilience.
  • Security Monitoring & Response: Proactively monitoring and swiftly responding to security events within the OT environment. You'll perform thorough system audits and support essential compliance reporting activities.
  • Cross-Functional Collaboration: Collaborating effectively across various functions with engineers, operators, and external vendors to design, implement, and maintain robust OT security measures.
  • Automation & Continuous Improvement: Contributing actively to automation initiatives, developing comprehensive documentation, and fostering continuous improvement within security operations processes.
  • Incident Investigation: Participating in investigations of security incidents affecting OT systems, helping to identify root causes and implement effective remediation.
  • Security Hardening: Implementing security hardening best practices for various OT devices and systems to reduce the attack surface.

Requirements:

To be successful in this role, you should possess a strong blend of specialized expertise and practical experience:

  • Experience: 4-6 years of direct experience in OT (Operational Technology) cybersecurity, with a strong preference for candidates from the electric utility sector.
  • System Administration & Security Tools: A strong background in system administration for industrial control systems and proven experience with various security tools relevant to OT environments.
  • Scripting Proficiency: Familiarity with scripting languages such as Python and PowerShell for automation and data analysis.
  • NERC CIP Compliance: Hands-on experience and a solid understanding of compliance frameworks, particularly NERC CIP.
  • Problem-Solving & Communication: Excellent problem-solving skills to diagnose complex OT security issues and strong communication skills to articulate technical concepts clearly to diverse audiences.

Additional Beneficial Experience:

Candidates with the following experience will be at a distinct advantage:

  • Specific OT Security Tools: Experience with tools like Tripwire (for configuration integrity), Splunk (for SIEM/logging), BigFix (for endpoint management), or ChangeGear (for change management).
  • EMS/SCADA Systems Knowledge: Familiarity with EMS (Energy Management Systems)/SCADA (Supervisory Control and Data Acquisition) systems, including their architecture and security considerations.
  • Relevant Certifications: Industry certifications such as GIAC (Global Information Assurance Certification), CompTIA Security+, or Microsoft MCSA/MCSE.

If you are a passionate OT Cyber Security Engineer ready to make a significant impact within a leading energy infrastructure firm, we encourage you to apply today!

Job Features

Job CategoryHybrid, IT, Security

OT Cyber Security Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Join a Leading Force in Energy Innovation! A top-tier energy infrastructure firm is actively seeking a high...View more

Hybrid, Permanent
New York City, NY
Posted 1 week ago

Security Software Engineer - Gen AI

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

eStreetSecurity is proudly partnered with a cutting-edge AI-powered cybersecurity startup that is at the forefront of tackling some of the most pressing digital threats in the world today. We are actively seeking a passionate and highly self-sufficient Security Software Engineer to join their innovative team. In this pivotal role, you will help develop and maintain advanced solutions focused on anti-phishing, robust fraud detection, and comprehensive identity theft prevention. If you're looking for a challenging hybrid position based in New York, and possess a strong foundation in cybersecurity, modern AI technologies, and product development, we would be eager to connect with you!


Location & Compensation:

  • Location: New York, NY (Hybrid Work Model)
  • Salary: USD $150,000 - $200,000 annually

Key Responsibilities:

As a Security Software Engineer specializing in Gen AI, you will be instrumental in building and enhancing core security products. Your key responsibilities will include:

  • Core Security System Development: Taking a hands-on approach to building robust systems specifically designed for advanced phishing detection, comprehensive identity theft prevention, and sophisticated fraud detection within our client's state-of-the-art security platform.
  • Full Software Development Lifecycle Contribution: Contributing actively across the entire software development lifecycle. This encompasses ideation and conceptualization, meticulous design, high-quality development, and seamless deployment of anti-phishing and fraud detection systems.
  • Cross-Functional Collaboration: Working in close collaboration with diverse cross-functional teams, including expert cybersecurity researchers, fellow engineers, and dedicated product managers, to collectively drive the strategic development and enhancement of cutting-edge security products.
  • LLM & Agent Integration: Building, meticulously fine-tuning, and strategically integrating Large Language Models (LLMs) and AI agents. The goal here is to significantly enhance threat detection accuracy, reduce false positives, and accelerate response times to emerging threats.
  • Product Ownership & Quality Assurance: Taking full ownership of the quality, performance, maintainability, and scalability of your developed products. This includes ensuring they consistently meet both ambitious business objectives and stringent technical goals.
  • Continuous Innovation & Best Practices: Staying consistently on top of the latest developments in cybersecurity research. You will proactively apply best practices and integrate new findings to continually evolve and improve the product's effectiveness against new threats.
  • Complex Problem Solving: Solving thoughtful and inherently complex problems, often requiring you to make critical business and technology tradeoffs. Your contributions will directly and significantly contribute to reducing digital threats globally.

Skills and Experience:

We're seeking a highly skilled and motivated Security Software Engineer with:

  • Software Engineering Foundation: At least 3+ years of progressive experience in software engineering, coupled with a solid background in building scalable and resilient applications.
  • Cybersecurity Focus: A minimum of 2+ years of hands-on experience in cybersecurity, with specific expertise in fraud detection, anti-phishing solutions, or identity theft prevention.
  • Critical Thinking & Problem-Solving: Possessing strong critical thinking and analytical problem-solving skills, with a proven ability to make thoughtful and impactful business and technology tradeoffs.
  • Project Ownership: A proven track record of taking full ownership of projects, from initial inception through to successful completion. This includes a strong emphasis on delivering high-quality, maintainable, and understandable product solutions.
  • Autonomy & Adaptability: Demonstrating comfort in managing ambiguity and the ability to independently execute projects while consistently delivering high-quality results in a fast-paced environment.

Bonus Skills:

Candidates with the following experience will be highly regarded:

  • Startup Experience: Prior experience in a high-growth, early-stage startup environment.
  • Security Application Development: Proven experience building core security applications or platforms from the ground up.
  • Cloud & Deployment: Familiarity with cloud-based infrastructure (e.g., AWS, Azure, GCP) and modern deployment pipelines (e.g., CI/CD).

Benefits & Perks:

Our client offers a compelling package designed to attract and retain top talent:

  • Cutting-Edge Technology: The exciting opportunity to work daily with the very latest advancements in AI, machine learning, and automation technologies, pushing the boundaries of innovation in the cybersecurity space.
  • Collaborative Culture: Join a talented and passionate team that deeply values collaboration, fostering an environment where innovative ideas are encouraged, shared, and celebrated.
  • Significant Growth Opportunities: Contribute directly to a rapidly growing company, with ample opportunities for professional development and substantial career advancement as the organization expands its global footprint.
  • Competitive Compensation & Benefits: Receive a highly competitive base salary and equity package, alongside flexible work arrangements, comprehensive health insurance, and other valuable perks.

This is a unique and impactful permanent opportunity to join a pioneering tech company that is making a real difference in the cybersecurity sector through AI and automation. If you're a driven Security Software Engineer with a passion for AI/ML, a background in threat detection, and a desire to work with cutting-edge technology in a collaborative, high-growth environment, we strongly encourage you to apply. We look forward to connecting with you!

Job Features

Job CategoryAI, Artificial Intelligence, Engineering, Hybrid, Security

Security Software Engineer – Gen AI Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is proudly partnered with a cutting-edge AI-powered cybersecurity startup th...View more

Onsite
Orlando, FL
Posted 1 week ago

Lead Cyber Threat Specialist

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. They are seeking a highly skilled and proactive Lead Cyber Threat Specialist. In this critical role, you will be directly responsible for identifying, analyzing, and proactively mitigating advanced cyber threats targeting our client's valuable assets. You will lead a dedicated team of threat hunters and work in close collaboration with other cybersecurity professionals to develop and implement cutting-edge threat detection and response strategies.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $115,000 - $145,000 annually

What You'll Be Doing:

As the Lead Cyber Threat Specialist, you will be at the forefront of defending against sophisticated cyber adversaries. Your key responsibilities will include:

  • Proactive Threat Hunting Leadership: Taking the lead on proactive threat hunting initiatives to systematically identify and mitigate Advanced Persistent Threats (APTs) and other sophisticated cyber adversaries before they can cause significant harm.
  • In-Depth Threat Intelligence Analysis: Conducting comprehensive and in-depth analysis of cyber threat intelligence from various sources. This involves identifying emerging threats, pinpointing new attack vectors, and understanding the Tactics, Techniques, and Procedures (TTPs) utilized by threat actors.
  • Incident Response Management: Managing and coordinating responses to complex security incidents from initial detection through full remediation. This includes performing detailed forensic analysis to determine the root cause, scope, and impact of incidents.
  • Cross-Functional Threat Intelligence Sharing: Collaborating extensively with internal cybersecurity teams (e.g., Security Operations Center, Incident Response, Forensics) and broader IT teams to effectively share threat intelligence and continuously enhance the organization's detection and response capabilities.
  • Security Tool Optimization: Evaluating existing and emerging security tools and technologies, recommending, and implementing optimizations to continuously improve threat detection efficacy and incident response capabilities.
  • Comprehensive Reporting: Preparing and delivering comprehensive, articulate reports on threat intelligence findings, detailed incident analyses, and strategic recommendations to senior leadership, ensuring clear communication of complex security postures.
  • Continuous Learning & Adaptation: Staying consistently abreast of the latest cyber threat trends, evolving attack methodologies, and advancements in security technologies to ensure the organization's defenses remain robust and current.
  • Team Mentorship & Development: Providing technical mentorship and guidance to junior threat hunters and cybersecurity analysts, fostering their skills and contributing to the overall growth of the team.

Qualifications:

To excel in this critical role, you should possess a strong blend of technical expertise, analytical prowess, and leadership capabilities:

  • Educational Background: A Bachelor's degree in Information Technology or a related discipline, or equivalent relevant work experience.
  • Relevant Certifications: Holding one or more relevant advanced certifications, such as Splunk Enterprise Security Certified Admin, Splunk Certified Cybersecurity Defense Analyst, Certified Cyber Threat Hunting Professional (CCTHP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Certified Cyber Threat Hunter (CCTH), or Certified Ethical Hacker (CEH).
  • Extensive Cybersecurity Experience: At least 7 years of progressively responsible experience in cybersecurity, with a strong, demonstrable focus on threat hunting, incident response, and threat intelligence analysis.
  • Hands-on Threat Hunting: Proven hands-on experience with various threat-hunting techniques, including anomaly detection, meticulous network traffic analysis, and deep packet inspection.
  • Threat Intelligence Expertise: Extensive experience in collecting, analyzing, and effectively disseminating threat intelligence derived from multiple, diverse sources.
  • Incident Response Leadership: A strong background in leading and coordinating complex security incident response activities, encompassing identification, containment, eradication, recovery, and post-incident analysis.
  • SOC & IT Collaboration: Demonstrated experience working closely with Security Operations Center (SOC) teams, IT operations, and engineering to optimize security tool configurations and continuously improve detection rules and alerts.
  • Security Technology Proficiency: Proficiency with a range of security technologies such as SIEM (Security Information and Event Management) systems, EDR (Endpoint Detection and Response) platforms, dedicated threat intelligence platforms, and advanced network traffic analysis tools.
  • Exceptional Analytical Skills: Exceptional analytical skills with the ability to interpret complex data sets, identify subtle anomalies, and uncover sophisticated threats.
  • Scripting Proficiency: Strong skills in scripting languages (e.g., Python, PowerShell) to automate threat-hunting processes, data analysis, and response actions.

If you are a driven and experienced Cyber Threat Specialist ready to lead and innovate within a prominent hospitality group, we encourage you to apply directly! We look forward to connecting with you.

Job Features

Job CategoryOnsite, Security

Lead Cyber Threat Specialist Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity eStreetSecurity is partnered with a dominating hospitality group, proudly headquartered in Orlando, FL. T...View more

VP, Identity & Access Management Architect and Operations Lead

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We are thrilled to be partnering with a globally leading provider of vacation ownership, rental, and resort experiences. Our client is renowned for its exclusive vacation club memberships, premier timeshare properties, and luxurious travel options spanning an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they offer highly flexible vacation solutions, including innovative points-based systems and robust exchange programs, all while operating under multiple well-known hospitality brands.

They are actively seeking a visionary Vice President, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategic planning, comprehensive evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.

The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The core objective is to dramatically enhance customer relationships and further expand accessibility across all their diverse experiences and destinations. Their ambitious goal is to solidify their position as a technology leader within the hospitality sector, and they are actively seeking seasoned professionals eager to bring their deep expertise to the organization long-term and drive this exciting evolution.

Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Crucially, the business intends to double its investment in Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive significant innovation through advanced technology adoption.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $175,000 annually

The Role:

Reporting directly to the VP of Information Security Architecture, this pivotal role will play an instrumental part in guiding and overseeing all critical IAM functions across the enterprise. This encompasses, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing intricate workflow and review certification processes, ensuring stringent audit and compliance readiness, orchestrating sophisticated hybrid cloud identity management, overseeing comprehensive privileged access management (PAM), and architecting robust authentication and authorization systems.

This leader must possess expert knowledge in modern identity management approaches, including advanced administration, innovative identity cloud services, intricate custom connector development, complex installation and configuration, meticulous performance tuning, and robust backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to seamlessly support other IT areas or functions as needed is required to navigate a dynamic and multifaceted IT landscape.

You'll also be strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, optimal scalability, and peak performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and overarching strategy specifically around business-focused identity management and comprehensive information security.


Summary of Contributions:

  • Complex Analysis & Strategic Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often adeptly manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
  • Proactive Problem Resolution: Responds to, skillfully solves, and makes informed, impactful decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk and ensuring swift resolution.
  • Operational Enhancement & Strategic Planning Support: Assists more senior associates in achieving overarching business results by identifying compelling opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and diligently achieving results against budget within the defined scope of responsibility.
  • Continuous Professional Development: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to continuously enhance and increase skills and knowledge, embodying a deep commitment to lifelong professional growth.
  • Adaptive Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team, demonstrating flexibility and adaptability.

Responsibilities:

  • IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions, ensuring they meet enterprise-grade requirements.
  • Holistic IAM Leadership: Architecting and managing comprehensively across all critical facets of IAM: Identity Governance, Access Management, and Privileged Access Management (PAM).
  • Performance & Health Optimization: Proactively identifying and addressing complex issues related to IAM system performance, ensuring high availability, responsiveness, and seamless operation.
  • Technical Integration Leadership: Providing crucial technical leadership for the seamless integration of IAM systems with other enterprise applications, cloud services, and foundational IT platforms.
  • Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and the overarching business objectives, translating strategic goals into actionable security frameworks.
  • Policy & Procedure Development: Developing, meticulously maintaining, and continually refining comprehensive IAM policies, procedures, and standards documentation that are clear, actionable, and enforceable.
  • Stakeholder Requirements Translation: Collaborating closely and effectively with various business and IT stakeholders to deeply understand their specific IAM requirements and expertly translating these into precise, actionable technical specifications.
  • Audit & Compliance Assurance: Performing regular and thorough audits to ensure that all IAM systems and processes strictly comply with established IAM standards, internal policies, and external regulatory mandates.
  • Team Guidance & Mentorship: Providing expert-level support and valuable technical guidance to team members regarding complex IAM challenges, troubleshooting, and best practices.
  • System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain resilient and secure against potential and emerging cybersecurity threats.
  • Strategic Documentation: Meticulously documenting IAM strategies, architectures, designs, and systems for comprehensive future reference, internal reviews, and effective knowledge transfer across teams.
  • Secure Application Development Participation: Participating significantly in major application development projects to design inherently secure architectures and ensure that developed systems rigorously align with the organization's overarching security strategy and policy.
  • Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established security standards.
  • Team Capability Enhancement: Actively enhancing the Security team's capabilities by providing direct mentorship to junior team members, fostering their professional growth and knowledge expansion.
  • Information Security Championing: Championing information security principles and best practices on key customer feature development projects, contributing directly to designing secure architectures and ensuring developed systems align with the organization's security strategy and policy.
  • Digital Integration Methodology Leadership: Leading the definition and methodology for ensuring that applications and processes are fully and securely integrated with our digital and service delivery platforms.
  • Third-Party Application Security Assurance: Ensuring that both company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications that meet these exacting standards.
  • Architecture Documentation Creation: Creating detailed security architecture documentation, including comprehensive architecture frameworks, design patterns, and security standards.
  • Cross-Organizational Partnerships: Partnering strategically with leaders across the Information Security and Data Privacy organization, as well as other key organizational leads, to foster a unified security approach.
  • Complex Application Security Solutioning: Working directly with peers and/or third-party vendors to provide strategic mitigations and innovative solutions to overcome major application security hurdles, meticulously evaluating business strategies and requirements.
  • Integration Analysis & Cost Estimation: Thoroughly studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions, aiding in strategic planning.

Skills and Attributes:

  • Exceptional Critical Thinking & Thought Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the profound ability to comprehend highly complex problems, draw logical conclusions, make sound strategic decisions, develop practical and innovative solutions, and effectively negotiate to drive the closure of intricate challenges.
  • Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence within a dynamic and ever-evolving environment.
  • Broad IT & Security Domain Knowledge: Strong demonstrated knowledge spanning enterprise IT systems, diverse cloud solutions (IaaS, PaaS, SaaS), and a wide array of advanced security technologies.
  • Superior Communication & Influence: The ability to communicate highly complex technical and strategic messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message effectively to different audiences and influencing outcomes.
  • Diverse Cybersecurity Experience: Broad and diverse experience encompassing cybersecurity strategy, security operations, security architecture, cloud security, and deep, specialized expertise in identity and access management.
  • Identity & Access Management Mastery: In-depth knowledge of identity management principles, various forms of role/attribute-based access control (RBAC/ABAC), and advanced authentication systems.
  • Applied Cybersecurity Controls: Demonstrated technical proficiency in effectively applying cybersecurity controls within real-world, complex enterprise environments.
  • Oversight of Complex Initiatives: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact and visibility.
  • Executive-Level Engagement: The confidence and skill to engage executive-level stakeholders on complex security matters with limited oversight and guidance, providing strategic insights and recommendations.
  • Strategic & Tactical Acumen: The capacity to think both strategically (long-term vision and planning) and tactically (immediate execution and problem-solving), combined with highly effective decision-making skills.
  • Relevant Cybersecurity Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.) is a strong asset.
  • Project & Problem Ownership: Demonstrable ability to independently drive projects to completion and take full ownership of complex problems within a demanding security environment, seeing them through to successful resolution.
  • Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to effectively manage multiple, often competing, priorities.

Qualifications:

  • Extensive Information Security Experience: A minimum of 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically focused on Information Security roles.
  • IAM Management Experience: Proven experience managing mid to large-sized Identity Management operations ("shops").
  • Security Frameworks Expertise: Hands-on experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
  • Cloud Identity Expertise: Demonstrated hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management solutions.
  • Modern IAM System Proficiency: Demonstrated proficiency with modern, enterprise-grade Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.

Education & Certifications:

  • Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent relevant work experience.
  • Preferred Education: A Master's degree in information security or a related discipline is highly preferred.
  • Key Certifications:
    • Certified Identity and Access Management (CIAM)
    • Global Information Assurance Certification (GIAC) Identity Management
    • OCI Oracle Identity Manager
    • SailPoint IIQ Administrator

Job Features

Job CategoryIT, Onsite, Security

VP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are thrilled to be partnering with a globally leading provider o...View more

Hybrid, Onsite, Permanent
New York City, NY
Posted 1 week ago

Software Engineer, AI

Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering

We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on delivering top-tier automation solutions across the healthcare space. This innovative organization successfully launched from one of New York's largest and most respected healthcare systems and is now rapidly expanding its reach and impact nationwide.

Their cutting-edge platform strategically leverages Artificial Intelligence (AI) to target critical business areas, significantly streamlining complex processes and enhancing efficiency throughout the healthcare ecosystem. The team is now looking to bring on a talented Software Engineer, AI, who will be instrumental in building the next generation of their intelligent automation capabilities.


Location & Compensation:

  • Location: New York, NY (Onsite / Hybrid - specific flexibility details to be discussed)
  • Salary: USD $200,000 - $260,000 annually

What You'll Be Doing:

As a Software Engineer, AI, you will be a core contributor to the development of intelligent systems that revolutionize healthcare operations. Your key responsibilities will include:

  • LLM Agent Development & Integration: Building fundamental Large Language Model (LLM) agents from the ground up, and playing a crucial role in assisting with their seamless integration across the entire product suite.
  • Infrastructure Support & Scalability: Providing robust support for infrastructure management, leveraging modern orchestration and deployment tools such as Kubernetes, Docker, and Terraform to ensure scalability and reliability.
  • Backend Service Development: Designing, developing, and maintaining high-performance back-end services primarily using Python and the FastAPI framework, ensuring efficient data processing and robust API capabilities.
  • AI/ML System Contribution: Actively contributing to the full lifecycle of AI/ML systems, from ideation and prototyping to deployment and monitoring in a production environment.
  • Agentic Workflow Implementation: Playing a key role in implementing advanced agentic workflows that enable autonomous and intelligent decision-making within the platform.

What's Needed:

We're seeking a skilled and experienced AI-focused Software Engineer with:

  • Backend Development Expertise: A minimum of 5+ years of extensive back-end development experience, with a strong focus on Python.
  • AI/ML Systems Experience: Proven experience in building and deploying AI/ML systems in a production environment.
  • RAG & Agentic Workflows: Practical experience with Retrieval-Augmented Generation (RAG) frameworks and designing/implementing agentic workflows.
  • Database Technologies: A solid understanding of various database technologies, including PostgreSQL, graph databases, Elasticsearch, and Redis, and how to integrate them effectively into AI solutions.
  • Containerization & Orchestration: Experience with Kubernetes, Docker, and Terraform for infrastructure management.
  • Problem-Solving & Collaboration: Strong analytical skills with the ability to troubleshoot complex issues, and a collaborative mindset to work effectively within cross-functional teams.

Benefits & Perks:

Our client offers a compelling package designed to attract and retain top talent:

  • Cutting-Edge Technology Exposure: Work daily with the latest advancements in AI, machine learning, and automation technologies, pushing the boundaries of innovation in healthcare.
  • Collaborative & Innovative Culture: Join a talented and passionate team that deeply values collaboration, fostering an environment where innovative ideas are encouraged and celebrated.
  • Significant Growth Opportunities: Contribute to a rapidly growing company, with ample opportunities for professional development and career advancement as the organization expands.
  • Competitive Compensation & Benefits: Receive a highly competitive salary and equity package, alongside flexible work arrangements, comprehensive health insurance, and additional perks.

This is a unique permanent opportunity to join a pioneering tech company that is making a real difference in the healthcare sector through AI and automation. If you're a driven Software Engineer with a passion for AI/ML and a desire to work with cutting-edge technology in a collaborative environment, we encourage you to apply. We look forward to connecting with you!

Job Features

Job CategoryAI, Artificial Intelligence, Engineering, Hybrid, Onsite

Software Engineer, AI Posted: June 18, 2025 Job Type: Permanent Industry: Development and Engineering We are actively partnered with a visionary, NYC-based tech company that is relentlessly focused on...View more

Onsite
New York City, NY
Posted 1 week ago

Desktop Engineer - Full-Time

Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophisticated enterprise desktop environment. This critical, full-time role involves comprehensive engineering, strategic deployment, and robust support of cutting-edge desktop solutions across a complex multi-site infrastructure.


Location & Compensation:

  • Location: New York, NY (Onsite)
  • Salary: $170,000 - $190,000 base salary

What You'll Be Doing:

As a Desktop Engineer, you will be at the forefront of managing the firm's end-user computing landscape, ensuring seamless operations and advanced capabilities. Your key responsibilities will include:

  • MECM/SCCM Infrastructure Management: Taking a lead role in the management and comprehensive support of the Microsoft Endpoint Configuration Manager (MECM), formerly SCCM, infrastructure. This includes ensuring its health, performance, and effective utilization for endpoint management.
  • Application Packaging & Deployment: Expertly packaging and deploying a wide range of applications, including various formats such as EXE, MSI, and MSIX, to ensure efficient and standardized software distribution across the enterprise.
  • Multi-Environment Troubleshooting: Providing advanced troubleshooting and resolution for issues across diverse desktop, mobile, and virtual environments, ensuring minimal downtime and optimal user experience.
  • Cross-Functional Collaboration: Collaborating closely and effectively with various internal teams, including IT Operations, Security, and Infrastructure teams, to align desktop solutions with broader organizational goals and security mandates.
  • Documentation & Change Management: Meticulously maintaining comprehensive documentation for all desktop configurations, processes, and solutions. You will also diligently enforce established change management protocols to ensure stability and control within the environment.
  • User Support & Experience: While primarily an engineering role, you'll also contribute to ensuring an excellent end-user experience by implementing reliable and user-friendly desktop solutions.

What's Needed:

We're looking for a highly proficient and experienced Desktop Engineer with:

  • Extensive Experience: A minimum of 5+ years of dedicated experience in a desktop engineering role or advanced IT support position within an enterprise setting.
  • Scripting & Packaging Proficiency: Strong PowerShell scripting skills for automation and advanced application packaging capabilities.
  • Core Desktop Technologies: Proven experience and expertise with Windows 10/11, comprehensive support of Office 365 suites, various virtualization technologies, and proficient management of Active Directory.
  • Enterprise Application Familiarity: Familiarity with legal-specific applications or a broad range of other complex enterprise applications is a significant plus.
  • Problem-Solving Skills: Excellent analytical and problem-solving abilities to diagnose and resolve complex technical issues efficiently.
  • Communication: Strong verbal and written communication skills to effectively collaborate with teams and document procedures.

Why This Role Matters:

This is a fantastic opportunity to join a leading law firm at a senior level, where you can directly impact the daily productivity and technological advancements for a demanding professional user base. You'll work with cutting-edge tools and collaborate with dedicated IT professionals in a dynamic New York City environment.

If you're a skilled Desktop Engineer ready to enhance enterprise desktop environments and drive technological excellence, we encourage you to apply. We look forward to hearing from you!

Job Features

Job CategoryIT, Onsite

Desktop Engineer – Full-Time Our client, a prominent and leading law-firm organization, is actively seeking a highly skilled Desktop Engineer to significantly support and enhance their sophistic...View more

Hybrid, Onsite, Remote
New York City, NY, Newark, NJ
Posted 1 week ago

Lead IAM Engineer

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We're currently partnered with a leading energy/utilities organization that's looking to bring on a highly skilled Lead IAM Engineer. This is a pivotal, senior-level role that combines hands-on technical expertise with critical leadership responsibilities. You'll lead the design, implementation, and ongoing management of advanced enterprise-wide Identity and Access Management (IAM) solutions, directly contributing to securing systems, enforcing robust security policies, and driving the overall IAM strategy across the organization.


Location & Compensation:

  • Location: New Jersey/New York (Offers Hybrid/Remote flexibility)
  • Compensation: USD $140,000 - $165,000 annually
  • Employment Type: Full-time

What You'll Be Doing:

As a Lead IAM Engineer, you'll be at the forefront of securing digital identities and access within a complex enterprise environment. Your key responsibilities will include:

  • IAM Architecture & Implementation Leadership: You'll lead the design, architecture, and implementation of cutting-edge IAM solutions, encompassing Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) systems.
  • Identity Governance Oversight: You'll oversee the entire identity lifecycle management, from robust provisioning to secure deprovisioning processes, ensuring accuracy and efficiency.
  • Advanced Access Control Enforcement: You'll implement and enforce stringent access control mechanisms, including least privilege principles, Just-In-Time (JIT) access, and core Zero Trust security architectures.
  • Directory & Federation Services Management: You'll manage and optimize critical directory services like Active Directory and Azure AD, traditional LDAP, and various identity federation protocols such such as SAML, OAuth, and OpenID Connect.
  • Cloud IAM Security: You'll secure access across diverse cloud platforms, specifically AWS and Azure, by implementing proper identity federation and granular role management strategies.
  • Compliance & Risk Management: You'll ensure strict alignment with key regulatory frameworks and standards like SOX and NIST. This involves conducting thorough audits and risk assessments to maintain a strong compliance posture.
  • Incident Response Collaboration: You'll collaborate closely with broader security teams to swiftly detect, analyze, and remediate IAM-related security incidents, minimizing potential impact.
  • Automation & Scripting: You'll develop efficient scripts and workflows using languages like PowerShell, Python, or similar tools to automate routine IAM tasks and enhance operational efficiency.
  • Strategic Stakeholder Engagement: You'll actively partner with various IT, security, and business teams to collaboratively define, refine, and successfully implement comprehensive IAM strategies that meet evolving organizational needs.

What's Needed:

We're looking for an experienced and technically astute individual with strong leadership capabilities:

  • Educational Background: A Bachelor's degree in a related field is required, or a minimum of 10 years of relevant cybersecurity experience can be considered in lieu of a degree.
  • Extensive IAM Engineering Experience: A minimum of 6 years of dedicated experience in IAM engineering, security architecture, or a closely related cybersecurity field.
  • Deep IAM Expertise: Profound expertise in various IAM platforms, a wide array of authentication protocols, and robust cloud security principles.
  • Scripting Proficiency: Demonstrated proficiency in scripting languages such as PowerShell, Python, and Bash.
  • Advanced Security Understanding: A strong, in-depth understanding of Zero Trust security models, identity-centric security approaches, and risk-based authentication methodologies.
  • Problem-Solving & Leadership: Excellent problem-solving skills, strong communication abilities (both verbal and written), and proven leadership capabilities.

Preferred Qualifications:

Candidates with the following qualifications will be highly regarded:

  • Relevant Certifications: Possessing relevant industry certifications such as CISSP, CISM, or various IAM-specific credentials.
  • DevSecOps Integration: Experience integrating IAM solutions with CI/CD pipelines and familiarity with DevSecOps practices.
  • API Security & SDKs: Familiarity with securing APIs and practical experience utilizing IAM Software Development Kits (SDKs).

This is a fantastic opportunity to take on a leadership role within a critical cybersecurity domain for a major energy/utilities organization. If you possess the required IAM expertise and are ready to drive strategic initiatives, we encourage you to apply.

Job Features

Job CategoryIT, Security

Lead IAM Engineer Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We’re currently partnered with a leading energy/utilities organization that’s looking to bring on a high...View more

Hybrid, Onsite, Remote
New York City, NY, Newark, NJ
Posted 1 week ago

Lead Cyber Security Analyst

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry? Our client, a recognized leader in their field, is actively seeking an experienced Lead Cyber Security Analyst to join their dynamic team. This pivotal, senior-level role is crucial for driving the company's IT security initiatives, maintaining robust security systems, and providing leadership to a skilled team of professionals dedicated to safeguarding critical organizational assets.


Location & Compensation:

  • Location: Primarily Remote, with required in-person/on-site presence a few days every month at either the Newark, NJ, or Bethpage, Long Island, NY office.
  • Base Compensation: $150,000 - $180,000 annually, plus a 15% Annual Target Bonus.

Summary:

As the Lead Cyber Security Analyst, you'll be at the forefront of the client's defense strategies. This role demands a proactive and hands-on leader who can not only manage complex security projects but also provide technical guidance and foster best practices within the team. You'll be instrumental in identifying vulnerabilities, mitigating risks, and implementing comprehensive security measures to protect the organization's information systems effectively in an evolving threat landscape.


Role Responsibilities:

Your contributions in this leadership role will include:

  • Cyber Security Project Leadership: Taking the helm as a project lead for critical cybersecurity initiatives. This includes demonstrating expertise in managing and implementing a wide array of security technologies such as antivirus solutions, Intrusion Detection/Prevention Systems (IDS/IPS), and advanced endpoint detection & response (EDR) platforms.
  • Comprehensive Data Protection: Spearheading efforts in data protection. This involves applying proficiency in data loss prevention (DLP) strategies and various data encryption techniques to ensure that all sensitive information remains consistently protected throughout its lifecycle.
  • Hands-on Technical Leadership: Providing proven, hands-on technical guidance and invaluable mentorship to team members. You'll ensure that best practices are rigorously followed, fostering a culture of continuous learning and excellence within the security operations team.
  • Proactive Problem Solving & Risk Mitigation: Displaying adeptness at swiftly identifying security vulnerabilities, effectively mitigating identified risks, and proactively implementing robust security measures to comprehensively protect information systems from evolving threats.
  • Security Operations Enhancement: Collaborating closely with cross-functional teams to implement and oversee advanced cybersecurity protocols, ensuring robust protection at every level of the organization's IT infrastructure.

Skills Required:

To excel in this role, you should possess a strong blend of technical expertise and leadership qualities:

  • Technology Proficiency: A minimum of 8+ years of experience in security IT, with a strong preference for experience gained within cloud computing environments and a proven track record of implementing security measures within cloud-forward architectures.
  • Cybersecurity Analyst Expertise: Employing deep analytical expertise in leveraging various security technologies, including Security Information and Event Management (SIEM) systems, firewalls, IDS, and other critical security tools.
  • Team Collaboration: A demonstrated ability to collaborate effectively with diverse teams, ensuring seamless integration and oversight of cybersecurity protocols across the enterprise.
  • Educational Background: A Bachelor's degree in a related field is preferred, or a minimum of 12+ years of experience in an IT-related field will be considered as equivalent work experience.

Benefits & Additives:

Our client values their employees and offers a comprehensive benefits package:

  • Health, Medical, Dental, and Vision healthcare plans.
  • 401K Match program.
  • Approximately 5% travel required for on-site presence and other business needs.

If you are a driven and experienced cybersecurity professional ready to lead and innovate within a forward-thinking organization, we encourage you to apply now! We look forward to discussing this great opportunity with you.

Job Features

Job CategoryIT, Security

Lead Cyber Security Analyst Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity Are you a seasoned cybersecurity professional ready to make a significant and lasting mark in the industry...View more

Onsite, Permanent
Orlando, FL
Posted 1 week ago

AVP, Identity & Access Management Architect and Operations Lead

Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity

We are excited to be partnering with a leading global provider in the vacation ownership, rental, and resort experiences industry. Our client is renowned for its exclusive vacation club memberships, premium timeshare properties, and luxury travel options across an impressive portfolio of high-end resorts and destinations worldwide. With an unwavering commitment to exceptional customer service, they deliver flexible vacation solutions, including innovative points-based systems and exchange programs, all while operating under multiple well-known hospitality brands.

Our client is seeking a visionary AVP, Identity & Access Management (IAM) Architect and Operations Lead to spearhead the strategy, comprehensive planning, rigorous evaluation, and flawless implementation of the entire IAM technology stack across their extensive global organization.

The business is currently undergoing a significant technology transformation, with a profound focus on modernization. The goal is to dramatically enhance relationships with customers and further expand accessibility across all their experiences and destinations. Their ambition is to become a technology leader in hospitality, and they are actively seeking seasoned professionals eager to bring their expertise to the organization for the long term and drive this exciting evolution.

Under dynamic new leadership, the entire Global Technology organization has been reinvigorated and is primed for substantial growth. This includes key departments such as Engineering & Operations, Data Platforms & Engineering, Artificial Intelligence, Information Security, Privacy, Infrastructure, Products & Platforms, Delivery Office, and the Office of the CIO. Critically, the business intends to double its spending on Technology across the organization for each of the next three years. This presents an unparalleled opportunity for you to be a foundational part of this transformative journey and drive innovation through advanced technology adoption.


Location & Compensation:

  • Location: Orlando, FL (Onsite)
  • Salary: USD $175,000 annually

The Role:

Reporting directly to the VP of Information Security Architecture, this pivotal role will be instrumental in guiding and overseeing all IAM functions across the enterprise. This includes, but is not limited to, developing a centralized provisioning IAM engine for all business and workforce applications, managing workflow and review certification processes, ensuring audit and compliance readiness, orchestrating hybrid cloud identity management, overseeing privileged access management (PAM), and architecting robust authentication and authorization systems.

This leader must possess expert knowledge in modern identity management approaches, including administration, identity cloud services, custom connector development, complex installation and configuration, performance tuning, and advanced backup and recovery methods across multiple computing environments. Proficiency in J2EE, .Net, Service Oriented Architecture (SOA), Web Services, LDAP, XML, OAuth, OpenID, and SAML 2.0 is absolutely essential. Additionally, a strong knowledge of SQL databases and the proven ability to support other areas or functions as needed is required to navigate a dynamic IT landscape.

You'll also be responsible for strategically designing, meticulously specifying, and thoughtfully selecting business application information security solutions. This requires a keen eye for functionality, data integrity, robust security, strict privacy adherence, seamless interoperability, scalability, and optimal performance for advanced IT architectures. Crucially, this role will directly contribute to the global enterprise cloud architecture and will lead the security vision and strategy specifically around business-focused identity management and comprehensive information security.


Summary of Contributions:

  • Complex Analysis & Decision-Making: Contributes significantly to team, department, and/or business results by performing complex quantitative and qualitative analysis for intricate business processes and/or strategic projects. Often manages smaller projects, specific business processes, or critical segments of larger organizational initiatives.
  • Problem Resolution & Proactive Solutions: Responds to, skillfully solves, and makes informed decisions on more complex/non-routine business requests, navigating challenges with limited to moderate inherent risk.
  • Operational Enhancement & Planning: Assists more senior associates in achieving overarching business results by identifying opportunities to enhance the effectiveness of business processes, actively participating in setting department operating plans, and achieving results against budget within the defined scope of responsibility.
  • Self-Improvement & Continuous Learning: Demonstrates a profound awareness of personal strengths and areas for improvement, and proactively acts independently to enhance and increase skills and knowledge, embodying a commitment to continuous professional development.
  • Ad Hoc Support: Performs other duties as appropriate to support the evolving needs of the organization and the security team.

Responsibilities:

  • IAM System Architecture & Management: Architecting, implementing, and managing sophisticated IAM systems, including specialized Customer IAM (CIAM) solutions.
  • Holistic IAM Management: Architecting and managing across all facets of IAM: Governance, Access Management, and Privileged Access Management.
  • Performance Optimization: Identifying and proactively addressing issues related to IAM performance, ensuring high availability and responsiveness.
  • Technical Integration Leadership: Providing technical leadership for the seamless integration of IAM systems with other enterprise applications and platforms.
  • Standards & Business Alignment: Ensuring stringent alignment between IAM standards, policies, and overarching business objectives.
  • Policy & Procedure Development: Developing and meticulously maintaining comprehensive IAM policies, procedures, and standards documentation.
  • Stakeholder Requirements Translation: Collaborating closely with various stakeholders to deeply understand their IAM requirements and expertly translate them into precise technical specifications.
  • Audit & Compliance: Performing regular audits to ensure that IAM systems and processes strictly comply with established IAM standards and organizational policies.
  • Team Guidance & Support: Providing expert support and valuable guidance to team members regarding complex IAM challenges and best practices.
  • System Security & Updates: Ensuring IAM systems are regularly updated, patched, and remain secure against potential and emerging threats.
  • Strategic Documentation: Documenting IAM strategies, architectures, and systems thoroughly for future reference, review, and knowledge transfer.
  • Secure Application Development: Participating significantly in application development projects to design secure architectures and ensure that developed systems rigorously align with the MVW security strategy and policy.
  • Security Architecture Documentation: Maintaining comprehensive security architecture documentation, including architecture frameworks, design patterns, logical and physical diagrams, and established standards.
  • Mentorship: Enhancing the Security team's capabilities by actively mentoring junior team members, fostering their growth and knowledge.
  • Security Championing: Championing information security principles and best practices on key customer feature development projects to help design inherently secure architectures and ensure developed systems align with the MVW security strategy and policy.
  • Digital Integration Leadership: Leading the definition and methodology for ensuring applications and processes are fully integrated with our digital and service delivery platforms.
  • Third-Party Application Security: Ensuring that company-developed and third-party applications adhere to rigorous security best practices and principles, and designing effective mitigation solutions for applications to meet these standards.
  • Architecture & Solution Documentation: Creating detailed security architecture documentation, including architecture frameworks, patterns, and standards.
  • Cross-Organizational Partnerships: Partnering strategically with leaders across our Information Security and Data Privacy organization, as well as other key organizational leads.
  • Complex Security Solutioning: Working directly with peers and/or third parties to provide strategic mitigations and innovative solutions to overcome major application security hurdles by evaluating complex business strategies and requirements.
  • Integration Analysis & Cost Estimates: Studying existing architecture/platforms to identify potential integration issues and preparing accurate cost estimates for proposed solutions.

Skills and Attributes:

  • Exceptional Critical Thinking & Leadership: Possessing exceptional critical thinking skills and demonstrated thought leadership, with the ability to comprehend highly complex problems, draw logical conclusions, make sound decisions, develop practical solutions, and effectively negotiate to drive the closure of complex challenges.
  • Proven Security Solution Development: A proven track record and extensive experience in developing comprehensive security solutions that consistently meet objectives of excellence in a dynamic and evolving environment.
  • Broad IT & Security Knowledge: Strong demonstrated knowledge of enterprise IT systems, diverse cloud solutions, and a wide array of security technologies.
  • Clear Communication: The ability to communicate highly complex technical messages in a simple, clear, and concise manner to various IT and non-IT teams, tailoring the message to the audience.
  • Diverse Cybersecurity Experience: Broad and diverse experience spanning cybersecurity strategy, operations, security architecture, cloud security, and deep expertise in identity and access management.
  • Identity & Access Expertise: In-depth knowledge of identity management principles, role/attribute-based access control (RBAC/ABAC), and various authentication systems.
  • Cybersecurity Controls Application: Demonstrated technical proficiency in applying cybersecurity controls effectively within real-world environments.
  • Complex Initiative Oversight: The proven ability to oversee and successfully execute highly complex, cross-organizational initiatives with significant impact.
  • Executive Engagement: The ability to confidently engage executive-level stakeholders on complex security matters with limited oversight and guidance.
  • Strategic & Tactical Thinking: The capacity to think both strategically (long-term vision) and tactically (immediate execution), combined with effective decision-making skills.
  • Relevant Certifications: Possession of relevant Cybersecurity Certification(s) (e.g., CISSP, CISA, CIAM, etc.).
  • Project & Ownership Drive: Able to drive projects independently and own problems end-to-end within a demanding security environment.
  • Organizational & Time Management: Strong organizational skills with demonstrable planning and time management capabilities to handle multiple priorities effectively.
  • Problem Ownership: Proven experience driving projects and owning problems completely within a security environment, seeing them through to successful resolution.

Qualifications:

  • Extensive Information Security Experience: 10+ years of progressive experience in relevant Information Security disciplines, with at least 8+ years specifically in Information Security roles.
  • Identity Management Leadership: Proven experience managing mid to large-sized Identity Management operations ("shops").
  • Security Frameworks: Experience with one or more major security frameworks: ISO 27001, NIST (National Institute of Standards and Technology), CIS (Center for Internet Security) standards, or SOC 2 Controls.
  • Cloud Identity Expertise: Hands-on technical expertise with AWS and Microsoft Azure/Entra ID for identity and access management.
  • Modern IAM System Proficiency: Demonstrated proficiency with modern Identity Management systems such as OCI (Oracle Cloud Infrastructure Identity and Access Management), SailPoint, Saviynt, BeyondTrust, and CyberArk.

Education & Certifications:

  • Required Education: Bachelor's degree in Computer Science, Information Technology, or a related discipline, or equivalent work experience.
  • Preferred Education: Master's degree in information security or a related discipline is preferred.
  • Key Certifications:
    • Certified Identity and Access Management (CIAM)
    • Global Information Assurance Certification (GIAC) Identity Management
    • OCI Oracle Identity Manager
    • SailPoint IIQ Administrator

Job Features

Job CategoryIT, Onsite, Security

AVP, Identity & Access Management Architect and Operations Lead Posted: June 18, 2025 Job Type: Permanent Industry: Cybersecurity We are excited to be partnering with a leading global provider in ...View more