Job Archives
Our client, operating in the Finance & Insurance sector, is seeking a highly skilled Program Manager to oversee critical command center operations and technology systems. This 12-month contract position, based hybrid in Charlotte, North Carolina, offers a unique opportunity to ensure seamless integration and functionality within a complex environment. The ideal candidate will have robust experience in the financial industry, proven leadership skills, and an extremely organized and detailed-oriented approach.
What You'll Be Doing: Orchestrating Command Center Excellence
As a Program Manager, you'll be instrumental in leading the development, implementation, and coordination of advanced command center operations and technology systems. Your responsibilities will blend strategic planning, meticulous project management, and effective cross-functional collaboration.
- Develop and Execute a Strategic Roadmap: You'll create and execute a comprehensive strategic roadmap specifically designed for integrating systems, processes, and technology within the command center. This involves outlining long-term goals, identifying key initiatives, and planning the sequence of activities to achieve optimal performance and seamless functionality.
- Set Program Goals and Manage Schedules: You'll define clear program goals, develop detailed program plans and schedules to ensure those goals are met, and provide timely reports on any delays. This proactive approach ensures projects stay on track and stakeholders are always informed of progress and potential challenges.
- Prioritize Tasks and Allocate Resources: You'll effectively prioritize project tasks based on strategic importance and operational needs. You'll also skillfully allocate project team members and manage all necessary resources for project execution in conjunction with program management and delivery leadership, ensuring optimal resource utilization and efficient delivery.
- Manage Program Budget and Timelines: You'll meticulously manage the program budget and timelines, ensuring financial adherence and timely delivery. You'll also oversee the consolidation of workstream status reports, providing a unified view of overall program progress.
- Coordinate Project Teams and Responsibilities: You'll be responsible for coordinating project team members across various workstreams, fostering collaboration and clear communication. You'll also develop detailed schedules and individual responsibilities, ensuring everyone understands their role in achieving project objectives.
- Track Project Performance with Management Tools: You'll leverage various project management tools such (as MS Project, Jira, M&A Accelerator, Clarity, and Planview) to meticulously track project performance and schedule adherence. This ensures real-time visibility into project health and enables proactive adjustments to keep initiatives on track.
- Facilitate Discussions and Track Minutes: You'll expertly schedule and facilitate discussions, ensuring productive meetings with internal teams, external vendors, and stakeholders. You'll also diligently track minutes in a standard, predefined format, capturing key decisions, action items, and next steps for clear accountability.
- Conduct Risk Assessments and Manage RAID Logs: You'll perform thorough risk assessments for projects, identifying potential threats and vulnerabilities. You'll also establish and maintain a project's RAID log (Risks, Assumptions, Issues, Dependencies), proactively foreseeing and strategically eliminating blockers and potential risks to ensure project success.
- Foster Effective Communication with Leadership and Stakeholders: You'll cultivate and foster effective communication and meetings with executive sponsors and stakeholders concerning project status. This ensures transparency, manages expectations, and secures buy-in for critical decisions related to program progress and budget spend, including weekly and monthly report-outs.
- Collaborate for Goal Delivery: You'll work effectively with workstream leads and program management to ensure the successful delivery of project goals and objectives. This collaborative approach ensures that all contributing parties are aligned and working cohesively towards common strategic aims.
- Act as Primary Point of Contact: You'll serve as the primary point of contact between technical teams, key stakeholders, and external vendors. Your role as a central communication hub ensures seamless information flow and coordination across all project facets.
- Ensure SDLC Adherence and Operational Readiness: You'll be instrumental in ensuring strict SDLC (Software Development Life Cycle) adherence throughout the project lifecycle. You'll also confirm that testing validation occurs to verify operational readiness, guaranteeing that all deployed systems are stable, secure, and ready for production use.
- Ensure Compliance with Regulations and Best Practices: You'll verify and confirm compliance with relevant regulations, standards, and best practices pertinent to command center operations and technology systems. This vigilance ensures legal adherence, operational integrity, and alignment with industry benchmarks in the financial sector.
- Facilitate Cross-Functional Collaboration: You'll actively facilitate cross-functional collaboration across various departments to meet integration goals. This involves breaking down silos, fostering teamwork, and ensuring that all contributing teams work cohesively towards shared objectives.
- Ensure Top-Quality Results: You'll consistently ensure top-quality results and success for every project. This commitment to excellence drives high standards in deliverables, processes, and overall project outcomes.
- Manage Systems Integration and Business Process Improvement Projects: You bring direct experience managing systems integration projects, ensuring seamless data flow and interoperability between disparate technology systems. You also have direct experience managing business process improvement projects, focusing on analyzing and formulating "As-Is" and "To-Be" processes to optimize operational efficiency.
- Partner with Vendors and Team Members: You have significant experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative approach ensures effective external and internal coordination for project success.
What's Needed: Your Profile for Program Leadership
To excel as a Program Manager, you'll need a unique blend of extensive experience in the financial industry, strong project management skills, and a deep understanding of command center operations and technology.
- Extensive Financial Industry Experience: You have 8+ years of experience in the financial industry and/or equivalent business and enterprise systems experience. This deep domain knowledge provides critical context for managing complex projects within a regulated financial environment.
- Direct Experience Managing Systems Integration Projects (Preferred): Direct experience managing systems integration projects is preferred. This highlights your ability to oversee projects that connect diverse technology systems, ensuring seamless data flow and interoperability.
- Direct Experience Managing Business Process Improvement Projects (Preferred): Direct experience managing business process improvement projects is preferred. This demonstrates your ability to analyze existing workflows, identify inefficiencies, and design optimized "to-be" processes.
- Extremely Organized and Detailed-Oriented: You are extremely organized and detailed-oriented. This meticulous approach is crucial for managing complex project plans, tracking numerous tasks, and ensuring accuracy in documentation and reporting.
- Self-Motivated: You are self-motivated, demonstrating initiative and a proactive approach to identifying challenges, developing solutions, and driving projects to completion independently.
- Proven Leadership Skills: You possess proven leadership skills, capable of guiding project teams, influencing stakeholders, and driving consensus towards shared goals.
- Strong Written and Verbal Communications: You have strong written and verbal communication skills. This is crucial for articulating complex project details, reports, and strategic plans to diverse audiences, including executive sponsors and technical teams.
- Strong Interpersonal Skills: You possess strong interpersonal skills, enabling you to build rapport, foster collaboration, and manage conflicts effectively within and across teams.
- Business, Financial, and Technical Acumen: You bring a robust blend of business, financial, and technical acumen. This allows you to understand the strategic, budgetary, and technical aspects of projects, ensuring holistic problem-solving and decision-making.
- Assertive and Action-Oriented: You are assertive and action-oriented, taking decisive steps to move projects forward, overcome obstacles, and ensure timely delivery of results.
- Manages Conflict: You are skilled at managing conflict constructively, mediating disagreements, and finding resolutions that maintain positive working relationships and keep projects on track.
- Collaborative: You are inherently collaborative, valuing teamwork and actively seeking input from others to achieve project objectives.
- Experience Partnering with Vendors and Team Members: You have extensive experience partnering with vendors and team members on requirements, deliverables, project planning, timelines, and resourcing. This collaborative leadership ensures effective coordination with external partners and internal teams.
If this Program Manager role in Charlotte, NC, aligns with your experience in leading complex integration projects, your expertise in command center operations, and your strong project management acumen within the financial industry, we encourage you to learn more about this exciting hybrid contract opportunity. This is a fantastic chance to make a significant impact on critical technology systems.
Job Features
Job Category | IT |
Our client, a prominent organization in the Information Technology sector, is seeking a highly experienced and motivated Senior Infrastructure Administrator. This permanent position, based hybrid in Phoenix, Arizona, requires 3 days a week in the office. You’ll play a critical role in managing and maintaining the organization's complex IT infrastructure. You'll be responsible for the design, implementation, optimization, and security of server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure the high availability, performance, and security of the IT environment, while also mentoring junior staff and contributing to the overall success of IT operations.
At AAA, their team members strive to deliver amazing service and help their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work. They're working to transform AAA for the next century with a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.
Why Work For This Organization?
- Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
- 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
- Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and more.
- Paid Holidays: Enjoy paid holidays, promoting work-life balance.
- Paid Time Off: Team Members accrue paid time off monthly, and depending on position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
- Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
- Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
- AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
- Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.
Job Summary: Leading IT Infrastructure Management
We are seeking a highly experienced and motivated Senior Infrastructure Administrator to play a critical role in managing and maintaining our organization's complex IT infrastructure. In this role, you will be responsible for the design, implementation, optimization, and security of our server, network, and storage infrastructure, both on-premises and in the cloud. You will leverage your extensive technical expertise and leadership skills to ensure high availability, performance, and security of our IT environment, while also mentoring junior staff and contributing to the overall success of our IT operations.
Responsibilities / Job Duties: Driving Infrastructure Excellence
As a Senior Infrastructure Administrator, you'll oversee and contribute to all facets of the IT infrastructure, ensuring its stability, performance, and security across diverse platforms. Your duties will blend hands-on technical work with strategic planning and mentorship.
- Infrastructure Management: You will comprehensively manage and maintain all aspects of our IT infrastructure, which includes physical and virtual servers, network devices, storage systems, and various cloud platforms. Your primary goal is to proactively identify and resolve potential issues to ensure the unwavering stability, optimal performance, and robust security of the entire infrastructure. You'll also be instrumental in implementing and maintaining sophisticated infrastructure monitoring and alerting systems to guarantee proactive identification of any issues before they impact operations.
- Server Administration: You will demonstrate expert-level administration of Windows Server and/or Linux environments. This includes meticulous installation, configuration, security hardening, performance tuning, and advanced troubleshooting. You will also manage and maintain critical core infrastructure services such as Active Directory, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol), ensuring seamless user authentication, resource resolution, and network address management.
- Network Management: You will expertly manage and maintain the network infrastructure, encompassing routers, switches, firewalls, and VPNs (Virtual Private Networks). Your responsibilities include continuously monitoring network performance to identify bottlenecks, swiftly troubleshooting network connectivity issues to restore service, and implementing robust network security measures to protect against unauthorized access and cyber threats.
- Storage Administration: You will diligently manage and maintain storage systems, including both SAN (Storage Area Network) and NAS (Network Attached Storage) devices. Your critical tasks involve ensuring data integrity through various validation methods, guaranteeing data availability through redundancy and replication, and ensuring security through robust backups, replication strategies, and disaster recovery planning to protect against data loss and ensure business continuity.
- Cloud Infrastructure: You bring extensive experience with leading cloud platforms such as Google Cloud, Azure, and AWS (Amazon Web Services). This includes deep knowledge of cloud architecture, managing virtualization in cloud environments, implementing and maintaining hybrid environments (connecting on-premises to cloud), and ensuring comprehensive cloud security. You will manage and maintain various cloud resources, including virtual machines, storage accounts, and networking components within these cloud ecosystems.
- Infrastructure Projects: You will take a leading role in leading and managing complex infrastructure projects. These projects include vital initiatives such as large-scale system migrations (e.g., to cloud, new hardware), significant upgrades (e.g., OS, hardware, software versions), and large-scale deployments of new systems or services. You will meticulously develop project plans, timelines, and budgets, ensuring all projects are completed on time and within financial parameters.
- Automation and Scripting: You will actively develop and maintain scripts using languages such as PowerShell, Bash, or Python. These scripts are designed to automate administrative tasks, streamline the deployment of infrastructure components, and develop custom solutions that address specific operational needs. Your efforts in automation will significantly improve operational efficiency and reduce manual effort across the IT environment.
- Mentorship: You will provide invaluable guidance and mentorship to junior infrastructure administrators, sharing your extensive knowledge and expertise. Your contributions to their professional development will strengthen the overall capabilities of the IT team, fostering a culture of continuous learning and growth.
Knowledge / Skills / Abilities: Your Core Competencies
- Server Administration: You possess expert-level proficiency with Windows Server and/or Linux administration, including in-depth knowledge of configuration, security hardening, performance tuning, and advanced troubleshooting for enterprise environments. You have a proven track record of managing complex server ecosystems.
- Network Management: You have a strong understanding of networking concepts (e.g., TCP/IP, VLANs, routing protocols, firewalls, VPNs) and extensive experience with managing network devices and infrastructure, ensuring robust and secure connectivity.
- Storage Administration: You bring extensive experience with storage technologies (e.g., SAN, NAS, object storage) and advanced storage administration tasks, including data replication, backup/recovery, and disaster recovery planning.
- Cloud Platforms: You possess a deep understanding of cloud platforms (e.g., Google Cloud, Azure, AWS), including cloud architecture, virtualization strategies for hybrid environments, and comprehensive cloud security best practices.
- Scripting: You have strong scripting skills in PowerShell, Bash, or Python for automating administrative tasks and developing custom solutions, driving efficiency and consistency.
- System Monitoring: You have hands-on experience with infrastructure monitoring tools (e.g., Nagios, Zabbix, SolarWinds, cloud-native monitoring) and the ability to interpret monitoring data to proactively identify and troubleshoot complex issues.
- Troubleshooting: You possess expert analytical and problem-solving skills that enable you to quickly diagnose and resolve complex infrastructure issues, often under pressure, minimizing downtime and impact.
- Security: You have a strong understanding of infrastructure security principles and best practices, including vulnerability management, access control, and threat mitigation strategies.
- Communication: You demonstrate excellent communication skills, both written and verbal, allowing you to effectively interact with diverse technical teams, non-technical audiences, and leadership.
- Leadership: You have a proven ability to lead and mentor junior staff, fostering their growth and contributing to a high-performing team.
- Project Management Track Record: You have a proven track record of managing complex infrastructure projects from initiation to successful completion.
- High-Availability and Disaster Recovery: You possess expertise in managing Windows Server and/or Linux environments, with extensive experience in high-availability solutions, meticulous disaster recovery planning, and advanced performance tuning techniques to ensure continuous operation and optimal system responsiveness.
Education, Competencies, Certifications/Licenses: Your Foundational Expertise
- Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related field is required, coupled with 8 years of experience in IT infrastructure administration. This experience must encompass server and network management, storage solutions, system optimization, and infrastructure security. Alternatively, a High School Diploma and 12 years of equivalent experience in these domains will be considered.
- Preferred Certifications: Industry certifications are highly preferred, validating your expertise. This includes credentials such as Microsoft MCSE (Microsoft Certified Solutions Expert), various Linux certifications (e.g., Red Hat Certified Engineer - RHCE), and AWS Certified Solutions Architect.
Work Environment:
This position operates in a professional office environment with standard office equipment, including computers, telephones, photocopiers, and filing cabinets.
Job Features
Job Category | IT |
Join the team that connects California to the world! Our client is dedicated to advancing education and research statewide by providing a world-class computing network essential for innovation, collaboration, and economic growth. Their organization operates the California Research and Education Network (CalREN), a high-capacity computer network spanning over 8,000 miles of optical fiber. CalREN serves over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.
Our client is seeking a highly experienced and proactive Senior Cybersecurity Analyst. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $115.5K/yr - $144.3K/yr. Reporting to the Manager, Information Security Office, you'll actively serve as a crucial cybersecurity resource on multiple complex projects. You'll initiate and drive security activities to ensure our client's networks, systems, and data are protected and readily available to support the organization's mission to serve the California educational community. Working as part of the core security team, you'll collaborate with members of our client's Security Advisory Committee, peer staff throughout the organization, and external solution partners to establish and enhance security tools, resources, and processes. Your responsibilities will cover data protection, incident response, vulnerability management, email gateway security, identity and access management security architecture, network security monitoring, malware defense, and security awareness training. This position also functions as a vital point of cybersecurity expertise for internal staff and may involve representing our client in technical forums, panel discussions, and conference presentations.
What You Will Do: Driving Comprehensive Cybersecurity for a Critical Network
As a Senior Cybersecurity Analyst, you'll be at the forefront of protecting California's vital Research and Education Network. Your role demands broad cybersecurity expertise, from threat analysis and incident response to vulnerability management and strategic security enhancements.
- Lead Security Activities and Solutions: You'll actively work under limited supervision with members of the Information Security Office (ISO) and extended teams on security solutions and implementations. This involves initiating and driving security activities to ensure our client's networks, systems, and data are robustly protected and continuously available to support the organization's mission to serve the California educational community.
- Serve as a Core ISO Team Member: You'll function as a core member of our client's Information Security Office (ISO), performing diverse security duties. This includes maintaining threat awareness, conducting proactive network traffic analysis to detect anomalies, leading incident response efforts, performing detailed forensic analysis to understand security breaches, and driving the resolution of security incidents. Your vigilance ensures network integrity.
- Collaborate on Security Operations Center (SOC) Development: You will collaborate extensively with our client's Security Advisory Committee, segment leaders, and other security experts around the state to develop strategic plans for establishing and enhancing a Security Operations Center (SOC), ensuring a centralized and proactive approach to network defense.
- Integrate Security into Network Environment: You'll integrate deep knowledge of network protocols, services, threats, vulnerabilities, mitigation strategies, and hardware capabilities. This comprehensive understanding will allow you to build a security environment that effectively reduces and mitigates risk while simultaneously allowing our client’s open science mission to succeed without unnecessary hindrance.
- Evaluate Data for Incident Detection: You'll meticulously evaluate a wide range of security data from various sources, including Zeek (Bro) logs, email security logs, netflow data, centralized syslog, authentication logs, and others, to effectively detect security incidents. Upon detection of suspicious activity, you'll take timely action, which may include blocking problem traffic, sending immediate alerts, and/or initiating in-depth investigations.
- Maintain ISO Documentation and Lead New Projects: You will meticulously maintain ISO documentation and perform updates as needed, ensuring all security processes, configurations, and incident responses are accurately recorded. You'll also work with internal and external stakeholders to lead and complete new ISO projects and initiatives, driving continuous improvement in our client's security posture.
- Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with our client's network security monitoring and SIEM services. This proactive measure ensures that our client's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
- Design and Implement Secure Email Gateway Services: You'll work closely with ISO staff and peer teams to design and implement secure email gateway services. This involves configuring email security solutions to filter malware, phishing attempts, spam, and other email-borne threats, protecting users and systems from a primary attack vector.
- Design and Implement Secure Identity and Access Management Services: You'll collaborate with ISO staff and peer teams to design and implement secure identity and access management (IAM) services. This ensures robust user authentication, authorization, and privileged access management, controlling who can access what resources and safeguarding sensitive data.
- Perform Threat Hunting for Anomalous Activity: You will regularly perform threat hunting to proactively search for anomalous activity within our client's network and systems. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
- Monitor and Respond to Security Alerts: You'll be responsible for monitoring and responding to security alerts generated by various tools. This involves triaging alerts, assessing their severity, and initiating appropriate response actions to mitigate potential threats quickly.
- Maintain Vulnerability Management Asset Inventory: You'll meticulously maintain the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
- Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report, summarizing key findings from regular vulnerability scans for internal and external stakeholders.
- Create Monthly Enterprise Vulnerability Risk Status Report: You'll prepare a comprehensive monthly enterprise vulnerability risk status report, providing a broader overview of the organization's vulnerability posture, trends, and mitigation efforts to executive leadership.
- Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis, ensuring your cybersecurity skills remain current with the latest industry trends and threat landscapes.
- Lead Incident Response Efforts: You'll take a leading role in incident response efforts, coordinating with internal and external security personnel and system administrators to contain, eradicate, and recover from security incidents.
- Respond to Complaints and Notifications: You'll respond appropriately to internal and/or external complaints and notifications related to security issues (e.g., scanning, hacking, spamming), ensuring proper investigation and resolution.
- Promote a Strong Security Culture: You will actively promote a strong security culture throughout our client’s internal network, consulting with our client's management and staff to foster security awareness and best practices.
- On-Call Availability: You must have the ability to be ‘on call’ outside of regular business hours on a regular and recurring basis, ensuring 24/7/365 readiness for critical incident response.
Key Success Factors: Cultivating Operational Excellence and Innovation
Your success in this role will be defined by a powerful combination of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for our client and its mission.
- Prioritization and Timely Completion: You possess the ability to prioritize and complete tasks assigned in a timely manner, even in a fast-paced environment with rapidly changing priorities.
- Strong Interpersonal and Teamwork Skills: You bring strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships. You are also capable of leading teams to reach consensus on complex security issues.
- Working Knowledge of IP-Based Networking: You have a working knowledge of IP-based networking, understanding fundamental concepts, protocols, and architectures essential for network security.
- Scripting and Data Manipulation Proficiency: You have a working knowledge of scripting using regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
- Background in Statistics and Analytics: You have a background in basic statistics and analytics, and experience with modern analytic and visualization packages (e.g., Tableau, Power BI), enabling data-driven security insights and reporting.
- Adept at Understanding and Learning Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
- Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
- Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of work, ensuring precision in security implementations and analyses.
- Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
- Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with our client.
- Experience Streamlining Operations: You have experience streamlining operational capabilities through standardization and automation, enhancing security operations and reducing manual effort.
- Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for our client's security services, influencing future architectural decisions and technology roadmaps.
- Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize our client's security profile while remaining sensitive to its mission.
- Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
- Knowledge of Encryption Techniques: You have knowledge of public-key and private-key encryption techniques, including DES, RSA, and PGP/GPG.
- Strong Understanding of Complex TCP/IP Networks: You possess a strong understanding of complex TCP/IP networks.
- Knowledge of Layer 2, Wireless, Switching, and Routing Protocols: You have knowledge of Layer 2 protocols, Wireless networking, Switching, and Routing Protocols.
- Familiarity with Virtualized Environments: You have familiarity with securing virtualized environments.
- Familiarity with Research and Education Networks: You have familiarity and experience working on research and education networks, and within Research and Education networking communities in the US or abroad.
Required Education And/Or Experience: Your Foundation
- Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
- Information Security Experience (7+ years): You must have a minimum of 7 years of experience in information security, cybersecurity, or network security engineering design, deployment, and implementation of security solutions. This includes continuous monitoring and making improvements to those solutions, working with the information security and security operations teams.
- Mid-Level Cybersecurity Certification: Certifications and/or equivalent training in a technical security specialty (e.g., GIAC, CISSP) are required, validating your expertise.
- SIEM Experience (4+ years): A minimum of 4 years of experience running and supporting Security Information and Event Management (SIEM) services is required.
- Vulnerability Management Experience (4+ years): A minimum of 4 years of experience running and supporting vulnerability management services is required.
Preferred Education And/Or Experience: Enhancing Your Profile
- Advanced Security Education: A Bachelor's degree in cybersecurity, information assurance, or a related field is preferred.
- SOAR Experience: Experience configuring and supporting security orchestration and automated response (SOAR) services is a plus.
- Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred.
- Unix/Linux Administration: A minimum of 4 years of experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.
Why Work at Our Client? Making a Meaningful Impact
Working at our client offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.
- Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
- Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
- Generous Health Benefits: Our client provides generous medical, dental, vision, and life insurance benefits, ensuring your well-being is prioritized.
- Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
- Investment in Your Future: Our client demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.
Work Environment & Hours:
This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours a day, 7 days a week, 365 days a year availability for incident response needs. An employee’s work shift is based on our client’s business needs.
Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. Our client is unable to sponsor or take over sponsorship of an employment Visa at this time.
Job Features
Job Category | IT, Security |
Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving more than 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.
CENIC is seeking an Associate Director of Network Operations to oversee the strategic direction, performance, and modernization of its vital Network Operations function. This full-time, permanent position, based hybrid in La Mirada, California, offers a competitive salary range of $170K/yr - $200K/yr. While the shift leads manage the day-to-day operations on their respective shifts, the Associate Director provides the strategic leadership, structure, and oversight necessary to enhance service reliability, performance, and accountability across CENIC's network operations. This role is ideal for a seasoned leader with a track record of transforming teams, combining technical fluency, operational discipline, and people-first leadership to build high-performing, responsive, and metrics-driven teams within a culture of continuous improvement.
What You'll Be Doing: Leading Network Operations and Driving Modernization
As the Associate Director of Network Operations, you'll be instrumental in shaping the future of CENIC's world-class network. Your role is a blend of strategic leadership, operational oversight, and continuous improvement, all focused on enhancing service reliability and performance for millions of users.
- Leadership & Organizational Development: You will lead OKR (Objectives and Key Results) activities, offering strategic guidance and enforcing rigor in their implementation across the Network Operations team. You'll actively promote a culture of professionalism, accountability, and collaboration, fostering an environment where team members thrive. Furthermore, you'll provide robust support for staff development through personalized coaching, targeted training initiatives, and effective performance management practices, all designed to foster continuous learning, skill development, and career growth within the team. You'll also engage directly with the HR team and senior leadership to address legacy challenges and strengthen overall team dynamics, ensuring a cohesive and high-performing unit.
- Operational Oversight & Strategy: You will oversee all aspects of network operations, including the 24/7/365 Network Operations Center (NOC). Your leadership will ensure strict alignment with organizational goals and service expectations, guaranteeing that the network delivers on its mission-critical role. You'll meticulously define, implement, and monitor key performance indicators (KPIs), establish robust service level agreements (SLAs), and conduct thorough post-incident reviews (PIRs) to drive accountability and continuous improvement. You'll also spearhead initiatives to improve incident response, problem management, and root cause analysis, identifying areas for greater operational alignment with best practices, such as ITIL and ITSM (IT Service Management) frameworks, and implementing processes to enhance this alignment.
- Tools & Automation: You'll develop a working familiarity with the current toolset used in network operations. Your strategic insight will then guide efforts to assess requirements for enhancing, supplementing, and/or replacing tools in support of more effective monitoring, alerting, and escalation processes. You'll collaborate closely with the engineering team to enhance observability and telemetry across the entire network infrastructure, ensuring comprehensive data collection for proactive management. Furthermore, you'll champion process efficiency, including advocating for and implementing appropriate automation solutions to improve operational outcomes, reduce manual effort, and increase system reliability.
- Cross-Functional Engagement: You will actively review and refine processes to ensure close coordination with other internal functional groups. This includes collaborating seamlessly with teams responsible for network design, cybersecurity, project management, asset management, finance, and member relations, ensuring integrated workflows and shared objectives. You will serve as the primary escalation point of contact and leadership liaison during a major network incident, providing critical guidance and communication during high-impact events. You'll also collaborate with the rest of the management team on broader process improvements to ensure timely communication and strong accountability both within and across various teams.
Key Success Factors: Cultivating Operational Excellence and Innovation
Your success in this role will hinge on a powerful combination of leadership, technical depth, and a commitment to continuous improvement, all within the context of a vital educational and research network.
- Strong Organizational and Leadership Skills: You possess strong organizational and leadership skills, with a proven ability to effectively manage multiple competing priorities in a fast-paced, dynamic environment. Your leadership will inspire confidence and drive results.
- Deep Technical Expertise in Network Operations: You bring deep technical expertise in network operations, encompassing WAN (Wide Area Network), MAN (Metropolitan Area Network), and optical transport environments. This includes a comprehensive understanding of their design, implementation, and troubleshooting.
- Proven Track Record in Managing Operational Teams: You have a proven track record of effectively managing operational teams and fostering a collaborative culture. Your experience demonstrates your ability to build, motivate, and guide high-performing teams to achieve ambitious goals.
- Exceptional Problem-Solving Skills: You possess exceptional problem-solving skills, with a distinct focus on proactive issue resolution. You're adept at diagnosing complex network problems, identifying root causes, and implementing effective, long-term solutions.
- Excellent Communication Skills: You have excellent communication skills, enabling you to articulate complex technical concepts clearly to diverse stakeholders at all levels, from engineers to executive leadership and external partners.
Required Education And/Or Experience: Your Foundation
- Educational Background: A Bachelor's degree in Computer Science, Information Technology, or a related technical field (or equivalent experience) is required. This academic foundation provides the essential theoretical knowledge for advanced network operations and management.
- Extensive Network Experience with Management Focus: You must possess a minimum of 10 years of experience in network engineering or operations, with at least 5 years in a management role. This extensive background demonstrates a seasoned professional capable of both deep technical understanding and effective team leadership within complex network environments.
- Expertise in Managing Live Production Networks: You have expertise in managing live production networks in dynamic environments, including advanced troubleshooting skills. This highlights your ability to ensure continuous availability and performance of critical network infrastructure under real-world operating conditions.
- Experience with Key Tools and Methodologies: You bring practical experience with monitoring tools (for network health and performance), automation frameworks (for streamlining operations), and change management processes (for controlled deployments and updates).
- Network Security Principles: You have proven experience in applying network security principles and practices, ensuring that network operations are conducted with a strong focus on data protection and threat mitigation.
- Standards-Based Frameworks: You have experience implementing a standards-based framework, such as ITIL (Information Technology Infrastructure Library), to promote best practices in IT service management and operational efficiency.
Preferred Education And/Or Experience: Enhancing Your Leadership Profile
- Large Commercial Service Provider Networks: Experience working with large commercial service provider networks is a plus, providing valuable context on high-scale, carrier-grade operations.
- High-Performance Research Networks: Experience working with high-performance research networks is desirable, indicating familiarity with cutting-edge networking demands and innovative applications.
- Deep Networking Protocol Knowledge: Familiarity with operating and troubleshooting networks at Layers 1-3 (Physical, Data Link, Network layers), as well as with advanced networking protocols, is preferred, demonstrating a comprehensive understanding of network fundamentals.
- Master's Degree: A Master's degree in a related technical or management field is a plus, indicating advanced academic specialization and leadership potential.
Why Work at CENIC? Making a Meaningful Impact
Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.
- Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
- Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
- Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
- Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
- Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.
Work Environment & Hours:
This position operates in a professional office environment with standard office equipment. The regular workweek is Monday through Friday, 8:00 a.m. to 5:00 p.m. The Network Operations Center is a 24-hour per day/7 days per week/365 days per year operation, meaning evening and weekend work may be required based on CENIC’s business demands.
Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.
Job Features
Job Category | IT, Security |
Our client, a prominent organization in the Information Technology sector, is looking for a skilled IAM Cybersecurity Engineer. This permanent position is based hybrid in Walnut Creek, California, requiring 3 days in the office per week. This role is crucial for leading projects to design, implement, and enhance cybersecurity controls, thereby protecting a large and complex IT environment. You'll be a key player in ensuring ongoing support, mentoring junior team members, and fulfilling routine cybersecurity tasks.
At AAA, their team members strive to deliver exceptional service, helping their Members outsmart life’s roadblocks. They believe everything you do outside of work adds to who you are at work, fostering a mission to create Members for life by unleashing the innovative spirit of their Team Members. Join a collaborative environment where your contributions are highly valued.
Why Work For This Organization?
- Great Pay: Opportunity to participate in a discretionary annual incentive plan or other incentive plans, depending on your position, offering competitive compensation.
- 401k Matching: Benefit from a generous $1 for $1 company match, up to 6% of eligible earnings per pay period, securing your financial future.
- Comprehensive Benefits: Access robust medical, dental, and vision insurance, along with a wellness program and other comprehensive benefits.
- Paid Holidays: Enjoy paid holidays, promoting work-life balance.
- Paid Time Off: Team Members accrue paid time off monthly, and depending on your position, an additional 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
- Collaborative Environment: Work in a collaborative environment where your contribution to providing exceptional service to members is highly valued.
- Free AAA Classic Membership: Receive a complimentary AAA Classic Membership, providing access to exclusive member benefits.
- AAA Product Discounts: Enjoy discounts on various AAA products, adding extra value.
- Tuition Reimbursement Program: Benefit from a Tuition Reimbursement Program, supporting your continuous learning and professional development.
Job Summary: Leading Cybersecurity Controls and Mentoring Talent
The IAM Cybersecurity Engineer plays a pivotal role in strengthening the overall cybersecurity posture of Mountain West Group. Reporting to the Director, Cyber Security and Network Engineering, this position demands proficiency across all aspects of information security. You will provide ongoing support and mentorship to more junior team members, ensuring their growth and development, while also expertly fulfilling routine cybersecurity tasks. A core responsibility includes rigorously testing the effectiveness of security controls and providing strategic advice to business partners on a wide range of cybersecurity topics.
Responsibilities / Job Duties: Driving Security Enhancements and Compliance
As an IAM Cybersecurity Engineer, your responsibilities will blend hands-on technical execution with strategic oversight and cross-functional collaboration, ensuring the robust protection of a complex IT environment.
- Respond to Cybersecurity-Related Requests: You will be the primary point of contact for responding to cybersecurity-related requests, taking appropriate action, which includes meticulously approving, fulfilling, or rejecting requests. This requires careful assessment of security implications and working closely with business partners to meet their legitimate needs while maintaining security standards. Your judgment ensures that all access and changes adhere to strict security protocols.
- Manage and Maintain Cybersecurity Tools: You will be responsible for the full lifecycle of managing and maintaining cybersecurity tools. This encompasses applying necessary patches to keep tools updated and secure, as well as overseeing the onboarding and offboarding of these tools within the security ecosystem. Your diligence ensures that security tools are always operational, effective, and fully integrated into the security infrastructure.
- Manage Projects, Initiatives, and Changes: You will take a leading role in managing cybersecurity projects, initiatives, and changes. This involves comprehensive planning to define scope and objectives, meticulous scheduling to ensure timely delivery, seamless implementation of new security controls or systems, and rigorous reporting of status to all relevant stakeholders. Your project management skills will be crucial for successful security enhancements.
- Audit and Improve Security Controls: You will actively audit various security controls, including firewall rules, cloud and SaaS security configurations, and API controls. Through these audits, you will meticulously recommend improvements to enhance their effectiveness, mitigate risks, and ensure compliance with internal policies and industry best practices. Your proactive approach strengthens the organization's defense mechanisms.
- Detect and Remediate Vulnerabilities: You will work in close collaboration with application, cloud, and infrastructure teams to effectively detect and remediate vulnerabilities. This includes identifying weaknesses in system configurations and in-house developed software. Your efforts will minimize the attack surface and strengthen the overall security posture by ensuring that known flaws are addressed promptly and effectively.
- Conduct Periodic Testing of Security Controls and Establish Metrics: You will regularly conduct periodic testing of security controls to evaluate their effectiveness. This involves performing various assessments to ensure controls are functioning as intended and providing the expected level of protection. Based on these evaluations, you will recommend improvements and establish and collect risk-based metrics to measure control effectiveness and overall security posture, informing data-driven security decisions.
- Assist with Development of Security Requirements: You will provide crucial assistance in the development of security requirements and assessment procedures for business use of technologies. This involves translating business needs into actionable security mandates, ensuring that new technologies and applications are securely designed and implemented from the outset.
- Other Duties as Assigned: You will be flexible and willing to perform other duties as assigned by the Director, Cyber Security and Network Engineering, contributing to the overall success and adaptability of the cybersecurity department.
Knowledge, Skills, and Abilities: Your Core Competencies
- Ability to Lead Individual Projects: You possess the proven ability to lead individual projects from conception to completion, demonstrating strong project management and ownership skills.
- Strong Oral and Written Communication Skills: You have strong oral and written communication skills, essential for articulating complex cybersecurity concepts clearly to technical teams, business partners, and leadership.
- Act as a Team Player: You are a natural team player, demonstrating a collaborative spirit and contributing positively to group efforts and shared security goals.
- Act with a Sense of Urgency: You act with a sense of urgency to effectively resolve requests and respond to incidents, recognizing the critical nature of cybersecurity operations.
- Ability to Weigh Request Reasonableness: You have the discerning ability to weigh whether a request is reasonable before fulfilling it, ensuring that security is balanced with operational needs and that exceptions are justified.
Education, Competencies, Certifications/Licenses: Your Foundational Expertise
- Educational Background: A Bachelor’s Degree in Information Technology or a related field, or equivalent work experience and education, is required.
- Information Technology Field Experience (5+ years): You must have 5+ years of experience in the information technology field, demonstrating a broad understanding of IT systems and operations.
- Cybersecurity Experience (4-7 years): You possess 4-7 years of dedicated cybersecurity experience, indicating significant practical knowledge of security principles and practices.
- Core Security Concepts Application (1+ year): You have at least one year of experience in one or two applications of core security concepts, including:
- Security Operations and Administrations: Daily management and oversight of security tools and processes.
- Access Controls: Managing and enforcing user permissions and system access.
- Risk Identification, Monitoring, and Analysis: Proactively identifying, tracking, and assessing security risks.
- Incident Response and Recovery: Handling security breaches and restoring systems.
- Cryptography: Understanding encryption and secure communication.
- Network and Communications Security: Securing network infrastructure and data in transit.
- Systems and Application Security: Protecting operating systems and software applications from vulnerabilities.
- Information or Cyber Security Certification: You hold a valid Information or Cyber Security Certification (e.g., CompTIA Security+, CySA+, CEH).
Preferred Qualifications: Enhancing Your Profile
- Project Management Experience: 2 years of project management experience is preferred, further strengthening your ability to lead initiatives.
- Advanced Certifications: Certified Information Systems Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) certifications are highly preferred, validating expert-level knowledge in information security and cloud security respectively.
What We Offer: Rewarding Your Contributions
- Competitive Salary and Incentives: Enjoy competitive pay with the opportunity to participate in a discretionary annual incentive plan or other incentive plans, reflecting the value of your contributions. The compensation range is targeted between Min: $129,223.00 - Mid: $161,528.00 - Max: $193,834.00, with all offers subject to a fair pay analysis.
- Robust 401k Matching: Benefit from a strong 401k matching program, with $1 for $1 company match up to 6% of eligible earnings per pay period, significantly boosting your retirement savings.
- Comprehensive Benefits Package: Access robust medical, dental, and vision coverage, along with a wellness program and more, ensuring your health and well-being are prioritized.
- Paid Time Off and Holidays: Enjoy generous paid holidays and monthly accrual of paid time off. Additionally, 24 hours per year are earmarked for volunteer activities, encouraging community engagement.
- Collaborative Environment: Work in a highly collaborative environment where your contributions to providing exceptional service to members are genuinely valued.
- Free AAA Classic Membership and Product Discounts: Receive a complimentary AAA Classic Membership and enjoy discounts on various AAA products, providing extra perks.
- Tuition Reimbursement Program: Take advantage of a Tuition Reimbursement Program, supporting your continuous learning and professional development.
Job Features
Job Category | IT, Security |
Cybersecurity Engineer (Permanent - Hybrid - La Mirada, CA)
Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.
Position Summary: Advancing Cybersecurity for California's Research & Education Network
This is a full-time, permanent position within the CENIC Information Security Office (ISO), offering a hybrid work model based out of La Mirada, California. The Cybersecurity Engineer reports directly to the Manager of the Information Security Office, undertaking a broad and critical range of technical cybersecurity, operational cybersecurity, and general administrative support duties. You'll be instrumental in diverse areas, including vulnerability management, ticket handling, security documentation, email gateway security, identity and access management security, network security monitoring, and various security audit and administrative tasks. The successful Cybersecurity Engineer will play a pivotal role in advancing CENIC's ISO team efforts, providing essential information security services and support to CENIC and its Charter Associate members, thereby safeguarding a network vital to millions.
Supervisory Responsibility: None.
What You Will Do: Core Functions in Network Security & Operations
As a Cybersecurity Engineer, you'll be on the front lines of protecting a critical research and education network. Your responsibilities will span system implementation, threat mitigation, incident response, and continuous improvement in security practices.
- Build and Implement Enterprise-Class Security Systems: You'll be responsible for meticulously building and implementing enterprise-class security systems within a live production environment. This involves deploying robust security controls, tools, and platforms designed to protect a high-capacity, high-traffic network serving millions of users. Your work ensures that the network's defenses are continuously strengthened against evolving threats.
- Align Security with Business and Technology Strategy: You'll actively align security standards, frameworks, and practices with the overall business and technology strategy of CENIC. This involves understanding organizational goals, technical roadmaps, and ensuring that security initiatives are integrated seamlessly, contributing to strategic objectives while meeting critical customer and regulatory requirements.
- Implement Security Processes to Mitigate Emerging Threats: You'll design and implement proactive security processes specifically aimed at identifying and mitigating emerging threats. This includes developing procedures for threat intelligence integration, vulnerability assessment, incident response, and continuous monitoring to ensure that CENIC's defenses can adapt rapidly to new attack vectors and evolving cyber risks.
- Code, Test, and Debug Applications for Security Solutions: You'll leverage current programming languages and technologies to write code, complete programming tasks, and perform rigorous testing and debugging of applications. This coding capability will be applied directly to developing and enhancing security solutions, automating security processes, and ensuring the reliability and performance of tools used in cybersecurity operations.
- Support Security Implementations Under Senior Guidance: You'll work under the limited direction and supervision of senior members of the ISO team on complex security solutions and implementations. This collaborative approach allows you to contribute to high-impact projects while gaining valuable mentorship and technical guidance from experienced cybersecurity professionals, ensuring successful project outcomes.
- Process and Update Service Desk Tickets: You'll be responsible for efficient service desk ticket processing and updates related to information security. This involves receiving, categorizing, prioritizing, and diligently resolving security-related incidents and service requests, ensuring timely resolution and clear communication with affected users and teams.
- Administer and Utilize Information Security Tools: You'll actively use and administer a wide range of information security tools and services. This includes platforms for vulnerability management, network security monitoring (NSM), Endpoint Detection and Response (EDR), email security gateways, Security Information and Event Management (SIEM) systems, alert management platforms, and Identity Management (IdM) security tools. You'll also utilize network analysis tools like nmap, tcpdump, and Wireshark for deep packet inspection and network forensics.
- Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with CENIC's network security monitoring and SIEM services. This proactive measure ensures that the organization's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
- Perform Threat Hunting for Anomalous Activity: You'll regularly perform threat hunting to proactively search for anomalous activity within CENIC's network and systems during standard ISO business hours. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
- 24/7 Monitoring and Incident Response (On-Call Rotation): You'll be responsible for 24/7 monitoring and responding to security alerts as a rotating member of the ISO escalations team. This critical on-call duty ensures that security incidents are addressed promptly around the clock, minimizing potential impact on CENIC's network and services, and maintaining continuous security vigilance.
- Maintain Vulnerability Management Asset Inventory: You'll be responsible for meticulously maintaining the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
- Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report. This involves generating and analyzing reports from regular vulnerability scans, summarizing key findings, and presenting them in a clear and actionable format for relevant stakeholders.
- Create Monthly Enterprise Vulnerability Risk Status Report: You'll meticulously create the monthly enterprise vulnerability risk status report. This comprehensive report provides a broader overview of the organization's overall vulnerability posture, trends, identified risks, and the effectiveness of mitigation efforts to executive leadership and other key stakeholders.
- Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis. This commitment to continuous learning ensures that your cybersecurity skills remain current with the latest industry trends, technologies, and threat landscapes, supporting your professional development.
- Provide Other CENIC Business User Security Assistance: You'll provide other CENIC business user security assistance as needs dictate. This involves offering guidance on secure practices, addressing user-specific security concerns, and supporting the broader user community in maintaining a secure digital environment.
- Improve CENIC's Privacy and Security Practices: You'll continuously look for opportunities, procedures, and tools to improve CENIC's privacy and security practices. This proactive mindset drives innovation, streamlines processes, and enhances the overall security and privacy profile of the organization, aligning with best practices.
- Collaborate on Software Tools and Solutions: You'll work closely with the CENIC Security Team to identify, discuss, and implement software tools and solutions in support of CENIC’s networks, network security designs, and the effective implementation of network security policies, procedures, and technologies. This ensures a collaborative and integrated approach to security enhancement.
Key Success Factors: Driving Security Excellence
Success in this role will be defined by a blend of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for CENIC.
- Consulting and Engineering Security Best Practices: You'll excel at consulting and engineering in the development and design of security best practices and the implementation of solid security principles across the organization. Your contributions will help meet business goals, stringent customer demands, and evolving regulatory requirements.
- Understanding Cloud Computing Security Considerations: You possess a deep understanding of security considerations related to cloud computing. This includes knowledge of risks such as data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, Advanced Persistent Threats (APTs), data loss, and Denial of Service (DoS) attacks, enabling you to design secure cloud solutions.
- Expertise in Identity and Access Management (IAM): You have expert knowledge of Identity and Access Management (IAM)—the comprehensive framework of security policies and technologies that limit and meticulously track the access of individuals and entities within an organization to sensitive technology resources.
- Security-Centric Software Development: You have proven experience developing software and proficiency in coding, using a security-centric approach. This means integrating security considerations throughout the software development lifecycle, building secure applications, and conducting security testing.
- Experience using Zeek network security monitoring (NSM) and host intrusion detection systems (HIDS) is crucial.
- IDS Script and Signature Development: You possess skills in IDS (Intrusion Detection System) script and signature development, enabling you to create custom rules for detecting specific threats or anomalous behaviors.
- Hands-on Network/Packet Level Examination: You are adept at hands-on network/packet level examination using tools such as tcpdump or Wireshark. This allows for deep forensic analysis of network traffic to diagnose security incidents and understand attack methodologies.
- Data and Text Manipulation Proficiency: You have a working knowledge of regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
- Operational Streamlining through Standardization and Automation: You have proven experience streamlining operational capabilities through standardization and automation. This demonstrates your ability to identify inefficiencies and implement automated solutions that enhance security operations and reduce manual effort.
- Multi-Tasking and Adaptability: You are highly adept at working on multiple tasks concurrently and can respond effectively to rapidly changing priorities in a fast-paced security environment.
- Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for CENIC's security services, influencing future architectural decisions and technology roadmaps.
- Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize CENIC's security profile while remaining sensitive to its mission.
- Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
- Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
- Strong Interpersonal and Teamwork Skills: You possess strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships.
- Working Knowledge of IP-Based Networking: You have a solid working knowledge of IP-based networking, including fundamental concepts, protocols, and architectures, crucial for network security.
- Background in Basic Statistics and Analytics: You have a background in basic statistics and analytics and experience with modern analytics and visualization packages (e.g., Tableau, Power BI). This enables data-driven security insights and reporting.
- Adept at Understanding Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
- Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of your work, ensuring precision in security implementations and analyses.
- Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
- Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with CENIC.
Required Education And/Or Experience: Your Foundation
- Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
- Information Security Experience (2-4 years): You must have 2-4 years of experience in information security, cybersecurity, or network security engineering, specifically focusing on the design, deployment, and implementation of security solutions. Alternatively, an equivalent combination of education, certifications, and experience will be considered.
- Mid-Level Cybersecurity Certification: A mid-level cybersecurity certification like CompTIA CySA+, SANS GSEC, or an equivalent credential, is required, validating your foundational and practical cybersecurity knowledge.
Preferred Education And/Or Experience: Enhancing Your Profile
- Advanced Security Education: A BA/BS in information security, information assurance, cybersecurity, or equivalent experience is preferred, indicating a specialized academic focus.
- Working Knowledge of Computer and Network Security: A strong working knowledge of computer and network security principles is desirable.
- Advanced-Level Cybersecurity Certification: An advanced-level cybersecurity certification like (ISC)2 CISSP (Certified Information Systems Security Professional), SANS GCIA (GIAC Certified Intrusion Analyst), or an equivalent is highly preferred, demonstrating expert-level security knowledge.
- Logging Environment Experience: Experience with logging environments such as Elastic (ELK Stack) or Splunk for security information and event management is a plus.
- Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred, enhancing automation and tool development capabilities.
- Unix/Linux Administration: A minimum of 2 years experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.
- Distributed Team Interpersonal Skills: Strong interpersonal skills and the ability to work effectively in a distributed team environment are desirable for this position.
Why Work at CENIC? Making a Meaningful Impact
Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.
- Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
- Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
- Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
- Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
- Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.
Work Environment & Hours:
This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours per day/7 days per week/365 days per year availability for incident response needs. An employee’s work shift is based on CENIC’s business needs.
Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.
We're partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They're looking for a highly skilled Software Systems Developer to join their team. This permanent position, based fully onsite in Gray, Tennessee, is critical for optimizing internal systems and enhancing performance through custom software development and robust IT infrastructure.
As a Software Systems Developer, you'll be responsible for designing, planning, and implementing technical solutions based on cross-functional requirements. You'll work closely with various teams to understand operational needs and translate them into scalable, maintainable software systems.
What You'll Be Doing: Building Integrated Technology Solutions
As a Software Systems Developer, you'll be at the heart of developing and enhancing the custom software that drives the client's business operations. Your role will blend technical design, hands-on development, and deep collaboration to create scalable, maintainable, and efficient systems.
- Gather Requirements and Implement Tailored Software Solutions: You'll start by meticulously gathering requirements from various business stakeholders, thoroughly understanding their operational needs and challenges. You'll then translate these requirements into detailed technical specifications and proceed to implement tailored software solutions that precisely address those needs, ensuring the delivered software directly optimizes business processes.
- Collaborate with the IT Team on Infrastructure: You'll work in close collaboration with the IT team to ensure that the underlying infrastructure effectively supports the software solutions you develop. This involves ensuring that network, server, and other IT components are configured for optimal performance, security, and scalability, guaranteeing that applications run efficiently and reliably.
- Maintain, Extend, and Integrate Internal Software Systems: You'll be responsible for the ongoing maintenance, extension, and integration of various internal software systems. This includes debugging existing code, adding new features to enhance functionality, and ensuring seamless communication and data exchange between different applications across the organization's technology landscape.
- Design, Administer, and Optimize MS SQL Server Databases: A core responsibility will involve deep engagement with data. You'll design, administer, and optimize MS SQL Server databases, ensuring they are structured for efficiency, scalability, and data integrity. This includes schema design, writing complex queries, optimizing stored procedures, managing user access, and performing routine maintenance to ensure peak database performance.
- Develop and Maintain Custom Reports: You'll be instrumental in enabling data-driven decision-making by developing and maintaining custom reports. This involves extracting data using various methods, creating insightful dashboards, and building reports using specialized tools like SSRS (SQL Server Reporting Services) and Crystal Reports. Your work will provide critical business intelligence, transforming raw data into actionable insights.
- Automate Business Processes: You'll drive operational efficiency by automating business processes. This involves leveraging your technical skills in SQL for data-driven automation, integrating solutions via APIs, and building custom applications that streamline workflows, reduce manual effort, and enhance productivity across various departments.
- Manage Source Control and Maintain Codebase: You'll meticulously manage source control for software projects, ensuring proper versioning, branching, and merging of code. Your commitment to maintaining a clean, extensible codebase will promote long-term maintainability, facilitate team collaboration, and support future enhancements.
- Document System Modifications and Customizations: You'll thoroughly document all system modifications and customizations for future reference. This includes creating technical specifications, architectural diagrams, user guides, and troubleshooting procedures. High-quality documentation is vital for knowledge transfer, onboarding new team members, and ensuring the long-term supportability of the developed systems.
What's Needed: Your Technical Qualifications
To excel as a Software Systems Developer, you'll need strong expertise in SQL Server, object-oriented programming, full-stack development, and a solid understanding of IT infrastructure.
- Strong Expertise in SQL Server Development and Architecture: You must possess strong expertise in SQL Server development and architecture. This includes advanced proficiency in writing T-SQL, designing database schemas, optimizing queries and stored procedures, and understanding SQL Server's architectural components for high performance and scalability.
- Proficiency in Object-Oriented Programming and Software Design: You're required to have proficiency in object-oriented programming (OOP) principles and strong knowledge of software design principles. This ensures you can build modular, maintainable, and scalable software solutions.
- Full-Stack Development Experience: You have proven experience with full-stack development, demonstrating your ability to contribute across all layers of a software application. This includes expertise in database technologies (SQL Server), server-side logic (C#, VB.Net, MVC/Web API), and client-side technologies (JavaScript, HTML5).
- Ability to Debug and Test Applications: You possess the ability to debug and test applications effectively within various integrated development environments (IDEs) and web browsers. This includes utilizing debugging tools, writing unit tests, and performing integration testing to ensure software quality and functionality.
- Solid Understanding of IT Infrastructure: You have a solid understanding of core IT infrastructure, including networking fundamentals (TCP/IP, LAN/WAN), operating systems (Windows, Linux), databases (SQL Server), and Active Directory (identity and access management). This holistic view enables you to design and troubleshoot integrated solutions.
- Excellent Communication and Interpersonal Skills: You bring excellent communication and interpersonal skills. This is crucial for effectively gathering requirements from diverse teams, collaborating with technical and non-technical stakeholders, and presenting solutions clearly.
- Self-Motivated with Strong Time Management: You are self-motivated with strong time management and task prioritization abilities. This indicates your capacity to manage your workload effectively, meet deadlines, and drive projects to completion independently.
- Capable of Providing Project Updates: You are capable of providing clear and concise project updates and timelines to leadership, ensuring proper visibility and alignment on project status and progress.
Education & Technical Skills:
- Bachelor's Degree: A Bachelor's degree in Information Technology or a related field, or equivalent experience, is required.
- MS SQL Development, Management, and Administration: Proficiency in MS SQL development, management, and administration.
- Programming Languages: Experience with C#, VB.Net, JavaScript, and HTML5.
- Web Development: Familiarity with MVC/Web API development.
- Source Control: Experience with source control systems and version management.
Job Features
Job Category | Engineering |
A leading financial firm is looking for a highly skilled and strategic Senior Infrastructure Security Engineer to join their vital Information Security team. This permanent position, based onsite in New York, NY, is crucial for strengthening and continuously evolving the company's robust infrastructure security within a complex, high-stakes, and fast-paced IT environment.
What You'll Do: Driving Advanced Infrastructure Security
As a Senior Infrastructure Security Engineer, you'll be on the front lines, designing, implementing, and enhancing the security posture of critical systems. Your role blends deep technical expertise with strategic leadership and cross-functional collaboration, ensuring top-tier security within a demanding financial landscape.
- Collaborate Across Teams to Enhance Security: You'll be instrumental in collaborating across various teams to proactively support and continuously enhance the company's overall security posture. This involves engaging with development, operations, cloud engineering, and other IT departments to embed security throughout the entire system lifecycle, ensuring a cohesive and strong defense strategy.
- Conduct Thorough Security Assessments: You'll regularly conduct comprehensive security assessments for both new and existing systems. This includes meticulously evaluating infrastructure components, applications, and configurations for vulnerabilities, misconfigurations, and adherence to security best practices. Your assessments will identify potential risks and inform remediation efforts, hardening the firm's digital defenses.
- Design, Develop, and Maintain Security Tools: You'll take a hands-on approach to security by actively designing, developing, and maintaining custom tools that improve internal security operations. This involves automating security tasks, building dashboards for monitoring security metrics, and creating utilities that enhance vulnerability management, threat detection, or incident response capabilities, thereby increasing the efficiency and effectiveness of the security team.
- Lead Strategic Security Initiatives: You'll spearhead critical and strategic security initiatives that directly shape the firm's defense capabilities. This includes:
- Implementing Zero Trust architecture in Linux environments: Leading the design and deployment of Zero Trust principles within the Linux ecosystem, ensuring no user or device is trusted by default, regardless of whether they are inside or outside the network.
- Shaping security frameworks for AI infrastructure: Developing and defining robust security frameworks specifically tailored for the unique challenges and risks associated with Artificial Intelligence (AI) infrastructure, ensuring the integrity, confidentiality, and availability of AI models and data.
- Integrating TLS client authentication into existing systems: Leading efforts to integrate TLS (Transport Layer Security) client authentication into existing systems, enhancing cryptographic security and ensuring mutual authentication between clients and servers.
What You'll Bring: Essential Expertise for Security Leadership
To excel as a Senior Infrastructure Security Engineer, you'll need extensive experience in infrastructure or site reliability engineering, a strong grasp of security fundamentals, and proficiency in programming.
- Extensive Infrastructure or Site Reliability Engineering Experience: You must possess 10+ years of verifiable experience in infrastructure or Site Reliability Engineering (SRE), coupled with a strong track record of hands-on security implementation. This extensive background demonstrates your ability to build, maintain, and secure complex, highly available systems at scale.
- Strong Grasp of Security Fundamentals: You're required to have a strong, in-depth grasp of security fundamentals, including:
- Protocols: Deep understanding of secure communication protocols such as TLS (Transport Layer Security) for encryption, OIDC (OpenID Connect) for identity verification, and FIDO2 for strong, passwordless authentication.
- Cryptography: Solid knowledge of cryptographic principles, including encryption algorithms, hashing, digital signatures, and key management best practices.
- Access Control: Expertise in various access control models (e.g., RBAC, ABAC), privilege management, and securing access to critical resources.
- Application Security: A thorough understanding of common application security vulnerabilities and remediation techniques, including familiarity with concepts like the OWASP Top 10 web application security risks.
- Proficiency in Programming and Modern Development Practices: You must be proficient in at least one programming language (e.g., Python, Go, Java, C++), enabling you to develop security tools, automate processes, and conduct code reviews. This is coupled with familiarity with modern development practices such as DevOps, CI/CD, and Infrastructure as Code.
- Eagerness to Learn and Contribute: You demonstrate a genuine eagerness to learn and contribute beyond your core responsibilities, especially in rapidly evolving and emerging areas like AI security. This proactive mindset and commitment to continuous learning are vital in the dynamic cybersecurity landscape.
- Strong Communication Skills: You possess strong communication skills, both verbal and written, with the crucial ability to explain complex technical concepts clearly to non-technical stakeholders. This ensures that security risks and recommendations are understood across all levels of the organization, facilitating informed strategic decision-making.
Why This Role? Impact, Growth, and Exceptional Compensation
This permanent Senior Infrastructure Security Engineer position in New York, NY, offers a compelling environment for professional growth and significant impact within a leading financial firm.
- Exceptional Compensation Package: You'll receive a competitive base salary ranging from USD $250,000 to $300,000, reflecting the senior-level expertise and critical nature of this role. This is complemented by a first-year guaranteed bonus, providing immediate recognition for your contributions.
- Comprehensive Benefits: Access a comprehensive benefits package that prioritizes your well-being, including robust health and prescription coverage, generous 401(k) matching to support your long-term financial goals, wellness and family support programs, and charitable donation matching, allowing you to contribute to causes you care about.
- Pivotal Role in Financial Security: You'll play a pivotal role in strengthening and evolving infrastructure security for a leading financial firm. Your work directly protects highly sensitive data and critical financial systems from sophisticated cyber threats, offering a profound sense of purpose and high-impact contributions.
- Exposure to Complex IT Environment: You will gain extensive exposure to a complex and fast-paced IT environment, challenging your skills and deepening your expertise in securing distributed systems, cloud infrastructure, and cutting-edge technologies.
- Leadership in Strategic Initiatives: You'll have the opportunity to lead strategic initiatives such as implementing Zero Trust architecture and shaping security frameworks for AI infrastructure, positioning you at the forefront of cybersecurity innovation.
Job Features
Job Category | IT, Security |
Glocomms has partnered with a leading financial systems firm to find a security-focused engineer who will support their enterprise encryption and digital identity systems. This permanent position, based hybrid in North Bergen, New Jersey, centers on managing certificate-based authentication, maintaining secure key infrastructure, and automating related processes to support internal and external communications.
What You'll Be Doing: Safeguarding Digital Identity and Encryption
As a Security Engineer specializing in Digital Identity & Encryption, you'll be instrumental in protecting sensitive financial data and communications. Your responsibilities will blend technical administration with proactive problem-solving and automation, ensuring the integrity and confidentiality of critical information.
- Administer and Monitor Digital Certificate Systems: You'll meticulously administer and monitor digital certificate systems. This involves managing the issuance, renewal, revocation, and overall lifecycle of X.509 certificates used for various authentication and encryption purposes across the enterprise. Your vigilance ensures that all digital identities are valid and secure.
- Maintain Internal Encryption Infrastructure: You'll be responsible for maintaining the internal encryption infrastructure and its related services. This includes overseeing Hardware Security Modules (HSMs), key management systems (KMS), and other cryptographic solutions. Your work ensures that data remains protected, whether in transit or at rest, safeguarding sensitive financial information.
- Implement and Enforce Secure Key Usage Policies: You will develop, implement, and rigorously enforce policies for secure key usage and lifecycle management. This involves defining standards for key generation, storage, distribution, rotation, and destruction, ensuring that cryptographic keys are protected throughout their entire lifecycle and used in compliance with best practices and regulatory requirements.
- Troubleshoot and Resolve Certificate-Based Authentication Issues: You'll expertly troubleshoot and resolve issues related to certificate-based authentication. This involves diagnosing problems with client authentication, server authentication, VPNs, web applications, or other systems relying on digital certificates for secure access. Your problem-solving skills will be crucial for quickly restoring secure connectivity.
What's Needed: Your Qualifications for Encryption and Identity Security
To excel as a Security Engineer, you'll need a solid background in cybersecurity or infrastructure, familiarity with key management, and proficiency in automation.
- Cybersecurity or Infrastructure Experience (2+ years): You must possess 2 or more years of verifiable experience in cybersecurity, infrastructure, or closely related fields. This foundational experience demonstrates your understanding of IT environments and security principles.
- Educational Background: A degree in Information Technology, Computer Science, or equivalent experience is required. This academic or practical background provides the essential knowledge for understanding complex technical systems.
- Familiarity with Certificate Authorities and Key Management: You have familiarity with certificate authorities (CAs), understanding their role in issuing and managing digital certificates. You also have knowledge of key management systems (KMS), which secure and manage cryptographic keys, and familiarity with automation tools used in security operations.
- Scripting and Infrastructure Automation Experience: You have hands-on experience with scripting and infrastructure automation. This indicates your ability to write scripts (e.g., PowerShell, Python) to automate routine security tasks, manage configurations, and streamline processes related to digital certificates and encryption.
- Industry Certifications (Plus): Industry certifications like Security+ or CISSP (Certified Information Systems Security Professional) are a significant plus. These certifications validate your expertise and commitment to the cybersecurity field.
- Strong Problem-Solving Skills and Attention to Detail: You will possess strong problem-solving skills to diagnose and resolve complex security issues effectively. Coupled with this, meticulous attention to detail is crucial for ensuring the accuracy of configurations and compliance with security policies.
- Comfort in a Collaborative, Fast-Paced Environment: You are comfortable working in a collaborative, fast-paced environment. This indicates your adaptability, teamwork abilities, and capacity to manage multiple priorities effectively in a dynamic setting.
What We Offer: Benefits and Growth in Financial Systems Security
This permanent Security Engineer role offers a compelling environment for professional growth and significant impact within a leading financial systems firm.
- Competitive Compensation and Incentives: You'll receive a competitive salary complemented by performance-based incentives, directly rewarding your contributions to strengthening the firm's security posture.
- Comprehensive Benefits: Access robust benefits including health, dental, and life insurance options, along with retirement savings plans, ensuring your well-being and financial future are supported.
- Paid Time Off and Family Leave: Benefit from paid time off and family leave policies, promoting work-life balance and supporting your personal and family needs.
- Flexible Hybrid Work Schedule: Enjoy a flexible hybrid work schedule, balancing onsite collaboration with remote flexibility, providing greater autonomy in managing your work environment.
- Professional Development Opportunities: You'll have opportunities for professional development and training, allowing you to continuously enhance your skills and expertise in cutting-edge digital identity and encryption technologies.
If this Security Engineer, Digital Identity & Encryption role in North Bergen, NJ, aligns with your experience in cybersecurity, your expertise in certificate systems and key management, and your passion for financial systems security, we encourage you to learn more about this exciting permanent, hybrid opportunity.
Ready to safeguard critical financial communications through advanced encryption and digital identity?
Job Features
Job Category | IT, Security |
Our client, a leader in the Beverage industry, is seeking an experienced Operational Technology (OT) Engineer to shape and maintain a secure and efficient OT framework across their North American clients. This permanent, onsite position in Fort Smith, Arkansas, is instrumental in building a dependable manufacturing technology environment, aligning with internal best practices and contributing to a broader global knowledge-sharing network. The role emphasizes a strong commitment to quality, safety, environmental stewardship, and product integrity within a 24/7 manufacturing setting.
What You'll Be Doing: Core Responsibilities in Operational Technology
As an OT Engineer, you'll be a pivotal figure in ensuring the secure, reliable, and high-performing operation of the client's manufacturing technology environment. Your responsibilities will span network architecture, cybersecurity, systems administration, and continuous improvement for industrial automation.
- OT Network Oversight: You will be responsible for meticulously architecting, overseeing, and safeguarding the OT network infrastructure. This includes expert administration of firewall configurations tailored for industrial environments, managing secure remote connectivity solutions to OT systems, maintaining resilient wireless systems on the plant floor, and optimizing switch settings for industrial protocols. You'll continuously monitor network health, swiftly respond to hardware issues (e.g., servers, switches, firewalls), and manage critical firmware/OS updates to ensure maximum uptime and security.
- Security & Patch Management: You will lead robust security and patch management efforts across the converged OT/IT landscape. This involves staying continuously informed on security advisories relevant to industrial control systems and enterprise IT, meticulously evaluating patching requirements, and then thoroughly testing and implementing updates across various OT/IT systems, including industrial workstations and network devices. You'll also diligently track and manage updates for OT applications and control systems, minimizing vulnerabilities and strengthening defenses against cyber threats.
- OT Systems Administration: You will expertly manage virtual environments that support crucial OT systems. This encompasses designing virtual machine (VM) templates, provisioning new VMs, and implementing robust backup strategies to ensure data recovery and business continuity for industrial applications. You'll also ensure comprehensive endpoint security across OT devices and enforce strict compliance with local OT standards, safeguarding system integrity.
- Security Operations & Governance: You will play a key role in security operations and governance within the OT domain. This includes guaranteeing the continuous availability of critical OT applications and meticulously managing data backup and recovery processes for industrial data. You'll support secure third-party integrations with OT systems and maintain comprehensive OT network documentation. Furthermore, you will actively integrate security considerations into project planning and execution for all new automation initiatives, embedding security by design.
- Active Directory & Domain Services: You will maintain the domain infrastructure for OT systems. This includes managing Active Directory (AD), overseeing Group Policy Objects (GPOs) for centralized configuration and security, maintaining DNS (Domain Name System) for name resolution, and managing organizational unit (OU) structures to ensure efficient identity and access management within the OT environment.
- Incident Response: You will be on the front lines, leading response efforts for both cybersecurity events and operational incidents that impact OT systems. This requires rapid communication, effective containment, swift recovery actions, and meticulous documentation. You'll address both cyber and non-cyber incidents, diligently validate disaster recovery protocols, and proactively analyze logs and correlate data to identify potential threats, minimizing downtime in a 24/7 manufacturing setting.
- Continuous Improvement & Collaboration: You will be a champion for continuous improvement, actively engaging with global OT experts across the organization to share insights, leverage best practices, and drive operational enhancements. This collaborative approach fosters a global knowledge-sharing network, ensuring the evolution of the OT framework.
- Industrial Automation & IIoT Initiatives: You will support and lead various digital transformation efforts within manufacturing, such as Industry 4.0, MES (Manufacturing Execution Systems), and IIoT (Industrial Internet of Things) initiatives. You'll also lead or assist in automation and instrumentation projects, meticulously maintaining flexibility and strategic direction of site automation systems. This includes developing and troubleshooting PLC/HMI (Programmable Logic Controller/Human-Machine Interface) systems, overseeing project implementation, and designing and supervising the installation and commissioning of new automation infrastructure, ensuring robust and efficient production lines.
What You Bring: Essential Qualifications for OT Excellence
To excel as an Operational Technology Engineer, you'll need extensive hands-on experience with enterprise and industrial technology platforms, a deep understanding of OT cybersecurity, and a proactive, collaborative mindset.
- Extensive Hands-on Platform Experience: You possess hands-on experience with enterprise and industrial technology platforms, including:
- Network Hardware: Proficiency with network hardware (e.g., Cisco routers, switches, firewalls).
- Server Environments: Experience with server environments (e.g., Microsoft Server).
- Virtualization Tools: Familiarity with virtualization tools (e.g., VMware).
- Automation Systems: Expertise with automation systems from vendors like Rockwell, Siemens, and Allen Bradley. This breadth of experience is crucial for managing diverse OT and IT components.
- Deep Familiarity with Rockwell's Software Suite: You have deep familiarity with Rockwell's suite of tools, including FactoryTalk components (e.g., Directory, View SE/ME for HMI/SCADA, AssetCentre for centralized asset management and version control). This indicates specialized knowledge in industrial control and visualization.
- Microsoft SQL Database Management: You are skilled in managing Microsoft SQL databases, including tasks like user access control, data recovery, and report generation. A working knowledge of Oracle systems and Microsoft Reporting Services is also beneficial, demonstrating versatility in database management.
- Basic Linux Administration: You are comfortable with basic administration of Linux-based operating systems, enabling you to manage and troubleshoot various industrial servers or specialized applications.
- Automation Systems Experience (5+ years): You bring over five years of verifiable experience designing, implementing, and maintaining automation systems in manufacturing or industrial settings. This extensive background showcases your practical expertise in bringing industrial processes to life and optimizing them.
- Proven Cybersecurity Measures Track Record: You have a proven track record in developing and executing cybersecurity measures specifically tailored to Operational Technology environments. This highlights your understanding of unique OT risks and your ability to implement effective security controls in industrial settings.
- Solid IT Fundamentals Understanding: You possess a solid understanding of IT fundamentals across the platforms mentioned, with the critical ability to bridge IT and OT domains. This enables seamless communication and integration between enterprise IT and industrial control systems.
- Proactive and Independent Problem-Solving: You are highly proactive and capable of independently identifying technical needs, meticulously planning and executing tests, effectively resolving issues, and delivering robust solutions. Your self-sufficiency is vital for continuous improvement in a dynamic environment.
- Collaborative Mindset with Operational Acumen: You exhibit a collaborative mindset, working effectively across teams. You have the ability to balance operational priorities in continuous production environments, ensuring system integrity and minimizing downtime even while implementing changes or resolving issues.
- Strong Communication Skills (Technical to Non-Technical): You are a strong communicator who can effectively translate complex technical changes and risks into clear, actionable insights for non-technical audiences (e.g., plant managers, operations staff). This bridges the communication gap between engineering and business.
Work Authorization:
Candidates must be eligible to work in the United States without sponsorship OR hold an existing employer-sponsored visa (e.g., H1b). The employer is unable to accommodate education or training visas (F1, OPT, CPT, etc.).
Make an Impact: Why Join This Team
This is a profound opportunity to work in a technically sophisticated environment where Operational Technology (OT) and Information Technology (IT) converge, shaping the future of manufacturing in the beverage industry. You'll be part of a forward-thinking team that values operational excellence, innovation, and continuous improvement, directly influencing the efficiency and security of 24/7 manufacturing operations. The organization offers a strong commitment to safety, quality, and sustainability, with a culture that encourages initiative and professional growth. Your contributions will be instrumental in building a dependable manufacturing technology environment that contributes to a broader global knowledge-sharing network.
We are seeking a highly skilled Fullstack Engineer (C#/Angular) to join our client's dynamic development team. This permanent position, based hybrid in Raleigh, North Carolina (requiring 2 days onsite per week), is crucial for building and maintaining high-performance applications that manage large-scale data operations and deliver seamless user experiences. Our client is a world-renowned provider of security services within the Cybersecurity industry.
What You'll Be Doing: Crafting Secure, High-Performance Applications
As a Fullstack Engineer, you'll be instrumental in developing and optimizing applications that form the core of the client's cybersecurity offerings. Your work will span both front-end and backend development, ensuring scalability, efficiency, and a seamless user experience for critical security services.
- Design, Develop, and Maintain Scalable Web Applications: You will be responsible for meticulously designing, developing, and maintaining scalable web applications. This involves utilizing C# for robust backend logic and Angular for responsive frontend user interfaces. Your work will ensure applications can handle large data operations and deliver consistent performance even with increasing user loads.
- Build Efficient Backend Systems for Data Collection and Processing: A core responsibility will be to build efficient backend systems specifically designed for large-scale data collection and processing. This includes designing database interactions, implementing data pipelines, and optimizing server-side logic to handle vast amounts of security-related data quickly and reliably.
- Develop and Maintain Front-End Interfaces for Smooth User Experience: You will actively develop and maintain front-end interfaces to ensure a smooth and intuitive user experience. This involves crafting responsive and interactive UIs using Angular and modern JavaScript tools, focusing on usability, accessibility, and visual appeal to provide users with clear insights into complex security data.
- Collaborate in a Dynamic Agile/Scrum Environment: You will be an active participant in a dynamic Agile/Scrum environment. This involves engaging in sprint planning, daily stand-ups, sprint reviews, and retrospectives. Your collaboration will ensure rapid development cycles, continuous feedback, and effective delivery of high-quality software solutions.
- Write Clean, Testable, and Reusable Code: You will consistently write clean, testable, and reusable code. This commitment to coding best practices ensures that your solutions are maintainable, extensible, and contribute to the long-term health of the codebase. Your code will be robust and reliable for critical cybersecurity applications.
- Optimize Applications for Speed and Scalability: You will continuously optimize applications for speed and scalability. This involves analyzing performance bottlenecks, fine-tuning code and database queries, and implementing architectural improvements to ensure that applications can handle high data volumes and user traffic efficiently. Your focus on optimization directly impacts application responsiveness and user satisfaction.
- Work Cross-Functionally with Internal Teams and Stakeholders: You will foster strong relationships and work cross-functionally with various internal teams and stakeholders. This collaboration is essential for gathering requirements, aligning on technical designs, integrating solutions, and ensuring that developed applications meet the needs of all relevant parties within the cybersecurity domain.
What You Bring: Essential Skills for a Fullstack Engineer
To excel as a Fullstack Engineer in this role, you'll need a strong foundation in C# and Angular development, coupled with practical experience in multithreading and adaptable problem-solving.
- Backend Development with C# (3+ years): You must possess 3+ years of verifiable backend development experience with C#. This demonstrates strong proficiency in building server-side logic, APIs, and data processing components using the C# language and its associated frameworks.
- Front-End Development with Angular and JavaScript (2+ years): You are required to have 2+ years of front-end development experience with Angular and modern JavaScript tools. This indicates strong proficiency in building interactive user interfaces, managing state, and consuming APIs from the frontend.
- Bachelor's Degree in Computer Science or Related Field: You must hold a Bachelor's degree in Computer Science or a related field. This academic background provides the foundational knowledge in programming, algorithms, and software design essential for this role.
- Experience with Multithreaded/Asynchronous Programming: You have proven experience with multithreaded/asynchronous programming. This is crucial for building high-performance applications that can handle concurrent operations efficiently, preventing blocking and ensuring responsiveness, especially for data-intensive tasks.
- Ability to Adapt to Various Roles: You demonstrate a strong ability to adapt to various roles within the software development lifecycle. This includes contributing effectively to design, performing rigorous testing, and skillfully troubleshooting complex issues across the application stack. Your versatility ensures comprehensive problem-solving capabilities.
- Strong Communication and Collaboration Skills: You possess strong communication and collaboration skills. This is crucial for articulating technical concepts clearly, engaging effectively with cross-functional teams, participating in Agile ceremonies, and providing constructive feedback in code reviews.
Preferred Skills: Enhancing Your Fullstack Profile
While the above are essential, the following skills would further enhance your application:
- Python Development Experience: Experience with Python development is a plus. This indicates versatility and could be valuable for scripting, data analysis, or backend services.
- Familiarity with Microsoft APIs: Familiarity with Microsoft APIs such as Graph, REST, and CSOM (Client-Side Object Model) is desirable. This is particularly useful for integrating with Microsoft ecosystem services and platforms.
- Cloud Platform Experience: Experience with Azure or other cloud platforms (e.g., AWS, GCP) is a plus. This indicates an understanding of cloud-native development and deploying scalable applications in the cloud.
- Proficiency with Source Control Tools: Proficiency with source control tools like TFS (Team Foundation Server) or Git. This ensures familiarity with version control best practices and collaborative development workflows.
- Integration of Third-Party APIs: Experience with the integration of third-party APIs is a plus. This demonstrates your ability to connect and exchange data with external services, expanding application functionalities.
- Performance Optimization (CPU, memory, network): Strong skills in performance optimization at various levels, including CPU utilization, memory management, and network communication, are highly valued for high-performance applications.
- Automation Testing and SQL Performance Tuning: Experience with automation testing (e.g., unit, integration, UI automation) and SQL performance tuning is a plus. These skills contribute to robust application quality and efficient data operations.
If this Fullstack Engineer (C#/Angular) role in Raleigh, NC, aligns with your expertise in C# and Angular, your passion for building high-performance, secure applications, and your desire to work in the cybersecurity industry, we encourage you to learn more about this exciting permanent, hybrid opportunity. This is a fantastic chance to contribute to cutting-edge security services.
Job Features
Job Category | Engineering |
Senior Data Architect - Security & Governance (Permanent - Hybrid - New York, NY; Holmdel, NJ; Stamford, CT; or Bethlehem, PA)
Glocomms has partnered with a major mutual life insurance company that's actively seeking a highly experienced and strategic Senior Data Architect - Security & Governance. This permanent position offers a flexible hybrid work model, requiring 3 days per week onsite in one of several key locations: Manhattan, NY; Holmdel, NJ; Stamford, CT; or Bethlehem, PA.
This role is absolutely pivotal in shaping the client's data security posture, leading the design and implementation of robust data protection frameworks across the entire enterprise. You'll ensure compliance with complex global regulations and safeguard sensitive information throughout its entire lifecycle. The ideal candidate will bring deep technical expertise in cutting-edge data security technologies, a strong understanding of emerging AI/ML security risks, and the ability to effectively influence executive stakeholders and diverse cross-functional teams.
What You'll Be Doing: Leading Strategic Data Protection Initiatives
As a Senior Data Architect focusing on Security & Governance, you'll be at the forefront of designing, implementing, and enforcing robust data protection frameworks across a major financial institution. Your role combines deep technical architecture with strategic leadership, ensuring data is protected at every stage and in every environment.
- Develop and Implement Enterprise-Wide Data Protection Strategies: You will take a leading role in developing and implementing enterprise-wide data protection strategies, policies, and frameworks. This involves creating a comprehensive roadmap for safeguarding sensitive information across the organization, ensuring alignment with business objectives and risk tolerance.
- Architect Secure Data Platforms, Pipelines, and AI/ML Workflows: You will be responsible for architecting secure data platforms, data pipelines, and AI/ML workflows, encompassing cutting-edge technologies like Generative AI (GenAI) and agentic systems. Your designs will integrate security controls from the ground up, ensuring the integrity and confidentiality of data throughout its lifecycle in analytical and AI/ML processing.
- Apply Advanced Data Protection Techniques: You'll meticulously apply advanced data protection techniques across the entire data lifecycle. This includes implementing robust encryption (in transit, at rest, and even in use), deploying tokenization methods, utilizing data masking for non-production environments, and leveraging anonymization techniques to protect privacy while enabling data utility for analytics and development.
- Define and Enforce Data Retention and Destruction Policies: You will precisely define and enforce data retention and destruction policies in line with internal governance and critical compliance mandates. This ensures that sensitive data is kept only for as long as legally or business-required, and is securely and irrevocably destroyed when no longer needed, minimizing data footprint and associated risks.
- Conduct Adversarial Testing to Enhance System Resilience: You will actively conduct adversarial testing to rigorously assess and enhance system resilience against sophisticated attacks. This includes simulating emerging threats like prompt injection (for GenAI models), data leakage (unintended exposure of sensitive data), and data poisoning (manipulating training data to compromise AI models). Your proactive testing strengthens defenses against novel attack vectors.
- Ensure Compliance with Privacy Regulations and Support Audits: You will play a crucial role in ensuring stringent compliance with critical data privacy regulations such as HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act), alongside other relevant jurisdictional regulations. You will also provide vital support for audit readiness and conduct cross-border data risk assessments, navigating the complexities of international data transfer and privacy.
- Secure Cloud Data Environments and Manage MLOps Security: You will secure cloud data environments across major providers like AWS (Amazon Web Services), Databricks (for data analytics and AI), and Snowflake (cloud data warehousing). This includes configuring robust security controls, access policies, and data protection mechanisms within these cloud platforms. You'll also specifically manage MLOps (Machine Learning Operations) security, ensuring that the end-to-end ML pipeline, from data ingestion to model deployment and monitoring, is secure and compliant.
- Utilize Data Governance and Classification Tools: You will expertly utilize leading data governance and classification tools such as Collibra, Informatica, and Microsoft Purview. This involves leveraging these platforms for data cataloging, data lineage tracking, data quality management, and enforcing data classification policies across the enterprise.
- Develop and Maintain Reference Architectures and Executive Reporting: You will be responsible for developing and maintaining authoritative reference architectures and prescriptive blueprints for secure data environments. Additionally, you will create and deliver executive-level reporting on the data security posture, highlighting key risks, mitigation strategies, and the overall effectiveness of data protection controls for senior leadership.
- Stay Ahead of Emerging Threats and Technologies: You will continuously stay ahead of emerging threats and technologies in the rapidly evolving fields of AI/LLM security (securing Large Language Models), agentic security (securing autonomous AI agents), and data governance. Your proactive research and adaptation will ensure the firm's data defenses remain cutting-edge against new attack vectors and compliance challenges.
Qualifications: Your Foundation for Data Security Leadership
To excel as a Senior Data Architect focusing on Security & Governance, you'll need extensive experience in information security, deep expertise in data protection and cloud security, and strong leadership and communication skills, particularly in emerging areas like AI/ML security.
- Extensive Information Security Experience: You must possess 10+ years of verifiable experience in information security, with a significant focus of 5+ years specifically on data security and privacy. This extensive background demonstrates a seasoned professional with deep practical knowledge of securing sensitive information in complex enterprise environments.
- Proven Expertise in Secure Data Architecture: You have proven expertise in designing and implementing secure data architectures within complex enterprise environments. This includes experience across various data storage types (databases, data lakes, warehouses) and data processing pipelines, ensuring security is embedded by design.
- Strong Understanding of Data Privacy Laws and Compliance: You possess a strong understanding of data privacy laws, major compliance frameworks, and cloud-native security principles. This ensures you can build solutions that meet stringent legal, regulatory, and industry best practice requirements for data protection.
- Excellent Communication and Collaboration Skills: You will exhibit excellent communication and collaboration skills, both verbal and written. This is crucial for effectively influencing technical and executive teams, presenting complex security topics clearly, and fostering strong partnerships across the organization to drive data security initiatives.
- Relevant Certifications (Plus): Possession of relevant industry certifications is a significant plus, demonstrating validated expertise. This includes:
- CISSP (Certified Information Systems Security Professional): A globally recognized certification for information security professionals.
- CIPP (Certified Information Privacy Professional): Demonstrates expertise in privacy laws and regulations.
- CCSP (Certified Cloud Security Professional): Validates expertise in cloud security architecture and operations.
- AWS Security - Specialty: Confirms expertise in securing data and workloads within Amazon Web Services.
If this Senior Data Architect - Security & Governance role, based in New York, Holmdel, Stamford, or Bethlehem, aligns with your extensive data security architecture experience, your expertise in AI/ML security, and your passion for shaping robust data protection frameworks within a major mutual life insurance company, we encourage you to learn more about this exceptional permanent, hybrid opportunity.
Please apply directly if you are interested. Please note: the client is not able to sponsor a visa now or in the future for this position.
Job Features
Job Category | Data, IT, Security |
Cybersecurity Manager, Identity & Access Management (Permanent - Hybrid - Omaha, NE)
Our client, a global leader in the packaged goods industry, is seeking a highly collaborative and strategic Cybersecurity Manager - Identity and Access Management (IAM). This permanent position, based hybrid in Omaha, Nebraska (3 days per week onsite), offers a pivotal opportunity to lead their enterprise IAM program.
This role requires a strong people leader with exceptional communication and interpersonal skills to manage IAM operations, drive identity governance, and partner seamlessly across HR, IT, GRC (Governance, Risk, and Compliance), and Cybersecurity teams. You'll be instrumental in overseeing identity lifecycle management, privileged access, and vendor access, all while mentoring a high-performing team in a dynamic work environment.
What You'll Be Doing: Leading Strategic IAM Initiatives
As the Cybersecurity Manager for Identity and Access Management, you'll be at the forefront of securing the organization's digital identities and access pathways. Your role combines strategic leadership with operational oversight, ensuring robust security, compliance, and efficiency across the enterprise.
- Lead the IAM Program: You will take primary ownership of leading the client's Identity and Access Management (IAM) program. This involves setting the strategic direction, defining the roadmap, and overseeing all operational aspects of IAM across the entire global organization. Your leadership will be crucial in building and maturing a comprehensive IAM framework.
- Manage IAM Operations: You will directly manage daily IAM operations, ensuring that identity lifecycle processes are efficient and secure. This includes overseeing user provisioning (granting access), access reviews (periodically validating access rights), Privileged Access Management (PAM) (securing elevated accounts), and Single Sign-On (SSO) solutions (simplifying user authentication). Your oversight ensures consistent and compliant access management.
- Drive Identity Governance: You will be instrumental in driving identity governance initiatives. This involves establishing policies, procedures, and controls that manage the digital identities and access privileges of all users (employees, contractors, vendors, customers) throughout their lifecycle. Your work ensures data integrity, compliance with internal policies, and adherence to external regulations.
- Partner Across Cross-Functional Teams: You will foster strong relationships and partner seamlessly across various cross-functional teams, including Human Resources (HR), Information Technology (IT), Governance, Risk, and Compliance (GRC), and other Cybersecurity teams. This collaboration is vital for aligning IAM strategies with broader organizational goals, securing buy-in, and ensuring that access security is embedded throughout business functions.
- Mentor a High-Performing Team: You will be responsible for mentoring and guiding a high-performing team of IAM professionals. This involves providing technical leadership, fostering skill development, setting SMART (Specific, Measurable, Achievable, Relevant, Time-bound) goals, and conducting regular performance management to ensure your team remains effective and grows professionally.
What You Bring: Essential Qualifications for IAM Leadership
To excel as a Cybersecurity Manager focusing on IAM, you'll need extensive experience in information security and IAM leadership, proven operational management skills, and familiarity with compliance frameworks.
- Extensive Information Security and IAM Leadership Experience: You must possess 8+ years of verifiable experience in Information Security, with a minimum of 5+ years specifically in IAM leadership roles. This extensive background demonstrates a seasoned professional capable of managing complex security programs and leading teams within the critical domain of identity and access management.
- Proven Experience Managing IAM Operations: You have proven, hands-on experience managing IAM operations. This includes direct oversight of user provisioning (onboarding/offboarding), conducting access reviews, implementing and managing PAM (Privileged Access Management) solutions, and deploying/maintaining SSO (Single Sign-On) solutions. Your practical experience in these areas is crucial for immediate impact.
- Strong Leadership and Team Development Skills: You demonstrate strong leadership and team development skills. This includes expertise in setting SMART goals for your team, conducting performance management, fostering a collaborative environment, and guiding professional growth for direct reports.
- Excellent Communication and Collaboration Skills: You possess excellent communication skills, both verbal and written, enabling clear articulation of complex technical concepts and effective interaction with diverse technical and non-technical teams. Your strong collaboration skills are essential for bridging organizational silos and achieving unified security goals.
- Experience with IAM Tools: You have practical experience with industry-leading IAM tools such as Okta (for identity and access management), SailPoint (for identity governance), CyberArk (for privileged access management), and Azure AD (Active Directory) for cloud-based identity services. Your familiarity with these platforms is vital for managing the IAM ecosystem.
- Familiarity with Compliance Frameworks: You are familiar with major compliance frameworks such as SOX (Sarbanes-Oxley Act), HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology) guidelines, and ISO 27001 (Information Security Management). This knowledge is crucial for ensuring that IAM practices meet regulatory and industry standards.
Qualifications: Foundational Knowledge and Certifications
To further solidify your qualifications, the ideal candidate will possess a strong academic foundation and relevant industry certifications.
- Educational Background: A Bachelor's degree in Computer Science, IT (Information Technology), Cybersecurity, or a related field is required. This academic background provides a strong theoretical understanding of computing and security principles.
- Industry Certifications: Possession of valuable industry certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or equivalent credentials is highly desirable. These certifications validate your expertise and commitment to the information security field.
- Strong Understanding of Cybersecurity Operations and Incident Response: You have a strong understanding of broader cybersecurity operations and incident response processes. This indicates your ability to integrate IAM practices within the larger security framework and contribute effectively during security incidents.
- Strategic Planning and Budget Management Experience: You possess demonstrable strategic planning and budget management experience. This includes developing long-term IAM roadmaps, justifying investments, and managing financial resources effectively to achieve program objectives.
- Comfort with Hybrid Work Model: You are comfortable working effectively in a hybrid work model, balancing onsite presence with remote flexibility. This adaptability ensures seamless collaboration and productivity within the designated work environment.
Work Environment:
This is a hybrid role requiring on-site presence Tuesday through Thursday out of the client's Omaha, NE office. Sponsorship is not available now or in the future for this position.
If you are a highly collaborative and strategic Cybersecurity Manager - Identity and Access Management (IAM) seeking a permanent, hybrid opportunity in Omaha, NE, to lead an enterprise IAM program within a global packaged goods industry leader, we encourage you to apply directly!
Senior IAM Engineer (Permanent - Onsite - New York, NY)
A top-tier hedge fund is seeking a highly skilled Senior IAM Engineer to strategically shape the future of its identity and access management infrastructure. This permanent position, based onsite in New York, NY, offers a high-impact engineering role at the crucial intersection of security, scale, and performance. It's ideal for a professional who thrives in technically rigorous and demanding environments.
The Opportunity: Building the Identity Backbone of a World-Class Firm
You'll become an integral part of a small, exceptionally skilled team responsible for building and securing the identity backbone of the firm. Your work will directly underpin the firm's critical trading, research, and engineering operations, spanning everything from foundational directory services to cutting-edge cloud-native authentication platforms. This role offers a unique chance to influence the architecture of a world-class technology organization, working on systems that demand unparalleled reliability, speed, and security at scale, alongside engineers who value precision and measurable impact.
What You'll Do: Driving Next-Generation Identity Platforms
As a Senior IAM Engineer, your responsibilities will blend strategic design, hands-on implementation, and leadership in highly secure, high-performance environments. You'll be instrumental in evolving the firm's identity and access capabilities across both on-premises and cloud infrastructures.
- Design and Implement Next-Generation Identity Platforms: You will take a leading role in the design and implementation of next-generation identity platforms. This involves architecting scalable, secure, and resilient solutions that leverage cutting-edge technologies to modernize the firm's identity infrastructure, ensuring it meets future demands for security, performance, and user experience.
- Build and Maintain Resilient Authentication and Authorization Services: You will be responsible for meticulously building and maintaining resilient authentication and authorization services across both on-premises and cloud environments. This includes designing fault-tolerant systems, implementing robust security controls, and ensuring continuous availability for critical access pathways, directly supporting the firm's trading, research, and engineering operations.
- Lead Firm-Wide Initiatives to Improve Security Posture: You will spearhead and lead firm-wide initiatives aimed at continuously improving the overall security posture of the organization. This involves identifying systemic vulnerabilities, proposing strategic enhancements, and driving the implementation of solutions that bolster the firm's defenses against sophisticated cyber threats. Your leadership will directly influence the security roadmap.
- Develop Automation Pipelines Using Advanced Tools: You will be instrumental in driving operational efficiency and consistency by developing robust automation pipelines. This includes leveraging cutting-edge Infrastructure as Code (IaC) tools such as Terraform for provisioning cloud resources, Pulumi for multi-language infrastructure management, and Crossplane for extending Kubernetes to manage external resources. Your automation efforts will streamline deployments, reduce manual effort, and ensure configuration consistency.
- Extend and Integrate Key IAM Solutions: You will extend and integrate industry-leading IAM solutions into the firm's existing ecosystem. This includes working with platforms like Azure AD (Active Directory) for cloud-based identity, Okta for identity and access management, and PingFederate (PingFed) for enterprise federation. Your expertise will ensure seamless authentication and authorization across diverse applications and services.
- Contribute to Internal Libraries and Governance Platforms: You will actively contribute to internal libraries and governance platforms developed within the firm. This involves writing high-quality code in Java, Python, or Go, creating reusable components, and enhancing platforms that enforce security policies, manage identity lifecycles, and ensure compliance. Your contributions will directly strengthen the firm's internal security engineering capabilities.
What We're Looking For: Your Expertise in Identity & Security Engineering
To excel as a Senior IAM Engineer at this top-tier hedge fund, you'll need extensive experience in software or security engineering, deep expertise in IAM concepts, strong programming skills, and a proven track record of solving complex challenges.
- Extensive Software or Security Engineering Experience: You must possess 8+ years of verifiable experience in software or security engineering. This extensive background demonstrates a seasoned professional capable of tackling complex technical challenges and delivering robust, secure solutions in high-stakes environments.
- Deep Expertise in IAM Concepts: You are required to have deep expertise in core IAM concepts, including:
- Authentication: Understanding various methods of verifying user identity (e.g., MFA, SSO, passwordless).
- Federation: Knowledge of how identities are shared and managed across different security domains (e.g., SAML, OAuth, OpenID Connect).
- Zero Trust: A strong grasp of Zero Trust principles, where no user or device is inherently trusted, and all access is verified.
- PKI (Public Key Infrastructure): Understanding of digital certificates, certificate authorities, and their role in secure communication and identity.
- Experience with Foundational Identity Services: You must have hands-on experience with foundational identity services that underpin enterprise access management. This includes deep familiarity with Active Directory (for centralized user management), LDAP (Lightweight Directory Access Protocol) for directory services, and PKI (Public Key Infrastructure) components for secure digital identities and communication.
- Strong Programming Skills in Multiple Languages/Tools: You possess strong programming skills in a combination of relevant languages and tools. This includes Java, Go, Python (for application and automation development), Terraform HCL (HashiCorp Configuration Language) for Infrastructure as Code, and Rego (for policy-as-code languages like OPA). This polyglot capability ensures versatility in developing and securing diverse systems.
- Track Record of Solving Complex Challenges: You must have a proven track record of solving complex technical and organizational challenges. This indicates your ability to dissect intricate problems, devise innovative solutions, navigate cross-functional dynamics, and deliver impactful results in demanding environments.
Why This Role? Influence and Impact at Scale
This is more than a security role—it's an exceptional chance to influence the architecture of a world-class technology organization. You'll be working on systems that demand unparalleled reliability, blazing speed, and ironclad security at immense scale. You'll collaborate alongside engineers who prioritize precision and measurable impact, fostering an environment where your contributions are highly valued and directly shape the firm's technological future.
Job Features
Job Category | IT, Security |
Head of Identity & Access Management (Permanent - Hybrid - Omaha, NE)
We're partnering with a global leader in the packaged goods industry to find a visionary Head of Identity & Access Management (IAM). This permanent position, based hybrid in Omaha, Nebraska, offers full relocation support for individuals outside the local area. You'll own the strategic development, roadmap, and operations for IAM across the entire company, playing an essential role in the CISO's long-term cybersecurity vision. Our client has already invested heavily in cybersecurity, with full support from executive leadership.
This is a unique opportunity for a seasoned professional with prior experience successfully standing up an IAM program from scratch while managing a team of direct reports. An understanding of the manufacturing industry on an international scale is a significant advantage.
What You'll Be Doing: Orchestrating Global IAM Strategy and Operations
As the Head of Identity & Access Management, you'll blend strategic leadership with hands-on program development, building and overseeing a comprehensive IAM framework that spans the entire global organization.
- Manage and Lead a Diverse Team: You'll directly manage a team of 8+ direct reports, serving as a pivotal coach, technical leader, and the public face of the IAM team. This involves guiding their professional development, setting performance expectations, providing mentorship, and ensuring the team operates cohesively and effectively to achieve strategic goals.
- Design, Build, and Lead a Fully Functioning IAM Program from the Ground-Up: This is a foundational role where you'll design, build, and effectively lead a fully functioning IAM program from the ground-up. This comprehensive initiative includes critical components such as:
- Identity Governance: Establishing policies and processes for managing the digital identities of all users (employees, vendors, customers) throughout their lifecycle, including user provisioning, de-provisioning, and access reviews.
- Privileged Access Management (PAM): Implementing solutions and controls to secure, monitor, and manage elevated access privileges for critical systems and data, minimizing the risk of insider threats or advanced attacks.
- Vendor Access Management: Developing secure frameworks for managing access provided to external vendors and service providers, ensuring strict control and auditing of third-party access to internal systems.
- SSO (Single Sign-On) Solutions: Driving the adoption and implementation of SSO solutions across the enterprise to enhance user experience, simplify access, and strengthen authentication security.
- Collaborate for Comprehensive Access Security: You'll collaborate extensively with other technical teams (e.g., Information Security, Security Operations, IT Infrastructure) and non-technical teams (e.g., HR, Legal, Business Units). Your objective is to ensure strong buy-in for IAM initiatives and achieve complete access security for all functions of the business, embedding security into every aspect of operations.
- Drive IAM Strategic Planning and Budget Oversight: You will be instrumental in driving the strategic direction of IAM, constantly evaluating current and emerging technologies. This includes defining the overall budget for the IAM program, justifying investments, and ensuring that technology roadmaps align with both cybersecurity best practices and broader business objectives. Your leadership will shape future IAM capabilities.
- Oversee Relationships with External Vendors and Service Providers: You will actively oversee relationships with external vendors and service providers for IAM solutions. This involves evaluating new tools, negotiating contracts, managing service level agreements (SLAs), and ensuring that vendor performance consistently meets the organization's high standards for security and service delivery.
Qualifications: Your Foundation for IAM Leadership
To excel as Head of Identity & Access Management, you'll need extensive experience in information security and IAM, proven leadership in managing direct reports, and a strong understanding of relevant technical domains.
- Extensive Information Security or IAM Experience: You must possess 8+ years of verifiable experience in an Information Security or IAM role. This extensive background demonstrates a seasoned professional with deep practical knowledge of cybersecurity principles and identity and access management practices within an enterprise context.
- Proven Managerial Experience: You are required to have 3+ years of experience as a manager (with direct reports) specifically within IAM or another technology function. This highlights your leadership capabilities in building, developing, and overseeing technical teams to achieve strategic goals.
- Educational Background: A Bachelor's Degree in Computer Science, Cybersecurity, or a related field from an accredited institution is preferred. This academic foundation provides a strong theoretical understanding of computing and security principles.
- Demonstrated Expertise in Key IAM Domains: You must have demonstrated expertise in key IAM domains, including:
- Identity Governance: Managing user lifecycles, access certifications, and policy enforcement.
- Access Management: Controlling user access to resources based on roles and policies.
- Vendor Access Management: Securing and auditing access for external parties.
- SSO (Single Sign-On) Solutions: Implementing and managing seamless and secure user authentication across multiple applications.
- Technical Engineering Background (Preferred): While not strictly required, prior experience with a technical engineering background in IAM is preferred. This would include hands-on experience in building, configuring, and troubleshooting IAM solutions, providing a deeper understanding of implementation challenges and technical nuances.
Compensation & Benefits: Rewarding Your Leadership and Expertise
This permanent Head of Identity & Access Management role offers a highly competitive compensation package and comprehensive benefits designed to attract top-tier talent and support your well-being and financial future.
- Highly Competitive Annual Salary: You will receive a very competitive annual salary, commensurate with your extensive experience and leadership capabilities. This compensation is structured as a base salary plus an annual bonus (15%), directly tying your performance to your overall earnings.
- Comprehensive Benefits Package: Access a comprehensive benefits package that includes terrific healthcare coverage (medical, vision, and dental), a robust 401(k) retirement plan, and additional long-term incentives, designed to secure your financial future and provide peace of mind.
Relocation Support & Omaha Highlights: Embrace a Thriving Community
This exceptional opportunity is located at our client's headquarters in Omaha, Nebraska, offering a vibrant community and quality of life.
- Full Relocation Support: For candidates not local to Omaha but interested in this pivotal position, full relocation support is available. This assistance ensures a smooth transition for you and your family to the area.
- Highly Ranked State: Nebraska is highly regarded, ranking #5 on the "Best States" list from U.S. News & World Report.
- Affordable Living & Family-Friendly: Enjoy a low cost of living and an environment that is great for raising a family, providing stability and community support.
- Excellent Public Education: The state is recognized for its strong public education system, listed 7th nationally for its public education system, boasting an impressive 94% high school graduation rate.
- Proximity to Lincoln: Just about an hour away is Lincoln, Nebraska, a bustling college town renowned as the home of the University of Nebraska's beloved Husker football team, offering additional entertainment and cultural experiences.
- Vibrant Arts and Culture Scene: Omaha itself boasts a terrific arts and culture scene, with a vibrant downtown area featuring numerous museums, theaters, and live music venues, ensuring a rich array of leisure activities.
If you are interested in learning more about this unparalleled opportunity to lead Identity & Access Management for a global leader in the packaged goods industry, please apply directly!
Job Features
Job Category | IT, Security |