Cyber security analyst jobs in North Brunswick, NJ - 153 jobs
All
Cyber Security Analyst
Information Security Analyst
Securities Analyst
Information Security Engineer
Cyber Security Engineer
Information Security Officer
Network Security Analyst
Security System Engineer
Senior Security Analyst
Chief Information Security Officer
Arma International 4.4
Cyber security analyst job in Princeton, NJ
Department Information Security Office Category Information Technology Job Type Full-Time
The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research.
The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements.
The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance.
Responsibilities
Strategic Planning and Policy Development
Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders.
Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations.
Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies.
Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office.
Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities.
Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications.
Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives.
As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture.
Management
Leads the overall management and success of a robust, current and expanding information security office.
Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan.
Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security.
Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs.
Training and Outreach
Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security.
Qualifications
Essential Qualifications:
At least 10 years of current experience directly related to the responsibilities of the role
Demonstrated domain expertise
A strategic grasp of information security at both institutional and operational levels
The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields
Communication and collaboration skills to build support for security-related initiatives and objectives
Experience in higher education or a research environment is preferred
Broad knowledge of computer security issues, requirements, and trends
Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation
Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse
Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment
Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents
The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university
The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable
Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment
Integrity and high standards of personal and professional conduct
Education :
Bachelor's degree required, preferably in computer science or information technology
Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials
Preferred Qualifications:
Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials
Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden.
Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law.
The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly.
If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above.
The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information.
Standard Weekly Hours
36.25
Eligible for Overtime
No
Benefits Eligible
Yes
Probationary Period
180 days
Essential Services Personnel (see policy for detail)
No
Physical Capacity Exam Required
No
Valid Drivers License Required
No
Experience Level
Director
Salary Range
$265,000 to $325,000
PI279427080
#J-18808-Ljbffr
$265k-325k yearly 2d ago
Looking for a job?
Let Zippia find it for you.
Network Security Analyst
Integrated Resources 4.5
Cyber security analyst job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network SecurityAnalyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
$92k-125k yearly est. 60d+ ago
Vice President, Cyber Security Engineer
CLS 4.8
Cyber security analyst job in Iselin, NJ
CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day.
Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use.
CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market.
Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment:
Pivotal purpose
Trusted guardian
Targeted innovation
Facilitate connections
Delivering excellence
Inclusive culture
Job information:
Functional title - CyberSecurity Engineer
Department - Security Engineering
Corporate level - Vice President
Report to - Director, Information Security Engineering
Location - New York / New Jersey - Metropark, onsite 2 days per week.
Expected full-time salary range between $140,000 - $180,000 + variable compensation + 401(k) match + benefits.
Note: Disclosure as required by NY Pay Transparency Law of the expected salary compensation range for this role.
Job Purpose
The CyberSecurity Engineering role is responsible for the delivery of security related activities and maintenance and enhancements of security solutions to improve the security posture of the CLS estate.
This individual will interact with the IT Security Architecture Team, IT Security Operations Team, Project Management Teams, global IT Teams, and outsourcing partners to deliver solutions that enhance the security program for CLS.
Essential Function / Major Duties and Job Responsibilities
Strategic
As part of the CLS Security Engineering team, develop and implement CLS security strategy in consultation with the CLS IT teams, ensuring that all initiatives are mirrored in respective strategies including the overall CLS Strategy.
Provide security advice and support for information technology projects.
Research new security related products and services to ensure that CLS is equipped with appropriate industry best of breed tools and solutions.
Operational
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc.
Review and help refine CLS Security procedures to ensure compliance with cyber resilience requirements.
Be responsible when assigned ownership of CLS Security related Regulatory and Internal Audit finding(s), and provide effective / timely resolution.
Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
Facilitate monitoring and enforcement of configurations, as well as manage and monitor security on systems deployed in the cloud in a similar fashion as is done on-premises at CLS.
Oversee design principles and controls relating to third party solution providers.
Leadership
Work as a team member and individual contributor being able to work independently and confidently without direct supervision.
Through example and behaviour, strive to provide peer leadership to other team members with the goal of being excellent service providers and enablers to other constituencies (both internal and external).
Strong communication (verbal and written) skills to engage with technical and non-technical audiences.
Ability to clarify technical detail and confidently communicate business risks to senior management.
Execute CLS Security Engineering team's vision and mission in alignment with the overall CLS Security vision and mission, as well as with CLS's strategic direction as it pertains to cyber resilience.
Experience / Essential and Desired for Successful Job Performance
A minimum of 5 years of information security experience with at least 2 years in cloud security.
Expert knowledge of one or more of the following: firewalls, TCP/IP, network IDS/IPS, host-based IDS/IPS, endpoint and network-based DLP, web proxies, email protection, endpoint protection software, SIEM
Sound knowledge of enterprise security concepts/frameworks and products, secure design principles and patterns
Monitor, tune and develop technical CLS Security controls and frameworks to ensure appropriate preparation, monitoring and response to threats
Ability to collaborate effectively with others to drive forward key security objectives
Strong documentation and report writing skills (to both technical and business audiences)
Excellent time management and organizational skills combined with technical CLS Security acumen
Financial and/or Banking industry experience preferred
Qualifications / Certifications
in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) or Security Certifications such as CISSP, SANS GIAC GSEC, GCED, GCIA, GCIH, GREM
Industry recognized cloud security qualifications (e.g. CCSK, CCSP, AWS Security Fundamentals, AWS Certified Security)
Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, NIST 800-53 and FFIEC handbook
Success Factors / Personal Characteristics Contributing to an Individual's Ability to Excel in the Position
Possess a strong service-oriented mind set to consistently deliver balanced security solutions that include people, process and technology.
Possess strong technical, analytical and problem-solving skills.
Self-motivated to exceed management expectations and objectives.
Ability to effectively communicate complex technical issues to both business and technical staff at all levels.
Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups.
Able to effectively cope with change and comfortably handle risk and ambiguity, not upset when things are up in the air.
Tenacious resolve and positive attitude in challenging situations
Our commitment to employees:
At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including:
Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days.
2 paid volunteer days so that you can actively support causes within your community that are important to you.
Generous parental leave policies to ensure you can enjoy valuable time with your family.
Parental transition coaching programmes and support services.
Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others.
Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity.
Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't.
Active support of flexible working for all employees where possible.
Monthly ‘Heads Down Days' with no meetings across the whole company.
Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees.
Private medical insurance and dental coverage.
Social events that give you opportunities to meet new people and broaden your network across the organisation.
Annual flu vaccinations.
Discounts and savings and cashback across a wide range of categories including health and retail for UK employees.
Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees.
All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning.
Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
$140k-180k yearly Auto-Apply 34d ago
SAVP-Cyber-Cloud and Application Security
EXL Talent Acquisition Team
Cyber security analyst job in Jersey City, NJ
This leader will serve as a key partner to engineering, development, architecture, cloud, infrastructure, and product teams-helping embed security into every layer of our delivery model while reducing business friction and maintaining velocity. The role also supports our broader enterprise security architecture and governance efforts through direct participation in architectural reviews and security advisory forums.
Minimum Requirements:
10+ years in cybersecurity with a focus on application and/or cloud security
5+ years of team leadership, with proven experience building and scaling security engineering functions
Execution experience and capability in a fast-paced environment
Demonstrated ability to balance strategic direction with hands-on technical execution
Strong expertise in secure SDLC, threat modeling, DevSecOps, and cloud-native architectures
Experience in securing modern technology stacks including Java, Python, microservices, container orchestration, and public cloud (preferably AWS)
Familiarity with key tooling: SAST, DAST, SCA, IaC scanning, secrets detection, CSPM, WAF, and API security platforms
Proficiency in cloud infrastructure security (IAM, networking, data protection, KMS, etc.)
Bachelor's degree in computer science, Cybersecurity, or a related technical field; advanced degree or certifications (e.g., CISSP, CSSLP, CCSP, AWS Security Specialty) preferred
Research and evaluate emerging privacy technologies from academia and industry, contributing to open-source tools and AI privacy standards
Act as consultant and advocate for privacy best practices as central to our mission of Responsible AI
Preferred Qualifications:
Strong communicator with the ability to positively influence engineers, developers, architects, and business leaders alike
Thoughtful, pragmatic, and able to execute in a high-velocity, agile environment
Deeply collaborative and experienced at embedding security into developer culture
Track record of reducing risk without slowing down innovation
Being articulate and precise to the internal stakeholders who are seeking counsel on what are the risks, why are they impactful, and options on how to resolve them
Broad knowledge across the Security domain, as well as demonstrated focus in AI security evaluations and in one (or more) areas of Cybersecurity such as Red Teaming, Purple Teaming, Vulnerability Research, and Exploitation
Master's degree (or foreign degree equivalent) in Information Systems Engineering, Computer Science, Engineering, Information Security, CyberSecurity, Information Assurance, or related field.
Salary Range: 125K-155K
For more information on benefits and what we offer please visit us at **************************************************
Major Deliverables:
Define and execute the security strategy for application and cloud environments, aligned to business priorities, delivery timelines, and compliance requirements
Lead by example with a strong hands-on presence in technology, tooling, program execution
Proactively identify, assess, and track vulnerabilities, control gaps, and architectural risks across products and cloud platforms
Prioritize remediation efforts based on risk, business impact, and threat intelligence-partnering with engineering teams to drive resolution
Provide real-time advisory to development teams during design, build, and release stages
Scale security guardrails and developer-friendly tooling across hybrid and cloud-native environments (AWS, containers, IaC, etc.)
Champion threat modeling, secure coding practices, and resilience-by-design at the feature level
Define and govern secure reference architectures and patterns for cloud adoption, microservices, and serverless environments
Collaborate with the Enterprise Architecture team and serve as a core member of the Security Architecture Review Board (SARB)
Deploy and optimize a modern security tooling stack including SAST, DAST, SCA, IaC scanning, CSPM, secrets detection, and runtime protection
Act as a key collaborator across product, engineering, infrastructure, and DevOps teams-reducing security friction and aligning controls with workflows
Build trust through enablement, education, and repeatable guidance frameworks
Lead, mentor, and grow a high-performing team of AppSec and CloudSec professionals
Foster a culture of innovation, ownership, and technical excellence within the team
Define and report on KPIs/KRIs tied to application and cloud security posture, remediation progress, and control maturity
Support compliance, audit, and customer security assurance initiatives
Bonus Points If You Have
Experience building or advising on AI/ML privacy practices, including model governance, training data management, or privacy risk mitigation in LLM pipelines.
Prior experience working in high-sensitivity or regulated industries, such as security, healthcare, or fintech.
Contributions to open source, policy working groups, or public thought leadership on privacy engineering.
$80k-109k yearly est. Auto-Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Newark, NJ
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$103k-141k yearly est. Easy Apply 5d ago
Security Analyst - Systems Operations
Adpcareers
Cyber security analyst job in Roseland, NJ
ADP is Hiring a SecurityAnalyst - Systems Operations
Unlock Your Career Potential:
Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data.
We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times.
From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
The position is required to work on weekends and 2
nd
US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice.
Well, this may be the role for you. Ready to make your mark?
The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO).
The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com
The Key Responsibilities for
Associate SecurityAnalyst in GCS Operations
are:
-Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage.
-Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support.
-Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests.
-Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure.
-Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings.
-Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem.
To Succeed In This Role-
You'll have a bachelor's degree or equivalent.
Preferred Qualifications-
-Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL.
-Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC.
-Scripting language (Linux Shell, Python, Powershell etc), SQL, etc.
-Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus.
-Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
$84k-119k yearly est. 2d ago
Security Analyst - Systems Operations
Blueprint30 LLC
Cyber security analyst job in Roseland, NJ
ADP is Hiring a SecurityAnalyst - Systems Operations
Unlock Your Career Potential:
Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data.
We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times.
From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
The position is required to work on weekends and 2
nd
US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice.
Well, this may be the role for you. Ready to make your mark?
The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO).
The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com
The Key Responsibilities for
Associate SecurityAnalyst in GCS Operations
are:
-Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage.
-Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support.
-Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests.
-Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure.
-Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings.
-Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem.
To Succeed In This Role-
You'll have a bachelor's degree or equivalent.
Preferred Qualifications-
-Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL.
-Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC.
-Scripting language (Linux Shell, Python, Powershell etc), SQL, etc.
-Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus.
-Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
$84k-119k yearly est. 2d ago
Information Security Analyst
Ra 3.1
Cyber security analyst job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
$91k-130k yearly est. Easy Apply 1d ago
Information Security Specialist
Ask It Consulting
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 1d ago
Intranet/Firewall Security Analyst
Procom Consultants Group 4.2
Cyber security analyst job in Jersey City, NJ
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Intranet/Firewall SecurityAnalyst
On behalf of our client, Procom Services is searching for a Intranet/Firewall SecurityAnalyst for a contract opportunity in Jersey City, New Jersey.
Intranet/Firewall SecurityAnalyst Job Details
• Analyze data and identify patterns to uncover risk attributes
• Assist with the development of Key Risk Indicator Dashboards
• Monitor various internal reporting channels for relevant events
• Maintain & Update Information Security Policy & Standard Library
• Maintain Information Security Intranet Portal
• Other duties as required
Intranet/Firewall SecurityAnalyst Mandatory Skills
A solid knowledge of metric and KRI development is necessary.
• Basic understanding of common information security risks and control processes
• Basic understanding of modern technical security controls (i.e. firewalls, SIEMS, IPS, HIPS, web proxies).
• Strong verbal and written communication skills, interpersonal and collaborative skills
• Minimum of five experience in the financial services industry and IT Security, Audit or Risk field
• CISSP, CISA, CEH certifications a plus
• Knowledge of several information security frameworks including: FFIEC, ISO 27001, COBIT, NIST 500 & 800
• Bachelor's degree in Computer Systems preferred
• Must exhibit poise and the ability to act calmly and competently in high pressure situations
• High level of personal integrity, as well as, the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
• A consummate team player
Intranet/Firewall SecurityAnalyst Start Date
ASAP
Intranet/Firewall SecurityAnalyst Assignment Length
5+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
$77k-102k yearly est. 60d+ ago
Need SSO Info Security Analyst
360 It Professionals 3.6
Cyber security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info SecurityAnalyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on
510-254-33-00 Ext. 130
$81k-105k yearly est. 1d ago
Security System Engineer
Network Mountain
Cyber security analyst job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
$78k-108k yearly est. 22d ago
Security Analyst / Architect
Deegit 3.9
Cyber security analyst job in Newark, NJ
• Key skills required for the job are: • SIEM - Security Information Event Management (Mandatory) • RSA Secure Access • Application Security Code Review - SAC • As a Consultant, you should have in-depth knowledge in any one technological or industry practice / functional area and overview of 2-3 other areas.
• You should handle solution definition/ fitment for a small sized project with a medium complexity.
• You should be able to build a custom Function Module with medium complexity program logic.
Additional Information
$70k-95k yearly est. 1d ago
Information Security Engineer
Vytalize Health
Cyber security analyst job in Hoboken, NJ
Your opportunity
As an Information Security Engineer, you play a critical role in designing and implementing security mechanisms to protect Vytalize data and information systems. Responsibilities involve assessing risks, designing information system security architecture. Performing regular control assessments to identify control deficiencies and coordinating security risk assessments across the ecosystem, audits or information security program certifications. Conducting third party information security risk assessments. Working as a team to respond and manage information security events.
What You Will Do
Incident Response
Assist in the testing of the incident response plans to effectively address and mitigate security breaches or compliance violations.
Assist in the testing of the business continuity plans and disaster recovery plan to effectively sustain business process and to effectively restore the operability of a system, application, or infrastructure to effectively restore the operability of a system, application, or infrastructure during and after a cyber incident disruption.
Responding and resolving information security events and escalation.
Security Architecture Design
Evaluate and assess security technologies, tools, and solutions to determine their suitability and effectiveness in addressing the organization's security needs.
Design cloud security strategies, and implement controls to protect data, applications, and infrastructure hosted in the cloud.
In coordination with the information security team, design security architecture to protect an organization's entire IT infrastructure, including networks, systems, applications, and data that align with business objectives and compliance requirements.
Risk Assessment and Audits
Maintain and monitor the cybersecurity risk register with the risks, risk ratings, risk mitigation strategies and action plans.
Assist with data gathering and coordination with the various teams for audits and risk assessments.
Training and Awareness
Monitor the training campaigns to demonstrate the effectiveness of the training program and improve phishing detection and response.
Supplier Risk
Conduct vendor risk assessments to identify and document potential supplier cybersecurity risks, threats, and vulnerabilities for management approval.
Develop a process for third-party compliance requests monitoring and tracking and ensure timely completion
Compliance Oversight
Collaborate with internal and external audit teams, providing documentation and evidence as needed to demonstrate compliance and adherence to the information security policies.
Develop and maintain a cybersecurity framework continuous assessment process to provide assurances that the controls in place are operating effectively.
Vulnerability Management
Monitor remediation of the vulnerability assessment findings, including penetration test, Collaboration and Communication
Collaborating with cross-functional teams
Communicate security risks, issues, and recommendations to senior management and stakeholders.
What will make you successful here
Work experience in the healthcare information security field.
Previous Health Information Technology (HIT) experience implementing controls to meet federal security and privacy regulations.
3+ years of relevant work experience in IT security in a complex enterprise environment, preferred.
Demonstrated knowledge of information technology processes, risks, infrastructure, and information security.
Experience with incident response and vulnerability management.
Knowledge of Health Insurance Portability and Accountability Act (HIPAA),
Health Information Technology for Economic and Clinical Health
(HITECH), and Payment Card Industry Data Security Standards (PCI DSS).
Experience with information security assessments and audits.
Strong written and verbal communication skills
Effective collaboration with stakeholders across departments and affiliated organizations.
Ability to analyze information system security design and recommended configuration.
Detailed oriented.
Preferred expertise in security assessment methodologies.
Ability to work effectively in a complex enterprise environment.
Perks/Benefits
Competitive base compensation
Annual bonus potential
Health benefits effective on start date
Health & Wellness Program; up to $300 per quarter for your overall well-being available on start date
401K plan effective on the first of the month after your start date; 100% of up to 4% of your annual salary
Unlimited (or generous) paid "Vytal Time", and 5 paid sick days after your first 90 days
Company paid STD/LTD
Technology setup
Ability to help build a market leader in value-based healthcare at a rapidly growing organization
*Please note at no time during our screening, interview, or selection process do we ask for additional personal information (beyond your resume) or account/financial information. We will also never ask for you to purchase anything; nor will we ever interview you via text message. Any communication received from a Vytalize Health recruiter during your screening, interviewing, or selection process will come from an email ending in @
vytalizehealth.com
*We fully embrace the power of AI and encourage innovative, responsible use of emerging technologies in our work. However, during the interview and assessment process, it's essential that we evaluate your individual skills, problem-solving ability, and technical mastery without external assistance.
Candidates must complete all interviews and assessments independently.
Use of AI tools, platforms, or automated assistance during interviews or assessments is not permitted. Unauthorized use will result in immediate disqualification from the hiring process and withdrawal of employment consideration.
Our goal is to ensure a fair and accurate assessment of your true capabilities-the same creativity and critical thinking we value once you join our team.
$78k-106k yearly est. Auto-Apply 4d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Lead Information Security Analyst - Identity
Adpcareers
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information SecurityAnalyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
$84k-119k yearly est. 2d ago
Lead Information Security Analyst - Identity
Blueprint30 LLC
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information SecurityAnalyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
$84k-119k yearly est. 2d ago
Information Security Specialist
Ask It Consulting
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 60d+ ago
Need SSO Info Security Analyst
360 It Professionals 3.6
Cyber security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info SecurityAnalyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
How much does a cyber security analyst earn in North Brunswick, NJ?
The average cyber security analyst in North Brunswick, NJ earns between $64,000 and $116,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in North Brunswick, NJ