Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: IT Security Engineer.
United States Jobs Expertini

Urgent! IT Security Engineer Job Opening In Shirley New York – Now Hiring Macpower Digital Assets Edge Private Limited

IT Security Engineer



Job description

The Information Security Engineer will provide accurate and timely monitoring and reporting of systems and potential risks related to the company.

This position will assist in the design and implementation of the company's cybersecurity solutions ensuring digital assets are protected from unauthorized access.

Perform regular security audits of information systems and develop corrective action plans.

Expected to maintain and update information security processes, procedures training programs, and documentation, while providing information security expertise to reduce risk and ensure appropriate levels of data confidentiality, integrity, and availability.



Essential Duties and Responsibilities:




  • Nothing in this job description restricts management's right to assign or reassign duties and responsibilities to this job at any time.


  • Focus on preventing IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction to an organization's information systems and IT assets and intellectual property.


  • Assist with the evaluation, development, implementation, monitoring, and maintenance of client information security policies, solutions, procedures, standards, and guidelines.


  • Develop and oversee vulnerability management program.


  • Administer and enhance an ongoing risk assessment program, provide recommendations for improved security design

  • Daily administration of information security systems that includes firewalls, spam filtering, URL filtering, endpoint security, IPS, data governance, Identity management, syslog server infrastructure and other perimeter and endpoint security systems.


  • Designing, testing, and implementing secure operating systems, networks, and databases.


  • Conduct risk audits and assessments, providing recommendations for improved security design.


  • Implement and oversee identity management systems to meet specific security needs and complex compliance standards.


  • Work with the Security Operation Center to maintain rules and alerts within the SIEM as well as be an escalation point to said alerts.


  • Evaluate and report on potential risks and threats to Information and data systems.

    Participate in threat hunting and work on remediation efforts.


  • Support, maintain and ensure client policy alignment with NIST 2.0 Framework.

  • Evaluate and improve information system and security controls related to applications, business processes, change control, data center operations, and incident management processes.


  • Reviews existing security architecture, identify and analyze design gaps, and recommends security enhancements.


  • Remains current on emerging security threats and design security architecture to mitigate.


  • Ensures alignment between security architecture frameworks and standards and overall business strategy.


  • Serves as an information security expert and trusted advisor to partners in IT and the business.


  • Assist with the design of security architecture compliance on requirements, including but not limited to: Sarbanes-Oxley, payment card industry standards, HIPAA/HITECH, global data privacy requirements, as well as state and federal regulations.

  • Manage content for the security awareness training program for employees and authorized users.

    Provide additional training when needed.


  • Actively participate in defining security requirements for information technology projects, conduct and direct research into IT issues and products.


  • Keen attention to detail with proven analytical, evaluative, and problem-solving abilities.


  • Manage, support and administer Endpoint Security Products.


  • Perform any other tasks/duties as assigned by management.




Education Requirements and Qualifications:




  • To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.

    The requirements listed below are representative of the knowledge, skill and/or ability required.


  • A two or four-year degree from an accredited university or college with course work in computer science, information security, management information systems, or a closely related field.


  • Minimum 7+ years of experience of full-time information security related experience.


  • Require/Preferred Experience with specific equipment/software/programs etc.


  • Preferred Certified Information Systems Security Professional (CISSP) or Global Information Assurance Certification (GIAC).


  • Ability to effectively communicate both in writing and verbally

  • Ability to multi-task; excellent organizational and planning skills required

  • Must be self-directed with the ability to work with minimal oversight.


  • Working knowledge of application & infrastructure security solutions (Firewalls, Intrusion Detection/Prevention Systems, Network Security, Password Management, Data Encryption, Next Generation endpoint security suites, SPAM Filters, Proxy Filters, Active Directory, SIEM, MFA, MDM, EDR, and Access Control).


  • Working knowledge of information security concepts, standards, and best practices.


  • An understanding of the impact of emerging business and end-user technologies have on information security requirements and architecture.


  • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business.


  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one.


  • Demonstrated technical expertise in existing security and IT systems and an ability to keep pace with changing security and IT technologies.


  • Certification such as GSEC, SSCP, CISM, CEH or CISSP are considered a strong advantage.


  • Must be able to read documents in Standard English such as Standard Operating Procedures, maintenance schedules and operating manuals.


  • Ability to work overtime as needed.


  • Physical Environment and Requirements.


  • While performing duties of the job, incumbent is occasionally required to stand; walk; sit; use hands to finger, handle or feel objects, tools or controls; reach with hands and arms; balance; talk and hear.




Required Skill Profession

Other General



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your IT Security Potential: Insight & Career Growth Guide


  • Real-time IT Security Jobs Trends in Shirley, New York, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for IT Security in Shirley, New York, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 44895 jobs in United States and 1348 jobs in Shirley, New York. This comprehensive analysis highlights market share and opportunities for professionals in IT Security roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for IT Security Engineer Job?

    Great news! is currently hiring and seeking a IT Security Engineer to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Macpower Digital Assets Edge Private Limited adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for IT Security Engineer Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in Shirley New York. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for IT Security Engineer?

    Key qualifications for IT Security Engineer typically include Other General and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for IT Security Engineer?

    To improve your chances of getting hired for IT Security Engineer, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for IT Security Engineer Job Success
    Macpower Digital Assets Edge Private Limited interview tips for IT Security Engineer

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the Macpower Digital Assets Edge Private Limited's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your IT Security Engineer interview at Macpower Digital Assets Edge Private Limited, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Macpower Digital Assets Edge Private Limited's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for IT Security Engineer Positions

    Setting up job alerts for IT Security Engineer is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!