Job Archives
Cybersecurity Engineer (Permanent - Hybrid - La Mirada, CA)
Join the team that connects California to the world! Our client, CENIC, is dedicated to advancing education and research statewide by operating the California Research and Education Network (CalREN). This high-capacity computer network spans over 8,000 miles of optical fiber, serving over 20 million users across California, including the vast majority of K-20 students, educators, researchers, and individuals at other vital public-serving institutions. If you're passionate about leveraging world-class computing networks for innovation, collaboration, and economic growth, this is your opportunity to make a significant impact.
Position Summary: Advancing Cybersecurity for California's Research & Education Network
This is a full-time, permanent position within the CENIC Information Security Office (ISO), offering a hybrid work model based out of La Mirada, California. The Cybersecurity Engineer reports directly to the Manager of the Information Security Office, undertaking a broad and critical range of technical cybersecurity, operational cybersecurity, and general administrative support duties. You'll be instrumental in diverse areas, including vulnerability management, ticket handling, security documentation, email gateway security, identity and access management security, network security monitoring, and various security audit and administrative tasks. The successful Cybersecurity Engineer will play a pivotal role in advancing CENIC's ISO team efforts, providing essential information security services and support to CENIC and its Charter Associate members, thereby safeguarding a network vital to millions.
Supervisory Responsibility: None.
What You Will Do: Core Functions in Network Security & Operations
As a Cybersecurity Engineer, you'll be on the front lines of protecting a critical research and education network. Your responsibilities will span system implementation, threat mitigation, incident response, and continuous improvement in security practices.
- Build and Implement Enterprise-Class Security Systems: You'll be responsible for meticulously building and implementing enterprise-class security systems within a live production environment. This involves deploying robust security controls, tools, and platforms designed to protect a high-capacity, high-traffic network serving millions of users. Your work ensures that the network's defenses are continuously strengthened against evolving threats.
- Align Security with Business and Technology Strategy: You'll actively align security standards, frameworks, and practices with the overall business and technology strategy of CENIC. This involves understanding organizational goals, technical roadmaps, and ensuring that security initiatives are integrated seamlessly, contributing to strategic objectives while meeting critical customer and regulatory requirements.
- Implement Security Processes to Mitigate Emerging Threats: You'll design and implement proactive security processes specifically aimed at identifying and mitigating emerging threats. This includes developing procedures for threat intelligence integration, vulnerability assessment, incident response, and continuous monitoring to ensure that CENIC's defenses can adapt rapidly to new attack vectors and evolving cyber risks.
- Code, Test, and Debug Applications for Security Solutions: You'll leverage current programming languages and technologies to write code, complete programming tasks, and perform rigorous testing and debugging of applications. This coding capability will be applied directly to developing and enhancing security solutions, automating security processes, and ensuring the reliability and performance of tools used in cybersecurity operations.
- Support Security Implementations Under Senior Guidance: You'll work under the limited direction and supervision of senior members of the ISO team on complex security solutions and implementations. This collaborative approach allows you to contribute to high-impact projects while gaining valuable mentorship and technical guidance from experienced cybersecurity professionals, ensuring successful project outcomes.
- Process and Update Service Desk Tickets: You'll be responsible for efficient service desk ticket processing and updates related to information security. This involves receiving, categorizing, prioritizing, and diligently resolving security-related incidents and service requests, ensuring timely resolution and clear communication with affected users and teams.
- Administer and Utilize Information Security Tools: You'll actively use and administer a wide range of information security tools and services. This includes platforms for vulnerability management, network security monitoring (NSM), Endpoint Detection and Response (EDR), email security gateways, Security Information and Event Management (SIEM) systems, alert management platforms, and Identity Management (IdM) security tools. You'll also utilize network analysis tools like nmap, tcpdump, and Wireshark for deep packet inspection and network forensics.
- Identify and Integrate Threat Intelligence Feeds: You'll be responsible for identifying and integrating available threat intelligence feeds with CENIC's network security monitoring and SIEM services. This proactive measure ensures that the organization's defenses are continuously updated with the latest information on emerging threats, attack indicators, and vulnerabilities, enabling more effective detection and response.
- Perform Threat Hunting for Anomalous Activity: You'll regularly perform threat hunting to proactively search for anomalous activity within CENIC's network and systems during standard ISO business hours. This involves leveraging security data to identify suspicious patterns, hidden threats, or signs of compromise that might bypass automated defenses, enhancing the overall detection capabilities.
- 24/7 Monitoring and Incident Response (On-Call Rotation): You'll be responsible for 24/7 monitoring and responding to security alerts as a rotating member of the ISO escalations team. This critical on-call duty ensures that security incidents are addressed promptly around the clock, minimizing potential impact on CENIC's network and services, and maintaining continuous security vigilance.
- Maintain Vulnerability Management Asset Inventory: You'll be responsible for meticulously maintaining the vulnerability management asset inventory to ensure accurate reporting. This involves keeping track of all network devices, servers, applications, and other IT assets, as well as their associated vulnerabilities, which is crucial for effective risk management and compliance.
- Create Weekly Public Vulnerability Scan Report: You'll be responsible for creating the weekly public vulnerability scan report. This involves generating and analyzing reports from regular vulnerability scans, summarizing key findings, and presenting them in a clear and actionable format for relevant stakeholders.
- Create Monthly Enterprise Vulnerability Risk Status Report: You'll meticulously create the monthly enterprise vulnerability risk status report. This comprehensive report provides a broader overview of the organization's overall vulnerability posture, trends, identified risks, and the effectiveness of mitigation efforts to executive leadership and other key stakeholders.
- Identify and Attend Approved Online Training: You'll proactively identify and attend approved online training on a periodic basis. This commitment to continuous learning ensures that your cybersecurity skills remain current with the latest industry trends, technologies, and threat landscapes, supporting your professional development.
- Provide Other CENIC Business User Security Assistance: You'll provide other CENIC business user security assistance as needs dictate. This involves offering guidance on secure practices, addressing user-specific security concerns, and supporting the broader user community in maintaining a secure digital environment.
- Improve CENIC's Privacy and Security Practices: You'll continuously look for opportunities, procedures, and tools to improve CENIC's privacy and security practices. This proactive mindset drives innovation, streamlines processes, and enhances the overall security and privacy profile of the organization, aligning with best practices.
- Collaborate on Software Tools and Solutions: You'll work closely with the CENIC Security Team to identify, discuss, and implement software tools and solutions in support of CENIC’s networks, network security designs, and the effective implementation of network security policies, procedures, and technologies. This ensures a collaborative and integrated approach to security enhancement.
Key Success Factors: Driving Security Excellence
Success in this role will be defined by a blend of technical expertise, strategic thinking, and strong interpersonal skills, all contributing to a robust security posture for CENIC.
- Consulting and Engineering Security Best Practices: You'll excel at consulting and engineering in the development and design of security best practices and the implementation of solid security principles across the organization. Your contributions will help meet business goals, stringent customer demands, and evolving regulatory requirements.
- Understanding Cloud Computing Security Considerations: You possess a deep understanding of security considerations related to cloud computing. This includes knowledge of risks such as data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, Advanced Persistent Threats (APTs), data loss, and Denial of Service (DoS) attacks, enabling you to design secure cloud solutions.
- Expertise in Identity and Access Management (IAM): You have expert knowledge of Identity and Access Management (IAM)—the comprehensive framework of security policies and technologies that limit and meticulously track the access of individuals and entities within an organization to sensitive technology resources.
- Security-Centric Software Development: You have proven experience developing software and proficiency in coding, using a security-centric approach. This means integrating security considerations throughout the software development lifecycle, building secure applications, and conducting security testing.
- Experience using Zeek network security monitoring (NSM) and host intrusion detection systems (HIDS) is crucial.
- IDS Script and Signature Development: You possess skills in IDS (Intrusion Detection System) script and signature development, enabling you to create custom rules for detecting specific threats or anomalous behaviors.
- Hands-on Network/Packet Level Examination: You are adept at hands-on network/packet level examination using tools such as tcpdump or Wireshark. This allows for deep forensic analysis of network traffic to diagnose security incidents and understand attack methodologies.
- Data and Text Manipulation Proficiency: You have a working knowledge of regular expressions and proficiency with data and text manipulation tools such as awk and sed, enabling efficient parsing and analysis of logs and other textual data for security insights.
- Operational Streamlining through Standardization and Automation: You have proven experience streamlining operational capabilities through standardization and automation. This demonstrates your ability to identify inefficiencies and implement automated solutions that enhance security operations and reduce manual effort.
- Multi-Tasking and Adaptability: You are highly adept at working on multiple tasks concurrently and can respond effectively to rapidly changing priorities in a fast-paced security environment.
- Consultant for Security Design Vision: You possess the ability to serve as a strategic consultant on the long-range vision for security design for CENIC's security services, influencing future architectural decisions and technology roadmaps.
- Proactive Security Enhancements: You are able to identify and implement security enhancements that will maximize CENIC's security profile while remaining sensitive to its mission.
- Effective Communication and Proposal Development: You have the ability to formulate, organize, and present ideas in an effective manner. You can develop compelling proposals and clearly articulate cost/benefit trade-offs to various audiences, securing buy-in for security initiatives.
- Self-Motivated and Independent Worker: You are self-motivated with a demonstrated ability to work highly independently, requiring little direct supervision. This indicates a proactive approach and strong ownership of responsibilities.
- Strong Interpersonal and Teamwork Skills: You possess strong interpersonal skills and the ability to work well in a team-oriented environment, fostering collaboration and positive working relationships.
- Working Knowledge of IP-Based Networking: You have a solid working knowledge of IP-based networking, including fundamental concepts, protocols, and architectures, crucial for network security.
- Background in Basic Statistics and Analytics: You have a background in basic statistics and analytics and experience with modern analytics and visualization packages (e.g., Tableau, Power BI). This enables data-driven security insights and reporting.
- Adept at Understanding Technical Information: You are adept at understanding complex technical information and quickly learning new concepts, essential for staying current in the rapidly evolving cybersecurity field.
- Keen Attention to Detail: You demonstrate keen attention to detail, consistently avoiding shortcuts that may adversely impact the quality of your work, ensuring precision in security implementations and analyses.
- Strong Analytical and Problem-Solving Skills: You possess strong analytical and problem-solving skills, enabling you to dissect complex security challenges, identify root causes, and devise effective, robust solutions.
- Prioritize Security and Privacy Principles: You consistently demonstrate the ability to consider, understand, and prioritize security (and privacy, where applicable) principles, practices, and procedures in all aspects of your role with CENIC.
Required Education And/Or Experience: Your Foundation
- Educational Background: A BA/BS in computer science or a related field, or equivalent experience, is required.
- Information Security Experience (2-4 years): You must have 2-4 years of experience in information security, cybersecurity, or network security engineering, specifically focusing on the design, deployment, and implementation of security solutions. Alternatively, an equivalent combination of education, certifications, and experience will be considered.
- Mid-Level Cybersecurity Certification: A mid-level cybersecurity certification like CompTIA CySA+, SANS GSEC, or an equivalent credential, is required, validating your foundational and practical cybersecurity knowledge.
Preferred Education And/Or Experience: Enhancing Your Profile
- Advanced Security Education: A BA/BS in information security, information assurance, cybersecurity, or equivalent experience is preferred, indicating a specialized academic focus.
- Working Knowledge of Computer and Network Security: A strong working knowledge of computer and network security principles is desirable.
- Advanced-Level Cybersecurity Certification: An advanced-level cybersecurity certification like (ISC)2 CISSP (Certified Information Systems Security Professional), SANS GCIA (GIAC Certified Intrusion Analyst), or an equivalent is highly preferred, demonstrating expert-level security knowledge.
- Logging Environment Experience: Experience with logging environments such as Elastic (ELK Stack) or Splunk for security information and event management is a plus.
- Programming Experience: Experience programming in C, C++, Python, Ruby, or other popular languages is preferred, enhancing automation and tool development capabilities.
- Unix/Linux Administration: A minimum of 2 years experience maintaining and administering production Unix/Linux operating systems, including RedHat/CentOS and FreeBSD variants, is preferred.
- Distributed Team Interpersonal Skills: Strong interpersonal skills and the ability to work effectively in a distributed team environment are desirable for this position.
Why Work at CENIC? Making a Meaningful Impact
Working at CENIC offers a unique opportunity to contribute to a vital public service mission within a supportive and impactful environment.
- Company Culture: Benefit from a company culture characterized by small teams and a collaborative environment, providing the opportunity to make a large impact in a relatively small organization.
- Community Engagement: Your work has direct and profound meaning, as you'll be actively engaging with research and education institutions in the largest state economy in the United States. The technology solutions you help deliver directly support millions of students, educators, and researchers.
- Generous Health Benefits: CENIC provides generous medical benefits, as well as comprehensive dental, vision, and life insurance, ensuring your well-being is prioritized.
- Liberal Paid Time Off: Enjoy liberal vacation, holiday, and sick leave policies, promoting a healthy work-life balance and providing ample time for personal pursuits.
- Investment in Your Future: CENIC demonstrates a strong investment in your future by contributing to your 403(b) retirement plan, even if you don't contribute yourself. They also offer matching contributions on top of that, helping you build significant long-term financial security.
Work Environment & Hours:
This position operates in a professional office environment with standard office equipment. The Information Security Office (ISO) operates weekdays between 8 AM and 5 PM PST, but maintains 24 hours per day/7 days per week/365 days per year availability for incident response needs. An employee’s work shift is based on CENIC’s business needs.
Work Authorization: Documented Proof of identity and legal eligibility to work in the United States. Applicants must be authorized to work for any employer in the U.S. CENIC is unable to sponsor or take over sponsorship of an employment Visa at this time.
We're partnering with a dynamic organization specializing in delivering integrated technology solutions to support complex business operations. They're looking for a highly skilled Software Systems Developer to join their team. This permanent position, based fully onsite in Gray, Tennessee, is critical for optimizing internal systems and enhancing performance through custom software development and robust IT infrastructure.
As a Software Systems Developer, you'll be responsible for designing, planning, and implementing technical solutions based on cross-functional requirements. You'll work closely with various teams to understand operational needs and translate them into scalable, maintainable software systems.
What You'll Be Doing: Building Integrated Technology Solutions
As a Software Systems Developer, you'll be at the heart of developing and enhancing the custom software that drives the client's business operations. Your role will blend technical design, hands-on development, and deep collaboration to create scalable, maintainable, and efficient systems.
- Gather Requirements and Implement Tailored Software Solutions: You'll start by meticulously gathering requirements from various business stakeholders, thoroughly understanding their operational needs and challenges. You'll then translate these requirements into detailed technical specifications and proceed to implement tailored software solutions that precisely address those needs, ensuring the delivered software directly optimizes business processes.
- Collaborate with the IT Team on Infrastructure: You'll work in close collaboration with the IT team to ensure that the underlying infrastructure effectively supports the software solutions you develop. This involves ensuring that network, server, and other IT components are configured for optimal performance, security, and scalability, guaranteeing that applications run efficiently and reliably.
- Maintain, Extend, and Integrate Internal Software Systems: You'll be responsible for the ongoing maintenance, extension, and integration of various internal software systems. This includes debugging existing code, adding new features to enhance functionality, and ensuring seamless communication and data exchange between different applications across the organization's technology landscape.
- Design, Administer, and Optimize MS SQL Server Databases: A core responsibility will involve deep engagement with data. You'll design, administer, and optimize MS SQL Server databases, ensuring they are structured for efficiency, scalability, and data integrity. This includes schema design, writing complex queries, optimizing stored procedures, managing user access, and performing routine maintenance to ensure peak database performance.
- Develop and Maintain Custom Reports: You'll be instrumental in enabling data-driven decision-making by developing and maintaining custom reports. This involves extracting data using various methods, creating insightful dashboards, and building reports using specialized tools like SSRS (SQL Server Reporting Services) and Crystal Reports. Your work will provide critical business intelligence, transforming raw data into actionable insights.
- Automate Business Processes: You'll drive operational efficiency by automating business processes. This involves leveraging your technical skills in SQL for data-driven automation, integrating solutions via APIs, and building custom applications that streamline workflows, reduce manual effort, and enhance productivity across various departments.
- Manage Source Control and Maintain Codebase: You'll meticulously manage source control for software projects, ensuring proper versioning, branching, and merging of code. Your commitment to maintaining a clean, extensible codebase will promote long-term maintainability, facilitate team collaboration, and support future enhancements.
- Document System Modifications and Customizations: You'll thoroughly document all system modifications and customizations for future reference. This includes creating technical specifications, architectural diagrams, user guides, and troubleshooting procedures. High-quality documentation is vital for knowledge transfer, onboarding new team members, and ensuring the long-term supportability of the developed systems.
What's Needed: Your Technical Qualifications
To excel as a Software Systems Developer, you'll need strong expertise in SQL Server, object-oriented programming, full-stack development, and a solid understanding of IT infrastructure.
- Strong Expertise in SQL Server Development and Architecture: You must possess strong expertise in SQL Server development and architecture. This includes advanced proficiency in writing T-SQL, designing database schemas, optimizing queries and stored procedures, and understanding SQL Server's architectural components for high performance and scalability.
- Proficiency in Object-Oriented Programming and Software Design: You're required to have proficiency in object-oriented programming (OOP) principles and strong knowledge of software design principles. This ensures you can build modular, maintainable, and scalable software solutions.
- Full-Stack Development Experience: You have proven experience with full-stack development, demonstrating your ability to contribute across all layers of a software application. This includes expertise in database technologies (SQL Server), server-side logic (C#, VB.Net, MVC/Web API), and client-side technologies (JavaScript, HTML5).
- Ability to Debug and Test Applications: You possess the ability to debug and test applications effectively within various integrated development environments (IDEs) and web browsers. This includes utilizing debugging tools, writing unit tests, and performing integration testing to ensure software quality and functionality.
- Solid Understanding of IT Infrastructure: You have a solid understanding of core IT infrastructure, including networking fundamentals (TCP/IP, LAN/WAN), operating systems (Windows, Linux), databases (SQL Server), and Active Directory (identity and access management). This holistic view enables you to design and troubleshoot integrated solutions.
- Excellent Communication and Interpersonal Skills: You bring excellent communication and interpersonal skills. This is crucial for effectively gathering requirements from diverse teams, collaborating with technical and non-technical stakeholders, and presenting solutions clearly.
- Self-Motivated with Strong Time Management: You are self-motivated with strong time management and task prioritization abilities. This indicates your capacity to manage your workload effectively, meet deadlines, and drive projects to completion independently.
- Capable of Providing Project Updates: You are capable of providing clear and concise project updates and timelines to leadership, ensuring proper visibility and alignment on project status and progress.
Education & Technical Skills:
- Bachelor's Degree: A Bachelor's degree in Information Technology or a related field, or equivalent experience, is required.
- MS SQL Development, Management, and Administration: Proficiency in MS SQL development, management, and administration.
- Programming Languages: Experience with C#, VB.Net, JavaScript, and HTML5.
- Web Development: Familiarity with MVC/Web API development.
- Source Control: Experience with source control systems and version management.
Job Features
Job Category | Engineering |
A leading financial firm is looking for a highly skilled and strategic Senior Infrastructure Security Engineer to join their vital Information Security team. This permanent position, based onsite in New York, NY, is crucial for strengthening and continuously evolving the company's robust infrastructure security within a complex, high-stakes, and fast-paced IT environment.
What You'll Do: Driving Advanced Infrastructure Security
As a Senior Infrastructure Security Engineer, you'll be on the front lines, designing, implementing, and enhancing the security posture of critical systems. Your role blends deep technical expertise with strategic leadership and cross-functional collaboration, ensuring top-tier security within a demanding financial landscape.
- Collaborate Across Teams to Enhance Security: You'll be instrumental in collaborating across various teams to proactively support and continuously enhance the company's overall security posture. This involves engaging with development, operations, cloud engineering, and other IT departments to embed security throughout the entire system lifecycle, ensuring a cohesive and strong defense strategy.
- Conduct Thorough Security Assessments: You'll regularly conduct comprehensive security assessments for both new and existing systems. This includes meticulously evaluating infrastructure components, applications, and configurations for vulnerabilities, misconfigurations, and adherence to security best practices. Your assessments will identify potential risks and inform remediation efforts, hardening the firm's digital defenses.
- Design, Develop, and Maintain Security Tools: You'll take a hands-on approach to security by actively designing, developing, and maintaining custom tools that improve internal security operations. This involves automating security tasks, building dashboards for monitoring security metrics, and creating utilities that enhance vulnerability management, threat detection, or incident response capabilities, thereby increasing the efficiency and effectiveness of the security team.
- Lead Strategic Security Initiatives: You'll spearhead critical and strategic security initiatives that directly shape the firm's defense capabilities. This includes:
- Implementing Zero Trust architecture in Linux environments: Leading the design and deployment of Zero Trust principles within the Linux ecosystem, ensuring no user or device is trusted by default, regardless of whether they are inside or outside the network.
- Shaping security frameworks for AI infrastructure: Developing and defining robust security frameworks specifically tailored for the unique challenges and risks associated with Artificial Intelligence (AI) infrastructure, ensuring the integrity, confidentiality, and availability of AI models and data.
- Integrating TLS client authentication into existing systems: Leading efforts to integrate TLS (Transport Layer Security) client authentication into existing systems, enhancing cryptographic security and ensuring mutual authentication between clients and servers.
What You'll Bring: Essential Expertise for Security Leadership
To excel as a Senior Infrastructure Security Engineer, you'll need extensive experience in infrastructure or site reliability engineering, a strong grasp of security fundamentals, and proficiency in programming.
- Extensive Infrastructure or Site Reliability Engineering Experience: You must possess 10+ years of verifiable experience in infrastructure or Site Reliability Engineering (SRE), coupled with a strong track record of hands-on security implementation. This extensive background demonstrates your ability to build, maintain, and secure complex, highly available systems at scale.
- Strong Grasp of Security Fundamentals: You're required to have a strong, in-depth grasp of security fundamentals, including:
- Protocols: Deep understanding of secure communication protocols such as TLS (Transport Layer Security) for encryption, OIDC (OpenID Connect) for identity verification, and FIDO2 for strong, passwordless authentication.
- Cryptography: Solid knowledge of cryptographic principles, including encryption algorithms, hashing, digital signatures, and key management best practices.
- Access Control: Expertise in various access control models (e.g., RBAC, ABAC), privilege management, and securing access to critical resources.
- Application Security: A thorough understanding of common application security vulnerabilities and remediation techniques, including familiarity with concepts like the OWASP Top 10 web application security risks.
- Proficiency in Programming and Modern Development Practices: You must be proficient in at least one programming language (e.g., Python, Go, Java, C++), enabling you to develop security tools, automate processes, and conduct code reviews. This is coupled with familiarity with modern development practices such as DevOps, CI/CD, and Infrastructure as Code.
- Eagerness to Learn and Contribute: You demonstrate a genuine eagerness to learn and contribute beyond your core responsibilities, especially in rapidly evolving and emerging areas like AI security. This proactive mindset and commitment to continuous learning are vital in the dynamic cybersecurity landscape.
- Strong Communication Skills: You possess strong communication skills, both verbal and written, with the crucial ability to explain complex technical concepts clearly to non-technical stakeholders. This ensures that security risks and recommendations are understood across all levels of the organization, facilitating informed strategic decision-making.
Why This Role? Impact, Growth, and Exceptional Compensation
This permanent Senior Infrastructure Security Engineer position in New York, NY, offers a compelling environment for professional growth and significant impact within a leading financial firm.
- Exceptional Compensation Package: You'll receive a competitive base salary ranging from USD $250,000 to $300,000, reflecting the senior-level expertise and critical nature of this role. This is complemented by a first-year guaranteed bonus, providing immediate recognition for your contributions.
- Comprehensive Benefits: Access a comprehensive benefits package that prioritizes your well-being, including robust health and prescription coverage, generous 401(k) matching to support your long-term financial goals, wellness and family support programs, and charitable donation matching, allowing you to contribute to causes you care about.
- Pivotal Role in Financial Security: You'll play a pivotal role in strengthening and evolving infrastructure security for a leading financial firm. Your work directly protects highly sensitive data and critical financial systems from sophisticated cyber threats, offering a profound sense of purpose and high-impact contributions.
- Exposure to Complex IT Environment: You will gain extensive exposure to a complex and fast-paced IT environment, challenging your skills and deepening your expertise in securing distributed systems, cloud infrastructure, and cutting-edge technologies.
- Leadership in Strategic Initiatives: You'll have the opportunity to lead strategic initiatives such as implementing Zero Trust architecture and shaping security frameworks for AI infrastructure, positioning you at the forefront of cybersecurity innovation.
Job Features
Job Category | IT, Security |
Glocomms has partnered with a leading financial systems firm to find a security-focused engineer who will support their enterprise encryption and digital identity systems. This permanent position, based hybrid in North Bergen, New Jersey, centers on managing certificate-based authentication, maintaining secure key infrastructure, and automating related processes to support internal and external communications.
What You'll Be Doing: Safeguarding Digital Identity and Encryption
As a Security Engineer specializing in Digital Identity & Encryption, you'll be instrumental in protecting sensitive financial data and communications. Your responsibilities will blend technical administration with proactive problem-solving and automation, ensuring the integrity and confidentiality of critical information.
- Administer and Monitor Digital Certificate Systems: You'll meticulously administer and monitor digital certificate systems. This involves managing the issuance, renewal, revocation, and overall lifecycle of X.509 certificates used for various authentication and encryption purposes across the enterprise. Your vigilance ensures that all digital identities are valid and secure.
- Maintain Internal Encryption Infrastructure: You'll be responsible for maintaining the internal encryption infrastructure and its related services. This includes overseeing Hardware Security Modules (HSMs), key management systems (KMS), and other cryptographic solutions. Your work ensures that data remains protected, whether in transit or at rest, safeguarding sensitive financial information.
- Implement and Enforce Secure Key Usage Policies: You will develop, implement, and rigorously enforce policies for secure key usage and lifecycle management. This involves defining standards for key generation, storage, distribution, rotation, and destruction, ensuring that cryptographic keys are protected throughout their entire lifecycle and used in compliance with best practices and regulatory requirements.
- Troubleshoot and Resolve Certificate-Based Authentication Issues: You'll expertly troubleshoot and resolve issues related to certificate-based authentication. This involves diagnosing problems with client authentication, server authentication, VPNs, web applications, or other systems relying on digital certificates for secure access. Your problem-solving skills will be crucial for quickly restoring secure connectivity.
What's Needed: Your Qualifications for Encryption and Identity Security
To excel as a Security Engineer, you'll need a solid background in cybersecurity or infrastructure, familiarity with key management, and proficiency in automation.
- Cybersecurity or Infrastructure Experience (2+ years): You must possess 2 or more years of verifiable experience in cybersecurity, infrastructure, or closely related fields. This foundational experience demonstrates your understanding of IT environments and security principles.
- Educational Background: A degree in Information Technology, Computer Science, or equivalent experience is required. This academic or practical background provides the essential knowledge for understanding complex technical systems.
- Familiarity with Certificate Authorities and Key Management: You have familiarity with certificate authorities (CAs), understanding their role in issuing and managing digital certificates. You also have knowledge of key management systems (KMS), which secure and manage cryptographic keys, and familiarity with automation tools used in security operations.
- Scripting and Infrastructure Automation Experience: You have hands-on experience with scripting and infrastructure automation. This indicates your ability to write scripts (e.g., PowerShell, Python) to automate routine security tasks, manage configurations, and streamline processes related to digital certificates and encryption.
- Industry Certifications (Plus): Industry certifications like Security+ or CISSP (Certified Information Systems Security Professional) are a significant plus. These certifications validate your expertise and commitment to the cybersecurity field.
- Strong Problem-Solving Skills and Attention to Detail: You will possess strong problem-solving skills to diagnose and resolve complex security issues effectively. Coupled with this, meticulous attention to detail is crucial for ensuring the accuracy of configurations and compliance with security policies.
- Comfort in a Collaborative, Fast-Paced Environment: You are comfortable working in a collaborative, fast-paced environment. This indicates your adaptability, teamwork abilities, and capacity to manage multiple priorities effectively in a dynamic setting.
What We Offer: Benefits and Growth in Financial Systems Security
This permanent Security Engineer role offers a compelling environment for professional growth and significant impact within a leading financial systems firm.
- Competitive Compensation and Incentives: You'll receive a competitive salary complemented by performance-based incentives, directly rewarding your contributions to strengthening the firm's security posture.
- Comprehensive Benefits: Access robust benefits including health, dental, and life insurance options, along with retirement savings plans, ensuring your well-being and financial future are supported.
- Paid Time Off and Family Leave: Benefit from paid time off and family leave policies, promoting work-life balance and supporting your personal and family needs.
- Flexible Hybrid Work Schedule: Enjoy a flexible hybrid work schedule, balancing onsite collaboration with remote flexibility, providing greater autonomy in managing your work environment.
- Professional Development Opportunities: You'll have opportunities for professional development and training, allowing you to continuously enhance your skills and expertise in cutting-edge digital identity and encryption technologies.
If this Security Engineer, Digital Identity & Encryption role in North Bergen, NJ, aligns with your experience in cybersecurity, your expertise in certificate systems and key management, and your passion for financial systems security, we encourage you to learn more about this exciting permanent, hybrid opportunity.
Ready to safeguard critical financial communications through advanced encryption and digital identity?
Job Features
Job Category | IT, Security |
Our client, a leader in the Beverage industry, is seeking an experienced Operational Technology (OT) Engineer to shape and maintain a secure and efficient OT framework across their North American clients. This permanent, onsite position in Fort Smith, Arkansas, is instrumental in building a dependable manufacturing technology environment, aligning with internal best practices and contributing to a broader global knowledge-sharing network. The role emphasizes a strong commitment to quality, safety, environmental stewardship, and product integrity within a 24/7 manufacturing setting.
What You'll Be Doing: Core Responsibilities in Operational Technology
As an OT Engineer, you'll be a pivotal figure in ensuring the secure, reliable, and high-performing operation of the client's manufacturing technology environment. Your responsibilities will span network architecture, cybersecurity, systems administration, and continuous improvement for industrial automation.
- OT Network Oversight: You will be responsible for meticulously architecting, overseeing, and safeguarding the OT network infrastructure. This includes expert administration of firewall configurations tailored for industrial environments, managing secure remote connectivity solutions to OT systems, maintaining resilient wireless systems on the plant floor, and optimizing switch settings for industrial protocols. You'll continuously monitor network health, swiftly respond to hardware issues (e.g., servers, switches, firewalls), and manage critical firmware/OS updates to ensure maximum uptime and security.
- Security & Patch Management: You will lead robust security and patch management efforts across the converged OT/IT landscape. This involves staying continuously informed on security advisories relevant to industrial control systems and enterprise IT, meticulously evaluating patching requirements, and then thoroughly testing and implementing updates across various OT/IT systems, including industrial workstations and network devices. You'll also diligently track and manage updates for OT applications and control systems, minimizing vulnerabilities and strengthening defenses against cyber threats.
- OT Systems Administration: You will expertly manage virtual environments that support crucial OT systems. This encompasses designing virtual machine (VM) templates, provisioning new VMs, and implementing robust backup strategies to ensure data recovery and business continuity for industrial applications. You'll also ensure comprehensive endpoint security across OT devices and enforce strict compliance with local OT standards, safeguarding system integrity.
- Security Operations & Governance: You will play a key role in security operations and governance within the OT domain. This includes guaranteeing the continuous availability of critical OT applications and meticulously managing data backup and recovery processes for industrial data. You'll support secure third-party integrations with OT systems and maintain comprehensive OT network documentation. Furthermore, you will actively integrate security considerations into project planning and execution for all new automation initiatives, embedding security by design.
- Active Directory & Domain Services: You will maintain the domain infrastructure for OT systems. This includes managing Active Directory (AD), overseeing Group Policy Objects (GPOs) for centralized configuration and security, maintaining DNS (Domain Name System) for name resolution, and managing organizational unit (OU) structures to ensure efficient identity and access management within the OT environment.
- Incident Response: You will be on the front lines, leading response efforts for both cybersecurity events and operational incidents that impact OT systems. This requires rapid communication, effective containment, swift recovery actions, and meticulous documentation. You'll address both cyber and non-cyber incidents, diligently validate disaster recovery protocols, and proactively analyze logs and correlate data to identify potential threats, minimizing downtime in a 24/7 manufacturing setting.
- Continuous Improvement & Collaboration: You will be a champion for continuous improvement, actively engaging with global OT experts across the organization to share insights, leverage best practices, and drive operational enhancements. This collaborative approach fosters a global knowledge-sharing network, ensuring the evolution of the OT framework.
- Industrial Automation & IIoT Initiatives: You will support and lead various digital transformation efforts within manufacturing, such as Industry 4.0, MES (Manufacturing Execution Systems), and IIoT (Industrial Internet of Things) initiatives. You'll also lead or assist in automation and instrumentation projects, meticulously maintaining flexibility and strategic direction of site automation systems. This includes developing and troubleshooting PLC/HMI (Programmable Logic Controller/Human-Machine Interface) systems, overseeing project implementation, and designing and supervising the installation and commissioning of new automation infrastructure, ensuring robust and efficient production lines.
What You Bring: Essential Qualifications for OT Excellence
To excel as an Operational Technology Engineer, you'll need extensive hands-on experience with enterprise and industrial technology platforms, a deep understanding of OT cybersecurity, and a proactive, collaborative mindset.
- Extensive Hands-on Platform Experience: You possess hands-on experience with enterprise and industrial technology platforms, including:
- Network Hardware: Proficiency with network hardware (e.g., Cisco routers, switches, firewalls).
- Server Environments: Experience with server environments (e.g., Microsoft Server).
- Virtualization Tools: Familiarity with virtualization tools (e.g., VMware).
- Automation Systems: Expertise with automation systems from vendors like Rockwell, Siemens, and Allen Bradley. This breadth of experience is crucial for managing diverse OT and IT components.
- Deep Familiarity with Rockwell's Software Suite: You have deep familiarity with Rockwell's suite of tools, including FactoryTalk components (e.g., Directory, View SE/ME for HMI/SCADA, AssetCentre for centralized asset management and version control). This indicates specialized knowledge in industrial control and visualization.
- Microsoft SQL Database Management: You are skilled in managing Microsoft SQL databases, including tasks like user access control, data recovery, and report generation. A working knowledge of Oracle systems and Microsoft Reporting Services is also beneficial, demonstrating versatility in database management.
- Basic Linux Administration: You are comfortable with basic administration of Linux-based operating systems, enabling you to manage and troubleshoot various industrial servers or specialized applications.
- Automation Systems Experience (5+ years): You bring over five years of verifiable experience designing, implementing, and maintaining automation systems in manufacturing or industrial settings. This extensive background showcases your practical expertise in bringing industrial processes to life and optimizing them.
- Proven Cybersecurity Measures Track Record: You have a proven track record in developing and executing cybersecurity measures specifically tailored to Operational Technology environments. This highlights your understanding of unique OT risks and your ability to implement effective security controls in industrial settings.
- Solid IT Fundamentals Understanding: You possess a solid understanding of IT fundamentals across the platforms mentioned, with the critical ability to bridge IT and OT domains. This enables seamless communication and integration between enterprise IT and industrial control systems.
- Proactive and Independent Problem-Solving: You are highly proactive and capable of independently identifying technical needs, meticulously planning and executing tests, effectively resolving issues, and delivering robust solutions. Your self-sufficiency is vital for continuous improvement in a dynamic environment.
- Collaborative Mindset with Operational Acumen: You exhibit a collaborative mindset, working effectively across teams. You have the ability to balance operational priorities in continuous production environments, ensuring system integrity and minimizing downtime even while implementing changes or resolving issues.
- Strong Communication Skills (Technical to Non-Technical): You are a strong communicator who can effectively translate complex technical changes and risks into clear, actionable insights for non-technical audiences (e.g., plant managers, operations staff). This bridges the communication gap between engineering and business.
Work Authorization:
Candidates must be eligible to work in the United States without sponsorship OR hold an existing employer-sponsored visa (e.g., H1b). The employer is unable to accommodate education or training visas (F1, OPT, CPT, etc.).
Make an Impact: Why Join This Team
This is a profound opportunity to work in a technically sophisticated environment where Operational Technology (OT) and Information Technology (IT) converge, shaping the future of manufacturing in the beverage industry. You'll be part of a forward-thinking team that values operational excellence, innovation, and continuous improvement, directly influencing the efficiency and security of 24/7 manufacturing operations. The organization offers a strong commitment to safety, quality, and sustainability, with a culture that encourages initiative and professional growth. Your contributions will be instrumental in building a dependable manufacturing technology environment that contributes to a broader global knowledge-sharing network.
We are seeking a highly skilled Fullstack Engineer (C#/Angular) to join our client's dynamic development team. This permanent position, based hybrid in Raleigh, North Carolina (requiring 2 days onsite per week), is crucial for building and maintaining high-performance applications that manage large-scale data operations and deliver seamless user experiences. Our client is a world-renowned provider of security services within the Cybersecurity industry.
What You'll Be Doing: Crafting Secure, High-Performance Applications
As a Fullstack Engineer, you'll be instrumental in developing and optimizing applications that form the core of the client's cybersecurity offerings. Your work will span both front-end and backend development, ensuring scalability, efficiency, and a seamless user experience for critical security services.
- Design, Develop, and Maintain Scalable Web Applications: You will be responsible for meticulously designing, developing, and maintaining scalable web applications. This involves utilizing C# for robust backend logic and Angular for responsive frontend user interfaces. Your work will ensure applications can handle large data operations and deliver consistent performance even with increasing user loads.
- Build Efficient Backend Systems for Data Collection and Processing: A core responsibility will be to build efficient backend systems specifically designed for large-scale data collection and processing. This includes designing database interactions, implementing data pipelines, and optimizing server-side logic to handle vast amounts of security-related data quickly and reliably.
- Develop and Maintain Front-End Interfaces for Smooth User Experience: You will actively develop and maintain front-end interfaces to ensure a smooth and intuitive user experience. This involves crafting responsive and interactive UIs using Angular and modern JavaScript tools, focusing on usability, accessibility, and visual appeal to provide users with clear insights into complex security data.
- Collaborate in a Dynamic Agile/Scrum Environment: You will be an active participant in a dynamic Agile/Scrum environment. This involves engaging in sprint planning, daily stand-ups, sprint reviews, and retrospectives. Your collaboration will ensure rapid development cycles, continuous feedback, and effective delivery of high-quality software solutions.
- Write Clean, Testable, and Reusable Code: You will consistently write clean, testable, and reusable code. This commitment to coding best practices ensures that your solutions are maintainable, extensible, and contribute to the long-term health of the codebase. Your code will be robust and reliable for critical cybersecurity applications.
- Optimize Applications for Speed and Scalability: You will continuously optimize applications for speed and scalability. This involves analyzing performance bottlenecks, fine-tuning code and database queries, and implementing architectural improvements to ensure that applications can handle high data volumes and user traffic efficiently. Your focus on optimization directly impacts application responsiveness and user satisfaction.
- Work Cross-Functionally with Internal Teams and Stakeholders: You will foster strong relationships and work cross-functionally with various internal teams and stakeholders. This collaboration is essential for gathering requirements, aligning on technical designs, integrating solutions, and ensuring that developed applications meet the needs of all relevant parties within the cybersecurity domain.
What You Bring: Essential Skills for a Fullstack Engineer
To excel as a Fullstack Engineer in this role, you'll need a strong foundation in C# and Angular development, coupled with practical experience in multithreading and adaptable problem-solving.
- Backend Development with C# (3+ years): You must possess 3+ years of verifiable backend development experience with C#. This demonstrates strong proficiency in building server-side logic, APIs, and data processing components using the C# language and its associated frameworks.
- Front-End Development with Angular and JavaScript (2+ years): You are required to have 2+ years of front-end development experience with Angular and modern JavaScript tools. This indicates strong proficiency in building interactive user interfaces, managing state, and consuming APIs from the frontend.
- Bachelor's Degree in Computer Science or Related Field: You must hold a Bachelor's degree in Computer Science or a related field. This academic background provides the foundational knowledge in programming, algorithms, and software design essential for this role.
- Experience with Multithreaded/Asynchronous Programming: You have proven experience with multithreaded/asynchronous programming. This is crucial for building high-performance applications that can handle concurrent operations efficiently, preventing blocking and ensuring responsiveness, especially for data-intensive tasks.
- Ability to Adapt to Various Roles: You demonstrate a strong ability to adapt to various roles within the software development lifecycle. This includes contributing effectively to design, performing rigorous testing, and skillfully troubleshooting complex issues across the application stack. Your versatility ensures comprehensive problem-solving capabilities.
- Strong Communication and Collaboration Skills: You possess strong communication and collaboration skills. This is crucial for articulating technical concepts clearly, engaging effectively with cross-functional teams, participating in Agile ceremonies, and providing constructive feedback in code reviews.
Preferred Skills: Enhancing Your Fullstack Profile
While the above are essential, the following skills would further enhance your application:
- Python Development Experience: Experience with Python development is a plus. This indicates versatility and could be valuable for scripting, data analysis, or backend services.
- Familiarity with Microsoft APIs: Familiarity with Microsoft APIs such as Graph, REST, and CSOM (Client-Side Object Model) is desirable. This is particularly useful for integrating with Microsoft ecosystem services and platforms.
- Cloud Platform Experience: Experience with Azure or other cloud platforms (e.g., AWS, GCP) is a plus. This indicates an understanding of cloud-native development and deploying scalable applications in the cloud.
- Proficiency with Source Control Tools: Proficiency with source control tools like TFS (Team Foundation Server) or Git. This ensures familiarity with version control best practices and collaborative development workflows.
- Integration of Third-Party APIs: Experience with the integration of third-party APIs is a plus. This demonstrates your ability to connect and exchange data with external services, expanding application functionalities.
- Performance Optimization (CPU, memory, network): Strong skills in performance optimization at various levels, including CPU utilization, memory management, and network communication, are highly valued for high-performance applications.
- Automation Testing and SQL Performance Tuning: Experience with automation testing (e.g., unit, integration, UI automation) and SQL performance tuning is a plus. These skills contribute to robust application quality and efficient data operations.
If this Fullstack Engineer (C#/Angular) role in Raleigh, NC, aligns with your expertise in C# and Angular, your passion for building high-performance, secure applications, and your desire to work in the cybersecurity industry, we encourage you to learn more about this exciting permanent, hybrid opportunity. This is a fantastic chance to contribute to cutting-edge security services.
Job Features
Job Category | Engineering |
Senior Data Architect - Security & Governance (Permanent - Hybrid - New York, NY; Holmdel, NJ; Stamford, CT; or Bethlehem, PA)
Glocomms has partnered with a major mutual life insurance company that's actively seeking a highly experienced and strategic Senior Data Architect - Security & Governance. This permanent position offers a flexible hybrid work model, requiring 3 days per week onsite in one of several key locations: Manhattan, NY; Holmdel, NJ; Stamford, CT; or Bethlehem, PA.
This role is absolutely pivotal in shaping the client's data security posture, leading the design and implementation of robust data protection frameworks across the entire enterprise. You'll ensure compliance with complex global regulations and safeguard sensitive information throughout its entire lifecycle. The ideal candidate will bring deep technical expertise in cutting-edge data security technologies, a strong understanding of emerging AI/ML security risks, and the ability to effectively influence executive stakeholders and diverse cross-functional teams.
What You'll Be Doing: Leading Strategic Data Protection Initiatives
As a Senior Data Architect focusing on Security & Governance, you'll be at the forefront of designing, implementing, and enforcing robust data protection frameworks across a major financial institution. Your role combines deep technical architecture with strategic leadership, ensuring data is protected at every stage and in every environment.
- Develop and Implement Enterprise-Wide Data Protection Strategies: You will take a leading role in developing and implementing enterprise-wide data protection strategies, policies, and frameworks. This involves creating a comprehensive roadmap for safeguarding sensitive information across the organization, ensuring alignment with business objectives and risk tolerance.
- Architect Secure Data Platforms, Pipelines, and AI/ML Workflows: You will be responsible for architecting secure data platforms, data pipelines, and AI/ML workflows, encompassing cutting-edge technologies like Generative AI (GenAI) and agentic systems. Your designs will integrate security controls from the ground up, ensuring the integrity and confidentiality of data throughout its lifecycle in analytical and AI/ML processing.
- Apply Advanced Data Protection Techniques: You'll meticulously apply advanced data protection techniques across the entire data lifecycle. This includes implementing robust encryption (in transit, at rest, and even in use), deploying tokenization methods, utilizing data masking for non-production environments, and leveraging anonymization techniques to protect privacy while enabling data utility for analytics and development.
- Define and Enforce Data Retention and Destruction Policies: You will precisely define and enforce data retention and destruction policies in line with internal governance and critical compliance mandates. This ensures that sensitive data is kept only for as long as legally or business-required, and is securely and irrevocably destroyed when no longer needed, minimizing data footprint and associated risks.
- Conduct Adversarial Testing to Enhance System Resilience: You will actively conduct adversarial testing to rigorously assess and enhance system resilience against sophisticated attacks. This includes simulating emerging threats like prompt injection (for GenAI models), data leakage (unintended exposure of sensitive data), and data poisoning (manipulating training data to compromise AI models). Your proactive testing strengthens defenses against novel attack vectors.
- Ensure Compliance with Privacy Regulations and Support Audits: You will play a crucial role in ensuring stringent compliance with critical data privacy regulations such as HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act), alongside other relevant jurisdictional regulations. You will also provide vital support for audit readiness and conduct cross-border data risk assessments, navigating the complexities of international data transfer and privacy.
- Secure Cloud Data Environments and Manage MLOps Security: You will secure cloud data environments across major providers like AWS (Amazon Web Services), Databricks (for data analytics and AI), and Snowflake (cloud data warehousing). This includes configuring robust security controls, access policies, and data protection mechanisms within these cloud platforms. You'll also specifically manage MLOps (Machine Learning Operations) security, ensuring that the end-to-end ML pipeline, from data ingestion to model deployment and monitoring, is secure and compliant.
- Utilize Data Governance and Classification Tools: You will expertly utilize leading data governance and classification tools such as Collibra, Informatica, and Microsoft Purview. This involves leveraging these platforms for data cataloging, data lineage tracking, data quality management, and enforcing data classification policies across the enterprise.
- Develop and Maintain Reference Architectures and Executive Reporting: You will be responsible for developing and maintaining authoritative reference architectures and prescriptive blueprints for secure data environments. Additionally, you will create and deliver executive-level reporting on the data security posture, highlighting key risks, mitigation strategies, and the overall effectiveness of data protection controls for senior leadership.
- Stay Ahead of Emerging Threats and Technologies: You will continuously stay ahead of emerging threats and technologies in the rapidly evolving fields of AI/LLM security (securing Large Language Models), agentic security (securing autonomous AI agents), and data governance. Your proactive research and adaptation will ensure the firm's data defenses remain cutting-edge against new attack vectors and compliance challenges.
Qualifications: Your Foundation for Data Security Leadership
To excel as a Senior Data Architect focusing on Security & Governance, you'll need extensive experience in information security, deep expertise in data protection and cloud security, and strong leadership and communication skills, particularly in emerging areas like AI/ML security.
- Extensive Information Security Experience: You must possess 10+ years of verifiable experience in information security, with a significant focus of 5+ years specifically on data security and privacy. This extensive background demonstrates a seasoned professional with deep practical knowledge of securing sensitive information in complex enterprise environments.
- Proven Expertise in Secure Data Architecture: You have proven expertise in designing and implementing secure data architectures within complex enterprise environments. This includes experience across various data storage types (databases, data lakes, warehouses) and data processing pipelines, ensuring security is embedded by design.
- Strong Understanding of Data Privacy Laws and Compliance: You possess a strong understanding of data privacy laws, major compliance frameworks, and cloud-native security principles. This ensures you can build solutions that meet stringent legal, regulatory, and industry best practice requirements for data protection.
- Excellent Communication and Collaboration Skills: You will exhibit excellent communication and collaboration skills, both verbal and written. This is crucial for effectively influencing technical and executive teams, presenting complex security topics clearly, and fostering strong partnerships across the organization to drive data security initiatives.
- Relevant Certifications (Plus): Possession of relevant industry certifications is a significant plus, demonstrating validated expertise. This includes:
- CISSP (Certified Information Systems Security Professional): A globally recognized certification for information security professionals.
- CIPP (Certified Information Privacy Professional): Demonstrates expertise in privacy laws and regulations.
- CCSP (Certified Cloud Security Professional): Validates expertise in cloud security architecture and operations.
- AWS Security - Specialty: Confirms expertise in securing data and workloads within Amazon Web Services.
If this Senior Data Architect - Security & Governance role, based in New York, Holmdel, Stamford, or Bethlehem, aligns with your extensive data security architecture experience, your expertise in AI/ML security, and your passion for shaping robust data protection frameworks within a major mutual life insurance company, we encourage you to learn more about this exceptional permanent, hybrid opportunity.
Please apply directly if you are interested. Please note: the client is not able to sponsor a visa now or in the future for this position.
Job Features
Job Category | Data, IT, Security |
Cybersecurity Manager, Identity & Access Management (Permanent - Hybrid - Omaha, NE)
Our client, a global leader in the packaged goods industry, is seeking a highly collaborative and strategic Cybersecurity Manager - Identity and Access Management (IAM). This permanent position, based hybrid in Omaha, Nebraska (3 days per week onsite), offers a pivotal opportunity to lead their enterprise IAM program.
This role requires a strong people leader with exceptional communication and interpersonal skills to manage IAM operations, drive identity governance, and partner seamlessly across HR, IT, GRC (Governance, Risk, and Compliance), and Cybersecurity teams. You'll be instrumental in overseeing identity lifecycle management, privileged access, and vendor access, all while mentoring a high-performing team in a dynamic work environment.
What You'll Be Doing: Leading Strategic IAM Initiatives
As the Cybersecurity Manager for Identity and Access Management, you'll be at the forefront of securing the organization's digital identities and access pathways. Your role combines strategic leadership with operational oversight, ensuring robust security, compliance, and efficiency across the enterprise.
- Lead the IAM Program: You will take primary ownership of leading the client's Identity and Access Management (IAM) program. This involves setting the strategic direction, defining the roadmap, and overseeing all operational aspects of IAM across the entire global organization. Your leadership will be crucial in building and maturing a comprehensive IAM framework.
- Manage IAM Operations: You will directly manage daily IAM operations, ensuring that identity lifecycle processes are efficient and secure. This includes overseeing user provisioning (granting access), access reviews (periodically validating access rights), Privileged Access Management (PAM) (securing elevated accounts), and Single Sign-On (SSO) solutions (simplifying user authentication). Your oversight ensures consistent and compliant access management.
- Drive Identity Governance: You will be instrumental in driving identity governance initiatives. This involves establishing policies, procedures, and controls that manage the digital identities and access privileges of all users (employees, contractors, vendors, customers) throughout their lifecycle. Your work ensures data integrity, compliance with internal policies, and adherence to external regulations.
- Partner Across Cross-Functional Teams: You will foster strong relationships and partner seamlessly across various cross-functional teams, including Human Resources (HR), Information Technology (IT), Governance, Risk, and Compliance (GRC), and other Cybersecurity teams. This collaboration is vital for aligning IAM strategies with broader organizational goals, securing buy-in, and ensuring that access security is embedded throughout business functions.
- Mentor a High-Performing Team: You will be responsible for mentoring and guiding a high-performing team of IAM professionals. This involves providing technical leadership, fostering skill development, setting SMART (Specific, Measurable, Achievable, Relevant, Time-bound) goals, and conducting regular performance management to ensure your team remains effective and grows professionally.
What You Bring: Essential Qualifications for IAM Leadership
To excel as a Cybersecurity Manager focusing on IAM, you'll need extensive experience in information security and IAM leadership, proven operational management skills, and familiarity with compliance frameworks.
- Extensive Information Security and IAM Leadership Experience: You must possess 8+ years of verifiable experience in Information Security, with a minimum of 5+ years specifically in IAM leadership roles. This extensive background demonstrates a seasoned professional capable of managing complex security programs and leading teams within the critical domain of identity and access management.
- Proven Experience Managing IAM Operations: You have proven, hands-on experience managing IAM operations. This includes direct oversight of user provisioning (onboarding/offboarding), conducting access reviews, implementing and managing PAM (Privileged Access Management) solutions, and deploying/maintaining SSO (Single Sign-On) solutions. Your practical experience in these areas is crucial for immediate impact.
- Strong Leadership and Team Development Skills: You demonstrate strong leadership and team development skills. This includes expertise in setting SMART goals for your team, conducting performance management, fostering a collaborative environment, and guiding professional growth for direct reports.
- Excellent Communication and Collaboration Skills: You possess excellent communication skills, both verbal and written, enabling clear articulation of complex technical concepts and effective interaction with diverse technical and non-technical teams. Your strong collaboration skills are essential for bridging organizational silos and achieving unified security goals.
- Experience with IAM Tools: You have practical experience with industry-leading IAM tools such as Okta (for identity and access management), SailPoint (for identity governance), CyberArk (for privileged access management), and Azure AD (Active Directory) for cloud-based identity services. Your familiarity with these platforms is vital for managing the IAM ecosystem.
- Familiarity with Compliance Frameworks: You are familiar with major compliance frameworks such as SOX (Sarbanes-Oxley Act), HIPAA (Health Insurance Portability and Accountability Act), NIST (National Institute of Standards and Technology) guidelines, and ISO 27001 (Information Security Management). This knowledge is crucial for ensuring that IAM practices meet regulatory and industry standards.
Qualifications: Foundational Knowledge and Certifications
To further solidify your qualifications, the ideal candidate will possess a strong academic foundation and relevant industry certifications.
- Educational Background: A Bachelor's degree in Computer Science, IT (Information Technology), Cybersecurity, or a related field is required. This academic background provides a strong theoretical understanding of computing and security principles.
- Industry Certifications: Possession of valuable industry certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or equivalent credentials is highly desirable. These certifications validate your expertise and commitment to the information security field.
- Strong Understanding of Cybersecurity Operations and Incident Response: You have a strong understanding of broader cybersecurity operations and incident response processes. This indicates your ability to integrate IAM practices within the larger security framework and contribute effectively during security incidents.
- Strategic Planning and Budget Management Experience: You possess demonstrable strategic planning and budget management experience. This includes developing long-term IAM roadmaps, justifying investments, and managing financial resources effectively to achieve program objectives.
- Comfort with Hybrid Work Model: You are comfortable working effectively in a hybrid work model, balancing onsite presence with remote flexibility. This adaptability ensures seamless collaboration and productivity within the designated work environment.
Work Environment:
This is a hybrid role requiring on-site presence Tuesday through Thursday out of the client's Omaha, NE office. Sponsorship is not available now or in the future for this position.
If you are a highly collaborative and strategic Cybersecurity Manager - Identity and Access Management (IAM) seeking a permanent, hybrid opportunity in Omaha, NE, to lead an enterprise IAM program within a global packaged goods industry leader, we encourage you to apply directly!
Senior IAM Engineer (Permanent - Onsite - New York, NY)
A top-tier hedge fund is seeking a highly skilled Senior IAM Engineer to strategically shape the future of its identity and access management infrastructure. This permanent position, based onsite in New York, NY, offers a high-impact engineering role at the crucial intersection of security, scale, and performance. It's ideal for a professional who thrives in technically rigorous and demanding environments.
The Opportunity: Building the Identity Backbone of a World-Class Firm
You'll become an integral part of a small, exceptionally skilled team responsible for building and securing the identity backbone of the firm. Your work will directly underpin the firm's critical trading, research, and engineering operations, spanning everything from foundational directory services to cutting-edge cloud-native authentication platforms. This role offers a unique chance to influence the architecture of a world-class technology organization, working on systems that demand unparalleled reliability, speed, and security at scale, alongside engineers who value precision and measurable impact.
What You'll Do: Driving Next-Generation Identity Platforms
As a Senior IAM Engineer, your responsibilities will blend strategic design, hands-on implementation, and leadership in highly secure, high-performance environments. You'll be instrumental in evolving the firm's identity and access capabilities across both on-premises and cloud infrastructures.
- Design and Implement Next-Generation Identity Platforms: You will take a leading role in the design and implementation of next-generation identity platforms. This involves architecting scalable, secure, and resilient solutions that leverage cutting-edge technologies to modernize the firm's identity infrastructure, ensuring it meets future demands for security, performance, and user experience.
- Build and Maintain Resilient Authentication and Authorization Services: You will be responsible for meticulously building and maintaining resilient authentication and authorization services across both on-premises and cloud environments. This includes designing fault-tolerant systems, implementing robust security controls, and ensuring continuous availability for critical access pathways, directly supporting the firm's trading, research, and engineering operations.
- Lead Firm-Wide Initiatives to Improve Security Posture: You will spearhead and lead firm-wide initiatives aimed at continuously improving the overall security posture of the organization. This involves identifying systemic vulnerabilities, proposing strategic enhancements, and driving the implementation of solutions that bolster the firm's defenses against sophisticated cyber threats. Your leadership will directly influence the security roadmap.
- Develop Automation Pipelines Using Advanced Tools: You will be instrumental in driving operational efficiency and consistency by developing robust automation pipelines. This includes leveraging cutting-edge Infrastructure as Code (IaC) tools such as Terraform for provisioning cloud resources, Pulumi for multi-language infrastructure management, and Crossplane for extending Kubernetes to manage external resources. Your automation efforts will streamline deployments, reduce manual effort, and ensure configuration consistency.
- Extend and Integrate Key IAM Solutions: You will extend and integrate industry-leading IAM solutions into the firm's existing ecosystem. This includes working with platforms like Azure AD (Active Directory) for cloud-based identity, Okta for identity and access management, and PingFederate (PingFed) for enterprise federation. Your expertise will ensure seamless authentication and authorization across diverse applications and services.
- Contribute to Internal Libraries and Governance Platforms: You will actively contribute to internal libraries and governance platforms developed within the firm. This involves writing high-quality code in Java, Python, or Go, creating reusable components, and enhancing platforms that enforce security policies, manage identity lifecycles, and ensure compliance. Your contributions will directly strengthen the firm's internal security engineering capabilities.
What We're Looking For: Your Expertise in Identity & Security Engineering
To excel as a Senior IAM Engineer at this top-tier hedge fund, you'll need extensive experience in software or security engineering, deep expertise in IAM concepts, strong programming skills, and a proven track record of solving complex challenges.
- Extensive Software or Security Engineering Experience: You must possess 8+ years of verifiable experience in software or security engineering. This extensive background demonstrates a seasoned professional capable of tackling complex technical challenges and delivering robust, secure solutions in high-stakes environments.
- Deep Expertise in IAM Concepts: You are required to have deep expertise in core IAM concepts, including:
- Authentication: Understanding various methods of verifying user identity (e.g., MFA, SSO, passwordless).
- Federation: Knowledge of how identities are shared and managed across different security domains (e.g., SAML, OAuth, OpenID Connect).
- Zero Trust: A strong grasp of Zero Trust principles, where no user or device is inherently trusted, and all access is verified.
- PKI (Public Key Infrastructure): Understanding of digital certificates, certificate authorities, and their role in secure communication and identity.
- Experience with Foundational Identity Services: You must have hands-on experience with foundational identity services that underpin enterprise access management. This includes deep familiarity with Active Directory (for centralized user management), LDAP (Lightweight Directory Access Protocol) for directory services, and PKI (Public Key Infrastructure) components for secure digital identities and communication.
- Strong Programming Skills in Multiple Languages/Tools: You possess strong programming skills in a combination of relevant languages and tools. This includes Java, Go, Python (for application and automation development), Terraform HCL (HashiCorp Configuration Language) for Infrastructure as Code, and Rego (for policy-as-code languages like OPA). This polyglot capability ensures versatility in developing and securing diverse systems.
- Track Record of Solving Complex Challenges: You must have a proven track record of solving complex technical and organizational challenges. This indicates your ability to dissect intricate problems, devise innovative solutions, navigate cross-functional dynamics, and deliver impactful results in demanding environments.
Why This Role? Influence and Impact at Scale
This is more than a security role—it's an exceptional chance to influence the architecture of a world-class technology organization. You'll be working on systems that demand unparalleled reliability, blazing speed, and ironclad security at immense scale. You'll collaborate alongside engineers who prioritize precision and measurable impact, fostering an environment where your contributions are highly valued and directly shape the firm's technological future.
Job Features
Job Category | IT, Security |
Head of Identity & Access Management (Permanent - Hybrid - Omaha, NE)
We're partnering with a global leader in the packaged goods industry to find a visionary Head of Identity & Access Management (IAM). This permanent position, based hybrid in Omaha, Nebraska, offers full relocation support for individuals outside the local area. You'll own the strategic development, roadmap, and operations for IAM across the entire company, playing an essential role in the CISO's long-term cybersecurity vision. Our client has already invested heavily in cybersecurity, with full support from executive leadership.
This is a unique opportunity for a seasoned professional with prior experience successfully standing up an IAM program from scratch while managing a team of direct reports. An understanding of the manufacturing industry on an international scale is a significant advantage.
What You'll Be Doing: Orchestrating Global IAM Strategy and Operations
As the Head of Identity & Access Management, you'll blend strategic leadership with hands-on program development, building and overseeing a comprehensive IAM framework that spans the entire global organization.
- Manage and Lead a Diverse Team: You'll directly manage a team of 8+ direct reports, serving as a pivotal coach, technical leader, and the public face of the IAM team. This involves guiding their professional development, setting performance expectations, providing mentorship, and ensuring the team operates cohesively and effectively to achieve strategic goals.
- Design, Build, and Lead a Fully Functioning IAM Program from the Ground-Up: This is a foundational role where you'll design, build, and effectively lead a fully functioning IAM program from the ground-up. This comprehensive initiative includes critical components such as:
- Identity Governance: Establishing policies and processes for managing the digital identities of all users (employees, vendors, customers) throughout their lifecycle, including user provisioning, de-provisioning, and access reviews.
- Privileged Access Management (PAM): Implementing solutions and controls to secure, monitor, and manage elevated access privileges for critical systems and data, minimizing the risk of insider threats or advanced attacks.
- Vendor Access Management: Developing secure frameworks for managing access provided to external vendors and service providers, ensuring strict control and auditing of third-party access to internal systems.
- SSO (Single Sign-On) Solutions: Driving the adoption and implementation of SSO solutions across the enterprise to enhance user experience, simplify access, and strengthen authentication security.
- Collaborate for Comprehensive Access Security: You'll collaborate extensively with other technical teams (e.g., Information Security, Security Operations, IT Infrastructure) and non-technical teams (e.g., HR, Legal, Business Units). Your objective is to ensure strong buy-in for IAM initiatives and achieve complete access security for all functions of the business, embedding security into every aspect of operations.
- Drive IAM Strategic Planning and Budget Oversight: You will be instrumental in driving the strategic direction of IAM, constantly evaluating current and emerging technologies. This includes defining the overall budget for the IAM program, justifying investments, and ensuring that technology roadmaps align with both cybersecurity best practices and broader business objectives. Your leadership will shape future IAM capabilities.
- Oversee Relationships with External Vendors and Service Providers: You will actively oversee relationships with external vendors and service providers for IAM solutions. This involves evaluating new tools, negotiating contracts, managing service level agreements (SLAs), and ensuring that vendor performance consistently meets the organization's high standards for security and service delivery.
Qualifications: Your Foundation for IAM Leadership
To excel as Head of Identity & Access Management, you'll need extensive experience in information security and IAM, proven leadership in managing direct reports, and a strong understanding of relevant technical domains.
- Extensive Information Security or IAM Experience: You must possess 8+ years of verifiable experience in an Information Security or IAM role. This extensive background demonstrates a seasoned professional with deep practical knowledge of cybersecurity principles and identity and access management practices within an enterprise context.
- Proven Managerial Experience: You are required to have 3+ years of experience as a manager (with direct reports) specifically within IAM or another technology function. This highlights your leadership capabilities in building, developing, and overseeing technical teams to achieve strategic goals.
- Educational Background: A Bachelor's Degree in Computer Science, Cybersecurity, or a related field from an accredited institution is preferred. This academic foundation provides a strong theoretical understanding of computing and security principles.
- Demonstrated Expertise in Key IAM Domains: You must have demonstrated expertise in key IAM domains, including:
- Identity Governance: Managing user lifecycles, access certifications, and policy enforcement.
- Access Management: Controlling user access to resources based on roles and policies.
- Vendor Access Management: Securing and auditing access for external parties.
- SSO (Single Sign-On) Solutions: Implementing and managing seamless and secure user authentication across multiple applications.
- Technical Engineering Background (Preferred): While not strictly required, prior experience with a technical engineering background in IAM is preferred. This would include hands-on experience in building, configuring, and troubleshooting IAM solutions, providing a deeper understanding of implementation challenges and technical nuances.
Compensation & Benefits: Rewarding Your Leadership and Expertise
This permanent Head of Identity & Access Management role offers a highly competitive compensation package and comprehensive benefits designed to attract top-tier talent and support your well-being and financial future.
- Highly Competitive Annual Salary: You will receive a very competitive annual salary, commensurate with your extensive experience and leadership capabilities. This compensation is structured as a base salary plus an annual bonus (15%), directly tying your performance to your overall earnings.
- Comprehensive Benefits Package: Access a comprehensive benefits package that includes terrific healthcare coverage (medical, vision, and dental), a robust 401(k) retirement plan, and additional long-term incentives, designed to secure your financial future and provide peace of mind.
Relocation Support & Omaha Highlights: Embrace a Thriving Community
This exceptional opportunity is located at our client's headquarters in Omaha, Nebraska, offering a vibrant community and quality of life.
- Full Relocation Support: For candidates not local to Omaha but interested in this pivotal position, full relocation support is available. This assistance ensures a smooth transition for you and your family to the area.
- Highly Ranked State: Nebraska is highly regarded, ranking #5 on the "Best States" list from U.S. News & World Report.
- Affordable Living & Family-Friendly: Enjoy a low cost of living and an environment that is great for raising a family, providing stability and community support.
- Excellent Public Education: The state is recognized for its strong public education system, listed 7th nationally for its public education system, boasting an impressive 94% high school graduation rate.
- Proximity to Lincoln: Just about an hour away is Lincoln, Nebraska, a bustling college town renowned as the home of the University of Nebraska's beloved Husker football team, offering additional entertainment and cultural experiences.
- Vibrant Arts and Culture Scene: Omaha itself boasts a terrific arts and culture scene, with a vibrant downtown area featuring numerous museums, theaters, and live music venues, ensuring a rich array of leisure activities.
If you are interested in learning more about this unparalleled opportunity to lead Identity & Access Management for a global leader in the packaged goods industry, please apply directly!
Job Features
Job Category | IT, Security |
IT Windows Systems Engineer (Permanent - Hybrid - Chester, NY)
Our client, a leader in IT Operations, is seeking a highly skilled IT Windows Systems Engineer to join their team. This permanent position, based hybrid in Chester, New York, offers a unique blend of onsite collaboration and remote flexibility. As a vital part of the Windows Operations Engineering and Support team, you'll be instrumental in supporting various technical projects. The ideal candidate will possess robust problem-solving skills, excellent communication abilities, and a collaborative mindset, all essential for successfully aligning within the organization's dynamic and forward-thinking environment.
What's the Job? Driving System Performance and Security
As an IT Windows Systems Engineer, you'll be at the forefront of managing, optimizing, and securing critical Windows-based infrastructure. Your responsibilities will span project leadership, system analysis, troubleshooting, and continuous improvement, ensuring optimal performance and accessibility for the entire organization.
- Lead and Support Technical Projects: You will take a leading role in leading and supporting various technical projects, ensuring optimal system performance and accessibility. This involves overseeing project timelines, coordinating resources, and driving initiatives from conception to successful completion. Your leadership will ensure that system enhancements are delivered efficiently and meet strategic objectives.
- Analyze Existing Systems, Recommend Improvements, and Implement Solutions: You'll meticulously analyze existing systems to identify areas for optimization, security enhancements, or efficiency gains. Based on your in-depth evaluations, you'll then recommend innovative improvements and take charge of implementing robust solutions. This proactive approach ensures the infrastructure remains current, performant, and aligned with evolving business needs.
- Act as an Escalation Point for Service Desk Tickets: You will serve as a crucial escalation point for service desk tickets, addressing complex issues that frontline support cannot resolve. This involves diagnosing intricate problems, performing root cause analysis, and coordinating resolutions seamlessly with both the Systems and Networking teams. Your expertise will be vital in quickly restoring service and minimizing disruption to end-users.
- Train and Collaborate with Team Members: You will play an active role in fostering a culture of continuous learning and excellence. This involves training and collaborating with team members to enhance overall team performance. You'll share your knowledge, mentor junior engineers, and participate in joint problem-solving, contributing to a more skilled and cohesive Windows Operations team.
- Develop and Enforce System Hardening Guidelines: You will be instrumental in enhancing the security posture by developing and enforcing rigorous system hardening guidelines. This includes defining secure configurations for Windows operating systems, Active Directory, and other related services. Furthermore, you will maintain comprehensive documentation for these guidelines and other system configurations, ensuring clarity, consistency, and adherence to security best practices across the infrastructure.
What's Needed? Your Qualifications for Windows Systems Engineering
To excel as an IT Windows Systems Engineer, you'll need extensive experience with Windows operating systems, virtualization, storage, and cloud identity, coupled with strong scripting and analytical skills.
- Extensive Engineering, Computer Science, or Related Experience: You must possess 7+ years of experience in Engineering, Computer Science, or a related field. This extensive background demonstrates a seasoned professional capable of tackling complex IT challenges and contributing effectively to enterprise-level system environments.
- Bachelor’s Degree (Preferred) or Equivalent: A Bachelor’s degree in computer science, Information Technology, or a related field is preferred. This academic background provides a strong theoretical foundation. Alternatively, an equivalent combination of education and experience that demonstrates comparable knowledge and skills will be given full consideration.
- Hands-on Experience with Key Infrastructure Technologies: You must have significant hands-on experience with core infrastructure technologies:
- VMware (vSphere, ESXi): Proficiency in managing virtualized environments, including administering vSphere (VMware's virtualization platform) and ESXi (the hypervisor), for server virtualization.
- NetApp and PURE Storage: Experience with enterprise-grade storage solutions like NetApp (e.g., ONTAP) and PURE Storage (e.g., FlashArray). This includes understanding storage provisioning, performance, and troubleshooting.
- Azure SSO (Single Sign-On): Familiarity with implementing and managing Azure-based Single Sign-On solutions for cloud and on-premises applications, enhancing identity and access management.
- Extensive Windows OS, Active Directory, and DNS Expertise: You possess extensive experience with Windows OS (all versions), demonstrating deep proficiency in configuring, troubleshooting, and optimizing various Windows Server and client versions. Crucially, you must have expert-level knowledge of Active Directory administration (user/group management, GPOs, replication, trusts) and DNS (Domain Name System) management for enterprise environments.
- Strong Scripting and Azure PaaS Skills: You must have strong skills in scripting, particularly with PowerShell (for Windows automation and administration) and Batch scripting (for command-line automation). Additionally, significant experience with Azure PaaS (Platform as a Service) infrastructure is required. This includes deploying, managing, and troubleshooting services like Azure App Services, Azure SQL Database, Azure Functions, and other PaaS offerings.
What's in it for me? Growth, Collaboration, and Innovation
This permanent IT Windows Systems Engineer position in Chester, NY, offers a compelling environment for professional growth and significant impact within a leading IT Operations organization.
- Opportunity to Work in a Dynamic and Innovative Environment: You'll have the invaluable opportunity to work in a dynamic and innovative environment that constantly evolves with new technologies and operational challenges. This fosters continuous learning and provides exciting opportunities to apply your skills to cutting-edge infrastructure.
- Engage in Challenging Projects that Enhance Technical Skills: You will be deeply engaged in challenging projects that are designed to enhance your technical skills. You'll work on complex system analyses, security hardening initiatives, and infrastructure upgrades, continuously expanding your expertise in Windows environments, virtualization, and cloud platforms.
- Collaborate with a Diverse Team of Professionals: You'll have the privilege of collaborating with a diverse team of professionals across various IT disciplines, including Systems, Networking, and Service Desk teams. This fosters an atmosphere of open communication, knowledge sharing, and mutual support.
- Potential for Career Growth and Advancement: The organization offers clear potential for career growth and advancement within the organization. Your contributions to vital IT operations and technical projects will be recognized, providing pathways for leadership roles or specialized expertise.
- Contribute to Impactful Projects: You will directly contribute to impactful projects that shape the future of IT operations. By optimizing system performance, enhancing security, and leading key initiatives, you'll play a crucial role in ensuring the reliability and efficiency of core IT services, providing a profound sense of purpose.
If this IT Windows Systems Engineer role in Chester, NY, aligns with your extensive experience in Windows OS, Active Directory, virtualization, and your passion for leading and optimizing IT infrastructure, we encourage you to learn more about this exciting permanent, hybrid opportunity. This is a fantastic chance to contribute to a leading IT Operations team.
Ready to shape the future of Windows systems engineering in a dynamic environment?
Job Features
Job Category | IT |
Our Fortune 500 client in the United States is seeking a highly experienced and motivated IT Software Engineer (Contract - Hybrid - Plano, TX) to join their innovative team. This contract position, based hybrid in Plano, Texas, offers a unique opportunity to collaborate with multiple teams and contribute to cutting-edge solutions.
IT Software Engineer (Contract - Hybrid - Plano, TX)
Location: Plano, TX – This is a Hybrid role, combining onsite presence with remote flexibility.
Employment Type: Contract
Pay Range: Not Specified
Industry: Computer and Mathematical
What You'll Be Doing: Innovating for Best-in-Class Claims Experiences
As an IT Software Engineer, you'll be instrumental in developing and enhancing complex systems that solve critical business problems and drive direct outcomes, particularly within the claims space. You'll contribute to innovative solutions that exceed customer expectations, ultimately delivering best-in-class claims experiences.
- Collaborate on Complex System Development: You will work collaboratively on a geographically diverse agile team to develop and enhance complex systems and/or software from user stories and technical/architectural specifications. Your teamwork is essential for creating cohesive and effective solutions.
- Be a Technical Problem Solver: You'll go far beyond simply developing error-free source code, test scripts, components, and system architectures. You'll be a true technical problem solver, meticulously documenting and building deployment guides aimed at maintaining robust, relevant software. Your proactive mindset will ensure solutions are sustainable and high-quality.
- Be a Customer-Centric Engineer: Putting clients' needs first, you'll skillfully translate customer requirements into technical applications and support the implementation of new software. Your customer-centric approach ensures that the solutions directly address user needs and provide tangible business value.
- Be a Forward Thinker: Merely fixing a problem isn't enough for you. Using your proactive mindset and initiative, you'll also identify opportunities to enhance performance, quality, and efficiency within existing systems and processes. Your foresight drives continuous improvement and innovation.
- Develop Creative Solutions in an Agile Environment: You will work effectively in an agile environment to develop creative solutions for the client's claims product. This involves adapting to rapid development cycles, participating in sprint ceremonies, and continuously iterating on features to meet evolving business needs and market demands.
- Accelerate Speed to Market with Modern Technologies: You'll contribute to accelerating speed to market by addressing current product needs and developing long-term strategic solutions. This involves leveraging cutting-edge technologies such as React, TypeScript, JavaScript, Node.js, and other potential backend languages. Your versatility across the tech stack enables rapid and efficient development.
- Utilize Cloud Services and Tools: You will have hands-on experience utilizing cloud services and tools, including AWS (Amazon Web Services), Cloud Foundry, and Content Delivery Networks (CDNs) like Akamai. Your proficiency with these cloud technologies ensures that solutions are scalable, resilient, and efficiently delivered to global users.
- Demonstrate Proficiency in Multiple Programming Languages: You will demonstrate proficiency in multiple object-oriented and functional programming languages. This versatility allows you to work across various parts of the application stack, ensuring adaptability and comprehensive problem-solving capabilities.
- Build and Implement RESTful Services: You will actively build and implement RESTful services. This involves designing and coding APIs that facilitate seamless communication between different software components, ensuring efficient data exchange and system integration.
- Develop Automated Tests and Recommend Improvements: You will meticulously develop automated tests across multiple scopes, including unit, system, integration, and regression testing. Furthermore, you will identify and recommend opportunities for continuous improvement in processes, performance, and communication, contributing to an evolving and optimized development environment.
Qualifications: Your Skills for Driving Innovation
To excel as an IT Software Engineer, you'll need a strong foundation in software engineering, practical experience in agile environments, and familiarity with diverse technologies and architectural concepts.
- Software Engineering Experience (3+ years): You must have 3 or more years of software engineering experience. This indicates a solid background in developing, testing, and deploying software solutions in a professional setting.
- Agile Development Experience: You have proven experience in software development within an agile environment. This demonstrates your familiarity with agile methodologies (e.g., Scrum, Kanban), sprint cycles, and iterative development processes.
- Business Operations and Strategies Background: You possess a background in business operations and strategies, including awareness of global technology and financial services trends. This broader understanding allows you to align technical solutions with business goals and market dynamics.
- Layered Systems Architectures Awareness: You have an awareness of layered systems architectures, designs, and shared software concepts. This indicates a foundational understanding of how complex software systems are structured and how different components interact within an enterprise environment.
- Testing Familiarity: You have familiarity with various testing types, including Unit, Functional, and System integration testing. This knowledge is crucial for contributing to quality assurance and ensuring robust software delivery.
Core Skills (Proficiency Required):
- Full Stack Engineering: You possess full stack engineering skills, including proficiency in React, TypeScript, Node.js, AWS, GraphQL, Redis, and MongoDB. This broad skillset enables you to work across both front-end and back-end development, as well as cloud infrastructure and database technologies.
- Web Fundamentals: Strong understanding of HTML, CSS, and JavaScript is essential.
- Backend Expertise: Experience in Python and other backend languages.
- REST API Development: Proven experience in REST API development.
- SQL Knowledge: Experience with SQL.
- Cloud Platform: Experience with GCP Cloud platform.
- Problem-Solving and Analytical: Excellent problem-solving and analytical skills.
- Communication and Teamwork: Strong communication and teamwork skills.
- Continuous Improvement Identification: Ability to identify areas of improvement (process, performance, communication, etc.) and work with teams to deliver solutions.
- Agile/Iterative Development: Experience with Agile/Iterative ways of software development.
- eXtreme Programming (XP) Disciplines: Practiced in eXtreme Programming (XP) disciplines, including Paired programming and Test-first/Test Driven Development (TDD).
- Independent Work and Technical Guidance: Ability to work independently as well as give technical guidance to the team.
- Proficiency in Multiple Languages: Proficiency in multiple object-oriented and functional programming languages.
- In-depth Knowledge of Technologies and Architecture: In-depth knowledge of diverse and emerging technologies, architectural concepts, and principles.
- Security and Privacy Awareness: Awareness of policies regarding security and privacy.
- Backlog and Delivery Understanding: Understanding of backlog tracking, burndown metrics, and incremental delivery.
Highly Competitive Applicants (Preferred Experience):
- Insurance Industry Knowledge: Understanding of the insurance industry and products.
- Passion for New Technology: Excited by trying new technology and learning new tools.
Education:
- Bachelor's or Master's Degree: A Bachelor's or Master's degree in a technical or business discipline, or equivalent experience.
If this IT Software Engineer role in Plano, TX, aligns with your full stack engineering skills, your experience with React, Node.js, AWS, and your passion for driving innovation in claims solutions, we encourage you to learn more about this exciting hybrid contract opportunity. This is a fantastic chance to contribute to a Fortune 500 client at the forefront of digital transformation.
Job Features
Job Category | Engineering, IT |
M365 Support Engineer - Japanese Language (Contract - Remote)
A prominent technology organization is actively seeking an M365 Support Engineer – Japanese Language to join their team. This 6-18 month contract position is 100% remote, with hours operating from 11 AM - 8 PM CDT to support enterprise-level customers in Japan. As a vital part of the Azure response team, you'll be instrumental in providing crucial technical support. The ideal candidate will possess excellent customer service skills, strong technical knowledge, and the ability to communicate effectively in both Japanese and English, all essential for successfully aligning with the organization's commitment to global service excellence.
What's the Job? Delivering Expert Support to Japanese Enterprise Clients
As an M365 Support Engineer, you'll be the primary point of contact for enterprise-level customers in Japan, providing expert technical support for Microsoft 365 services. Your role is centered on rapid incident resolution, proactive problem prevention, and fostering strong customer relationships.
- Deliver Timely and High-Quality Incident Resolution: You will be responsible for delivering timely and high-quality incident resolution for enterprise customers. This involves efficiently diagnosing and resolving technical issues related to Microsoft 365 services. A core focus will be on conducting thorough root cause analysis to understand why incidents occurred, implementing prevention strategies to avoid recurrence, and facilitating knowledge transfer to customers and internal teams.
- Utilize Knowledge of Customer Environment for Timely Resolution: You will leverage your understanding of the specific customer environment to resolve issues in a timely and effective manner. This includes familiarizing yourself with their Microsoft 365 configurations, integration points, and unique operational requirements, allowing for tailored and efficient troubleshooting.
- Manage Escalations and Sub-Cases: You will adeptly manage escalations and sub-cases to ensure the timely and high-quality resolution of all customer issues. This involves taking ownership of complex problems, coordinating with higher-tier support or specialized teams (both internally and externally), tracking progress, and communicating updates to customers until issues are fully resolved.
- Develop and Implement Proactive Support Strategies: You will contribute to enhancing service quality by actively developing and implementing strategies for providing proactive support. This forward-thinking approach aims to anticipate and prevent incidents before they impact customers, ultimately resulting in fewer disruptions and increased system availability for enterprise clients.
- Participate in Triage Meetings and Knowledge Sharing: You will regularly participate in triage meetings to collaborate with other engineers, share technical knowledge, and collectively work towards efficiently resolving customer problems. These meetings are crucial for discussing complex cases, identifying trends, and fostering a collaborative problem-solving environment.
What's Needed? Your Qualifications for M365 Support
To excel as an M365 Support Engineer, you'll need a solid technical background, fluency in Japanese, and a strong understanding of enterprise messaging and cloud technologies.
- Technical Degree or Equivalent Experience: You must possess a 4-year technical degree or have equivalent work experience demonstrating a strong technical foundation.
- Technical Support or MIS Experience: A minimum of 3 years of experience in technical support or MIS (Management Information Systems) in an enterprise environment is required. This background indicates your ability to handle complex IT issues within a large organizational setting.
- Bilingual Fluency (Japanese & English): You must have fluency in Japanese (reading, writing, and speaking) to effectively communicate with enterprise customers in Japan. Additionally, you need to be confident in English (reading and writing) for internal collaboration and documentation.
- Solid Working Knowledge of Enterprise Messaging & Identity: You possess a solid working knowledge of Enterprise Messaging Administrative concepts (e.g., Exchange Online, mail flow, email security) and Identity management (e.g., Azure Active Directory, user provisioning, single sign-on). This understanding is crucial for supporting Microsoft 365 services.
- Experience with Azure or Cloud Technologies: You have hands-on experience with Azure or other Cloud technologies. This demonstrates your familiarity with cloud services, architecture, and troubleshooting in a modern cloud environment, which is the foundation of Microsoft 365.
What's in it for me? Growth, Impact, and Global Exposure
This 6-18 month contract as an M365 Support Engineer offers a compelling environment for professional growth and significant impact within a leading technology organization.
- Opportunity to Work on a Supportive Team with Cutting-Edge Technology: You'll have the invaluable opportunity to work on a supportive team that uses and supports cutting-edge technology, ensuring continuous learning and engagement with the latest advancements.
- Hands-On Experience with Microsoft Products: You'll gain extensive hands-on experience with Microsoft products and services, deepening your expertise in the Microsoft 365 ecosystem and related cloud offerings.
- Enhance Technical and Customer Service Skills: This role provides a direct chance to enhance both your technical skills (through complex troubleshooting) and your customer service experience (through direct client interaction), developing a well-rounded professional profile.
- Engagement with Diverse Enterprise-Level Clients: You'll engage with a diverse range of enterprise-level clients in Japan, exposing you to various business models and technical challenges, enriching your problem-solving experience.
- Potential for Career Growth: The role offers a clear potential for career growth and development within the organization, providing pathways for advancement based on your performance and contributions.
Upon completion of waiting period, consultants are typically eligible for a comprehensive suite of benefits designed to support their well-being and financial security. These include:
- Medical and Prescription Drug Plans: Comprehensive healthcare coverage for medical services and necessary prescription medications.
- Dental Plan: Benefits covering routine dental care and essential treatments.
- Vision Plan: Coverage for eye examinations, prescription glasses, and contact lenses.
- Health Savings Account (HSA): A tax-advantaged savings account to help pay for qualified medical expenses.
- Health Flexible Spending Account (HFSA): Allows pre-tax contributions for eligible healthcare costs.
- Dependent Care Flexible Spending Account (DCFSA): Provides tax advantages for dependent care expenses.
- Supplemental Life Insurance: Options for additional life insurance coverage for enhanced financial protection.
- Short Term and Long Term Disability Insurance: Income replacement benefits during periods of temporary or prolonged incapacitation due to illness or injury.
- Business Travel Insurance: Coverage for unforeseen events or emergencies that may occur during authorized business travel.
- 401(k), Plus Match: An opportunity to save for retirement with the added benefit of employer matching contributions, enhancing your long-term financial growth.
- Weekly Pay: Consistent and regular compensation provided on a weekly basis, ensuring stable financial flow throughout your contract engagement.
If this M365 Support Engineer - Japanese Language role aligns with your customer service skills, technical knowledge of Microsoft 365, and your ability to communicate effectively in both Japanese and English, we encourage you to learn more about this exciting remote contract opportunity. This is a fantastic chance to contribute to a leading technology organization and support enterprise clients in Japan.
Ready to leverage your bilingual tech support skills on a global scale?
Job Features
Job Category | IT |
Senior Manager, Data & Analytics (Permanent - Hybrid - St. Paul, MN)
Our client, a prominent player in the Computer and Mathematical industry, is actively seeking a visionary Senior Manager, Data & Analytics. This permanent position, based hybrid in St. Paul, Minnesota (3 days a week onsite), offers a pivotal opportunity to lead their data and business intelligence strategy. This leadership role will drive enterprise-wide reporting and analytics, transforming complex data into actionable insights that empower crucial finance, sales, and operations teams. As the leader of a dynamic team of associates and contractors, you will mentor, guide, and inspire your team to deliver high-impact reporting solutions that directly influence strategic decision-making. Working at the intersection of technology and business, you will partner closely with stakeholders to design scalable data solutions, enhance performance metrics, and cultivate a thriving culture of data-driven innovation.
What You'll Be Doing: Leading Data Strategy and BI Transformation
As the Senior Manager, Data & Analytics, you'll be the architect of the company's data strategy, guiding a talented team to deliver actionable insights that directly impact key business functions. Your role blends strategic vision with hands-on leadership in a hybrid environment.
- Define and Shape the Analytics Vision: You will meticulously define and shape the analytics vision for the organization. This involves collaborating closely with business and IT leaders to establish a comprehensive, long-term Power BI reporting and analytics strategy. Your vision will guide the development of data capabilities that directly support evolving business needs and foster a data-driven culture across the enterprise.
- Lead and Develop a High-Performing Team: You will be responsible for leading and developing a high-performing team of associates and contractors. This includes providing direct mentorship, strategic direction, and comprehensive oversight. You'll conduct performance reviews, identify growth opportunities, and ensure that your team's efforts are consistently aligned with overarching business objectives, fostering an environment of continuous learning and excellence.
- Drive Strategic Execution of Reporting Needs: You will translate complex Power BI reporting needs into a well-defined and actionable roadmap. This involves prioritizing initiatives, allocating resources, and overseeing the execution to ensure the timely delivery of critical insights. Your strategic leadership will bridge the gap between analytical requirements and practical implementation, maximizing the value derived from data.
- Lead Cross-Functional Collaboration: You will foster extensive cross-functional collaboration, working closely with various teams including finance, sales, and operations. Your leadership will ensure that analytics solutions are precisely aligned and prioritized with core business goals, facilitating seamless data flow and maximizing the impact of insights across departments.
- Establish Data Governance Best Practices: You will be instrumental in establishing robust data governance best practices. This involves defining policies, procedures, and standards to ensure the consistency, reliability, and scalability of data utilized in reports and dashboards. Your efforts will safeguard data integrity, promote data literacy, and ensure compliance with relevant regulations.
- Optimize Performance and Scalability of Power BI Dashboards: You will take a proactive approach to optimize the performance and scalability of Power BI dashboards. This includes designing dashboards with a strong focus on usability (intuitive interfaces, clear visualizations), efficiency (fast loading times, optimized queries), and adaptability to meet evolving business needs. Your expertise will ensure that reports remain responsive and valuable as data volumes grow.
- Champion Business Intelligence Adoption: You will serve as a passionate champion for business intelligence (BI) adoption across the organization. This involves actively mentoring teams on BI best practices, fostering a vibrant community of BI users, and promoting continuous innovation in analytics. Your leadership will empower users to leverage data effectively, driving a culture of data-driven decision-making.
- Explore AI & ML Integration in Reporting: You will partner closely with analytics leaders to identify and explore opportunities for AI (Artificial Intelligence) and ML (Machine Learning) integration within reporting and analytics. This includes leveraging AI/ML for automating report generation, identifying complex trends, and performing predictive forecasting, thereby pushing the boundaries of traditional BI and delivering more sophisticated insights.
- Ensure Stakeholder Engagement through Communication: You will develop and manage a structured BI communication plan to ensure that key stakeholders are consistently informed and actively involved in data and analytics initiatives. This involves clear and timely updates on project progress, insights derived, and strategic decisions, fostering transparency and securing continued support for data programs.
What We Need From You: Essential Qualifications for a Data Leader
To excel as a Senior Manager, Data & Analytics, you'll need a robust blend of extensive leadership experience in BI/analytics, deep technical expertise in Microsoft data platforms, and strong business acumen, especially within distributor models.
- Education: A Bachelor’s degree in MIS (Management Information Systems), CIS (Computer Information Systems), Business Analytics, or a related field is required. Alternatively, equivalent experience demonstrating comparable knowledge and skills will be considered.
- Leadership Experience in BI/Analytics: A minimum of 7 years of verifiable experience leading IT, analytics, or BI teams is required, with a distinct focus on Power BI solutions. This demonstrates your ability to guide technical teams, manage complex data projects, and deliver impactful business intelligence.
- Deep Expertise in Microsoft Data Platforms: You must possess deep expertise in Microsoft Power BI (for data visualization and reporting), Azure Cloud Data Storage (e.g., Azure Data Lake Storage, Azure SQL Database, Azure Blob Storage), MS SQL (Microsoft SQL Server), and Synapse BI tooling (e.g., Azure Synapse Analytics for data warehousing and analytics). Microsoft Fabric experience is a significant plus, indicating familiarity with Microsoft's latest unified data platform.
- Strategic Business Acumen: You bring strategic business acumen, particularly a strong understanding of distributor models common in the CPG (Consumer Packaged Goods), retail, and beverage alcohol industries. This includes deep insight into their unique operational analytics needs, such as supply chain optimization, sales performance analysis, and inventory management.
- Expertise in Agile & Waterfall Methodologies: You possess expertise in both Agile and Waterfall methodologies, with practical experience managing BI projects in MS DevOps or Jira environments. This demonstrates your adaptability to different project management frameworks and your ability to leverage modern tools for effective project execution.
- Strong Analytical Mindset: You have a strong analytical mindset, coupled with the ability to translate complex data into compelling narratives that directly drive business decisions. Your insights will be clear, concise, and actionable, enabling stakeholders to make informed choices.
- Leadership in Business Intelligence Adoption: You have a proven track record of leadership in business intelligence adoption, including experience mentoring teams and actively fostering a data-driven culture across an organization. You inspire others to embrace analytics and leverage data effectively.
- Effective Communication and Stakeholder Engagement: You possess effective communication and stakeholder engagement skills. This includes the ability to clearly socialize complex analytical insights and align BI initiatives with executive priorities, ensuring strong buy-in and support for data strategies.
- Continuous Improvement Mindset: You are driven by a continuous improvement mindset, consistently focused on evolving BI capabilities and processes to meet changing business needs and embrace emerging technologies.
Desired Skills (Adding Further Value):
- Track Record of Multi-Project Delivery: A demonstrated track record of delivering on multiple projects simultaneously, while effectively managing the demands of daily support, is highly desired.
- Ability to Prioritize Workloads: The ability to prioritize multiple workloads effectively in a high-pace environment is crucial for managing competing demands.
- Strong Customer Service Skills: You possess strong customer service skills and staff management experience.
- Project Monitoring and People Leadership: The ability to develop and monitor project progress, coupled with strong organizational, project management, team building, and people leadership skills, is highly valued.
- Facilitation and Communication Across Levels: The ability to facilitate problem-solving among technical and business stakeholders with varying needs and priorities, and to communicate well with users, technical staff, and senior management, is essential.
- Collaborative Solution Development: The ability to work with a range of technical staff to develop joint solutions, fostering a collaborative approach to problem-solving.
Comprehensive Benefits: Supporting Your Success
The client offers eligible team members and their dependents comprehensive health benefits and programs, which include medical, dental, vision, life insurance, health savings and flexible spending accounts. Other benefits for eligible team members include 401(k) with an employer match, short-term disability coverage, company-paid long-term disability insurance, generous paid time off (PTO) plans, and paid parental leave.
If this Senior Manager, Data & Analytics role in St. Paul, MN, aligns with your leadership experience in BI, your deep expertise in Microsoft data platforms, and your passion for driving data-driven innovation in CPG/retail, we encourage you to learn more about this exciting permanent, hybrid opportunity.
Job Features
Job Category | Data |
A prominent client in the Financial Industry is seeking a highly skilled Log Data Engineer (Contract - Hybrid - Owings Mills, MD) to join their team. This contract position, based hybrid in Owings Mills, Maryland (requiring two days in the office per week), offers a unique blend of infrastructure and data engineering, operating at the critical intersection of DataOps. The ideal candidate will possess a high degree of autonomy, the ability to prioritize work with minimal oversight, strong analytical skills, and excellent communication abilities, all essential for successful alignment within the organization's dynamic and highly regulated environment.
Log Data Engineer (Contract - Hybrid - Owings Mills, MD)
Location: Owings Mills, MD – This is a Hybrid role, requiring two days in the office per week.
Employment Type: Contract (W2 or C2C)
Pay Range: $60/hr W2, $72/hr C2C
Industry: Computer and Mathematical / Financial Industry
What’s the Job? Engineering Scalable Log Data Platforms for Financial Insight
As a Log Data Engineer, you'll operate at the vital intersection of infrastructure and data engineering (DataOps), playing a pivotal role in building, maintaining, and optimizing the platforms that process vast amounts of log data. Your work is absolutely critical for providing actionable insights into security, operations, and compliance, thereby ensuring the reliability and integrity of core financial systems around the clock. This role demands a blend of deep technical expertise in both infrastructure and data management.
- Develop Data Processing Pipelines: You will be responsible for meticulously developing robust data processing pipelines. These pipelines, built using programming languages such as Java, JavaScript, and Python on Unix server environments, are designed to efficiently extract, transform, and load (ETL) log data from a multitude of disparate sources. This involves ingesting various types of logs (e.g., security audit logs, application performance logs, network flow data, user activity logs, compliance-related audit trails) from diverse systems across the financial enterprise. Your coding expertise ensures that raw, often unstructured or semi-structured, log data is accurately cleansed, normalized, and prepared for analysis and operational use, laying the groundwork for critical insights.
- Implement Scalable, Fault-Tolerant Solutions: You will architect and implement scalable, fault-tolerant solutions for data ingestion, processing, and storage. This involves designing resilient architectures that can efficiently handle massive data volumes (terabytes to petabytes) and gracefully manage unexpected failures or spikes in data. You'll ensure that log data is continuously captured, processed, and stored without loss or degradation, which is paramount for real-time monitoring, historical analysis, and forensic investigations in the highly sensitive financial sector. Your solutions will be built with redundancy and high availability in mind, ensuring uninterrupted data flow.
- Support Systems Engineering Lifecycle Activities: You will provide comprehensive support for systems engineering lifecycle activities pertaining to data engineering deployments. This spans the entire process, including:
- Requirements Gathering: Collaborating with security, operations, audit, and compliance teams to understand their specific log data needs.
- Design: Creating detailed architectural diagrams, data flow diagrams, and technical specifications for robust data solutions.
- Testing: Rigorously testing their functionality, performance (e.g., latency for real-time ingestion), and scalability.
- Implementation: Overseeing and executing their deployment into production environments.
- Operations: Managing their ongoing health, performance, and maintenance.
- Documentation: Maintaining thorough, auditable documentation that covers all aspects of the data platforms. Your involvement ensures the end-to-end quality and integrity of data platforms crucial for a regulated industry.
- Automate Platform Management Processes: You will drive significant operational efficiency by automating platform management processes through Ansible or other scripting tools/languages (e.g., Python scripts, Shell scripts). This includes developing automation for infrastructure provisioning (e.g., spinning up new data ingestion nodes), configuration management (e.g., deploying standard log forwarders), software deployments (e.g., updating pipeline components), and routine maintenance tasks (e.g., log rotation, storage optimization). This reduces manual effort, minimizes human error, and enhances operational consistency and speed.
- Troubleshoot Incidents Impacting Log Data Platforms: You will be directly responsible for troubleshooting incidents impacting the log data platforms. This involves rapidly diagnosing issues related to data ingestion failures, processing bottlenecks within the pipelines, storage accessibility problems, or inaccuracies in reporting. Your problem-solving skills will be crucial for minimizing downtime, ensuring the continuous flow of critical log data for security operations, compliance auditing, and maintaining the overall integrity of financial systems. This often requires deep dives into distributed logs and metrics across various components.
- Collaborate on Data Requirements and Scalable Solutions: You will foster strong relationships and collaborate with cross-functional teams across the organization, including security operations centers (SOC), compliance officers, fraud detection teams, and application development groups. The goal is to deeply understand their specific log data requirements. Leveraging these insights, you will then design scalable solutions that effectively meet their business needs, ensuring that the log data platforms provide the necessary insights and support for critical decision-making without compromising performance or cost-efficiency.
- Develop Training and Documentation Materials: You will play an active role in creating essential training and documentation materials for the log data platforms. This includes developing clear user guides, operational runbooks for incident response, detailed architectural diagrams, and troubleshooting guides. High-quality documentation is vital for knowledge transfer, onboarding new team members, enabling self-service for data consumers, and ensuring consistent operational practices for the complex log data platforms, which is critical for auditability in finance.
- Support Log Data Platform Upgrades and Coordinate Testing: You will provide crucial support for log data platform upgrades. This involves meticulously planning upgrade processes, conducting thorough testing of new versions (e.g., performance testing, regression testing, user acceptance testing), and coordinating these testing efforts with key users of the platform. Your aim is to ensure minimal disruption, successful transitions to newer versions, and continuous compliance with evolving security and regulatory standards.
- Gather and Process Raw Data from Multiple Sources: You will be adept at gathering and processing raw data from multiple disparate sources. This includes writing custom scripts to extract data from various endpoints, calling diverse APIs for real-time data streams, and writing complex SQL queries to retrieve information from different databases and legacy systems. Your efforts transform raw, often unstructured or semi-structured, data into a format suitable for analysis and ingestion into the log platforms, preparing it for actionable insights.
- Enable Analytical Processing Solutions: You will contribute significantly to enabling both batch and real-time analytical processing solutions leveraging emerging technologies. This includes designing and implementing systems that allow for the efficient analysis of large volumes of log data, supporting various use cases from real-time security incident detection and operational performance monitoring to historical analysis for audit and forensic purposes, all crucial for a financial institution.
- Participate in On-Call Rotations: You will be a key member of the team, participating in on-call rotations to address critical issues and ensure the reliability of data engineering systems around the clock. This commitment is vital for maintaining the continuous availability and integrity of critical log data platforms in a 24/7 financial environment, supporting security and operational continuity.
Required Technical Expertise & Experience: Your Core Qualifications for DataOps Excellence
To excel as a Log Data Engineer, you'll need extensive, hands-on experience in AWS cloud services, data lake development, scripting, and a strong background in IT service management and advanced troubleshooting.
- AWS Expertise and CI/CD for Log Ingestion: You must possess expertise in AWS (Amazon Web Services) and the implementation of CI/CD (Continuous Integration/Continuous Delivery) pipelines specifically designed for log ingestion. This indicates deep knowledge of how to build automated, reliable workflows for bringing diverse log data into AWS environments using services like Kinesis, Firehose, S3, and Lambda, managed through CloudFormation or Terraform.
- Expertise with AWS Computing Environments: You have demonstrated expertise with various AWS computing environments. This includes practical experience with ECS (Elastic Container Service) for container orchestration, EKS (Elastic Kubernetes Service) for managed Kubernetes clusters, EC2 (Elastic Compute Cloud) for virtual servers, and Lambda for serverless computing. This wide-ranging experience ensures you can design and manage diverse compute resources optimized for log processing and analytics.
- Data Lake Design, Development, and Deployment (3-5 years): You must have 3-5 years of experience in designing, developing, and deploying data lakes using AWS native services. This includes proficiency with AWS S3 (Simple Storage Service) as a scalable object storage layer, AWS Kinesis Firehose for real-time data streaming, IAM (Identity and Access Management) for secure and granular access control, and Terraform for Infrastructure as Code (IaC) to provision and manage data lake components effectively.
- Data Pipeline Orchestration Platforms: You have practical experience with data pipeline orchestration platforms such as Apache Airflow, AWS Step Functions, or Prefect. This indicates your ability to design, schedule, monitor, and manage complex, interdependent data workflows for log processing and delivery across distributed systems.
- Ansible/Terraform Scripting and IaC Expertise: Expertise in Ansible/Terraform scripts and overall Infrastructure as Code (IaC) scripting is required. This demonstrates your proficiency in automating the provisioning, configuration, and management of infrastructure components that support log data platforms, ensuring consistency, repeatability, and efficient change management.
- Version Control and CI/CD for Data Engineering: You must implement version control (e.g., GitLab, GitHub, Bitbucket) and CI/CD practices for data engineering workflows. This ensures reliable and efficient deployments of data pipelines and infrastructure changes, promoting collaborative development and adherence to best practices in software delivery.
- Proficiency in Distributed Linux Environments: You possess strong proficiency in distributed Linux environments. This includes administering Linux servers, understanding their networking, storage, and process management in a scaled-out, clustered context, which is common for hosting log agents or processing engines.
- Proficiency in Monitoring, Logging, and Alerting for Data Infrastructure: You demonstrate strong proficiency in implementing monitoring, logging, and alerting solutions specifically for data infrastructure. This includes using tools like Prometheus for metrics collection, Grafana for data visualization and dashboarding, and leveraging native AWS services (e.g., CloudWatch) to ensure proactive identification and resolution of issues within the log data pipelines.
- Experience Writing Data Pipelines for Log Ingestion: You have proven experience writing data pipelines to ingest log data from a variety of sources and platforms. This is a core hands-on skill, covering diverse log formats (e.g., JSON, XML, unstructured text) and ingestion methods (e.g., agents, APIs, streaming services).
- Implementation Knowledge in Data Processing Pipelines (Java, JavaScript, Python): You possess implementation knowledge in data processing pipelines using programming languages like Java, JavaScript, and Python to extract, transform, and load (ETL) data. This confirms your ability to code the actual logic for data cleansing, enrichment, and transformation within the pipelines.
- Data Model Creation and Maintenance: You are skilled in creating and maintaining data models, ensuring efficient storage, retrieval, and analysis of large datasets of log information. This includes designing schemas that optimize for performance, usability, and compliance.
- Troubleshoot Data Processing, Storage, and Retrieval Issues: You are adept at troubleshooting and resolving issues related to data processing, storage, and retrieval specific to log data. This demonstrates your ability to diagnose complex data-related problems across the entire data lifecycle, from source to consumption.
- Experience in Data Extraction, Ingestion, and Processing Systems: You have proven experience in the development of systems for data extraction, ingestion, and processing of large volumes of data. This highlights your capability to build robust data infrastructure from the ground up, tailored for log analytics.
General Skills and Experience:
- Complex Issue Troubleshooting: You have the ability to troubleshoot and diagnose complex issues across various technical domains, from network connectivity to application-level errors impacting data flow.
- Supporting Technical Users and Requirements Analysis: You are able to demonstrate experience supporting technical users and effectively conduct requirements analysis for data-focused solutions, translating business needs into technical specifications.
- Independent Work with Minimal Guidance: You can work independently with minimal guidance and oversight, demonstrating strong autonomy, self-motivation, and the ability to manage your workload efficiently.
- IT Service Management Familiarity: You have practical experience with IT Service Management (ITSM) and familiarity with Incident & Problem management processes.
- Performance Bottleneck Identification and Resolution: You are highly skilled in identifying performance bottlenecks, recognizing anomalous system behavior, and resolving root cause of service issues for complex data platforms, ensuring optimal system health.
- Cross-Team Influence: You have a demonstrated ability to effectively work across teams and functions to influence design, testing, operations, and deployment of highly available software, fostering collaboration and alignment.
- Knowledge of Methodologies: You possess knowledge of standard methodologies related to security, performance, and disaster recovery for data infrastructure.
If this Log Data Engineer role in Owings Mills, MD, aligns with your expertise in AWS, data pipeline development, scripting, and your passion for ensuring the reliability of critical log data platforms in the financial industry, we encourage you to learn more about this exciting hybrid contract opportunity. This is a fantastic chance to make a significant impact on core financial systems through DataOps.
Ready to leverage your combined infrastructure and data engineering skills to drive operational excellence and secure financial insights?
Job Features
Job Category | Data, Engineering, IT |