×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Security Operations Engineer

Job in Woodbridge Township, Middlesex County, New Jersey, 07064, USA
Listing for: Randstad Digital
Full Time position
Listed on 2026-01-27
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 50 - 75 USD Hourly USD 50.00 75.00 HOUR
Job Description & How to Apply Below

We are seeking a Security Operations Engineer who delivers outstanding service and communicates with clarity and professionalism.

On-Site 5 days a week first 8 weeks, then Hybrid in office 3 days a week

No Corp to Corp or Sponsorship available

The ideal candidate brings strong attention to detail, empathy when supporting clients and colleagues, and a disciplined approach to creating and maintaining documentation. In this role, you will contribute meaningfully within a collaborative team while focusing on protecting the organization’s digital assets by auditing and remediating user identities and privileges, strengthening governance processes, and enhancing the monitoring of technology risk.

You will also play a proactive role in identifying and addressing Active Directory vulnerabilities and resolving access-related security issues.

Location:

Woodbridge, New Jersey

Job type:
Solutions

Salary: $50 – 75 per hour

Work hours:

9am to 5pm

Education:

Bachelors

Identity & Account Governance
  • Identify and resolve expired or overdue passwords across all identity systems.
  • Perform regular Active Directory health checks and cleanup tasks, including locating and disabling stale user and computer accounts.
  • Review and optimize service accounts to ensure proper permissions, correct system scope, and compliance with password policies.
  • Verify that Multi-Factor Authentication, such as Duo, is correctly enforced for critical and high-risk accounts.
  • Ensure accounts are used only in their designated environments to prevent cross-environment access, such as development accounts being used in production.
  • Identify and remove unnecessary local administrative privileges on workstations and servers to support a strong least privilege model.
  • Detect and resolve duplicate credentials within Azure Active Directory to ensure consistent and secure identity management.
Security Monitoring & Analysis
  • Help develop and improve security monitoring and detection use cases in Splunk and other monitoring platforms.
  • Support the investigation and response process for security alerts from tools such as Threat Command, Canary, Extra Hop, and Crowd Strike Identity.
  • Develop and improve security monitoring use cases in Splunk and other SIEM tools to strengthen threat detection.
  • Monitor and respond to potential security alerts from systems such as EDR, network anomaly detection, and identity protection.
  • Create and maintain response templates to guide consistent handling of security incidents and common red flag scenarios.
Vulnerability Management
  • Assist in identifying outdated applications and work with teams to address the security risks they introduce.
  • Research and evaluate threat intelligence to identify relevant vulnerabilities and emerging attack techniques.
  • Use tools such as Blood Hound and Ping Castle to find and remediate Active Directory security weaknesses.
  • Identify vulnerable or unsupported applications across the enterprise and coordinate their remediation.
REQUIREMENTS
  • Strong written and verbal communication skills.
  • Undergraduate degree in a technology related field such as computer science, EMIS, systems engineering, or electrical engineering.
  • Proven ability to take initiative, manage time effectively, and follow tasks through to completion.
  • One to three years of experience in Information Security; more than four years is preferred.
  • Experience working with both on premise and AWS environments.
  • Solid understanding of security principles, network communication models, and related protocols.
  • Familiarity with Service Now or similar workforce or system of record platforms.
  • Hands on experience managing and responding to security alerts.
  • Experience performing phishing analysis and working with web proxies, endpoint detection and response tools, and database monitoring solutions.
  • Strong understanding of Active Directory security group structures and lifecycle management.
  • Experience reviewing industry or third party threat intelligence and integrating findings into a security environment.
  • Working knowledge of network operations and troubleshooting.
  • Demonstrated ability to create runbooks, knowledge articles, and process documentation to support routine reporting and operational…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary