Vice President, Application Cyber Security Specialist
Cyber security analyst job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Information Security Engineer
Cyber security analyst job in Iselin, NJ
We are seeking a high-judgment, detail-oriented operator to lead our Threat Modeling Program Operations. This individual will be responsible for orchestrating workflows, triaging intake, designing key metrics, and eliminating process inefficiencies. The role demands an expert in building executive-ready reports and dashboards to track throughput, cycle times, and model quality, ensuring optimal outcomes for complex, multifaceted initiatives in Information Security Engineering.
This is a contingent resource assignment, and the candidate may:
Consult on complex, large-scale initiatives in Information Security Engineering.
Review and analyze intricate, long-term security challenges, considering multiple factors including intangible or unprecedented elements.
Contribute to resolving complex issues requiring deep understanding of security policies, procedures, and compliance requirements.
Strategically collaborate with client personnel to ensure project success.
Key Responsibilities:
Lead and optimize workflow orchestration for the Threat Modeling Program.
Develop and manage reports and dashboards to monitor program effectiveness (throughput, cycle time, model quality).
Analyze and address complex security engineering issues, guiding teams to resolution.
Collaborate cross-functionally with stakeholders, delivering executive communication and reporting.
Continuously improve processes to eliminate inefficiencies and ensure scalability.
Required Qualifications:
5+ years of experience in Information Security Engineering or equivalent (consulting, training, military, education).
Proven ability to take initiative, work independently, and drive results.
Strong attention to detail and ability to handle ad hoc reporting.
Advanced skills in Microsoft Excel (VLookups & Pivot Tables) and PowerPoint.
Proficient with Agile methodologies and project management tools like Atlassian JIRA and Confluence.
Experience in analytical
Cloud Security Engineer - SRE
Cyber security analyst job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Director - Threat Detection Analyst
Cyber security analyst job in Edison, NJ
In the Technology division, we leverage innovation to build the connections and capabilities that power our Firm, enabling our clients and colleagues to redefine markets and shape the future of our communities. This is a Lead Data & Analytics Engineering position at the Director level, which is part of the job family responsible for providing specialist data analysis and expertise that drive decision-making and business insights as well as crafting data pipelines, implementing data models, and optimizing data processes for improved data accuracy and accessibility, including applying machine learning and AI-based techniques.
About the role:
The Director role within Fraud Detection Analytics performs a critical function within the Fraud Department, in safeguarding the organization against diverse fraud risks. This position is responsible for designing, implementing, and overseeing advanced analytics strategies to detect and mitigate fraudulent activities across multiple payment channels and fraud typologies, including account takeover (ATO), deposit fraud, scams, and emerging schemes. The ideal candidate combines deep technical expertise with strategic vision and strong communication skills to drive cross-functional collaboration and deliver actionable insights.
What you'll do in the role:
Develop and refine fraud detection controls and analytical frameworks targeting fraud risks such as ATO, deposit fraud, scams, and other typologies.
Monitor and analyze transaction channels (crypto, wire, ACH, Zelle, bill payments) for suspicious activity and emerging patterns.
Leverage data-driven insights by integrating internal data with external intelligence sources for proactive fraud detection.
Utilize SQL and advanced analytics to extract, analyze, and interpret large datasets to identify emerging fraud trends.
Apply predictive modeling, forecasting, and statistical methodologies to enhance operational efficiency and reporting.
Design and validate rules within the fraud rules engine, conducting rigorous pre- and post-production testing.
Continuously adjust controls based on observed trends to address evolving risks.
Identify automation opportunities to streamline manual processes related to data collection, metric calculation, and loss assessment.
Deliver business insights through dashboards and visualization tools (Tableau, SAS, Python, R) and produce on-demand reports.
Communicate key trends, findings, and actionable recommendations to management and stakeholders.
Prepare and present executive-level reports on suspicious activities and risk management.
Set and monitor KPIs for fraud detection, implementing mitigation strategies where needed.
Collaborate with Customer Service, Product Management, Engineering, and Data Science teams to enhance fraud detection tools and models.
Coordinate with Fraud Operations to align rule strategies with staffing resources.
Recommend and implement innovative technologies for fraud detection, prevention, and reporting.
What you'll bring to the role:
Minimum of 5+ years of experience in fraud analytics, financial crime, or risk management.
Bachelor's or Master's degree in Data Science, Computer Science, Finance, or related field.
Expert proficiency in SQL (including joins, subqueries, unions, temporary tables) for data extraction, analysis, and reporting.
Demonstrated experience designing and implementing fraud detection models, with a strong focus on account takeover, scam & first party fraud scenarios.
In-depth understanding of transaction exhaust methods (cryptocurrency, wires, ACH, Zelle, bill payments).
Strong analytical, problem-solving, and decision-making skills.
Excellent verbal and written communication skills, with the ability to present complex findings to non-technical audiences.
Experience working with large datasets and modern analytics tools (Python, R, Tableau, SAS).
Desired Skills:
Previous experience in banking, fintech, or payments industry.
Knowledge of regulatory requirements related to financial fraud and AML.
Familiarity with fraud monitoring tools and case management systems.
Ability to work in fast-paced, high-pressure environments and manage multiple priorities effectively.
Proven track record of leading successful fraud detection initiatives across multiple payment channels.
Advanced skills in statistical analysis and visualization platforms.
Experience collaborating with Data Science and Product teams to produce fraud risk models and meet business goals
WHAT YOU CAN EXPECT FROM MORGAN STANLEY:
We are committed to maintaining the first-class service and high standard of excellence that have defined Morgan Stanley for over 89 years. Our values - putting clients first, doing the right thing, leading with exceptional ideas, committing to diversity and inclusion, and giving back - aren't just beliefs, they guide the decisions we make every day to do what's best for our clients, communities and more than 80,000 employees in 1,200 offices across 42 countries. At Morgan Stanley, you'll find an opportunity to work alongside the best and the brightest, in an environment where you are supported and empowered. Our teams are relentless collaborators and creative thinkers, fueled by their diverse backgrounds and experiences. We are proud to support our employees and their families at every point along their work-life journey, offering some of the most attractive and comprehensive employee benefits and perks in the industry. There's also ample opportunity to move about the business for those who show passion and grit in their work.
To learn more about our offices across the globe, please copy and paste ***************************************************** into your browser.
Morgan Stanley's goal is to build and maintain a workforce that is diverse in experience and background but uniform in reflecting our standards of integrity and excellence. Consequently, our recruiting efforts reflect our desire to attract and retain the best and brightest from all talent pools. We want to be the first choice for prospective employees.
It is the policy of the Firm to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, creed, age, sex, sex stereotype, gender, gender identity or expression, transgender, sexual orientation, national origin, citizenship, disability, marital and civil partnership/union status, pregnancy, veteran or military service status, genetic information, or any other characteristic protected by law.
Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet).
Auto-ApplyNetwork Security Analyst
Cyber security analyst job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network Security Analyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
Lead Information Security Analyst - Identity
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Lead Information Security Analyst - Identity
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
Cyber Security Identity & Access Management Engineer
Cyber security analyst job in Elmwood Park, NJ
Job Title : Cyber Security Identity & Access Management Engineer Experience Required - 7+ Years Must Have Technical/Functional Skills * Deep understanding of Access Management - Authentication & Single Sign-On, authentication protocols like OAuth2.0, OpenID Connect and SAML2.0
* Experience with development of Transmit Security Journeys, WebSDK & scripting (AuthScript)
* Hands on experience in implementation of user authentication and authorization using Transmit Security
* Hands on with development and deployment of custom developed applications using Java/J2EE technologies.
* Hand on with development of REST API using Java Spring Framework
* Full understanding of HTTP Request/Response tracing, Session Handling
* Good understanding of Secure HTTP communication - client to server and server to server secure communication
* Good understanding of Java Spring Boot application development, deployment
* Good understanding of NoSQL databases like MongoDB, Casandra, etc.
* Good understanding of DevOps tools like Git, Eclipse/IntelliJ, Jenkins, Docker, Puppet, Kubernetes, Ansible, etc.
Non-Technical:
* Scheduling & Planning - should be able to plan and execute the deliverables as per the proposed design.
* Communication - Ability to communicate Up, Down, and Across All Levels of the Organization and Technical Backgrounds
* Detail Oriented - Good Understanding of IAM concepts
* Analytical, Self-motivated - Critical thinker who can analyze issues and is able to troubleshoot, along with the developers, to find root cause of the problem.
* Interpersonal skills and Professional demeanor - Respond to customer inquiries in a timely manner, guiding and advising customers on security best practices in a friendly customer facing manner.
* Team Player - Ability to work in a team & collaborate with other application team and infrastructure teams
* Problem-Solver - Processes tactical mitigations based on results of analysis and determination of issues found in the incident and issues found in inherited legacy systems.
Provide recommendation for improvements on the existing set up
Roles & Responsibilities
* Incident Triaging - Performing incident resolution through analysis and technology support
* Daily Health checks and Monitoring
* Operation status reports and metrics: Incident management, Service request management
* SLA Management for respond, restore and resolve, Troubleshooting and resolution of issues, Configuration Management, Enhancements, Product Vendor Connect, Platform Support
* Knowledge management - SOP creation and updates. Knowledge transition. Provide complete knowledge of system flow and interdependence between various internal and external systems.
* Auditing & Reporting - Support Health Equity in audits and provide Out-of-the-box reports
Project Management
Salary Range - $100,000 to $160,000 per year
TCS Employee Benefits Summary:
Discretionary Annual Incentive.
Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans.
Family Support: Maternal & Parental Leaves.
Insurance Options: Auto & Home Insurance, Identity Theft Protection.
Convenience & Professional Growth: Commuter Benefits & Certification & Training Reimbursement.
Time Off: Vacation, Time Off, Sick Leave & Holidays.
Legal & Financial Assistance: Legal Assistance, 401K Plan, Performance Bonus, College Fund, Student Loan Refinancing.
#LI-JS2
Information Security Analyst II (E5122)
Cyber security analyst job in Piscataway, NJ
The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports.
Key Responsibilities
Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Education
Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req
Work Experience
2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req
Licenses and Certifications
Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref
Skills and Requirements
Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response)
Knowledge or familiarity on conducting and mitigating security/risk assessments
Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.)
Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests).
Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool
Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & Solaris
Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:
As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================
Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Franklin Lakes, NJ
Information Security Analyst
Duration : 12 Months
Total Hours/week : 40.00
Client: Medical Device Company
Job Category: Operations/Technical
Level Of Experience: Senior Level
Employment Type: Contract on W2 (Need US Citizens Or GC Holders Only)
Job Description:
Information Security Analyst, Threat and Vulnerability Management
This role will focus on Tactical Intelligence and Vulnerability Management.
Threat and Vulnerability Management This person has experience in risk prioritization, navigating sources for identification and assessment of threats, and conducting cross-functional awareness for addressing risk.
They will have experience assisting with vulnerability scanning and analysis, threat intelligence tools and working across a matrixed environment to assess indicators and triage risk.
You will leverage a broad array of threat information. Additionally, you will proactively drive hunting and analysis and conduct technical research and analysis on emerging threats.
You are comfortable providing fact-based reports to various levels of the organization within a fast-paced environment.
You have previous tactical intelligence or vulnerability management experience, understand the fundamentals of reducing attack surfaces, and possess effective analytical skills.
You will be accountable for setting your own work direction and completing tasks.
Key Responsibilities (Top Tasks & Outcomes for Which This Position Will be Accountable)
Experience recognizing threats and conducting analysis on emerging threats and how they relate specifically to client
Provide written analysis of findings to communicate potential risks and impact
Experience in network security analysis and log-centric analysis (SIEM)
Understanding and reporting of attacker Indicators of Compromise
Monitoring intrusion detection systems and identifying host and network-based intrusions via intrusion detection technologies
Provide attack surface management training and development
Manage risk reporting and escalation to cross-functional teams in a cooperative manner
Other responsibilities as necessary
Perform risk identification and triage with incident management
Assist with additional projects as needed
Skills and Knowledge Required
Strong communication and project management skills
Requires a highly motivated, dynamic and customer-centric associate who thrives in a challenging and changing environment
Working knowledge of crisis management communication, incident response and handling methodologies, NIST cybersecurity standards and FDA cybersecurity guidance
Effective meeting management and group facilitation skills
Experience:
2-3 years' experience in a security operations full-time role
Educational
A minimum of a bachelor's degree required. Ideal candidate will have a degree in computer science, communication, or other technical discipline.
Knowledge, Skills & Abilities
In-depth knowledge of computer operating systems, including Windows, IoS and Linux a plus
Experience with intelligence tools and applications
Knowledge of Healthcare rubrics for vulnerability scoring and threat modelling
Preferred Certifications: CERT-Certified Computer Security Incident Handler Certification, CISSP, HCISSP
Detail-oriented with the ability to promptly assess documents for accuracy as well as consistency
Strong interpersonal skills with the ability to influence others in a positive and effective manner
Ability to work in a team environment
Excellent communication skills; both oral and written
Information Security Analyst II (E5122)
Cyber security analyst job in Piscataway, NJ
Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices.
This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place.
The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption.
The role reports to the Manager, Information Security and manages 0 direct reports.
Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering.
In lieu of a degree equivalent experience will be considered.
ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.
g.
Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment.
ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus.
PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.
) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.
e.
Self Service Access requests).
Good understanding of a programming language (e.
g.
Java, C, Perl), HTML/XML and Unix “shells” scripting (e.
g.
CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.
o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements.
This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================Disclaimer: This is proprietary to IEEE.
It outlines the general nature and key features performed by various positions that share the same job classification.
It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job.
Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
Min: $91,000.
00 Max: $114,000.
00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Dec 22, 2025, 4:20:40 PM
Auto-ApplyEmergency Response Team (ERT) Security Analyst
Cyber security analyst job in Mahwah, NJ
Emergency Response Team (ERT) Security Analyst - (250000AB) Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. At Radware, we live and breathe cybersecurity. It is our passion. Each day, our international team works to earn the trust of more than 12,500 organizations around the globe. Keeping them safe is our mission. To that end, we go head-to-head with politically motivated hacktivists, dangerous nation-state threat actors and other notorious cyber attackers - these are not your average adversaries. Backed by nearly 30 years of experience, Radware is best known for its technical excellence and innovative network and application security solutions. That is why it is so important that we build our team with bold and bright talent.
About the Team: The Security Analyst will join the Emergency Response Team in Radware's Managed Services business unit. The ERT Team provides immediate and direct security support for customers under attack, ensuring the continued functioning of protected services and, ultimately, customer satisfaction.
What is the job: The Emergency Response Team (ERT) Security Analyst fuels the success of customers by serving as the primary contact when timely assistance is needed the most. If you are an energetic, upstart engineer who enjoys working in a fast-paced environment and interacting with people under pressure, this could be the position for you. What you need: · At least 1 year experience in application security or Master's degree in Cyber Security· Good understanding of network design (e.g. LAN/WAN, switches/routers, routing protocols such as BGP and OSPF) and protocols (e.g., IPv4, TCP/IP, VPN, IPSec, HTTP, DNS)· Good understanding of and experience with security · Wireshark, Kali Linux· Customer and service oriented· Good troubleshooting and diagnosis capabilities· Willing to be on alert during off-work hours· Excellent communication skills and team work· Excellent time management, multi-tasking, and prioritization skills· Perceptive, fast learner, and able to perform well under pressure How can you stand out:· Experience in similar positions/companies· BSc/BA in Computer Science or equivalent· Knowledge in scripting language· Graduated Networking or Security courses Why you should join us:Employees from more than 40 countries have chosen Radware as a place where they can belong.Radware has been recognized by Glassdoor and BDI as one of the World's Best Places to Work, ranking among the top 100 companies across the globe in the IT category.Radware has also been named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards, by Forrester a Leader in DDoS Protection, and has been named a Leader in WAF Market by Quadrant Knowledge Solutions.We are equally committed to our people. We strive to create a dynamic work environment that celebrates diversity, promotes equality, and thrives on the unique contributions of each individual.If you are ready to be part of a global-minded company that is inspired to create a better, safer future; and if and want to fight for the good guys and be at the forefront of helping companies protect their most critical assets from today's cyber adversaries, then you've found the right fit at Radware.Salary Range: $93k-$118k#LI-TM1Primary Location: US-NJ-MahwahWork Locations: Radware US, New Jersey Mahwah 575 Corporate Drive Lobby 1 Mahwah 07430Job: Cloud and ManagementRefer a friend for this job Tell us about a friend who might be interested in this job. All privacy rights will be protected.Refer a friend
Auto-ApplyEmergency Response Team (ERT) Security Analyst
Cyber security analyst job in Mahwah, NJ
Radware is a global leader of cyber security and application delivery solutions for physical, cloud, and software defined data centers. At Radware, we live and breathe cybersecurity. It is our passion. Each day, our international team works to earn the trust of more than 12,500 organizations around the globe. Keeping them safe is our mission. To that end, we go head-to-head with politically motivated hacktivists, dangerous nation-state threat actors and other notorious cyber attackers - these are not your average adversaries. Backed by nearly 30 years of experience, Radware is best known for its technical excellence and innovative network and application security solutions. That is why it is so important that we build our team with bold and bright talent.
About the Team: The Security Analyst will join the Emergency Response Team in Radware's Managed Services business unit. The ERT Team provides immediate and direct security support for customers under attack, ensuring the continued functioning of protected services and, ultimately, customer satisfaction.
What is the job: The Emergency Response Team (ERT) Security Analyst fuels the success of customers by serving as the primary contact when timely assistance is needed the most. If you are an energetic, upstart engineer who enjoys working in a fast-paced environment and interacting with people under pressure, this could be the position for you.
What you need:
* At least 1 year experience in application security or Master's degree in Cyber Security
* Good understanding of network design (e.g. LAN/WAN, switches/routers, routing protocols such as BGP and OSPF) and protocols (e.g., IPv4, TCP/IP, VPN, IPSec, HTTP, DNS)
* Good understanding of and experience with security
* Wireshark, Kali Linux
* Customer and service oriented
* Good troubleshooting and diagnosis capabilities
* Willing to be on alert during off-work hours
* Excellent communication skills and team work
* Excellent time management, multi-tasking, and prioritization skills
* Perceptive, fast learner, and able to perform well under pressure
How can you stand out:
* Experience in similar positions/companies
* BSc/BA in Computer Science or equivalent
* Knowledge in scripting language
* Graduated Networking or Security courses
Why you should join us:
Employees from more than 40 countries have chosen Radware as a place where they can belong.
Radware has been recognized by Glassdoor and BDI as one of the World's Best Places to Work, ranking among the top 100 companies across the globe in the IT category.
Radware has also been named a Gold Winner for Application Security in the 2023 Globee Cybersecurity Awards, by Forrester a Leader in DDoS Protection, and has been named a Leader in WAF Market by Quadrant Knowledge Solutions.
We are equally committed to our people. We strive to create a dynamic work environment that celebrates diversity, promotes equality, and thrives on the unique contributions of each individual.
If you are ready to be part of a global-minded company that is inspired to create a better, safer future; and if and want to fight for the good guys and be at the forefront of helping companies protect their most critical assets from today's cyber adversaries, then you've found the right fit at Radware.
Salary Range: $93k-$118k
#LI-TM1
Need SSO Info Security Analyst
Cyber security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info Security Analyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on
510-254-33-00 Ext. 130
Security Analyst / Architect
Cyber security analyst job in Newark, NJ
• Key skills required for the job are: • SIEM - Security Information Event Management (Mandatory) • RSA Secure Access • Application Security Code Review - SAC • As a Consultant, you should have in-depth knowledge in any one technological or industry practice / functional area and overview of 2-3 other areas.
• You should handle solution definition/ fitment for a small sized project with a medium complexity.
• You should be able to build a custom Function Module with medium complexity program logic.
Additional Information
Security System Engineer
Cyber security analyst job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Forefront Identity Management Security (FIMS) Analyst
Cyber security analyst job in Franklin Lakes, NJ
Energy. It defines LanceSoft. Consider our unique ‘keep apace' operational culture, the spirited lot of hand-picked professionals, our ‘up-to-the-minute' knowledge base, together they form a dynamic mix of value-generating characteristics that help us delve into the heart of a problem to deliver precise services and solutions - repeatedly.
In business since 2000, LanceSoft is a reputed and credible Contingent Workforce Management Services firm that has established itself as a pioneer in providing highly scalable workforce solutions and exceptionally competent global IT services to a diverse set of customers across various industries around the globe. LanceSoft is headquartered out of the Washington DC Metropolitan (Herndon, VA) and operates out of various locations in the US, Canada and India
Job Description
The associate would join a project team responsible for critical Identity and Access Management projects utilizing Forefront Identity Manager to facilitate process automation. - The team member would be responsible for: o Quickly learning BD's onboarding and termination automated procedures. o Providing End User Training and Support for Forefront Identity Manager processes. o Documenting and training IT staff on Forefront Identity Manager processes. o Facilitate and execute testing of new ForeFront Identity Manager functionality (additional source systems, workflows, roles and permissions). o Facilitate global Active Directory data integrity remediation of User and Group objects.
Qualifications
Strong Identity and Access Management foundation in Active Directory and Forefront Identity Manager. SAP GRC and ABAP security design is a nice to have. - Excellent Powershell, LDAP or equivalent scripting and reporting skills including heavy Microsoft Excel and CSV based Extract, Transform and Load operations. - Excellent verbal and written communication skills. - Must have hands on experience implementing large FIM projects - Must have strong technical writing capabilities related to FIM
Additional Information
Looking for a candidate who has strong Active Directory Reporting. BD is doing a massive clean up in Active Directory .
Also this candidate must be able to do training for new customers and have good communication skills.
Vice President, Cyber Security Engineer
Cyber security analyst job in Iselin, NJ
CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day.
Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use.
CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market.
Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment:
Pivotal purpose
Trusted guardian
Targeted innovation
Facilitate connections
Delivering excellence
Inclusive culture
Job information:
Functional title - Cyber Security Engineer
Department - Security Engineering
Corporate level - Vice President
Report to - Director, Information Security Engineering
Location - New York / New Jersey - Metropark, onsite 2 days per week.
Expected full-time salary range between $140,000 - $180,000 + variable compensation + 401(k) match + benefits.
Note: Disclosure as required by NY Pay Transparency Law of the expected salary compensation range for this role.
Job Purpose
The Cyber Security Engineering role is responsible for the delivery of security related activities and maintenance and enhancements of security solutions to improve the security posture of the CLS estate.
This individual will interact with the IT Security Architecture Team, IT Security Operations Team, Project Management Teams, global IT Teams, and outsourcing partners to deliver solutions that enhance the security program for CLS.
Essential Function / Major Duties and Job Responsibilities
Strategic
As part of the CLS Security Engineering team, develop and implement CLS security strategy in consultation with the CLS IT teams, ensuring that all initiatives are mirrored in respective strategies including the overall CLS Strategy.
Provide security advice and support for information technology projects.
Research new security related products and services to ensure that CLS is equipped with appropriate industry best of breed tools and solutions.
Operational
Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc.
Review and help refine CLS Security procedures to ensure compliance with cyber resilience requirements.
Be responsible when assigned ownership of CLS Security related Regulatory and Internal Audit finding(s), and provide effective / timely resolution.
Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc.
Facilitate monitoring and enforcement of configurations, as well as manage and monitor security on systems deployed in the cloud in a similar fashion as is done on-premises at CLS.
Oversee design principles and controls relating to third party solution providers.
Leadership
Work as a team member and individual contributor being able to work independently and confidently without direct supervision.
Through example and behaviour, strive to provide peer leadership to other team members with the goal of being excellent service providers and enablers to other constituencies (both internal and external).
Strong communication (verbal and written) skills to engage with technical and non-technical audiences.
Ability to clarify technical detail and confidently communicate business risks to senior management.
Execute CLS Security Engineering team's vision and mission in alignment with the overall CLS Security vision and mission, as well as with CLS's strategic direction as it pertains to cyber resilience.
Experience / Essential and Desired for Successful Job Performance
A minimum of 5 years of information security experience with at least 2 years in cloud security.
Expert knowledge of one or more of the following: firewalls, TCP/IP, network IDS/IPS, host-based IDS/IPS, endpoint and network-based DLP, web proxies, email protection, endpoint protection software, SIEM
Sound knowledge of enterprise security concepts/frameworks and products, secure design principles and patterns
Monitor, tune and develop technical CLS Security controls and frameworks to ensure appropriate preparation, monitoring and response to threats
Ability to collaborate effectively with others to drive forward key security objectives
Strong documentation and report writing skills (to both technical and business audiences)
Excellent time management and organizational skills combined with technical CLS Security acumen
Financial and/or Banking industry experience preferred
Qualifications / Certifications
in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) or Security Certifications such as CISSP, SANS GIAC GSEC, GCED, GCIA, GCIH, GREM
Industry recognized cloud security qualifications (e.g. CCSK, CCSP, AWS Security Fundamentals, AWS Certified Security)
Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, NIST 800-53 and FFIEC handbook
Success Factors / Personal Characteristics Contributing to an Individual's Ability to Excel in the Position
Possess a strong service-oriented mind set to consistently deliver balanced security solutions that include people, process and technology.
Possess strong technical, analytical and problem-solving skills.
Self-motivated to exceed management expectations and objectives.
Ability to effectively communicate complex technical issues to both business and technical staff at all levels.
Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups.
Able to effectively cope with change and comfortably handle risk and ambiguity, not upset when things are up in the air.
Tenacious resolve and positive attitude in challenging situations
Our commitment to employees:
At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including:
Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days.
2 paid volunteer days so that you can actively support causes within your community that are important to you.
Generous parental leave policies to ensure you can enjoy valuable time with your family.
Parental transition coaching programmes and support services.
Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others.
Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity.
Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't.
Active support of flexible working for all employees where possible.
Monthly ‘Heads Down Days' with no meetings across the whole company.
Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees.
Private medical insurance and dental coverage.
Social events that give you opportunities to meet new people and broaden your network across the organisation.
Annual flu vaccinations.
Discounts and savings and cashback across a wide range of categories including health and retail for UK employees.
Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees.
All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning.
Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Roseland, NJ
ADP is hiring a Lead Cloud Security Analyst in our Roseland, NJ office. This is a hybrid role.
As a Lead Cloud Security Analyst, you will join a highly skilled team providing world-class infrastructure and network security assessments and security consultation for ADP's Global Security Organization (GSO). This team is responsible for the execution of ADP's global Compliance and Vulnerability Management Program (CVM) program for infrastructure and network across Cloud and on-premises locations.
Services provided to the organization include Vulnerability management program management including Zero-day vulnerability response & Secure OS Build Compliance for cloud/container infrastructure as well as on-premises servers/endpoints.
You will focus on supporting CVM Cloud initiatives by leveraging a variety of security tools. Working closely with product and technology teams, with your knowledge of industry standards, you will be ensuring our infrastructure meets and maintains the requirements of our CVM security program.
To succeed in this position, you'll need knowledge and experience in securing cloud environments (AWS is a MUST) and in developing or being a part of a vulnerability management program working with a variety of product/DevOps teams.
Experience with the use of security tools for scanning and detection coupled with the ability to analyze the results across a large data set using database and scripting tools. Balance that with ability to stay ahead of threats and security trends while refining processes in a rapidly changing environment to drive and evolve the program.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
WHAT YOU'LL DO:
Here's what you can expect on a typical day in the life of a Lead Cloud Security Analyst at ADP.
Develop: Using existing tools, leverage available data to prioritize what should be addressed to reduce risk in the environment.
Measure: Develop metrics to track and show the performance of the program.
Communicate: From working with technical teams to understand/solve security issues to summarizing status for senior management.
Challenges: Across hundreds of products and a large global infrastructure, no day is the same and we must be prepared to respond to challenges presented.
Risk Management: Understand and evaluate/respond to risks/vulnerabilities and how to mitigate them.
Experience You'll Need:
Deep understanding of information security specifically in the realm of vulnerability management (VM)
Deep understanding of Cloud Security (AWS - Must, Other Cloud environments - Preferred)
Experience managing/building VM programs - defining and building metrics, automation of response and remediation (guidance)
Strong analytical/problem solving skills and cross functional knowledge across multiple development and security disciplines.
Understanding of security and compliance tools such as Qualys, Crowdstrike etc.
Experience working with CSPM tools such as Wiz, Prisma, Dome9/Cloudguard, etc.
Ability to communicate security-related concepts to a broad range of technical and non-technical staff.
Experience in scripting languages (Python - Preferred) and SQL Queries (Strong emphasis on Data Analytics)
To Succeed in This Role:
You'll have a bachelor's degree OR equivalent.
Any of the following are a plus but not necessary: CISSP, CISM, etc.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Information Security Analyst II (E5122)
Cyber security analyst job in Piscataway, NJ
The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports.
Key Responsibilities
* Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
* Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
* Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
* Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
* Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
* Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
* Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
* Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
* Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
* Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
* Assists in the formulation and enforcement of security policies and procedures.
Education
* Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req
Work Experience
* 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req
Licenses and Certifications
* Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref
Skills and Requirements
* Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response)
* Knowledge or familiarity on conducting and mitigating security/risk assessments
* Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.)
* Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
* Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
* Knowledge and experience Windows Active Directory.
* Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests).
* Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix "shells" scripting (e.g. CSH, KSH, SH).
* Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool
* Ability to work alone and build relationships across the organization.
* Anticipates problems and identifies long-term implications of decisions and actions.
* Familiarity with server operating systems, such as; Windows, Linux & Solaris
* Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
* Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
* Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:
As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================
Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.