- City of New York (New York, NY)
- …& Compliance, and Information Security . Your Impact: As the Endpoint Security and Identity and Access Management (IAM) Specialist for the Division ... Your Role: We are seeking a skilled and detail-oriented Endpoint Security and Identity and Access Management (IAM) Specialist to join our cybersecurity… more
- City of New York (New York, NY)
- …as a Project Leader by instructing, teaching, and illustrating best practices for security access management, identity governance, and policy enforcement ... Computer Specialist (SW) Level II, to function as Sr. Security Access Management Analyst, who will: -...devices and managing configuration to ensure secure and compliant endpoint access . - Ensure the appropriate permissions… more
- Deloitte (New York, NY)
- …professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (eg Defender for Endpoints and Defender ... and procedures eg, O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event… more
- Deloitte (Morristown, NJ)
- …professional experience enterprise-with at least two of the following technologies: Microsoft Endpoint Security Platforms (eg Defender for Endpoints and Defender ... and procedures eg, O365 tenant management and configuration, identify management and access control, auditing and monitoring, security incident and event… more
- Deloitte (Morristown, NJ)
- …and offshore engineers and architects across 8 key Azure cyber domains: Governance, Identity , Application Security , PaaS security , Infrastructure security ... management group and subscription management and configuration, identify management and access control, firewall management, auditing and monitoring, security … more
- Safran (New York, NY)
- …Administer Azure AD, Intune, Exchange Online, SharePoint, OneDrive, and Teams. * Enforce Identity and Access Management (IAM), including Conditional Access ... Experience with Intune, Defender for Cloud Apps, Defender for Endpoint , SIEM platforms (Microsoft Sentinel), and security ...such as CompTIA Security + or Microsoft Certified: Security , Compliance, and Identity Fundamentals are a… more
- iconectiv (Bridgewater, NJ)
- …teams. + Monitor system, network, and application activity for signs of unauthorized access or malicious activity. + Perform security audits and risk ... **About iconectiv** Your business and your customers need to confidently access and exchange information simply, seamlessly and securely. iconectiv's extensive… more
- Robert Half Technology (New York, NY)
- …Experience in Application Security is necessary. * Proficiency in Information - Network Security . * Expertise in Endpoint Security is required. * Must ... standards for SaaS environments * Implement and oversee cloud security controls, such as access controls, encryption, and monitoring tools * Conduct periodical … more
- Celonis (New York, NY)
- …effectively. **The work you'll do:** + Design and implement enterprise-level security solutions, including firewalls, IDS/IPS, endpoint protection, DLP, SIEM, ... us. **The Team:** Within our InfoSec organization, Our global security engineering team is responsible for designing, building, and...CISSP, CISM, CEH, or GIAC are a plus. + Identity and Access Management + Automation and… more
- MongoDB (New York, NY)
- …Evaluate, implement, and manage cloud-native security tools and platforms for endpoint security , identity management (IAM), and CSPM **Qualifications:** ... solutions for cloud platforms (AWS, Azure, GCP), including network and compute security , identity management, and cloud security posture management (CSPM)… more
- Wells Fargo (Iselin, NJ)
- …networking, cryptography, cloud, authentication and directory services, email, internet, applications, and endpoint security + Review and correlate security ... confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity + Identify security … more
- City of New York (New York, NY)
- …incidents and vulnerability reports and work on remediation of issues. - Ensure identity and access management policies are documented - Produce documentation ... a Computer Systems Manager Non-Manager to serve as the Chief Information Security Officer (CISO). The Computer Systems Manager-Non-Manager will be responsible for… more
- Deloitte (New York, NY)
- … management program, specifically familiar with CyberArk solutions ie, Core Privileged Access Security , Endpoint Privilege Manager Application Access ... various API authentication standards. + Experience across core IAM domains like Identity Governance and Administration and Access Management Information for… more
- Brennan Center for Justice (New York, NY)
- …issues and providing user support across the organization. + Help manage security tools such as endpoint protection, Multi-Factor Authentication (MFA) ... non-technical users. + Interest in learning about cybersecurity tools such as endpoint protection, vulnerability management, and security monitoring. + Ability… more
- Honeywell (Morris Plains, NJ)
- …of the program. The candidate should have extensive experience with system security concepts, tools, implementation, data access governance tools, and ... occur in late 2025 or early 2026. The Cyber Security team is looking for an experienced Senior ...other applications. + Administers, supports, installs, and maintains enterprise endpoint protection solutions (AIP) and DLP. + Assist in… more
- City of New York (New York, NY)
- …with city's Office of Technology and Innovation (OTI) on identity and access management, compliance and governance, and security best practices. THE ROLE ... network infrastructure; physical and virtual server management, backup and recovery, security and access control, database administration, capacity planning, and… more
- City of New York (New York, NY)
- …engineering, design, implementation, maintenance, analysis, and administration of security technologies. Remain current on cybersecurity trends and intelligence ... to enhance security analysis and incident identification capabilities for the incident...the SIEM. Implement protections such as Firewall blocks, EPO/AV ( Endpoint Protection/Antivirus) policies and rules, and the creation of… more
- Meta (New York, NY)
- **Summary:** At Cross-Meta Security (X-Sec) our mission is to protect the company, our community, and its data while empowering safe innovation. Within X-Sec, the ... pillar aims to minimize the harm caused by unauthorized access or inappropriate usage of Meta's systems and data....to help us detect, investigate, contain and recover from Security Incidents as early as possible. We focus on… more
- NYU Rory Meyers College of Nursing (New York, NY)
- …maintenance and security strategies to ensure uninterrupted operations and data security ; implementing backup, remote, and cloud access procedures + Deliver ... a particular emphasis on using tools like BigFix and Cortex XDR for endpoint management, security , and threat detection. Cybersecurity knowledge and experience… more
- Fiserv (Berkeley Heights, NJ)
- …AI/ML-related security techniques such as model auditing, explainability, LLM endpoint protection, and responsible AI frameworks. **What would be great to ... (eg, Vertex AI, SageMaker, Bedrock, Anthropic, OpenAI integrations). + Embed security and compliance controls into AI/ML architectures, including model governance, … more