Security Operations Engineer
Listed on 2026-01-27
-
IT/Tech
Cybersecurity
We are seeking a Security Operations Engineer who delivers outstanding service and communicates with clarity and professionalism.
On-Site 5 days a week first 8 weeks, then Hybrid in office 3 days a week
No Corp to Corp or Sponsorship available
The ideal candidate brings strong attention to detail, empathy when supporting clients and colleagues, and a disciplined approach to creating and maintaining documentation. In this role, you will contribute meaningfully within a collaborative team while focusing on protecting the organization’s digital assets by auditing and remediating user identities and privileges, strengthening governance processes, and enhancing the monitoring of technology risk.
You will also play a proactive role in identifying and addressing Active Directory vulnerabilities and resolving access-related security issues.
Location:
Woodbridge, New Jersey
Job type:
Solutions
Salary: $50 – 75 per hour
Work hours:
9am to 5pm
Education:
Bachelors
- Identify and resolve expired or overdue passwords across all identity systems.
- Perform regular Active Directory health checks and cleanup tasks, including locating and disabling stale user and computer accounts.
- Review and optimize service accounts to ensure proper permissions, correct system scope, and compliance with password policies.
- Verify that Multi-Factor Authentication, such as Duo, is correctly enforced for critical and high-risk accounts.
- Ensure accounts are used only in their designated environments to prevent cross-environment access, such as development accounts being used in production.
- Identify and remove unnecessary local administrative privileges on workstations and servers to support a strong least privilege model.
- Detect and resolve duplicate credentials within Azure Active Directory to ensure consistent and secure identity management.
- Help develop and improve security monitoring and detection use cases in Splunk and other monitoring platforms.
- Support the investigation and response process for security alerts from tools such as Threat Command, Canary, Extra Hop, and Crowd Strike Identity.
- Develop and improve security monitoring use cases in Splunk and other SIEM tools to strengthen threat detection.
- Monitor and respond to potential security alerts from systems such as EDR, network anomaly detection, and identity protection.
- Create and maintain response templates to guide consistent handling of security incidents and common red flag scenarios.
- Assist in identifying outdated applications and work with teams to address the security risks they introduce.
- Research and evaluate threat intelligence to identify relevant vulnerabilities and emerging attack techniques.
- Use tools such as Blood Hound and Ping Castle to find and remediate Active Directory security weaknesses.
- Identify vulnerable or unsupported applications across the enterprise and coordinate their remediation.
- Strong written and verbal communication skills.
- Undergraduate degree in a technology related field such as computer science, EMIS, systems engineering, or electrical engineering.
- Proven ability to take initiative, manage time effectively, and follow tasks through to completion.
- One to three years of experience in Information Security; more than four years is preferred.
- Experience working with both on premise and AWS environments.
- Solid understanding of security principles, network communication models, and related protocols.
- Familiarity with Service Now or similar workforce or system of record platforms.
- Hands on experience managing and responding to security alerts.
- Experience performing phishing analysis and working with web proxies, endpoint detection and response tools, and database monitoring solutions.
- Strong understanding of Active Directory security group structures and lifecycle management.
- Experience reviewing industry or third party threat intelligence and integrating findings into a security environment.
- Working knowledge of network operations and troubleshooting.
- Demonstrated ability to create runbooks, knowledge articles, and process documentation to support routine reporting and operational…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).