Post job

Cyber security analyst jobs in South River, NJ - 371 jobs

All
Cyber Security Analyst
Information Security Analyst
Cyber Security Engineer
Security Engineer
Senior Security Analyst
Information Security Officer
Defense Analyst
  • Senior Security Analyst

    Capgemini 4.5company rating

    Cyber security analyst job in New York, NY

    Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired bya collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizationsunlock the value of technology and build a more sustainable, more inclusive world. The Senior Security Analyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client. Responsibilities Handles monthly reporting duties for the Information Risk Management team. Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress. Has familiarity with security technologies and controls; expertise not required, but the ability to escalate to more senior subject matter experts is important. Develops work plans to structure solutions and communications. Involves client and vendor staff appropriately in resolving security problems. Participates effectively within the business' security governance framework. Tracks the corrective and preventive actions being taken to improve security to closure. Possesses strong communication skills to communicate technical and security risk information to management. Experience Ability to self-manage with little interaction from other management staff. Flexible and able to adapt to manage a fast‑changing environment. Ability to solve complex issues and provide recommendations and advice regarding remediations. Experience with security architecture, security software, or security policy. Ability to organize agendas, lead conference calls, and track action items to completion. Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security+ are preferred. Job Description - Grade Specific The base compensation range for this role in the posted location is: $65,586-121,980. Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law. The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction. These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity. It is not typical for candidates to be hired at or near the top of the posted compensation range. In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws. Capgemini offers a comprehensive, non‑negotiable benefits package to all regular, full‑time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include: Paid time off based on employee grade (A-F), defined by policy: Vacation: 12‑25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave Medical, dental, and vision coverage (or provincial healthcare coordination in Canada) Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada) Life and disability insurance Employee assistance programs Other benefits as provided by local policy and eligibility Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation. Disclaimers Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law. Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact. Ref. code 385096-en_US Posted on 05 Jan 2026 Contract type Permanent Location Atlanta, Austin, Bellevue, Berwyn, Bridgewater, Brooklyn, Burlington, Chicago, Columbia, Dallas, Dayton - Sogeti US, Guaynabo, Houston, Irving, Mclean, Nashville, New York, San Francisco, Santa Clara, Seattle, Southfield, Tampa, Westerville #J-18808-Ljbffr
    $65.6k-122k yearly 4d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security Engineer

    Beocom Technologies, LLC

    Cyber security analyst job in New York, NY

    We need a Cyber Security Engineer who's ready to defend against evolving digital threats. You'll design and implement enterprise-grade security controls, perform vulnerability assessments, and respond to incidents - keeping client and company data safe. You'll work closely with infrastructure and application teams to ensure security is baked into every layer of our technology stack. Your expertise will directly reduce risks, maintain compliance, and protect critical business assets. Requirements Full-time position with occasional after-hours incident response. Ability to travel for on-site security assessments if required. Dedication to staying informed on new attack vectors and mitigation techniques. Qualifications Experience: 5+ years in a cybersecurity engineering role. Education: Bachelor's degree in Cybersecurity, Computer Science, or related field. Certifications: CISSP, CEH, or Security+ preferred. Proven track record in threat detection and incident handling. Technical Skills Proficiency with SIEM platforms, IDS/IPS, firewalls, and endpoint protection. Strong knowledge of vulnerability scanning and penetration testing tools. Familiarity with compliance frameworks like NIST, ISO 27001, or PCI DSS. Expertise in identity management and secure access control. Professional Skills Analytical mindset with strong attention to detail. Ability to act decisively under pressure. Excellent documentation and reporting skills. Benefits Competitive salary and security certification reimbursements. Access to cutting-edge cybersecurity tools. Comprehensive benefits package. Growth path to senior leadership roles in security. #J-18808-Ljbffr
    $80k-109k yearly est. 6d ago
  • NG911 - Cyber Security Tools Implementation Engineer

    V Group Inc. 4.2company rating

    Cyber security analyst job in New York, NY

    Duration: 11+ Months Contract Contract Interview Type: In-person Scheduled Work Hours: Normal business hours Monday-Friday 35 hours/week (not including mandatory unpaid meal break after 6 hours of work). Requirement ID: NYC_OT735_SS contact Sandeep @ ********************** Job Description Justification: This request is for an NG911 Subject Matter Expert (SME) needed to continue the project work for the Class 1/2/3 and Call Handling upgrades of the Next Generation 9-1-1 emergency call system and provide expertise and technical knowledge during the configuration and test phases. NG911 - Cyber Security Tools Implementation Engineer Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management. Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP. Support for application development and database administration. Provide support for Email, DNS, AND Remote access solutions. Deploy appropriate network security solutions. Note: Normal Business Hours, Monday through Friday (not including a mandatory unpaid meal break after 6 hours of work), 35 work hours per week. If the consultant works more than 35 hours per week, the consultant must request overtime in the Agency's timekeeping system, and the project manager must approve those hours worked above the weekly maximum. SCOPE OF SERVICES: NG911 - Cyber Security Tools Implementation Engineer Implement solutions for DNS, Email, remote access configuration, integration, performance monitoring, and security management. Test Next Generation firewall platforms, host operating systems, and applications such as LDAP, SMTP. Support for application development and database administration. Provide support for Email, DNS, AND Remote access solutions. Deploy appropriate network security solutions. MANDATORY SKILLS/EXPERIENCE Note: Candidates who do not have the mandatory skills will not be considered At least 12 years of experience in an enterprise data center environment to plan, design, and install network & security infrastructure systems for public safety. 3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies CISSP or other industry Cyber Security Certification Experience migrating DNS to a new platform. Experience participating in the design and implementation of a DMZ and all associated requirements for monitoring external threats. Experience with security infrastructure and implementation of perimeter network security components such as Next Generation firewalls. DESIRABLE SKILLS/EXPERIENCE: 3+ years working experience with IBM QRadar SEIM solution integration with Cascade, Firemon, and Citrix & other critical security service technologies CISSP or other industry Cyber Security Certification Experience migrating DNS to a new platform. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- V Group Inc. is an IT Services company which supplies IT staffing, project management, and delivery services in software, network, help desk and all IT areas. Our primary focus is the public sector including state and federal contracts. We have multiple awards/ contracts with the following states: CA, FL, GA, MD, MI, NC, NY, OH, OR, PA, VA, VT, and WA. If you are considering applying for a position with V Group, or in partnering with us on a position, please feel free to contact me for any questions you may have regarding our services and the advantages we can offer you as a consultant. Please share my contact information with others working in Information Technology.
    $81k-109k yearly est. 4d ago
  • Chief Information Security Officer

    Arma International 4.4company rating

    Cyber security analyst job in Princeton, NJ

    Department Information Security Office Category Information Technology Job Type Full-Time The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research. The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements. The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance. Responsibilities Strategic Planning and Policy Development Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders. Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations. Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies. Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office. Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities. Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications. Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives. As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture. Management Leads the overall management and success of a robust, current and expanding information security office. Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan. Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security. Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs. Training and Outreach Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security. Qualifications Essential Qualifications: At least 10 years of current experience directly related to the responsibilities of the role Demonstrated domain expertise A strategic grasp of information security at both institutional and operational levels The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields Communication and collaboration skills to build support for security-related initiatives and objectives Experience in higher education or a research environment is preferred Broad knowledge of computer security issues, requirements, and trends Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment Integrity and high standards of personal and professional conduct Education : Bachelor's degree required, preferably in computer science or information technology Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials Preferred Qualifications: Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden. Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law. The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly. If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above. The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information. Standard Weekly Hours 36.25 Eligible for Overtime No Benefits Eligible Yes Probationary Period 180 days Essential Services Personnel (see policy for detail) No Physical Capacity Exam Required No Valid Drivers License Required No Experience Level Director Salary Range $265,000 to $325,000 PI279427080 #J-18808-Ljbffr
    $265k-325k yearly 6d ago
  • Staff AI Security Engineer - Secure-by-Default & AI Defense

    The Browser Company

    Cyber security analyst job in New York, NY

    A tech company focused on browser innovations is seeking a Security Software Engineer in New York. This role involves designing and shipping security features, ensuring the product's security architecture is robust against AI-driven risks, and requires strong coding skills in languages such as Golang or Python. The ideal candidate will have over 5 years of experience in security engineering, will collaborate with multiple teams, and will enjoy a supportive, diverse workplace. #J-18808-Ljbffr
    $90k-124k yearly est. 6d ago
  • Cyber Security Analyst

    Zone It Solutions

    Cyber security analyst job in New York, NY

    Job Description We is seeking a talented Cyber Security Analyst. As a Cyber Security Analyst, you will play a key role in ensuring the security and integrity of our organization's data and systems. Requirements Responsibilities: Monitor, detect, and respond to cyber threats and security incidents, Conduct vulnerability assessments and penetration testing to identify potential weaknesses in our systems, Develop and implement security measures and best practices to protect against cyber attacks, Stay up-to-date with the latest cyber security trends and technologies, Collaborate with cross-functional teams to identify security risks and implement appropriate solutions, Provide training and guidance to employees on cyber security awareness and best practices. Requirements: Bachelor's degree in Computer Science, Information Security, or a related field, Proven experience in cyber security or a related role, Strong knowledge of security protocols and tools, Ability to analyze and interpret complex data and make informed decisions, Excellent problem-solving and communication skills, Relevant certifications (e.g. CISSP, CISM) are preferred but not required. Benefits About Us Zone IT Solutions is an Australia-based Recruitment Company. We specialise in Digital, ERP and larger IT Services. We offer flexible, efficient and collaborative solutions to any organisation that requires IT, experts. Our agile, agnostic and flexible solutions will help you source the IT Expertise you need. If you are looking for new opportunities, your profile at *******************************. Also, follow our LinkedIn page for new job opportunities and more. Zone IT Solutions is an equal-opportunity employer, and our recruitment process focuses on essential skills and abilities.
    $80k-109k yearly est. Easy Apply 10d ago
  • Cyber Command Forensic Analyst

    Govserviceshub

    Cyber security analyst job in New York, NY

    Job Title: Cyber Command Forensic Analyst SCOPE OF SERVICES: The forensics Analyst will investigate network intrusions and other cyber incidents to determine cause, extent and consequences of the breach. TASKS: · Research and develop new techniques, and procedures to continually improve the digital forensics process. · Produce high quality written work product presenting complex technical issues clearly and concisely. · Managing and maintaining the analysis labs and forensics tools leveraged for investigations. · Ensuring data is collected and preserved within industry standard best practices and in alignment evidence integrity requirements. · Assisting the Cyber Emergency Response Team during critical incidents. · Investigate network intrusions and other cybersecurity incidents to determine the cause and extent of the breach. Includes ability to perform host -based and network -based forensic analysis. MANDATORY SKILLS/EXPERIENCE: · Minimum 4 years of experience in Threat Management/Forensics Investigations/Incident Response environment · Proficient in performing digital forensic investigations on a variety of platforms and operating systems with a deep understanding of digital forensics processes and tools. Requirements DESIRABLE SKILLS/EXPERIENCE: · Experience with a wide range of forensic tools (FTK, X -Ways, SIFT, AXIOM, EnCase, etc.) · Experience with memory analysis tools (i.e. Volatility, MemProcFS) · Experience with Linux and open source tools · Experience investigating intrusions on Windows and Linux/Unix operating systems · Experience with performing forensics collections in cloud environments (AWS, Azure, GCP) · Knowledge of gathering, accessing, and assessing evidence from computer systems and electronic devices · Knowledge of virtual environments · Knowledge of forensic imaging techniques · Knowledge of Microsoft Windows operating system and Windows artifacts · Knowledge of Linux/UNIX operating systems and artifacts · Knowledge of mac OS operating system and forensics artifacts · Knowledge of file systems · Strong analytical skills Skills: · Incident Management · Threat Management · Cyber Security
    $80k-109k yearly est. 34d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Cyber security analyst job in New York, NY

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $86k-112k yearly est. Auto-Apply 6d ago
  • Experienced Analyst - Strategic, Defense, and Shareholder Advisory

    Evercore Inc. 4.9company rating

    Cyber security analyst job in New York, NY

    Primary Responsibilities: The Analyst will provide value add analysis and research as part of the Strategic, Defense, and Shareholder Advisory team within the Advisory business. In this role, the Analyst will create client presentations regarding hostile activity, proxy fights, shareholder activism, and corporate governance. The Analyst will work on live activism and raid defense situations, as well as create materials for use in client presentations, internal meetings, and marketing initiatives. The Analyst will work in a team environment within Evercore's Strategic, Defense, and Shareholder Advisory practice. Responsibilities include, but are not limited to the following: * Create materials related to shareholder activism, hostile activity, shareholder engagement and corporate governance for use in client presentations, internal meetings and marketing initiatives * Support live engagements, including proxy fights and raid defense situations, contested M&A and special committee assignments * Perform research and analysis to identify company's potential vulnerabilities to activist shareholders or potential acquirors * Monitor relevant trends and regulatory developments * Collaborate closely with senior bankers and other internal teams on strategic mandates Specific Qualifications: * Graduate of Class of 2024 through Class of 2025 * Relentless work ethic and high energy level * An excellent, team-based atttiude * Excellent communication skills (written and verbal) * Proficient in Microsoft Office, specifically Excel * Exceptional attention to detail * Calm under pressure with a demonstrated track record of successfully managing multiple projects simultaneously * Intellectual curiosity and an interest in finance Expected Base Salary Range: $120,000-$140,000. In addition to a competitive base salary, employees may be eligible to receive a discretionary bonus delivered in the form of cash and/or deferred equity. Evercore also offers a variety of benefits and programs, subject to eligibility. These include, but are not limited to: * Medical, prescription, dental, and vision insurance, including healthcare savings and reimbursements accounts * 401(k) Retirement Plan * Life and disability insurance, including additional voluntary financial protection insurance * Well-being resources and programs, including mental health and mindfulness programs, digital wellness platforms, well-being events, and targeted on-site health services * Family-building and family-support benefits * Paid parental, caregiver, marriage and bereavement leave * Commuter benefits, health club membership discounts, and other corporate discounts * Paid holidays, vacation days, personal days, sick days, and volunteer opportunities About Evercore: Evercore (NYSE: EVR) is a premier global independent investment banking advisory firm. We are dedicated to helping our clients achieve superior results through trusted independent and innovative advice on matters of strategic significance to boards of directors, management teams, and shareholders - including mergers and acquisitions, shareholder advisory, restructurings, and capital structure. Evercore also assists clients in raising public, private capital, delivers equity research, equity sales and agency trading execution, in addition to providing wealth and investment management services to high-net-worth individuals. Founded in 1995, the Firm is headquartered in New York and maintains offices and affiliate offices in major financial centers in North America, Europe, the Middle East, and Asia. For more information, please visit ***************** Inclusion and Equal Opportunity Employment: Evercore is an equal employment opportunity employer and does not discriminate against individuals because of actual or perceived race, color, creed, religion, sex, pregnancy, national origin or ancestry, mental or physical disability, age, veteran status, military status, citizenship status, sexual orientation, gender identity or expression, genetic information, or immigration or citizenship status, or any other characteristic protected by applicable law (referred to as "protected status"), in accordance with applicable federal, state and local laws.
    $120k-140k yearly 13d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Cyber security analyst job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $84k-119k yearly est. Auto-Apply 20d ago
  • Security Analyst - Systems Operations

    Adpcareers

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 3h ago
  • Security Analyst - Systems Operations

    Blueprint30 LLC

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 3h ago
  • Information Security Analyst

    Ra 3.1company rating

    Cyber security analyst job in Jersey City, NJ

    Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you! They are an equal opportunity employer and value diversity at our company. Job Description Strong knowledge of Information Security concepts such as: •Encryption, Cloud and Mobile Device Security •Data Loss and Prevention tools and solutions •Risk-Threat Analysis and Vulnerability Assessments •Enterprise Security Monitoring, Role-Based Access Control (RBAC) •Identity and Access Management, Computer Forensic •IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.) •Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability. Sounds like you? then ping us with your most updated resume. We'd love to talk to you! We are excited about the companies growth and the role you will play with them. Qualifications Desired Skills & Experience: You hold a Bachelor's degree in any domain. You are certified in CISSP, or CISA, or CEH, required. You have more than 1 year experience working in the IT security function. You have good experience with Operating System, Database, Network and Application Security. Additional Information All your information will be kept confidential according to EEO guidelines. Ping me at **********************
    $91k-130k yearly est. Easy Apply 60d+ ago
  • Information Security Analyst II (E5122)

    Ieee 4.9company rating

    Cyber security analyst job in Piscataway, NJ

    Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e. g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc. ) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i. e. Self Service Access requests). Good understanding of a programming language (e. g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e. g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences. o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. ===============================================Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons. Min: $91,000. 00 Max: $114,000. 00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Jan 5, 2026, 5:38:52 PM
    $91k-114k yearly Auto-Apply 11h ago
  • Information Security Specialist

    Ask It Consulting

    Cyber security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 14h ago
  • Information Security Analyst

    Public Health Solutions 4.7company rating

    Cyber security analyst job in New York, NY

    Company
    $68k-96k yearly est. Auto-Apply 20d ago
  • Cyber Security Engineer: Threat Defense & Growth

    Beocom Technologies, LLC

    Cyber security analyst job in New York, NY

    A leading technology firm in New York is seeking a Cyber Security Engineer to safeguard against digital threats. You will design and implement robust security controls, conduct vulnerability assessments, and respond to incidents to protect critical business assets. The ideal candidate has over 5 years of experience in cybersecurity engineering, a relevant degree, and preferred certifications. This role offers a competitive salary and a comprehensive benefits package. #J-18808-Ljbffr
    $80k-109k yearly est. 6d ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 3h ago
  • Lead Information Security Analyst - Identity

    Adpcareers

    Cyber security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 3h ago
  • Information Security Analyst

    Public Health Solutions 4.7company rating

    Cyber security analyst job in New York, NY

    Public Health Solutions (PHS) is a 501(c)3 non-profit community-based organization (CBO) that has existed for 70 years to improve health equity and address health-related social needs (HRSN) for historically underserved marginalized communities. As the largest public health nonprofit serving New York City, we improve health outcomes and help communities thrive by providing services directly to vulnerable families, supporting community-based organizations through our long-standing public-private partnerships, and bridging the gap between healthcare and community services. We focus on a wide range of public health issues including food and nutrition, health insurance, maternal and child health, sexual and reproductive health, tobacco control, and HIV/AIDS. Learn more about our work at healthsolutions.org. PHS administers WholeYouNYC (WYNYC), a coordinated community resource network that builds trustworthy and reliable pathways between healthcare providers, health plans and CBOs providing critical resources in the community that address the social drivers of health. WYNYC brings together over 100 organizations offering various programs - such as food, housing, employment, health insurance, and sexual health services - across all five boroughs. These services and programs make it possible for New Yorkers to live their healthiest lives and ultimately reduce health disparities and advance health equity. To date, our network has already impacted thousands of lives through community partnerships and referrals, generating millions in estimated healthcare savings. New York State (NYS) recently announced the availability of $500M statewide to support Social Care Network (SCN) lead entities responsible for coordinating social care delivery in various regions across the state. Public Health Solutions (PHS) and our WYNYC network were awarded the role of regional SCN for Brooklyn, Manhattan, and Queens. This is a grant-funded position ending March 31, 2027. Program Description: The Information Security Analyst is responsible for supporting and maintaining the organization's information security and compliance program in accordance with applicable federal, state, and contractual requirements, including the NYS OHIP, Common Security Framework (CSF), and HIPAA Security practices. This position plays a critical role in safeguarding organizational assets by monitoring information systems, evaluating security controls, and coordinating incident response activities. The Analyst will collaborate closely with internal IT resources, the managed Security Operations Center (SOC), and external partners to ensure adherence to established policies, standards, and regulatory obligations. Key Responsibilities * Regulatory Compliance and Risk Management * Support and maintain compliance with OHIP PM-17 standards, NYS security requirements, HITRUST CSF, and HIPAA regulations. * Participate in internal and external security audits, assessments, and certification readiness efforts. * Document and maintain evidence of compliance activities, corrective action plans, and remediation tracking. * Assist in the periodic review and revision of information security policies, standards, and procedures. * Security Operations * Monitor and respond to alerts generated through the organization's SIEM and security monitoring platforms, in coordination with the SOC. * Investigate, triage, and document security incidents and vulnerabilities in accordance with established escalation protocols. * Prepare and distribute regular security and compliance reports to IT leadership. * Microsoft 365 and Azure Security * Administer and maintain controls within the Microsoft 365 Security & Compliance Center, including data loss prevention (DLP), auditing, retention, and threat protection. * Implement and review Azure Cloud security configurations, including conditional access, identity protection, and secure baselines. * Monitor privileged access and ensure adherence to least-privilege and separation-of-duties principles. * Coordination and Communication * Serve as a liaison with the SOC and external vendors for incident response, threat intelligence, and log management activities. * Collaborate with infrastructure, application, and compliance teams to align security practices with organizational objectives. Qualifications and Experience: * Education: Associate or Bachelor's degree in IT, Computer Science, or related field or equivalent. * Experience: Minimum of one(1) to three (3) years of professional experience in information security, cybersecurity operations, or IT compliance. * Demonstrated knowledge of, NYS OHIP, and HIPAA compliance frameworks. * Proficiency with Microsoft 365 Security & Compliance Center, Azure Security Center, and Defender for Cloud. * Experience with SIEM platforms (e.g., Microsoft Sentinel, Splunk, LogRhythm) and associated reporting functions. * Familiarity with security incident response, vulnerability management, and risk assessment methodologies. Strong written and verbal communication skills, with the ability to produce audit-ready documentation and reports Desired Skills: * Professional certifications such as CompTIA Security+, CISSP, CCSK, Microsoft Certified: Security Operations Analyst Associate, or HITRUST CCSFP. * Prior experience supporting compliance efforts within a public health, nonprofit, or governmental organization. Key Attributes for Success * Strong eagerness to learn and develop new technical skills. * A proactive and problem-solving mindset. * Attention to detail and ability to document IT processes clearly. * Ability to work both independently and collaboratively within an IT team. * Willingness to take on new challenges in a fast-paced IT environment. Reports To: Information Security Manager Direct Reports: This position has no direct reports Benefits: * Hybrid Work Schedule. * Generous Paid Time Off and Holidays. * An attractive and comprehensive benefits package including Medical, Dental and Vision. * Flexible Spending Accounts and Commuter Benefits. * Company Paid Life Insurance and Disability Coverage. * 403(b) + employer matching and discretionary company contributions. * College Savings Plan. * Ongoing training and continuous opportunities for professional growth and development. At PHS, we place immense value on diversity within our teams, understanding that varied backgrounds and experiences significantly enhance our community and propel us toward our goals. If you find you don't have experience in all the areas listed above, we still encourage you to apply and share your background and experiences in your application. We are eager to discover how your unique perspective can bring positive transformations to our team and help advance our mission of creating healthier, more equitable communities. We look forward to learning more about you! PHS is proud to be an equal opportunity employer and encourages applications from women, people of color, persons with disabilities, LGBTQIA+ individuals, and veterans. 9am- 5pm 35 hours
    $68k-96k yearly est. 19d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in South River, NJ?

The average cyber security analyst in South River, NJ earns between $64,000 and $116,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in South River, NJ

$86,000
Job type you want
Full Time
Part Time
Internship
Temporary