Logo
Motion Recruitment Partners LLC

Information Security Engineer Job at Motion Recruitment Partners LLC in Woodbrid

Motion Recruitment Partners LLC, Woodbridge, NJ, United States


Information Security Engineer Woodbridge Township, NJ Hybrid Contract $76.38/hr - $86.06/hr Outstanding long-term contract opportunity! A well-known Financial Services Company is looking for a Information Security Engineer in Iselin, NJ (Hybrid). Work with the brightest minds at one of the largest financial institutions in the world. This is a long-term contract opportunity that includes a competitive benefit package! Our client has been around for over 150 years and is continuously innovating in today's digital age. If you want to work for a company that is not only a household name, but also truly cares about satisfying customers' financial needs and helping people succeed financially, apply today. Contract Duration: 24 Months Required Skills & Experience 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education. 8+ years of Information Security Engineering experience, demonstrated through work experience, military service, education, or training. 8+ years of coding and development experience in Python, Ruby, or Ansible Automation, with expertise in automating encryption and self-healing systems. 5+ years of experience in CI/CD processes with tools like Jenkins, Gradle, SonarQube, and Artifactory. 3+ years of experience developing applications on Kubernetes/K8 platforms and deploying solutions to Microsoft Azure and Google Cloud Platform. Desired Skills & Experience Advanced expertise in encryption technologies, including symmetric and asymmetric cryptography, and implementing data-at-rest encryption solutions. Experience in designing and implementing self-healing systems, including automated recovery and fault-tolerant solutions. Knowledge of synthetic transaction monitoring tools to ensure the reliability and availability of critical systems. Strong vendor management skills, including evaluating, onboarding, and collaborating with vendors for encryption tools and automated recovery solutions. Knowledge of Directory Servers, such as Ping Directory or Oracle Unified Directory. Proficiency with monitoring and data analysis tools like Splunk and Elasticsearch for encryption-related security event detection and performance tracking. Advanced knowledge of Linux and network troubleshooting commands, with a focus on securing encrypted data flows and automated recovery. Hands-on experience with tools like SiteMinder, Ping Directory SDK, and cryptographic libraries. Deep knowledge of information security frameworks, standards, and best practices, including NIST and ISO guidelines for encryption and automated resilience. Exceptional ability to communicate complex technical concepts to a wide range of audiences, including executives. What You Will Be Doing Consult on complex initiatives with broad impact and large-scale planning for Information Security Engineering. Review and analyze complex multi-faceted, larger scale or longer-term Information Security Engineering challenges that require in-depth evaluation of multiple factors including intangibles or unprecedented factors. Contribute to the resolution of complex and multi-faceted situations requiring solid understanding of the function, policies, procedures, and compliance requirements that meet deliverables. Strategically collaborate and consult with client personnel. Lead and execute complex computer security incident response activities, including post-incident forensics, to identify root causes and recommend mitigation strategies. Design, implement, and manage encryption solutions for data at rest and in transit, ensuring compliance with organizational policies and regulatory standards. Collaborate with vendors to evaluate, procure, and deploy advanced encryption tools, including self-healing systems that automate recovery and reduce downtime. Develop and implement synthetic transaction monitoring to simulate user interactions, ensuring continuous performance and availability of critical applications. Provide security consulting on large-scale projects, emphasizing cryptographic protocols, key management practices, and vendor-driven encryption solutions. Architect and maintain highly secure solutions across networking, cryptography, cloud environments, authentication, directory services, and endpoint security. Monitor and correlate security logs to detect vulnerabilities and ensure encryption solutions remain robust against evolving threats. Integrate self-healing technologies into the security architecture, automating responses to incidents and reducing manual intervention. Conduct risk assessments to identify vulnerabilities, particularly in encryption and data protection, and recommend actionable remediation strategies. Collaborate with internal teams and vendors to align encryption strategies with compliance, performance, and operational requirements. Lead a team of security professionals, fostering innovation in self-healing systems, encryption, and synthetic monitoring practices. You will receive the following benefits: Medical Insurance - Four medical plans to choose from for you and your family Dental & Orthodontia Benefits Vision Benefits Health Savings Account (HSA) Health and Dependent Care Flexible Spending Accounts Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance Hospital Indemnity Insurance 401(k) including match with pre and post-tax options Paid Sick Time Leave Legal and Identity Protection Plans Pre-tax Commuter Benefit 529 College Saver Plan Motion Recruitment Partners (MRP) is an Equal Opportunity Employer, including Veterans/Disability/Women. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP’s Employment Accommodation policy. Applicants need to make their needs known in advance. Posted by: Jennifer Reynolds Specialization: Cloud Security Cybersecurity