CIT Group Inc.

  • VP, Security Platform Engineering

    Location US-NJ-Livingston
    Job ID
    # Positions
    Job Family
    Information Technology - IT Engineering
  • Overview

    Founded in 1908, CIT (NYSE: CIT) is a financial holding company with approximately $50 billion in assets as of Dec. 31, 2017. Its principal bank subsidiary, CIT Bank, N.A., (Member FDIC, Equal Housing Lender) has approximately $30 billion of deposits and more than $40 billion of assets. CIT provides financing, leasing, and advisory services principally to middle-market companies and small businesses across a wide variety of industries. It also offers products and services to consumers through its Internet bank franchise and a network of retail branches in Southern California, operating as OneWest Bank, a division of CIT Bank, N.A. For more information, visit


    CIT is seeking a VP - Security Platforms Engineering to manage and support various Information Security Tools and Services used at CIT.


     As a member of the Security Platform Engineering, the candidate will deploy, configure and manage security appliances.


    Responsibilities include:

    • Oversee all aspects of the configuration, development and operation of IT Security appliances.
    • Provide outstanding customer service to the IT Security organization
    •  Keep track of vendor’s security technology roadmaps, plan and schedule upgrades as needed
    •  Help application and infrastructure team on troubleshooting connectivity and performance issues that are related to Security Platform
    • Coordinate with team leads to ensure applications are sound and adhere to architectural guidelines
    • Along with the other team members provide 24X7 on call support for any issues related to IT Security


    Self-motivation, teamwork and experience working in a fast paced environment are highly desired. The ideal candidate should have a deep understanding of both information security and computer science. They should understand basic concepts such as networking, applications and operating system functionality. The candidate should be able to quickly assimilate new information while understanding the threat vectors and how to properly assess them. The candidate must demonstrate proven success in working in a team as well as independently and exhibit follow-through to understand root causes of issues. This position calls for an individual who exhibits thoughtful introspection but is also able to assess a broad spectrum of issues. A collaborative approach is a must, as well as the ability to effectively communicate with a wide range of technical and non-technical personnel.

    Hands on experience with Application Security controls including design, dynamic scans, static code analysis for control flow and analysis.

    Ability to multi-task without compromising deadlines and assignment expectations
    Take direction from project management and work as part of a collaborative team
    Basic project management competencies such as following process and protocol for project delivery, ability to identify project risks, project multitasking, and ability to self-manage when appropriate
    Ability to execute assessments as defined in project plans, within assigned budgets and due dates
    High motivation, integrity, and commitment to self-development
    Strong written and verbal communication skills
    Broad industry knowledge within Information Security

    Deep understanding of TCP/IP protocols, software defined networks, micro-segmentation, load balancers


    • 5+ years of experience in managing Web application firewalls, Web proxy, DDoS protection
    • 5+ years of experience in Data Masking, Data Loss Prevention (DLP), Data access Management
    • 5+ years of End point protection, Advanced Threat Hunting, Malware detection, SIEM, Vulnerability scanning
    • 5+ years of experience with security frameworks (e.g., ISO 27002, NIST, etc.)
      • 5+ years of experience running security related software;
      • 5+ years of technical security experience in applying information security best practices
      • Ability to work with other functions to achieve security objectives. 
      • B.S in Information Technology or Information Security.


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed