Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer
Cyber security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Cyber Security Analyst II- Secret Clearance | Philadelphia, PA
Cyber security analyst job in Philadelphia, PA
Cybersecurity Analyst II- Secret Clearance | Philadelphia, PA Cambridge International Systems, Inc. Join a dynamic global team united by shared values: commitment, integrity, and perseverance. At Cambridge, you'll work alongside top talent worldwide, tackling some of today's most complex and critical challenges in defense and security.
We are currently seeking a Cybersecurity Analyst to support operations in Philadelphia, PA. This is a full-time, CONUS position requiring an active DoD Secret clearance,
What You'll Do
As a Cybersecurity Analyst, you will play a critical role in planning and implementing comprehensive security measures to safeguard computer systems, networks, and sensitive data from unauthorized access, data loss, and service interruptions, that serve U.S. government missions.
You will:
Plans and implements security measures to protect computer systems, networks, and data from loss and service interruptions.
Analyzes and documents security risks, breaches, and other cyber security incidents and the damage they cause.
Develops and implements a network disaster recovery plan and oversees the monitoring of the computer networks for security issues.
Installs and operates security software and measures to protect systems and information infrastructure, including firewalls and data encryption programs.
Collaborate with the security team to perform tests and find network weaknesses.
Assesses data collections/ tools via ACAS
Experience utilizing HBSS, web content filters, SIEM, and firewall systems
Works with management to develop best practices.
Researches and keeps current on the latest IT intelligence technologies, trends, and security standards.
What You'll Bring
Required Qualifications:
Education & Experience:
This position requires a Bachelor's degree in Computer Science, Information Technology or an equivalent Science, Technology, and Engineering & Math (STEM) degree and 3+ years of experience; years of experience may be substituted in lieu of degree.
DoD 8570.1-M Security+ required; CISSP, CASP+ or similar IAT lvl. III highly preferred.
IAM level II required
Assist End Customer in attaining and maintain DOD, DON, and NAVSEA continuous inspection readiness posture
3+ years of performing analysis of logs and events.
3+ years of automating processes through scripting and assessing impacts
3+ years of Windows Administration or Engineering experience.
Experience with the following publications NIST 800-53/A, NIST 800-37, CNSS 1253, NIST 800-60 Rev I&II, ECSM series
Development of SCTMs, POA&M's, Vulnerability Reports and CSSP tool implementation highly preferred.
Categorization experience and familiarity with assisting stakeholders evaluate risk and develop Concept of Operations artifact(s) to develop various ATO packages.
MCP, MCITP, MCSA, MCSA on Windows 2000 or higher strongly preferred.
Some demonstrated experience either operating, administering, or testing Linux preferred.
Experience with EMass & MCCAST (and other software tools) highly preferred.
3+ years of RMF experience.
Experience for implementing and mapping RMF lifecycle to project lifecycles.
Must have a current and active DoD Secret security clearance.
Proficient with modern IT tools and infrastructure technologies
Travel & Passport
Up to 25% travel, both CONUS and OCONUS may be required; some overnight stays possible.
Must have an active passport to support OCONUS travel
Work Environment
Compliance with vaccination and medical requirements for TDY/OCONUS roles as per Vaccine Recommendations by AOR | Health.mil.
Office setting:
Primarily an office-based role in Philadelphia, PA
Standard desk/computer work with flexibility for walking and movement on site
Must be able to work in an office environment, sitting at a desk, looking at a computer for most of the workday.
Work is physically comfortable; the employee has discretion about sitting, walking, standing, etc.
May be required to travel short distances to offices/conference rooms and buildings on site.
This position requires long hours and/or nights/weekend work.
This position requires long periods of sitting or standing.
This position requires communicating with others verbally and/or written.
This position requires working in a stressful environment.
This position requires dealing with conflict.
This position works under pressure and with strict deadlines.
This position requires focus and attention to detail.
Background & Security
Employment is contingent upon successful background investigation
Drug screening may be required for federal contract compliance
Benefits & Perks
We believe in investing in our team-both professionally and personally:
Medical, dental, vision, life, accident, and critical illness insurance
401(k) immediate vesting and match
Paid time off and company holidays
Generous tuition & training support
Relocation assistance
Sign-on and performance-based bonuses
Employee referral program
Access to Tickets at Work, EAP, wellness initiatives, and more
Join Us
If you're driven by mission, technology, and teamwork-we want to hear from you. Cambridge is growing, and this position is just one of many opportunities on our global team. Know someone perfect for the role? Referrals are welcome-both employees and non-employees may qualify for a bonus.
Apply today and help shape the future of secure cloud computing
for national security.
About Cambridge International Systems
At Cambridge, innovation grows through diversity. We are proud to be an equal opportunity employer, committed to creating an inclusive and supportive work environment for all. Learn more at *******************
Auto-ApplyDirector - Threat Detection Analyst
Cyber security analyst job in Edison, NJ
In the Technology division, we leverage innovation to build the connections and capabilities that power our Firm, enabling our clients and colleagues to redefine markets and shape the future of our communities. This is a Lead Data & Analytics Engineering position at the Director level, which is part of the job family responsible for providing specialist data analysis and expertise that drive decision-making and business insights as well as crafting data pipelines, implementing data models, and optimizing data processes for improved data accuracy and accessibility, including applying machine learning and AI-based techniques.
About the role:
The Director role within Fraud Detection Analytics performs a critical function within the Fraud Department, in safeguarding the organization against diverse fraud risks. This position is responsible for designing, implementing, and overseeing advanced analytics strategies to detect and mitigate fraudulent activities across multiple payment channels and fraud typologies, including account takeover (ATO), deposit fraud, scams, and emerging schemes. The ideal candidate combines deep technical expertise with strategic vision and strong communication skills to drive cross-functional collaboration and deliver actionable insights.
What you'll do in the role:
Develop and refine fraud detection controls and analytical frameworks targeting fraud risks such as ATO, deposit fraud, scams, and other typologies.
Monitor and analyze transaction channels (crypto, wire, ACH, Zelle, bill payments) for suspicious activity and emerging patterns.
Leverage data-driven insights by integrating internal data with external intelligence sources for proactive fraud detection.
Utilize SQL and advanced analytics to extract, analyze, and interpret large datasets to identify emerging fraud trends.
Apply predictive modeling, forecasting, and statistical methodologies to enhance operational efficiency and reporting.
Design and validate rules within the fraud rules engine, conducting rigorous pre- and post-production testing.
Continuously adjust controls based on observed trends to address evolving risks.
Identify automation opportunities to streamline manual processes related to data collection, metric calculation, and loss assessment.
Deliver business insights through dashboards and visualization tools (Tableau, SAS, Python, R) and produce on-demand reports.
Communicate key trends, findings, and actionable recommendations to management and stakeholders.
Prepare and present executive-level reports on suspicious activities and risk management.
Set and monitor KPIs for fraud detection, implementing mitigation strategies where needed.
Collaborate with Customer Service, Product Management, Engineering, and Data Science teams to enhance fraud detection tools and models.
Coordinate with Fraud Operations to align rule strategies with staffing resources.
Recommend and implement innovative technologies for fraud detection, prevention, and reporting.
What you'll bring to the role:
Minimum of 5+ years of experience in fraud analytics, financial crime, or risk management.
Bachelor's or Master's degree in Data Science, Computer Science, Finance, or related field.
Expert proficiency in SQL (including joins, subqueries, unions, temporary tables) for data extraction, analysis, and reporting.
Demonstrated experience designing and implementing fraud detection models, with a strong focus on account takeover, scam & first party fraud scenarios.
In-depth understanding of transaction exhaust methods (cryptocurrency, wires, ACH, Zelle, bill payments).
Strong analytical, problem-solving, and decision-making skills.
Excellent verbal and written communication skills, with the ability to present complex findings to non-technical audiences.
Experience working with large datasets and modern analytics tools (Python, R, Tableau, SAS).
Desired Skills:
Previous experience in banking, fintech, or payments industry.
Knowledge of regulatory requirements related to financial fraud and AML.
Familiarity with fraud monitoring tools and case management systems.
Ability to work in fast-paced, high-pressure environments and manage multiple priorities effectively.
Proven track record of leading successful fraud detection initiatives across multiple payment channels.
Advanced skills in statistical analysis and visualization platforms.
Experience collaborating with Data Science and Product teams to produce fraud risk models and meet business goals
WHAT YOU CAN EXPECT FROM MORGAN STANLEY:
We are committed to maintaining the first-class service and high standard of excellence that have defined Morgan Stanley for over 89 years. Our values - putting clients first, doing the right thing, leading with exceptional ideas, committing to diversity and inclusion, and giving back - aren't just beliefs, they guide the decisions we make every day to do what's best for our clients, communities and more than 80,000 employees in 1,200 offices across 42 countries. At Morgan Stanley, you'll find an opportunity to work alongside the best and the brightest, in an environment where you are supported and empowered. Our teams are relentless collaborators and creative thinkers, fueled by their diverse backgrounds and experiences. We are proud to support our employees and their families at every point along their work-life journey, offering some of the most attractive and comprehensive employee benefits and perks in the industry. There's also ample opportunity to move about the business for those who show passion and grit in their work.
To learn more about our offices across the globe, please copy and paste ***************************************************** into your browser.
Morgan Stanley's goal is to build and maintain a workforce that is diverse in experience and background but uniform in reflecting our standards of integrity and excellence. Consequently, our recruiting efforts reflect our desire to attract and retain the best and brightest from all talent pools. We want to be the first choice for prospective employees.
It is the policy of the Firm to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, creed, age, sex, sex stereotype, gender, gender identity or expression, transgender, sexual orientation, national origin, citizenship, disability, marital and civil partnership/union status, pregnancy, veteran or military service status, genetic information, or any other characteristic protected by law.
Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet).
Auto-ApplyCybersecurity Defense SOC Analyst (L2)
Cyber security analyst job in Iselin, NJ
This is an opportunity to join Ascot Group - one of the world's preeminent specialty risk underwriting organizations.
Designed as a modern-era company operating through an ecosystem of interconnected global operating platforms, we're bound by a common mission and purpose: One Ascot. Our greatest strength is a talented team who flourish in a collaborative, inclusive, and entrepreneurial culture, steeped in underwriting excellence, integrity, and a passion to find a better way, The Ascot Way.
The Ascot Way guides our people and our organization. Our underwriting platforms collaborate to find creative ways to deploy our capital in a true cross-product and cross-platform approach. These platforms work as one, deploying our capital creatively through our unique Fusion Model: Client Centric, Risk Centric, Technology Centric.
Built to be resilient, Ascot maximizes client financial security while delivering bespoke products and world class service - both pre- and post-claims. Ascot exists to solve for our clients' brightest tomorrow, through agility, collaboration, resilience, and discipline.
Job Summary:
As part of our 24x7 Cybersecurity Defense function, the SOC Analyst (L2) will be responsible for investigating security incidents, improving detection content and supporting the overall monitoring, detection and cybersecurity incident response activities. This involves working closely with the members of the internal Cybersecurity team and our Managed Security Service Provider (MSSP).
Acting as an escalation point for L1/L2 SOC analysts, this resource will work within an expanding cybersecurity team, collaborating with cybersecurity managers, IT Infrastructure, and Deskside Support Teams.
You must be detail-oriented, diligent, and capable of managing multiple aspects of the incident response lifecycle simultaneously. You will be supporting a 24X7 Cybersecurity Defense function and will be required to work in shifts that will vary based on operational needs to support the global footprint across the UK and US time zones.
This resource will additionally be responsible for maintaining detection content on the detection tool, (detection rules, log ingestion, parsers, forwarders), maintaining playbooks, SOC documentation and supporting integrations and log sources associated with the overall Cybersecurity Defense solution. This role will be in the office with a hybrid work schedule.
Responsibilities:
•Monitor our security tools to triage and respond to suspicious events and abnormal activities, capable of performing deep-dive incident investigations.
•Serve as a point of escalation for the L1, L2 SOC Analysts, and the point of contact for our MSSP, coordinating response efforts with other groups and stakeholders with varying technical expertise, such as IT, Legal, business etc.
•Develop and implement advanced security protocols and incident response procedures and improve our threat intelligence processes.
•Stay current with evolving threats, vulnerabilities, tools, technologies and threat actor TTPs to help improve detection and response capabilities.
•Provide oversight and governance over the daily operations of the MSSP and SOC team at a global level.
•Mentor and provide training to junior SOC team members.
•Develop and refine standard operating procedures in the form of run books and playbooks for incident response and threat detection. Create and make improvements to procedures and playbooks. Conduct technical analysis, log reviews, and assessments of cybersecurity incidents throughout the incident management lifecycle.
•Work with end users where appropriate on security related incident and request workflow.
•Document and manage incident cases to utilize information for stakeholder engagement to provide insight, intelligent recommendations, risk reporting and lessons learned.
•Work in scheduled shift patterns when required.
•Conduct in-depth security investigations, log analysis, network/email traffic assessment, and evaluate other data sources to identify root causes, assess impact, and gather evidence for response and mitigating actions.
•Implement detection use cases within our SIEM for our expanding estate using appropriate scripting languages.
•Manage log sources, log ingestion volumes, detection content and overall SIEM solution system health, maintenance, and upgrades.
•Assist with additional ad hoc projects as required.
Requirements:
•Cybersecurity related bachelor's degree or related field.
•Minimum of 8 years of experience in a security operations role, SOC engineering and or a cybersecurity technical engineering role.
•Exposure to building and migrating log sources onto a new SIEM platform, creating detection content, log parsers and detection engineering will be preferred. Alternatively, candidates that have worked in senior technical roles in a Managed Security Service Provider (MSSP) will be preferred.
•Preference will be given to candidates who also have additional technical and cybersecurity certifications covering both defensive and offensive security such as CompTIA Security+, Certified SOC Analyst (CSA), Certified Ethical Hacker (CEH), CySA+, CISSP, GSEC, GCIH, CCSP, Microsoft SC-200, CISSP-ISSMP, CTIA, OSCP.
•Candidates must have solid experience and knowledge of typical enterprise technologies. On-premises and cloud hosting, Windows and Linux operating systems (OS), Microsoft Azure, M365 and the ability to detect signs of compromise in these systems.
•Possess a growth mindset and is willing to learn how to resolve technical security issues.
•Demonstrate a working and genuine interest and talent in Cybersecurity.
•Demonstrate detail orientation and can take a structured approach to procedures and working instructions.
•Work and maintain a calm structured mindset even when under pressure.
•Possess an aptitude for understanding and analyzing data when troubleshooting.
•Strong written communication, critical thinking, and analysis skills, including the ability to present potential risks and actual findings to a wide audience. Ability to communicate complex problems to a non-technical audience.
•Must have a working understanding of key security concepts and attack types such as phishing, malware, vulnerabilities, Cyber Kill Chain, and attack stages.
•A strong analytical mindset, capable of digesting a wide range of information to make practical judgements based on available data and context.
•Experience with security tools and technologies, including SIEM, intrusion detection systems, EDR, XDR, log analysis, and malware analysis.
•Understand threat actor tactics, techniques and procedures, have familiarity with the MITRE-ATT&CK Framework and different stages of an attack lifecycle.
•Maintain a desire to keep learning, with a curious and creative growth mindset.
***This position may be filled at a different level, depending on experience***
Compensation
Actual base pay could vary and may be above or below the listed range based on factors including but not limited to experience, subject matter expertise, and skills. The base pay is just one component of Ascot's total compensation package for employees. Other rewards may include an annual cash bonus and other forms of discretionary compensation awarded by the Company
.
The salary range for this role in the NY Metro and Chicago, IL area is $105,000 - $120,000.
Company Benefits
The Company provides a competitive benefits package that includes the following (eligibility requirements apply):
Health and Welfare Benefits: Medical (including prescription coverage), Dental, Vision, Health Savings Account, Commuter Account, Health Care and Dependent Care Flexible Spending Accounts, Life Insurance, AD&D, Work/Life Resources (including Employee Assistance Program), and more
Leave Benefits: Paid holidays, annual Paid Time Off (includes paid state /local paid leave where required), Short-term Disability, Long-term Disability, Other leaves (e.g., Bereavement, FMLA, Adoption, Maternity, Military, Primary & Non-Primary Caregiver)
Retirement Benefits: Contributory Savings Plan (401k)
#L1 Hybrid
Auto-ApplyCyber Security Solutions Engineer - GES
Cyber security analyst job in Trenton, NJ
States: MA, NH, RI, ME, CT, VT, NJ, NY is home office based. Meet the Team You will provide guidance and assist Security Sellers and Account teams within the territory in a pre-sales technical role, showcasing Cisco security product solutions, setting up demonstrations, explaining features and benefits to customers, and designing and configuring products to address specific customer security needs. You will form relationships with our customer's key decision-makers, positioning Cisco security solutions aligned accurately to their requirements.
You will be a part of an outstanding technical pre-sales team in our Global Security Sales Organization (GSSO), responsible for driving the success of Cisco's Security Portfolio and focusing on protecting Customer Application Environments no matter where they live (on-prem / any cloud).
Our mission is simple: democratize security by making it easy and effective for everyone. We're transforming security from the ground up by solving the world's most pressing geopolitical challenge - safe, secure information access. We engineer our business to enable our customers to easily address their ever-evolving security challenges.
We believe that impactful work is rewarding work and that our team is at its best when everyone feels empowered to bring their whole self to work. We learn together by hiring for cultural contribution, not cultural fit, and recognize that diversity in background and thought are essential to building high-impact teams.
We invest in growth and learning opportunities and encourage our people to never stop learning. We foster collaboration and believe in being recognized (and rewarded!) for hard work. We champion a healthy work-life balance. We're kinder than necessary.
Together we build for the future by designing simple solutions for complex problems. And that's why we're the most loved and trusted name in security.
Your Impact
As an advisor to the customer, you'll be working with technology experts to craft architectures and configure products to meet customer-specific needs, are prepared to lead all technical aspects of pre-sales activities, and position security solutions effectively against competing offerings. You are an aggressive starter, self-starter with the ability to build executive relationships, develop and execute sales strategies and tactics that improve Cisco's opportunity with a customer environment, position and promote the partner and customer value proposition for Cisco security architecture, articulate Cisco's product and business strategies, and create the demand that makes deals happen! You will:
* Serve as the subject matter expert in Cisco security solutions
* Provide guidance and assist account teams within the territory in building solutions to address specific customer security needs
* Understand business requirements for a customer base and be able to translate them into technical requirements
* Understand and articulate Cisco's architecture and services within security technologies
* Create, present, and document technical solutions
* Perform in-depth and high-level technical presentations for customers partners and prospects
* Drive identified major account opportunities (i.e. technical consulting, upper-level management presentations, and Cisco technology solutions) while allowing local account teams to maintain long-term ownership
Who You Are
You are passionate about the customer experience and excited about new technology. You are a true teammate and love to learn. Being a self-starter, our SEs act as an industry domain authority, and strive to help Cisco make customers for life.
Minimum Qualifications
* Minimum of 4 years of pre-sales experience
* Hands on experience with one or more of these Cisco Security Products (or their competitive equivalent):
********************************************************************
* Experience with whiteboard discussions that transform customer requirements into security solutions
Preferred Qualifications
* History of successful quota achievement.
* Ability to demo / POV any of these Cisco Security products (the more the better): ********************************************************************
* Knowledge of public clouds AWS, Azure, GCP, and OCI.
* Experience with incident response a plus
* Experience with administering security for a company (e.g. purchased and deployed Cisco security products as a customer) is a plus.
* Solid presentation and interpersonal skills.
* Highly motivated self-starter who does not need day-to-day management
* Experience with APIs and scripting languages
Why Cisco?
At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint.
Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere.
We are Cisco, and our power starts with you.
Message to applicants applying to work in the U.S. and/or Canada:
The starting salary range posted for this position is $217,200.00 to $274,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits.
Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process.
U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time.
U.S. employees are eligible for paid time away as described below, subject to Cisco's policies:
* 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees
* 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco
* Non-exempt employees receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees
* Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations)
* 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next
* Additional paid time away may be requested to deal with critical or emergency issues for family members
* Optional 10 paid days per full calendar year to volunteer
For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies.
Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows:
* .75% of incentive target for each 1% of revenue attainment up to 50% of quota;
* 1.5% of incentive target for each 1% of attainment between 50% and 75%;
* 1% of incentive target for each 1% of attainment between 75% and 100%; and
* Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation.
For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid.
The applicable full salary ranges for this position, by specific state, are listed below:
New York City Metro Area:
$223,000.00 - $330,300.00
Non-Metro New York state & Washington state:
$217,200.00 - $315,300.00
* For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined.
Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
Vice President, Cyber Security Engineer
Cyber security analyst job in Iselin, NJ
CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day.
Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use.
CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market.
Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment:
Pivotal purpose
Trusted guardian
Targeted innovation
Facilitate connections
Delivering excellence
Inclusive culture
Job information:
Functional title - Cyber Security Engineer
Department - Security Engineering
Corporate level - Vice President
Report to - Director, Information Security Engineering
Location - New York / New Jersey - Metropark, onsite 2 days per week.
Expected full-time salary range between $140,000 - $180,000 + variable compensation + 401(k) match + benefits.
Note: Disclosure as required by NY Pay Transparency Law of the expected salary compensation range for this role.
Job Purpose
The Cyber Security Engineering role is responsible for the delivery of security related activities and maintenance and enhancements of security solutions to improve the security posture of the CLS estate.
This individual will interact with the IT Security Architecture Team, IT Security Operations Team, Project Management Teams, global IT Teams, and outsourcing partners to deliver solutions that enhance the security program for CLS.
Essential Function / Major Duties and Job Responsibilities
Strategic
As part of the CLS Security Engineering team, develop and implement CLS security strategy in consultation with the CLS IT teams, ensuring that all initiatives are mirrored in respective strategies including the overall CLS Strategy.
Provide security advice and support for information technology projects.
Research new security related products and services to ensure that CLS is equipped with appropriate industry best of breed tools and solutions.
Operational
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc.
Review and help refine CLS Security procedures to ensure compliance with cyber resilience requirements.
Be responsible when assigned ownership of CLS Security related Regulatory and Internal Audit finding(s), and provide effective / timely resolution.
Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
Facilitate monitoring and enforcement of configurations, as well as manage and monitor security on systems deployed in the cloud in a similar fashion as is done on-premises at CLS.
Oversee design principles and controls relating to third party solution providers.
Leadership
Work as a team member and individual contributor being able to work independently and confidently without direct supervision.
Through example and behaviour, strive to provide peer leadership to other team members with the goal of being excellent service providers and enablers to other constituencies (both internal and external).
Strong communication (verbal and written) skills to engage with technical and non-technical audiences.
Ability to clarify technical detail and confidently communicate business risks to senior management.
Execute CLS Security Engineering team's vision and mission in alignment with the overall CLS Security vision and mission, as well as with CLS's strategic direction as it pertains to cyber resilience.
Experience / Essential and Desired for Successful Job Performance
A minimum of 5 years of information security experience with at least 2 years in cloud security.
Expert knowledge of one or more of the following: firewalls, TCP/IP, network IDS/IPS, host-based IDS/IPS, endpoint and network-based DLP, web proxies, email protection, endpoint protection software, SIEM
Sound knowledge of enterprise security concepts/frameworks and products, secure design principles and patterns
Monitor, tune and develop technical CLS Security controls and frameworks to ensure appropriate preparation, monitoring and response to threats
Ability to collaborate effectively with others to drive forward key security objectives
Strong documentation and report writing skills (to both technical and business audiences)
Excellent time management and organizational skills combined with technical CLS Security acumen
Financial and/or Banking industry experience preferred
Qualifications / Certifications
in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) or Security Certifications such as CISSP, SANS GIAC GSEC, GCED, GCIA, GCIH, GREM
Industry recognized cloud security qualifications (e.g. CCSK, CCSP, AWS Security Fundamentals, AWS Certified Security)
Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, NIST 800-53 and FFIEC handbook
Success Factors / Personal Characteristics Contributing to an Individual's Ability to Excel in the Position
Possess a strong service-oriented mind set to consistently deliver balanced security solutions that include people, process and technology.
Possess strong technical, analytical and problem-solving skills.
Self-motivated to exceed management expectations and objectives.
Ability to effectively communicate complex technical issues to both business and technical staff at all levels.
Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups.
Able to effectively cope with change and comfortably handle risk and ambiguity, not upset when things are up in the air.
Tenacious resolve and positive attitude in challenging situations
Our commitment to employees:
At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including:
Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days.
2 paid volunteer days so that you can actively support causes within your community that are important to you.
Generous parental leave policies to ensure you can enjoy valuable time with your family.
Parental transition coaching programmes and support services.
Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others.
Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity.
Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't.
Active support of flexible working for all employees where possible.
Monthly ‘Heads Down Days' with no meetings across the whole company.
Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees.
Private medical insurance and dental coverage.
Social events that give you opportunities to meet new people and broaden your network across the organisation.
Annual flu vaccinations.
Discounts and savings and cashback across a wide range of categories including health and retail for UK employees.
Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees.
All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning.
Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
Auto-ApplyInformation Security Specialist - Cyber Resilience
Cyber security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
The role involves designing and implementing cyber resilience strategies, leading initiatives to improve organizational preparedness, conducting risk assessments, and collaborating with various teams to align resilience goals with business objectives. Responsibilities also include developing incident response plans, managing continuity strategies, providing expert guidance during incidents, and delivering training programs to foster a culture of resilience.
Depth & Scope:
Participates on complex, comprehensive or large projects and initiatives
Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Expert knowledge of IT security and risk disciplines and practices
Preferred Qualification :
Design, develop, and implement comprehensive cyber resilience strategies.
Lead cross-functional initiatives to enhance organizational preparedness against cyber threats and incidents.
Conduct risk assessments and business impact analyses to identify vulnerabilities.
Collaborate with IT, security teams, and business units to align resilience goals with organizational objectives.
Develop and manage incident response plans, continuity strategies, and recovery protocols.
Provide expert guidance during cybersecurity incidents, ensuring rapid response and recovery.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyCyber Security Solutions Sales Specialist
Cyber security analyst job in Bridgewater, NJ
Overview: Cognizant is looking for a Cyber Security Service Line Sales Specialist to join the Cybersecurity Service Line to drive additional revenue growth specific to Palo Alto Networks Cybersecurity solutions & services. Service Line Sales Executives, partner with Cognizant vertical and Cloud, Infrastructure and Security (CIS) sales teams to identify areas of opportunity to position Cybersecurity solutions and services, create compelling solutions to secure client estate and pursue Cybersecurity deals with innovative technical and commercial models.
The Service Line Specialist will provide deep expertise in one or more of Palo Alto Networks Cybersecurity solutions & services. Supporting Cognizant's client account teams in vertical markets and their account expansion plans into new markets and business areas. SLS's are usually assigned into existing markets and some SLS' will also engage in new logo markets. The Specialist will be a "trusted advisor" to both the client and the Cognizant Client Partner blending strategic, tactical and 'street savvy' sales experience.
Responsibilities:
* Responsible for Cyber Security & Networks Solutions and Services business growth and pipeline generation in partnership with the sales leaders and sales enablement within sales account teams.
* Partners with account teams to identify, solution and close opportunities within the account base
* Training and Educating Vertical and other Horizontal Sales team on Cognizant Security Portfolio
* Driving solutions for managed services opportunities collaborating with offshore based teams
* Articulating the Cybersecurity solution and value proposition to clients, as part of large managed services / IT outsourcing engagements
* Responsible for engaging in proactive conversations with security collaborators on current trends, client's landscape and enable solutions to address security challenges.
* Willing and able to travel approximately 30%
Required Qualifications:
* 15+ years of overall experience and 10+ years of experience in Cybersecurity solutions & Palo Alto Networks related to Service sales, Program management, Technical Solution centric sales.
* Experience in working with one or more Cybersecurity technology solution companies and understanding of their solution portfolio such as Palo Alto, Cisco, Zscaler, Crowdstrike etc.
* Experience in articulating joint value proposition of Cognizant Security Services and Palo Alto Networks Solutions
* Work with GSI team of Palo Alto Networks to track pipeline, perform account planning and drive client conversations along with Palo Alto Networks account representatives.
* Experience in Security Consulting, Security Professional Services and Managed Services solution experience
* Experience in preparing solution presentations, proposals (word / ppt), statement of work, effort price estimation and pricing/commercial model
* Good working experience with market leading security technologies with in SIEM, Network and Endpoint Security, Cloud Security, Identity and Access Management etc.
* Ability to articulate technology solution value proposition to business collaborators, partners and team members
* Experience with developing Trusted Advisor relationships at the C Level with in F200 & F500 Accounts
* Works closely with other Cognizant practices and geographic regions to ensure that Cognizant continues to operate effectively as one firm.
* Strong Information Cybersecurity Technology Background
* Prior experience in presales solutioning and client management.
* Ability to partner with additional collaborators in a matrixed environment and provide inputs to offering development teams on market requirements to enable them to create innovative differentiated offerings
* Good communication skills in complex client relationship model
* Bachelor's Degree required or equivalent experience
Preferred Qualifications:
* Security certifications such as CISA or CISM or CISSP preferred
* Understanding of the Palo Alto Networks portfolios including Prisma SASE, Prisma Cloud, Cortex XDR, XSIAM, XSOAR and Strata platforms
* Experience in Large Opportunities management.
* Palo Alto Networks Certifications
* Master's Degree in Cyber Security/Networking or related field.
Salary and Other Compensation:
The annual salary for this position is between $170,000 to $175,000 depending on experience and other qualifications of the successful candidate.
This position is also eligible for Cognizant's discretionary annual incentive program, based on performance and subject to the terms of Cognizant's applicable plans.
Benefits: Cognizant offers the following benefits for this position, subject to applicable eligibility requirements:
* Medical/Dental/Vision/Life Insurance
* Paid holidays plus Paid Time Off
* 401(k) plan and contributions
* Long-term/Short-term Disability
* Paid Parental Leave
* Employee Stock Purchase Plan
Disclaimer: The salary, other compensation, and benefits information is accurate as of the date of this posting. Cognizant reserves the right to modify this information at any time, subject to applicable law.
#LI-FA1
The Cognizant community:
We are a high caliber team who appreciate and support one another. Our people uphold an energetic, collaborative and inclusive workplace where everyone can thrive.
* Cognizant is a global community with more than 300,000 associates around the world.
* We don't just dream of a better way - we make it happen.
* We take care of our people, clients, company, communities and climate by doing what's right.
* We foster an innovative environment where you can build the career path that's right for you.
About us:
Cognizant is one of the world's leading professional services companies, transforming clients' business, operating, and technology models for the digital era. Our unique industry-based, consultative approach helps clients envision, build, and run more innovative and efficient businesses. Headquartered in the U.S., Cognizant (a member of the NASDAQ-100 and one of Forbes World's Best Employers 2025) is consistently listed among the most admired companies in the world. Learn how Cognizant helps clients lead with digital at *****************
Cognizant is an equal opportunity employer. Your application and candidacy will not be considered based on race, color, sex, religion, creed, sexual orientation, gender identity, national origin, disability, genetic information, pregnancy, veteran status or any other characteristic protected by federal, state or local laws.
Disclaimer:
Compensation information is accurate as of the date of this posting. Cognizant reserves the right to modify this information at any time, subject to applicable law.
Applicants may be required to attend interviews in person or by video conference. In addition, candidates may be required to present their current state or government issued ID during each interview.
Platform Engineer - Security
Cyber security analyst job in Camden, NJ
Since 1869, we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Cape Cod, Chunky, Goldfish, Kettle Brand, Lance, Late July, Pacific Foods, Pepperidge Farm, Prego, Pace, Rao's Homemade, Snack Factory, Snyder's of Hanover. Swanson, and V8.
Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us.
Why Campbell's…
Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners).
Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting.
Campbell's offers unlimited sick time along with paid time off and holiday pay.
If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store.
Giving back to the communities where our employees work and live is very important to Campbell's. Our “Campbell's Cares” program matches employee donations and/or volunteer activity up to $1,500 annually.
Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
Who we are looking for…
The Campbell's Company is looking for an senior-level Engineer - Information Security to join our critical and highly visible Information Security team. This position will primarily be responsible for managing the lifecycle and effectiveness of key security tools and processes. You will work closely with the Architecture and Risk Management teams to ensure that security controls are in place and appropriately managing risk throughout the Information Technology, Operational Technology, and Cloud environments.
What you will do…
Essential responsibilities will include but not be limited to:
Design, deploy, and integrate security tools and processes
Design, deploy, integrate Privilege Access Management (PAM) services for Linux and Windows environments
Experience in developing, testing, and deploying ZeroTrust security strategies focused on identity, device, and network contexts
Cloud (Azure / AWS) security engineering
Develop and implement automation strategies tied to both administrative maintenance of the environment, as well as contribute to the overall detection engineering efficiency
Active Directory security hardening
Job Complexity
Manage multiple, concurrent project and task assignments, placing proper priorities on tasks and attention to detail to follow through all assignments to completion
Create and manage the lifecycle of documentation to support the architecture and operations of security systems
Continuously improve operational playbooks and knowledge transfer material to enable operational support teams to handle increasingly complex tasks to enable Engineering time is focused on the most valuable work
Serve as an incident escalation point
Provide thought leadership and communications expertise in the development of policies, standards, procedures, and other communication for the department
Provide thought leadership on key performance indicators for measuring success objectively
Integrate existing and new tools and supporting resources into our security intelligence platform, with the goal of deriving actionable data
Keep current with the latest news and events surrounding cyber threats and security
Evaluate new technologies and processes that enhance security capabilities
What you bring to the table… (Must Have)
Bachelor's degree in a computer science or information technology discipline
5+ years of relevant work experience, including:
2 years of experience as an Information Security Analyst with experience within at least two of the following disciplines: networking, system hardening, identity and access management, or privileged access management
1 year of experience in system or firewall administration
Deep understanding of Linux identity engineering and administration
2 years of experience working with privileged access management platforms across Windows, Linux, network device, and containerized platforms
Significant experience working with automation scripting leveraging at least 3 of the following: python, PowerShell, API based integrations, and no/low-code workflow automation platforms.
Strong knowledge of L4-L7 protocols such as SSL, HTTP, DNS, SMTP, and IPsec
Deep understanding of TCP/IP, computer networking, routing, and switching, and encryption technologies and standards
Knowledge of identity and access management principles (SSO, MFA, ModernAuth)
It would be great if you have… (Nice to Have)
CISSP certification is a plus
Cloud security experience is a plus
Conceptual understanding of the Cyber Kill Chain and MITRE ATT&CK framework
Experience with Manufacturing environments is a plus
Experience with leveraging LLM's or statistical analysis to drive operational insights
Strong capacity to understand vectors and the risks associated with them
Experience with deploying and managing distributed architecture layer 7 firewalls
Experience with IDS/IPS, penetration and vulnerability testing
Strong security policy knowledge and experience
Strong ability to clearly communicate and document complex concepts
Data protection tools and processes - Data Loss Prevention [DLP], Rights Management Services [RMS], Cloud Access Security Broker [CASB]
More about the job…
This position reports to the Senior Manager for Security Architecture and Engineering
Compensation and Benefits:
The target base salary range for this full-time, salaried position is between
$131,400-$188,900
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplyCyber Security
Cyber security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Head of Cyber Incident Response & Cyber Threat Mitigation Services
Cyber security analyst job in Holmdel, NJ
Do you want to be part of a collaborative team handling potentially challenging situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity in threat reduction efforts.
A qualified candidate should be a collaborative self-starter who has a combination of strong technical aptitude, knowledge of security attack methods/stages (e.g., MITRE), a strong mindset, strong written and oral communication and can also inspire and develop talent. They must partner across the firm to drive identification, containment, investigations, response and recovery. As part of Guardian, the successful candidate must live by the Guardian operating principles of thinking big & growing, accelerate operational excellence, wowing the consumer, and be able to lead through change with courage.
You have
The knowledge, experience, length of education needed to accomplish the desired end results.
7+ years broad/deep technology experience including public clouds
3+ years of leader experience in a security role, preferably involving incident response
Incident response methodologies and evidence handline
Strong written and oral communication skills
Experience working across functions including business, legal, HR, communications, IT.
Analytical and curious attitude
Knowledge of threat hunting and risk mitigation
Knowledge of NIST CSF, MITRE, and others frameworks, malware analysis concepts, types of attacks and attackers, common vulnerabilities.
Experience with financial services or regulated entities, US privacy regulations.
Ability to think in a structured and creative manner to address cyber incidents
Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies.
Ability to lead a diverse high performing team.
Ability to accelerate impact and lead positive cyber security change.
Good knowledge of SIEM tools (Splunk preferred) and logging/monitoring, insider and UBA concepts and application.
BS/MS in relevant experience in cyber security and/or industry related certifications desired
A continuous & lifelong learner.
You will
Lead a team of cyber security incident response and threat mitigation engineering professionals.
Be responsible for planning, design, operating Guardian's cyber incident response and cyber threat mitigations operations across the areas.
Run our Corporate Incident Response Team as related to cybersecurity - coordinating actions and responses across teams.
Manage the plans, playbooks, quick reference guides necessary - and out-of-band communication plans.
Engage with 1st line teams to develop muscle memory and ensure containment actions (shutdown authorities are clear).Coordinate with business continuity/disaster recovery teams to ensure integrated approach to large events.
Be responsible for triaging & leading cyber security incidents advanced from the security operations center
Manage third-party incident retainers and prepare for any future engagements.
Participate-in / coordinate periodic exercises with third-parties.
Ensure quality of security incident handling and cyber threat mitigation work.
Ensure incidents are appropriately tracked, reported and after-action reports documented. Ensure metrics are timely and accurate.
Drive our user behavior analytics (UBA) program working with the business to develop and improve appropriate logging monitoring. Develop standard operating procedures for our 1st line SOC based on threats/observed incidents.
Proactively identify gaps and opportunities in our logging and monitoring processes.
Host monthly incident response calibration/collaboration meetings across HR, physical security, fraud, legal, compliance to collaborate on issues and shared threats and knowledge
Communicate to various levels of the organization, both written and oral concisely and clearly.
Provide strong technical understanding of security control monitoring process at different layers.
Identify (and champion where applicable) risk mitigation.
Collaborate with other leaders across cybersecurity to help define and complete cybersecurity strategy, financial, vendor and talent management.
Contribute to the enterprise organizational Data Loss Prevention program
Lead, manage, guide, and mentor the staff on a regular basis, including selection/retention, goal setting, annual reviews, and compensation planning and career development.
Provide recommendations to management & leadership team to increase effectiveness of security technology solutions to mitigate cyber threats and handle incidents.
Respond to and assist with due diligence and internal / external security audit requests.
Identify and act on opportunities to further enhance and refine security incident handling & cyber threat mitigation processes & capabilities.
Location and Travel
Three days a week at a Guardian office in Holmdel, NJ, Bethlehem, PA, or New York, NY.
20% travel to other Guardian Offices as needed
Reporting Relationships
As our Head of Cyber Incident Response Threat Services, you will report to Guardian's Chief Information Security Officer.
Salary Range:
$148,940.00 - $244,685.00
The salary range reflected above is a good faith estimate of base pay for the primary location of the position. The salary for this position ultimately will be determined based on the education, experience, knowledge, and abilities of the successful candidate. In addition to salary, this role may also be eligible for annual, sales, or other incentive compensation.
Our Promise
At Guardian, you'll have the support and flexibility to achieve your professional and personal goals. Through skill-building, leadership development and philanthropic opportunities, we provide opportunities to build communities and grow your career, surrounded by diverse colleagues with high ethical standards.
Inspire Well-Being
As part of Guardian's Purpose - to inspire well-being - we are committed to offering contemporary, supportive, flexible, and inclusive benefits and resources to our colleagues. Explore our company benefits at ************************************************
Benefits apply to full-time eligible employees. Interns are not eligible for most Company benefits.
Equal Employment Opportunity
Guardian is an equal opportunity employer. All qualified applicants will be considered for employment without regard to age, race, color, creed, religion, sex, affectional or sexual orientation, national origin, ancestry, marital status, disability, military or veteran status, or any other classification protected by applicable law.
Accommodations
Guardian is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. Guardian also provides reasonable accommodations to qualified job applicants (and employees) to accommodate the individual's known limitations related to pregnancy, childbirth, or related medical conditions, unless doing so would create an undue hardship. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact applicant_accommodation@glic.com.
Current Guardian Colleagues: Please apply through the internal Jobs Hub in Workday.
Auto-ApplyInformation System Security Officer (ISSO) III
Cyber security analyst job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Product Security Engineer, AI
Cyber security analyst job in Trenton, NJ
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Information Security Specialist
Cyber security analyst job in Trenton, NJ
We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges.
In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India.
We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information
security policies and standards, in addition to planning, coordinating, and implementing security
measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
Develop plans to safeguard computer files against accidental or unauthorized
modification, destruction, or disclosure and to meet emergency data processing
needs. Monitor use of data files and regulate access to safeguard information in
computer files.
Document and maintain a repository with version control of all policies, procedures and best practices
Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
Monitor use of data files and safeguard computer files against authorized access and unauthorized access
Modify computer security files to incorporate new software, correct errors or access changes
Perform risk assessments and execute tests of data processing system to ensure
functioning of data processing activities and security measures.
Encrypt data transmissions and erect firewalls to conceal confidential information as it
is being transmitted and to keep out tainted digital transfers.
Identify and track issues, risks and action items.
Document information security policies, standards, and procedures spanning and
encompassing the range of topics such as organization security, asset ID and
classification, personal security, communications and operations management,
access control, system development and maintenance, business continuity
management, and compliance.
Confer with users to discuss issues such as computer data access needs, security
violations, and programming changes.
Train users and promote security awareness to ensure system security and to
improve server and network efficiency.
Prior experience in the following are essential for the role:
Websense 7.8
E policy Orchestrator 4.6
Mc Afee email gateway (MEG) 7.6
Airwatch 8.0.6.0
Qualifications
SKILLS:
Prior hands on experience with Websense 7.8 and above
REQUIRED EXPERIENCE:
3 Years
SKILLS:
Prior hands on experience with E policy Orchestrator 4.6 and above
REQUIRED EXPERIENCE:
3 Years
SKILLS:
Prior hands on experience with Mc Afee email gateway (MEG) 7.6 and above
REQUIRED EXPERIENCE:
3 Years
SKILLS:
Prior experience monitoring use of data files and safeguard computer files against authorized access and unauthorized access
REQUIRED EXPERIENCE:
3 Years
SKILLS:
Prior hands on experience with Airwatch 8.0.6.0
REQUIRED EXPERIENCE:
3 Years
SKILLS:
Train users and promote security awareness to ensure system security and to improve server and network efficiency.
REQUIRED EXPERIENCE:
2 Years
Does the candidate have experience with any of the following products:
antivirus, SIEM, encryption tools, web content filtering, MDM. Please list
What versions of McAfee email gateway, Airwatch, EPolicy Orchestrator and Websense does the candidate possess?
Additional Information
Good comm skills are a big priority
Duration: 12+ months to renewal
Security Analyst
Cyber security analyst job in Moorestown, NJ
Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs
Position : Security Analyst (SIEM)
Location: Moorestown, NJ
Duration: Full Time
Job Description :
Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc.
Working knowledge of SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions
Windows and UNIX administration experience
Perl or Python scripting knowledge
Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity
Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers
Ability to work independently and within a team environment
Demonstrated ability to stay current with information security best practices, existing and emerging technology
Good oral communications and written communication skills
Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred
Thanks & Regards
Rahul Kumar
Additional Information
Contact "Rahul Kumar" for more details at ************ Ext :157
Cyber Security Engineer
Cyber security analyst job in Philadelphia, PA
Paragon Cyber Solutions is seeking a highly skilled and mission-driven Cyber Security Engineer to join our team in support of a critical defense program based at the Naval Surface Warfare Center Philadelphia Division (NSWCPD).
As the Cyber Security Engineer, you will play a central role in the development, implementation, and oversight of information security policies, procedures, and systems to ensure the integrity, confidentiality, and availability of mission-critical systems. You will provide strategic leadership for cybersecurity compliance across the program and support certification and accreditation activities in accordance with DoD and NIST frameworks.
Clearance
Active Secret Clearance
Requirements
Essential Functions
Conduct security assessments and audits using tools such as DISA eMASS and ACAS to identify vulnerabilities, evaluate controls, and ensure compliance with DoD standards.
Prepare and maintain security documentation, including System Security Plans (SSPs), risk assessments, and Plans of Action and Milestones (POA&Ms), to support accreditation and authorization processes.
Responsible for Assured Compliance Assessment Solution (ACAS) configuration, implementation, and scans.
Hands on configuration experience with ESXi, VMWare, Linux, Windows AD, SCAP, and remediating STIG findings.
Provide remediation of vulnerabilities identified on infrastructure devices.
Identify what cybersecurity STIG, checklist, or control requirements apply during the development of new components and software that is implemented into the enterprise infrastructure.
Knowledge of Identity, Credential, and Access Management (ICAM) and Zero Trust Architecture (ZTA) a plus.
Perform other duties as assigned.
Required Skills
Experience in implementing and enforcing application cybersecurity and vulnerability management.
Required Experience
Bachelor's degree in Cybersecurity, Information Technology, Computer Science or related field; or equivalent combination of education and experience.
Five (5) years or more of Cybersecurity related experience (hands on security engineering).
Assured Compliance Assessment Solution (ACAS) experience is mandatory.
Experience conducting Information Systems vulnerability assessment, risk mitigation, and application of mitigation strategies.
Understanding of RMF, eMASS, POA&Ms, ACAS, and Vulnerability Management.
Additional Eligibility Qualifications
DoD 8570 IAT II or IAM II Certified (Security+ CE or equivalent) required or higher.
Benefits
Health Care Plan (Medical, Dental & Vision).
Retirement Plan (401K w/ employer matching).
Paid Time Off & 11 Paid Holidays.
Short and Long-Term Disability.
Healthy Work-Life Balance.
Training & Development.
Why Work For Paragon Cyber Solutions?
You want to make a difference. You want to be recognized by name versus being a number. You want to work with a company where you can grow and work in different areas to increase your knowledge/experience. You have an entrepreneurial spirit and need to live it.
As a small business, each team member rolls up their sleeves and helps where needed (including our CEO). Our ideal candidate will be comfortable with multi-tasking and prefers working in a fast-paced, dynamic environment. You must be adaptable to the needs of a growing business.
A Model of Excellence
That's our motto in all we do and what we seek in our team members.
Are you a hardworking professional seeking a new opportunity that fosters growth? Look no further!
We are an award winning minority, woman, veteran-owned, 8(a), EDWOSB, VOSB, certified Tampa, FL-based small business. We pride ourselves on delivering high-quality solutions that help our clients protect the integrity of their business operations.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Specialist
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
Information Security Specialist (US) - GRC
Cyber security analyst job in Mount Laurel, NJ
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications:
* Experience leading assessments of audit and regulatory remediation plans, providing guidance on IT risk governance and compliance frameworks, developing governance oversight practices, identifying emerging risk themes, and leading continuous improvement projects using agile and AI technologies
* Expert knowledge of IT audit and control methodologies, project and change management skills, competencies in technology controls and emerging threats, and proficiency in Agile frameworks and AI-driven solution development
* 7 years of IT risk experience, preferably in regulated industries and financial services, with knowledge of IT governance frameworks like ITIL, NIST, and COBIT.
* Certifications such as CRISC, CISA, and optionally CISSP
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-Apply