Vice President, Application Cyber Security Specialist
Cyber security analyst job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Cloud Security Engineer - SRE
Cyber security analyst job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
AWS Security Engineer
Cyber security analyst job in Jersey City, NJ
Type : Contract
f2f Interview is must
We are seeking an experienced AWS Security Engineer to design, implement, and manage security controls across Snowflake and Databricks environments. The ideal candidate will have strong expertise in AWS security, data platform governance, and Python-based automation to ensure secure, compliant, and efficient operations within our cloud ecosystem.
Key Responsibilities:
Implement, monitor, and enhance security controls across network, application, and data layers for Snowflake and Databricks environments.
Manage user access, roles, and permissions in Snowflake or Databricks to ensure compliance with least privilege and governance policies.
Configure and manage AWS security components, including IAM roles/policies, S3 bucket policies, EC2, Lambda, and CloudWatch for monitoring and event response.
Collaborate with data engineering and platform teams to ensure secure data ingestion, storage, and access controls.
Automate security monitoring and configuration management using Python scripting and AWS SDKs.
Identify and remediate security vulnerabilities, ensuring continuous compliance with internal and external standards.
Contribute to security documentation, audits, and process improvements for data platform security posture.
Director - Threat Detection Analyst
Cyber security analyst job in Edison, NJ
In the Technology division, we leverage innovation to build the connections and capabilities that power our Firm, enabling our clients and colleagues to redefine markets and shape the future of our communities. This is a Lead Data & Analytics Engineering position at the Director level, which is part of the job family responsible for providing specialist data analysis and expertise that drive decision-making and business insights as well as crafting data pipelines, implementing data models, and optimizing data processes for improved data accuracy and accessibility, including applying machine learning and AI-based techniques.
About the role:
The Director role within Fraud Detection Analytics performs a critical function within the Fraud Department, in safeguarding the organization against diverse fraud risks. This position is responsible for designing, implementing, and overseeing advanced analytics strategies to detect and mitigate fraudulent activities across multiple payment channels and fraud typologies, including account takeover (ATO), deposit fraud, scams, and emerging schemes. The ideal candidate combines deep technical expertise with strategic vision and strong communication skills to drive cross-functional collaboration and deliver actionable insights.
What you'll do in the role:
Develop and refine fraud detection controls and analytical frameworks targeting fraud risks such as ATO, deposit fraud, scams, and other typologies.
Monitor and analyze transaction channels (crypto, wire, ACH, Zelle, bill payments) for suspicious activity and emerging patterns.
Leverage data-driven insights by integrating internal data with external intelligence sources for proactive fraud detection.
Utilize SQL and advanced analytics to extract, analyze, and interpret large datasets to identify emerging fraud trends.
Apply predictive modeling, forecasting, and statistical methodologies to enhance operational efficiency and reporting.
Design and validate rules within the fraud rules engine, conducting rigorous pre- and post-production testing.
Continuously adjust controls based on observed trends to address evolving risks.
Identify automation opportunities to streamline manual processes related to data collection, metric calculation, and loss assessment.
Deliver business insights through dashboards and visualization tools (Tableau, SAS, Python, R) and produce on-demand reports.
Communicate key trends, findings, and actionable recommendations to management and stakeholders.
Prepare and present executive-level reports on suspicious activities and risk management.
Set and monitor KPIs for fraud detection, implementing mitigation strategies where needed.
Collaborate with Customer Service, Product Management, Engineering, and Data Science teams to enhance fraud detection tools and models.
Coordinate with Fraud Operations to align rule strategies with staffing resources.
Recommend and implement innovative technologies for fraud detection, prevention, and reporting.
What you'll bring to the role:
Minimum of 5+ years of experience in fraud analytics, financial crime, or risk management.
Bachelor's or Master's degree in Data Science, Computer Science, Finance, or related field.
Expert proficiency in SQL (including joins, subqueries, unions, temporary tables) for data extraction, analysis, and reporting.
Demonstrated experience designing and implementing fraud detection models, with a strong focus on account takeover, scam & first party fraud scenarios.
In-depth understanding of transaction exhaust methods (cryptocurrency, wires, ACH, Zelle, bill payments).
Strong analytical, problem-solving, and decision-making skills.
Excellent verbal and written communication skills, with the ability to present complex findings to non-technical audiences.
Experience working with large datasets and modern analytics tools (Python, R, Tableau, SAS).
Desired Skills:
Previous experience in banking, fintech, or payments industry.
Knowledge of regulatory requirements related to financial fraud and AML.
Familiarity with fraud monitoring tools and case management systems.
Ability to work in fast-paced, high-pressure environments and manage multiple priorities effectively.
Proven track record of leading successful fraud detection initiatives across multiple payment channels.
Advanced skills in statistical analysis and visualization platforms.
Experience collaborating with Data Science and Product teams to produce fraud risk models and meet business goals
WHAT YOU CAN EXPECT FROM MORGAN STANLEY:
We are committed to maintaining the first-class service and high standard of excellence that have defined Morgan Stanley for over 89 years. Our values - putting clients first, doing the right thing, leading with exceptional ideas, committing to diversity and inclusion, and giving back - aren't just beliefs, they guide the decisions we make every day to do what's best for our clients, communities and more than 80,000 employees in 1,200 offices across 42 countries. At Morgan Stanley, you'll find an opportunity to work alongside the best and the brightest, in an environment where you are supported and empowered. Our teams are relentless collaborators and creative thinkers, fueled by their diverse backgrounds and experiences. We are proud to support our employees and their families at every point along their work-life journey, offering some of the most attractive and comprehensive employee benefits and perks in the industry. There's also ample opportunity to move about the business for those who show passion and grit in their work.
To learn more about our offices across the globe, please copy and paste ***************************************************** into your browser.
Morgan Stanley's goal is to build and maintain a workforce that is diverse in experience and background but uniform in reflecting our standards of integrity and excellence. Consequently, our recruiting efforts reflect our desire to attract and retain the best and brightest from all talent pools. We want to be the first choice for prospective employees.
It is the policy of the Firm to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, creed, age, sex, sex stereotype, gender, gender identity or expression, transgender, sexual orientation, national origin, citizenship, disability, marital and civil partnership/union status, pregnancy, veteran or military service status, genetic information, or any other characteristic protected by law.
Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet).
Auto-ApplyNetwork Security Analyst
Cyber security analyst job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network Security Analyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
Cyber Security Solutions Engineer - GES
Cyber security analyst job in Trenton, NJ
States: MA, NH, RI, ME, CT, VT, NJ, NY is home office based. Meet the Team You will provide guidance and assist Security Sellers and Account teams within the territory in a pre-sales technical role, showcasing Cisco security product solutions, setting up demonstrations, explaining features and benefits to customers, and designing and configuring products to address specific customer security needs. You will form relationships with our customer's key decision-makers, positioning Cisco security solutions aligned accurately to their requirements.
You will be a part of an outstanding technical pre-sales team in our Global Security Sales Organization (GSSO), responsible for driving the success of Cisco's Security Portfolio and focusing on protecting Customer Application Environments no matter where they live (on-prem / any cloud).
Our mission is simple: democratize security by making it easy and effective for everyone. We're transforming security from the ground up by solving the world's most pressing geopolitical challenge - safe, secure information access. We engineer our business to enable our customers to easily address their ever-evolving security challenges.
We believe that impactful work is rewarding work and that our team is at its best when everyone feels empowered to bring their whole self to work. We learn together by hiring for cultural contribution, not cultural fit, and recognize that diversity in background and thought are essential to building high-impact teams.
We invest in growth and learning opportunities and encourage our people to never stop learning. We foster collaboration and believe in being recognized (and rewarded!) for hard work. We champion a healthy work-life balance. We're kinder than necessary.
Together we build for the future by designing simple solutions for complex problems. And that's why we're the most loved and trusted name in security.
Your Impact
As an advisor to the customer, you'll be working with technology experts to craft architectures and configure products to meet customer-specific needs, are prepared to lead all technical aspects of pre-sales activities, and position security solutions effectively against competing offerings. You are an aggressive starter, self-starter with the ability to build executive relationships, develop and execute sales strategies and tactics that improve Cisco's opportunity with a customer environment, position and promote the partner and customer value proposition for Cisco security architecture, articulate Cisco's product and business strategies, and create the demand that makes deals happen! You will:
- Serve as the subject matter expert in Cisco security solutions
- Provide guidance and assist account teams within the territory in building solutions to address specific customer security needs
- Understand business requirements for a customer base and be able to translate them into technical requirements
- Understand and articulate Cisco's architecture and services within security technologies
- Create, present, and document technical solutions
- Perform in-depth and high-level technical presentations for customers partners and prospects
- Drive identified major account opportunities (i.e. technical consulting, upper-level management presentations, and Cisco technology solutions) while allowing local account teams to maintain long-term ownership
Who You Are
You are passionate about the customer experience and excited about new technology. You are a true teammate and love to learn. Being a self-starter, our SEs act as an industry domain authority, and strive to help Cisco make customers for life.
Minimum Qualifications
-Minimum of 4 years of pre-sales experience
-Hands on experience with one or more of these Cisco Security Products (or their competitive equivalent):
********************************************************************
- Experience with whiteboard discussions that transform customer requirements into security solutions
Preferred Qualifications
- History of successful quota achievement.
- Ability to demo / POV any of these Cisco Security products (the more the better): ********************************************************************
- Knowledge of public clouds AWS, Azure, GCP, and OCI.
- Experience with incident response a plus
- Experience with administering security for a company (e.g. purchased and deployed Cisco security products as a customer) is a plus.
- Solid presentation and interpersonal skills.
- Highly motivated self-starter who does not need day-to-day management
- Experience with APIs and scripting languages
**Why Cisco?**
At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
**Message to applicants applying to work in the U.S. and/or Canada:**
The starting salary range posted for this position is $217,200.00 to $274,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco's policies:
+ 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
+ 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
+ Non-exempt employees** receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
+ Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
+ 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
+ Additional paid time away may be requested to deal with critical or emergency issues for family members
+ Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
+ .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
+ 1.5% of incentive target for each 1% of attainment between 50% and 75%;
+ 1% of incentive target for each 1% of attainment between 75% and 100%; and
+ Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$223,000.00 - $330,300.00
Non-Metro New York state & Washington state:
$217,200.00 - $315,300.00
* For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
** Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
Cisco is an Affirmative Action and Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, genetic information, age, disability, veteran status, or any other legally protected basis.
Cisco will consider for employment, on a case by case basis, qualified applicants with arrest and conviction records.
SAVP-Cyber-Cloud and Application Security
Cyber security analyst job in Jersey City, NJ
This leader will serve as a key partner to engineering, development, architecture, cloud, infrastructure, and product teams-helping embed security into every layer of our delivery model while reducing business friction and maintaining velocity. The role also supports our broader enterprise security architecture and governance efforts through direct participation in architectural reviews and security advisory forums.
Minimum Requirements:
10+ years in cybersecurity with a focus on application and/or cloud security
5+ years of team leadership, with proven experience building and scaling security engineering functions
Execution experience and capability in a fast-paced environment
Demonstrated ability to balance strategic direction with hands-on technical execution
Strong expertise in secure SDLC, threat modeling, DevSecOps, and cloud-native architectures
Experience in securing modern technology stacks including Java, Python, microservices, container orchestration, and public cloud (preferably AWS)
Familiarity with key tooling: SAST, DAST, SCA, IaC scanning, secrets detection, CSPM, WAF, and API security platforms
Proficiency in cloud infrastructure security (IAM, networking, data protection, KMS, etc.)
Bachelor's degree in computer science, Cybersecurity, or a related technical field; advanced degree or certifications (e.g., CISSP, CSSLP, CCSP, AWS Security Specialty) preferred
Research and evaluate emerging privacy technologies from academia and industry, contributing to open-source tools and AI privacy standards
Act as consultant and advocate for privacy best practices as central to our mission of Responsible AI
Preferred Qualifications:
Strong communicator with the ability to positively influence engineers, developers, architects, and business leaders alike
Thoughtful, pragmatic, and able to execute in a high-velocity, agile environment
Deeply collaborative and experienced at embedding security into developer culture
Track record of reducing risk without slowing down innovation
Being articulate and precise to the internal stakeholders who are seeking counsel on what are the risks, why are they impactful, and options on how to resolve them
Broad knowledge across the Security domain, as well as demonstrated focus in AI security evaluations and in one (or more) areas of Cybersecurity such as Red Teaming, Purple Teaming, Vulnerability Research, and Exploitation
Master's degree (or foreign degree equivalent) in Information Systems Engineering, Computer Science, Engineering, Information Security, Cyber Security, Information Assurance, or related field
Major Deliverables:
Define and execute the security strategy for application and cloud environments, aligned to business priorities, delivery timelines, and compliance requirements
Lead by example with a strong hands-on presence in technology, tooling, program execution
Proactively identify, assess, and track vulnerabilities, control gaps, and architectural risks across products and cloud platforms
Prioritize remediation efforts based on risk, business impact, and threat intelligence-partnering with engineering teams to drive resolution
Provide real-time advisory to development teams during design, build, and release stages
Scale security guardrails and developer-friendly tooling across hybrid and cloud-native environments (AWS, containers, IaC, etc.)
Champion threat modeling, secure coding practices, and resilience-by-design at the feature level
Define and govern secure reference architectures and patterns for cloud adoption, microservices, and serverless environments
Collaborate with the Enterprise Architecture team and serve as a core member of the Security Architecture Review Board (SARB)
Deploy and optimize a modern security tooling stack including SAST, DAST, SCA, IaC scanning, CSPM, secrets detection, and runtime protection
Act as a key collaborator across product, engineering, infrastructure, and DevOps teams-reducing security friction and aligning controls with workflows
Build trust through enablement, education, and repeatable guidance frameworks
Lead, mentor, and grow a high-performing team of AppSec and CloudSec professionals
Foster a culture of innovation, ownership, and technical excellence within the team
Define and report on KPIs/KRIs tied to application and cloud security posture, remediation progress, and control maturity
Support compliance, audit, and customer security assurance initiatives
Bonus Points If You Have
Experience building or advising on AI/ML privacy practices, including model governance, training data management, or privacy risk mitigation in LLM pipelines.
Prior experience working in high-sensitivity or regulated industries, such as security, healthcare, or fintech.
Contributions to open source, policy working groups, or public thought leadership on privacy engineering.
Auto-ApplyLead Information Security Analyst - Identity
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
Lead Information Security Analyst - Identity
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Information Security Analyst II (E5122)
Cyber security analyst job in Piscataway, NJ
Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices.
This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place.
The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption.
The role reports to the Manager, Information Security and manages 0 direct reports.
Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering.
In lieu of a degree equivalent experience will be considered.
ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.
g.
Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment.
ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus.
PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.
) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.
e.
Self Service Access requests).
Good understanding of a programming language (e.
g.
Java, C, Perl), HTML/XML and Unix “shells” scripting (e.
g.
CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.
o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements.
This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================Disclaimer: This is proprietary to IEEE.
It outlines the general nature and key features performed by various positions that share the same job classification.
It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job.
Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
Min: $91,000.
00 Max: $114,000.
00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Dec 22, 2025, 4:20:40 PM
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
Easy ApplyEngineer, Information Security and Risk
Cyber security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Need SSO Info Security Analyst
Cyber security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info Security Analyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on
510-254-33-00 Ext. 130
Information Security Specialist
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
Security System Engineer
Cyber security analyst job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Cyber Security Solutions Engineer - GES
Cyber security analyst job in Trenton, NJ
States: MA, NH, RI, ME, CT, VT, NJ, NY is home office based. Meet the Team You will provide guidance and assist Security Sellers and Account teams within the territory in a pre-sales technical role, showcasing Cisco security product solutions, setting up demonstrations, explaining features and benefits to customers, and designing and configuring products to address specific customer security needs. You will form relationships with our customer's key decision-makers, positioning Cisco security solutions aligned accurately to their requirements.
You will be a part of an outstanding technical pre-sales team in our Global Security Sales Organization (GSSO), responsible for driving the success of Cisco's Security Portfolio and focusing on protecting Customer Application Environments no matter where they live (on-prem / any cloud).
Our mission is simple: democratize security by making it easy and effective for everyone. We're transforming security from the ground up by solving the world's most pressing geopolitical challenge - safe, secure information access. We engineer our business to enable our customers to easily address their ever-evolving security challenges.
We believe that impactful work is rewarding work and that our team is at its best when everyone feels empowered to bring their whole self to work. We learn together by hiring for cultural contribution, not cultural fit, and recognize that diversity in background and thought are essential to building high-impact teams.
We invest in growth and learning opportunities and encourage our people to never stop learning. We foster collaboration and believe in being recognized (and rewarded!) for hard work. We champion a healthy work-life balance. We're kinder than necessary.
Together we build for the future by designing simple solutions for complex problems. And that's why we're the most loved and trusted name in security.
Your Impact
As an advisor to the customer, you'll be working with technology experts to craft architectures and configure products to meet customer-specific needs, are prepared to lead all technical aspects of pre-sales activities, and position security solutions effectively against competing offerings. You are an aggressive starter, self-starter with the ability to build executive relationships, develop and execute sales strategies and tactics that improve Cisco's opportunity with a customer environment, position and promote the partner and customer value proposition for Cisco security architecture, articulate Cisco's product and business strategies, and create the demand that makes deals happen! You will:
* Serve as the subject matter expert in Cisco security solutions
* Provide guidance and assist account teams within the territory in building solutions to address specific customer security needs
* Understand business requirements for a customer base and be able to translate them into technical requirements
* Understand and articulate Cisco's architecture and services within security technologies
* Create, present, and document technical solutions
* Perform in-depth and high-level technical presentations for customers partners and prospects
* Drive identified major account opportunities (i.e. technical consulting, upper-level management presentations, and Cisco technology solutions) while allowing local account teams to maintain long-term ownership
Who You Are
You are passionate about the customer experience and excited about new technology. You are a true teammate and love to learn. Being a self-starter, our SEs act as an industry domain authority, and strive to help Cisco make customers for life.
Minimum Qualifications
* Minimum of 4 years of pre-sales experience
* Hands on experience with one or more of these Cisco Security Products (or their competitive equivalent):
********************************************************************
* Experience with whiteboard discussions that transform customer requirements into security solutions
Preferred Qualifications
* History of successful quota achievement.
* Ability to demo / POV any of these Cisco Security products (the more the better): ********************************************************************
* Knowledge of public clouds AWS, Azure, GCP, and OCI.
* Experience with incident response a plus
* Experience with administering security for a company (e.g. purchased and deployed Cisco security products as a customer) is a plus.
* Solid presentation and interpersonal skills.
* Highly motivated self-starter who does not need day-to-day management
* Experience with APIs and scripting languages
Why Cisco?
At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
Message to applicants applying to work in the U.S. and/or Canada:
The starting salary range posted for this position is $217,200.00 to $274,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco's policies:
* 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
* 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
* Non-exempt employees receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
* Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
* 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
* Additional paid time away may be requested to deal with critical or emergency issues for family members
* Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
* .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
* 1.5% of incentive target for each 1% of attainment between 50% and 75%;
* 1% of incentive target for each 1% of attainment between 75% and 100%; and
* Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$223,000.00 - $330,300.00
Non-Metro New York state & Washington state:
$217,200.00 - $315,300.00
* For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
Information Security Analyst
Cyber security analyst job in Roseland, NJ
ADP is hiring a Lead Cloud Security Analyst in our Roseland, NJ office. This is a hybrid role.
As a Lead Cloud Security Analyst, you will join a highly skilled team providing world-class infrastructure and network security assessments and security consultation for ADP's Global Security Organization (GSO). This team is responsible for the execution of ADP's global Compliance and Vulnerability Management Program (CVM) program for infrastructure and network across Cloud and on-premises locations.
Services provided to the organization include Vulnerability management program management including Zero-day vulnerability response & Secure OS Build Compliance for cloud/container infrastructure as well as on-premises servers/endpoints.
You will focus on supporting CVM Cloud initiatives by leveraging a variety of security tools. Working closely with product and technology teams, with your knowledge of industry standards, you will be ensuring our infrastructure meets and maintains the requirements of our CVM security program.
To succeed in this position, you'll need knowledge and experience in securing cloud environments (AWS is a MUST) and in developing or being a part of a vulnerability management program working with a variety of product/DevOps teams.
Experience with the use of security tools for scanning and detection coupled with the ability to analyze the results across a large data set using database and scripting tools. Balance that with ability to stay ahead of threats and security trends while refining processes in a rapidly changing environment to drive and evolve the program.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
WHAT YOU'LL DO:
Here's what you can expect on a typical day in the life of a Lead Cloud Security Analyst at ADP.
Develop: Using existing tools, leverage available data to prioritize what should be addressed to reduce risk in the environment.
Measure: Develop metrics to track and show the performance of the program.
Communicate: From working with technical teams to understand/solve security issues to summarizing status for senior management.
Challenges: Across hundreds of products and a large global infrastructure, no day is the same and we must be prepared to respond to challenges presented.
Risk Management: Understand and evaluate/respond to risks/vulnerabilities and how to mitigate them.
Experience You'll Need:
Deep understanding of information security specifically in the realm of vulnerability management (VM)
Deep understanding of Cloud Security (AWS - Must, Other Cloud environments - Preferred)
Experience managing/building VM programs - defining and building metrics, automation of response and remediation (guidance)
Strong analytical/problem solving skills and cross functional knowledge across multiple development and security disciplines.
Understanding of security and compliance tools such as Qualys, Crowdstrike etc.
Experience working with CSPM tools such as Wiz, Prisma, Dome9/Cloudguard, etc.
Ability to communicate security-related concepts to a broad range of technical and non-technical staff.
Experience in scripting languages (Python - Preferred) and SQL Queries (Strong emphasis on Data Analytics)
To Succeed in This Role:
You'll have a bachelor's degree OR equivalent.
Any of the following are a plus but not necessary: CISSP, CISM, etc.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Information Security Analyst
Cyber security analyst job in Jersey City, NJ
Why us?
You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and Application Security.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at **********************
Easy ApplyEngineer, Information Security and Risk
Cyber security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Specialist
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com