Post job

Cyber security analyst jobs in Toms River, NJ - 62 jobs

All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Information Security Engineer
Information Security Officer
Senior Security Analyst
Cyber Security Engineer
Securities Analyst
Senior Information Security Analyst
  • Chief Information Security Officer

    Arma International 4.4company rating

    Cyber security analyst job in Princeton, NJ

    Department Information Security Office Category Information Technology Job Type Full-Time The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research. The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements. The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance. Responsibilities Strategic Planning and Policy Development Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders. Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations. Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies. Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office. Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities. Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications. Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives. As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture. Management Leads the overall management and success of a robust, current and expanding information security office. Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan. Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security. Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs. Training and Outreach Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security. Qualifications Essential Qualifications: At least 10 years of current experience directly related to the responsibilities of the role Demonstrated domain expertise A strategic grasp of information security at both institutional and operational levels The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields Communication and collaboration skills to build support for security-related initiatives and objectives Experience in higher education or a research environment is preferred Broad knowledge of computer security issues, requirements, and trends Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment Integrity and high standards of personal and professional conduct Education : Bachelor's degree required, preferably in computer science or information technology Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials Preferred Qualifications: Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden. Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law. The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly. If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above. The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information. Standard Weekly Hours 36.25 Eligible for Overtime No Benefits Eligible Yes Probationary Period 180 days Essential Services Personnel (see policy for detail) No Physical Capacity Exam Required No Valid Drivers License Required No Experience Level Director Salary Range $265,000 to $325,000 PI279427080 #J-18808-Ljbffr
    $265k-325k yearly 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Vice President, Cyber Security Engineer

    CLS 4.8company rating

    Cyber security analyst job in Iselin, NJ

    CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day. Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment: Pivotal purpose Trusted guardian Targeted innovation Facilitate connections Delivering excellence Inclusive culture Job information: Functional title - Cyber Security Engineer Department - Security Engineering Corporate level - Vice President Report to - Director, Information Security Engineering Location - New York / New Jersey - Metropark, onsite 2 days per week. Expected full-time salary range between $140,000 - $180,000 + variable compensation + 401(k) match + benefits. Note: Disclosure as required by NY Pay Transparency Law of the expected salary compensation range for this role. Job Purpose The Cyber Security Engineering role is responsible for the delivery of security related activities and maintenance and enhancements of security solutions to improve the security posture of the CLS estate. This individual will interact with the IT Security Architecture Team, IT Security Operations Team, Project Management Teams, global IT Teams, and outsourcing partners to deliver solutions that enhance the security program for CLS. Essential Function / Major Duties and Job Responsibilities Strategic As part of the CLS Security Engineering team, develop and implement CLS security strategy in consultation with the CLS IT teams, ensuring that all initiatives are mirrored in respective strategies including the overall CLS Strategy. Provide security advice and support for information technology projects. Research new security related products and services to ensure that CLS is equipped with appropriate industry best of breed tools and solutions. Operational Operate and maintain CLS Security controls related to SIEM, DLP, Vulnerability Management, Cyber Threat Intelligence, Endpoint Protection, Network Protection, etc. Review and help refine CLS Security procedures to ensure compliance with cyber resilience requirements. Be responsible when assigned ownership of CLS Security related Regulatory and Internal Audit finding(s), and provide effective / timely resolution. Design and integrate consistent security solutions across CLS on-premise and cloud environments for domains like Vulnerability Management, Endpoint Security, Data Security, Network Security, Identity and Access management, etc. Facilitate monitoring and enforcement of configurations, as well as manage and monitor security on systems deployed in the cloud in a similar fashion as is done on-premises at CLS. Oversee design principles and controls relating to third party solution providers. Leadership Work as a team member and individual contributor being able to work independently and confidently without direct supervision. Through example and behaviour, strive to provide peer leadership to other team members with the goal of being excellent service providers and enablers to other constituencies (both internal and external). Strong communication (verbal and written) skills to engage with technical and non-technical audiences. Ability to clarify technical detail and confidently communicate business risks to senior management. Execute CLS Security Engineering team's vision and mission in alignment with the overall CLS Security vision and mission, as well as with CLS's strategic direction as it pertains to cyber resilience. Experience / Essential and Desired for Successful Job Performance A minimum of 5 years of information security experience with at least 2 years in cloud security. Expert knowledge of one or more of the following: firewalls, TCP/IP, network IDS/IPS, host-based IDS/IPS, endpoint and network-based DLP, web proxies, email protection, endpoint protection software, SIEM Sound knowledge of enterprise security concepts/frameworks and products, secure design principles and patterns Monitor, tune and develop technical CLS Security controls and frameworks to ensure appropriate preparation, monitoring and response to threats Ability to collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical CLS Security acumen Financial and/or Banking industry experience preferred Qualifications / Certifications in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) or Security Certifications such as CISSP, SANS GIAC GSEC, GCED, GCIA, GCIH, GREM Industry recognized cloud security qualifications (e.g. CCSK, CCSP, AWS Security Fundamentals, AWS Certified Security) Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, NIST 800-53 and FFIEC handbook Success Factors / Personal Characteristics Contributing to an Individual's Ability to Excel in the Position Possess a strong service-oriented mind set to consistently deliver balanced security solutions that include people, process and technology. Possess strong technical, analytical and problem-solving skills. Self-motivated to exceed management expectations and objectives. Ability to effectively communicate complex technical issues to both business and technical staff at all levels. Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups. Able to effectively cope with change and comfortably handle risk and ambiguity, not upset when things are up in the air. Tenacious resolve and positive attitude in challenging situations Our commitment to employees: At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including: Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days. 2 paid volunteer days so that you can actively support causes within your community that are important to you. Generous parental leave policies to ensure you can enjoy valuable time with your family. Parental transition coaching programmes and support services. Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others. Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity. Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't. Active support of flexible working for all employees where possible. Monthly ‘Heads Down Days' with no meetings across the whole company. Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees. Private medical insurance and dental coverage. Social events that give you opportunities to meet new people and broaden your network across the organisation. Annual flu vaccinations. Discounts and savings and cashback across a wide range of categories including health and retail for UK employees. Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees. All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning. Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
    $140k-180k yearly Auto-Apply 34d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Cyber security analyst job in Cherry Hill, NJ

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $103k-140k yearly est. Easy Apply 5d ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Trenton, NJ

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $184,000/year to $257,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $184k-257k yearly 60d+ ago
  • Information Security Specialist

    Atria Group 4.2company rating

    Cyber security analyst job in Trenton, NJ

    We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges. In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India. We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Monitor use of data files and regulate access to safeguard information in computer files. Document and maintain a repository with version control of all policies, procedures and best practices Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels Monitor use of data files and safeguard computer files against authorized access and unauthorized access Modify computer security files to incorporate new software, correct errors or access changes Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. Identify and track issues, risks and action items. Document information security policies, standards, and procedures spanning and encompassing the range of topics such as organization security, asset ID and classification, personal security, communications and operations management, access control, system development and maintenance, business continuity management, and compliance. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Train users and promote security awareness to ensure system security and to improve server and network efficiency. Prior experience in the following are essential for the role: Websense 7.8 E policy Orchestrator 4.6 Mc Afee email gateway (MEG) 7.6 Airwatch 8.0.6.0 Qualifications SKILLS: Prior hands on experience with Websense 7.8 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with E policy Orchestrator 4.6 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with Mc Afee email gateway (MEG) 7.6 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior experience monitoring use of data files and safeguard computer files against authorized access and unauthorized access REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with Airwatch 8.0.6.0 REQUIRED EXPERIENCE: 3 Years SKILLS: Train users and promote security awareness to ensure system security and to improve server and network efficiency. REQUIRED EXPERIENCE: 2 Years Does the candidate have experience with any of the following products: antivirus, SIEM, encryption tools, web content filtering, MDM. Please list What versions of McAfee email gateway, Airwatch, EPolicy Orchestrator and Websense does the candidate possess? Additional Information Good comm skills are a big priority Duration: 12+ months to renewal
    $93k-141k yearly est. 1d ago
  • Sr Information Security Specialist (US) - AI BISO

    TD Bank 4.5company rating

    Cyber security analyst job in Mount Laurel, NJ

    Hours: 40 Pay Details: $123,680 - $200,200 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Business Information Security Officer (BISO) leads development and/or implementation of significant or Bank-wide Technology Controls / Information Security strategies, policies, programs, tools and provides expert advice and guidance on technical solutions. Oversees control and governance activities and identifies and assesses potential security risks, breaches/ exposures impacting highly complex / high risk businesses or transformational (change the bank) strategic initiatives primarily interfacing with executive and/or functional stakeholders across the Bank. The BISO AI provides technology risk advice and consultation to business partners, enabling effective risk management within their risk appetite and supporting business objectives. This role facilitates communication and execution of enterprise-wide information security programs, delivers awareness training, and conducts risk assessments on business applications, third parties, and infrastructure. The BISO validates that security and technology controls are implemented to support business requirements and oversees control and governance activities, identifying and assessing potential security risks and exposures that impact complex or high-risk businesses and strategic initiatives. Depth & Scope: * Works autonomously on high profile, complex and/or high risk technology projects with significant impact to the organization * Provides technical leadership / consulting / direction to a larger team / portfolio on all aspects of technology controls / information security * Foresees issues / gaps and identifies emerging industry trends (i.e. future focused) * Provides recommendations on value-added improvements / enhancements * Top technical expert individual contributor with expert knowledge of IT security and risk disciplines and practices * Advanced and highly specialized knowledge of organization, technology controls / security/ risk issues * Provides recommendations on value-added improvements / enhancements Education & Experience: * Bachelor's degree preferred * Information security certification / accreditation an asset * 10+ years of relevant experience Preferred Qualifications: AI-Specific Skills & Industry Best Practices * Deep understanding of AI risk management frameworks (e.g., NIST AI Risk Management Framework, ISO/IEC 23894, ISO42001, OWASP, MITRE). * Familiarity with financial services industry regulations and standards (e.g., FFIEC, GLBA, GDPR, PCI DSS, NYDFS Cybersecurity Regulation). * Experience implementing AI governance and ethical guidelines in financial institutions. * Ability to assess and mitigate risks associated with AI models, including bias, explainability, and robustness. * Knowledge of secure AI development lifecycle and best practices for model validation and monitoring. * Expertise integrating AI security controls into enterprise architecture and technology platforms. * Awareness of emerging AI threats, adversarial attacks, and evolving regulatory requirements. * Ability to communicate complex AI risk concepts to executive stakeholders and non-technical audiences. * Experience with incident response and remediation for AI-related security events. * Commitment to continuous learning and staying current with industry trends, frameworks, and best practices in AI and financial services. Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% * Domestic Travel - Occasional * International Travel - Never * Performing sedentary work - Continuous * Performing multiple tasks - Continuous * Operating standard office equipment - Continuous * Responding quickly to sounds - Occasional * Sitting - Continuous * Standing - Occasional * Walking - Occasional * Moving safely in confined spaces - Occasional * Lifting/Carrying (under 25 lbs.) - Occasional * Lifting/Carrying (over 25 lbs.) - Never * Squatting - Occasional * Bending - Occasional * Kneeling - Never * Crawling - Never * Climbing - Never * Reaching overhead - Never * Reaching forward - Occasional * Pushing - Never * Pulling - Never * Twisting - Never * Concentrating for long periods of time - Continuous * Applying common sense to deal with problems involving standardized situations - Continuous * Reading, writing and comprehending instructions - Continuous * Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $123.7k-200.2k yearly Auto-Apply 4d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Trenton, NJ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago
  • Security Analyst

    Ventures Unlimited

    Cyber security analyst job in Moorestown, NJ

    Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs Position : Security Analyst (SIEM) Location: Moorestown, NJ Duration: Full Time Job Description : Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc. Working knowledge of SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions Windows and UNIX administration experience Perl or Python scripting knowledge Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers Ability to work independently and within a team environment Demonstrated ability to stay current with information security best practices, existing and emerging technology Good oral communications and written communication skills Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred Thanks & Regards Rahul Kumar Additional Information Contact "Rahul Kumar" for more details at ************ Ext :157
    $76k-109k yearly est. 60d+ ago
  • Principal Product Security Engineer

    6942-Abiomed Legal Entity

    Cyber security analyst job in Cherry Hill, NJ

    At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at ******************* Job Function: Technology Enterprise Strategy & Security Job Sub Function: Security & Controls Job Category: Scientific/Technology All Job Posting Locations: Danvers, Massachusetts, United States of America, Raritan, New Jersey, United States of America Job Description: Johnson & Johnson's MedTech cybersecurity team is recruiting for an experienced Sr Product Security Engineer to be based in Danvers, MA or Raritan, NJ. This role can also be remote or hybrid work. This role will require up to 10% travel. As the world's most comprehensive MedTech business, J&J MedTech Companies are building on a century of experience, merging science and technology, to shape the future of health and benefit even more people around the world. With our unparalleled breadth, depth and reach across heart recovery, surgery, orthopedics and interventional solutions, we're working to profoundly change the way care is delivered. We are in this for life. For more information, visit ******************************** At Johnson & Johnson, we all belong. Are you passionate about security and interested in joining a community of collaborative colleagues working in a Patient First! culture? If that's you, we have an immediate opportunity for a Sr Product Security Engineer to join the Product Cybersecurity team to help ensure security is implemented by design for this top-performing medical device company. This is an exciting opportunity to impact development initiatives that will shape future product development and industry standards. You will own the Product Security process for the products that you will support throughout the product development lifecycle which includes both pre-market and post-market processes engineering teams. If you are eager to leverage your security risk and compliance skills to make a difference and directly impact patient lives, this could be perfect for you. Purpose: The Senior Product Security Engineer will be responsible for implementation of J&J's enterprise Product Security strategy and framework throughout the Heart Recovery portfolio of medical devices and supporting platforms. This role will join Abiomed, part of Johnson & Johnson MedTech, to provide technical expertise and strategic leadership in securing Impella heart pump technologies, next-generation cardiac support systems, and connected medical devices. This role is responsible for delivering security architecture, cryptographic controls, embedded system protections/controls, and threat mitigation techniques to ensure robust, regulatory-compliant security across the product lifecycle. Specific responsibilities include supporting heart recovery throughout a new product's development phases, review product security requirements and recommend security design solutions, complete Quality documentation, threat modelling, coordinate third-party penetration testing, software architecture review and design recommendations, code analysis and other security testing work as needed. Additionally, this position will have post market responsibilities for Heart Recovery marketed devices include monitoring for new vulnerabilities, assisting with patching and remediation plans, as well as responding to customer security questionnaires and reviewing security language within contractual agreements as needed. Drive alignment to J&J Product Security's overarching framework. Support the Product Security strategy and objectives within Heart Recovery Define and implement secure boot, firmware integrity validation, and anti-tamper mechanisms to protect Heart Recovery Device firmware against unauthorized modification. Enforce cryptographic protocols for data-at-rest and data-in-transit, ensuring compliance with FDA cybersecurity requirements, NIST 800-175, FIPS 140-3, and IEC 62443. Define and implement key management infrastructure (PKI, HSMs, TPMs, and secure enclave integration) for device identity, authentication, and software signing. Develop real-time vulnerability assessment techniques for detecting security flaws in wireless communications (Bluetooth LE, NFC, Wi-Fi, 5G, proprietary RF) used in Heart Recovery's medical devices. Implement Zero Trust security for device-to-cloud connectivity, integrating mTLS and continuous authentication models into clinical applications. Oversee secure OTA (over-the-air) update mechanisms, ensuring firmware rollbacks, code signing, and supply chain integrity validation. Embedded Security & Secure Development Lifecycle: Lead Secure Development Lifecycle practices, integrating threat modeling, static/dynamic analysis, fuzz testing, and formal verification into the development process. Work with R&D Engineering to define hardware security architecture, including trust zones, hardware root of trust (HRoT), and secure microcontroller protections Implement memory safety strategies to mitigate buffer overflows, side-channel attacks, and execution vulnerabilities in real-time operating systems (RTOS) and bare-metal firmware. Respond to customer cybersecurity questionnaires and contractual language for post-market medical devices under your responsibility as necessary. Qualifications Required: •5+ years industry experience in Information Security •3+ years experience with embedded system, IOT, or medical device cybersecurity •Bachelor's degree or equivalent •Experience generating Threat models without the use of threat modeling tools •Experience performing risk assessments utilizing CVSS 3.1 or higher, with STRIDE per element •Ability to write technical security requirements for embedded systems and web platforms based on the latest regulations •Understanding and execution of third-party penetration testing, vulnerability scanning, CVSS and/or other general security testing principles •Experience supporting regulatory security submissions, ensuring compliance with FDA Cybersecurity Guidance (2025), EU MDR, NIST 800-53, IMDRF, and AAMI TIR57. •Knowledge of real-time operating systems hardening techniques •Knowledge of cloud security principles •Ability to generate SBOMs from Software source code and Binaries, Firmware, and Operating Systems •Ability to generate pre-market risk assessments against the threat model leveraging STRIDE and post-market risk assessments via SCA SBOM scans. •Ability to generate the security architecture views for medical devices that could include: Global System View, Multi-Patient Harm View, Updateability/Patchability view and, detailing system boundaries, data flows, and external interactions to show risk mitigation, ensuring transparency, and supporting post-market management •Ability to translate technical security requirements into solutions •Ability to provide secure coding recommendations and execute reviews •Data privacy experience, including HIPAA and GDPR •Understanding of industry standards and certifications such as HITRUST & ISO 27001 •Ability to work autonomously and proactively seek out product security opportunities within heart recovery •Ability to lead large projects and proven ability to track to project plan timelines from a security perspective •Ability to create and deliver cybersecurity awareness campaigns and other communications •Creative problem-solving skills •Customer focus (internal & external) •Excellent communication and collaboration skills, able to network, interface and influence at all levels of the organization, cross sector, cross-functionally and globally •Strong leadership skills Preferred Skills: •Experience leading or participating in formal security audits •Experience with Operating Systems such as QNX QOS, Yocto •Familiarity with FDA and/or other global regulatory cybersecurity guidance requirements and submission process •Experience with web applications and server hardening (i.e. AWS, Azure) including knowledge of OWASP Top 10 and blue teaming techniques •Experience in cybersecurity pre-sales •Software development experience •CISSP, CISM, or other security certification •MS and/or advanced degree Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act. Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, please contact us via *******************/contact-us/careers or contact AskGS to be directed to your accommodation resource. Required Skills: Preferred Skills: Compliance Management, Crisis Management, Cross-Functional Collaboration, Fraud Management, Legal Services, Mentorship, Process Improvements, Risk Assessments, Security Architecture Design, Security Framework, Security Incident Response, Security Planning, Security Policies, Standard Operating Procedure (SOP), Tactical Planning, Technical Credibility The anticipated base pay range for this position is : $102,000.00 - $177,100.00 Additional Description for Pay Transparency: Subject to the terms of their respective plans, employees are eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)). Subject to the terms of their respective policies and date of hire, Employees are eligible for the following time off benefits: Vacation -120 hours per calendar year Sick time - 40 hours per calendar year; for employees who reside in the State of Washington -56 hours per calendar year Holiday pay, including Floating Holidays -13 days per calendar year Work, Personal and Family Time - up to 40 hours per calendar year Parental Leave - 480 hours within one year of the birth/adoption/foster care of a child Condolence Leave - 30 days for an immediate family member: 5 days for an extended family member Caregiver Leave - 10 days Volunteer Leave - 4 days Military Spouse Time-Off - 80 hours Additional information can be found through the link below. *********************************************
    $102k-177.1k yearly Auto-Apply 17d ago
  • Information Security Specialist

    Ask It Consulting

    Cyber security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 1d ago
  • Information Security / Cybersecurity Specialist

    Enterprise Engineering Services

    Cyber security analyst job in Atlantic City, NJ

    Job Description The INFOSEC/Cybersecurity Specialist applies advanced computer science and cybersecurity practices to design, develop, evaluate, and integrate secure computer systems and networks. The role provides information assurance, system security engineering, and integration support to internal and external customers. Responsibilities span a wide range of security functions including secure architectures, electronic data protection, network access control, encryption technologies, vulnerability and penetration analysis, and cybersecurity research. Key Responsibilities System Security Officer (SSO) Support Perform SSO duties for all ATO‑owned systems-Operations (OPS) and Facilities & Equipment (F&E)-across the entire system lifecycle. Program Control & Governance Provide program control and governance management support. Security Management Functions Support budget management Provide privacy management support Coordinate responses for data calls Support audit management activities Develop and maintain Standard Operating Procedures (SOPs) Provide policy management support Cybersecurity Engineering & Lifecycle Support Support system development lifecycle activities for NAS enterprise‑level F&E‑funded cybersecurity services and OPS‑funded cybersecurity efforts. Support development of cybersecurity standards and policies. Assist with integration of NAS systems into enterprise architecture at strategic and tactical levels. Cybersecurity Engineering & Technical Services Deliver cybersecurity engineering management support Develop cybersecurity requirements Support development, management, and operation of cybersecurity tools Provide domain subject matter expertise Conduct cyber engineering reviews Support enterprise solution development Support cybersecurity monitoring standards, requirements, and management Qualifications U.S. Citizenship is required Must be able to obtain a Public Trust clearance Bachelor's degree in related field Minimum 2 years of relevant experience FAA experience a bonus Preferred Qualifications Experience with encryption technologies, penetration testing, vulnerability assessments, and information assurance Experience supporting federal, aviation, or enterprise‑level systems Strong analytical, communication, and documentation skills Ability to collaborate with technical, program, and leadership teams Job Posted by ApplicantPro
    $84k-119k yearly est. 4d ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Cyber security analyst job in Trenton, NJ

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago
  • Senior Information Security Analyst

    Provident Bank 4.7company rating

    Cyber security analyst job in Iselin, NJ

    How would you like to join one of the most highly regarded financial institutions in New Jersey with deep roots in the community? Provident is a successful and highly regarded multi-billion-dollar bank that continues to grow with branches in New Jersey, Eastern Pennsylvania and New York. Our longevity is a testament to our commitment to placing our employees, customers, and the communities we serve at the center of all we do. At Provident Bank, we are committed to enhancing our customer and employees' experience. POSITION OVERVIEW: The Information Security Senior Analyst will set security strategies, interact with senior management, and work in conjunction with all areas of the business. The Information Security department is responsible for identifying and securing the Bank's information assets and providing customers, employees, and other stakeholders with the assurance that their sensitive information and privacy is protected. KEY RESPONSIBILITIES: Management of various security tools used by the bank: EDR, SIEM, Email Security, Webfilter, vulnerability management program and privilege access management Research emerging security trends and provide recommendations for improvement of security policies, procedures, training, and incident response Support the execution of critical bank projects by representing the IS department as a project team member and providing directions on security implementation Responsible for supporting the bank's information security oversight of policy through monitoring and analyzing security system alerts, incidents, vulnerabilities and coordinating the triage, analysis, and remediation process Manage internal security projects to implement best practice security practices throughout organization by working hand in hand with IT staff on implementation Collaborate with business lines to ensure security processes and tools are aligned with overall organization risk appetite Author, test, and evaluate security policy and controls to support the maturation process of the organization's information security standards Develop and present Information Security training to organizations to improve end user behaviors Assist the Audit organization in documenting evidence of technology controls and compliance in meeting regulatory and legal requirements MINIMUM QUALIFICATIONS: Associate degree or bachelor's degree in the related field 3+ years in Information Security or Information Technology role Thorough knowledge of and security aspects of network systems. Familiarity with network security concepts including firewalls, IPS and IDS Knowledge of tools in following categories: WEB Filtering, EDR, SIEM, AV, IAM, PAM and Email Protection Systems Ability to work under stress of meeting numerous deadlines and requests that sometimes compete in priority. Ability and willingness to work a flexible schedule including weekends as necessary. Ability to troubleshoot problems and implement suitable solutions. Must keep current with technical aspects of position and know and use job-related functions and skills. Ability to communicate effectively with both technical and non-technical colleagues. Experience with risk assessment, certification and accreditation and enterprise security planning. Understanding of best practice security methodologies. Knowledge of any of: Critical Security Controls, FFIEC Examination Handbooks, NIST Cyber Security framework and Mitre ATT&CK framework. Ability to train others. LICENSES AND/OR CERTIFICATES At least one of: Security+, SSCP, CEH, GIAC, CISSP, CISA, CISM, or comparable certification highly desired WORKING CONDITIONS: Work is performed in a normal office environment. Noise levels are usually moderate. This position involves travel to customers and property locations. Prolonged sitting Lifting from 5 to 10 lbs. (printer paper, storage boxes) Occasional bending or overhead lifting (storing files or boxes) The hazards are mainly those present in a normal office setting This may not be all-inclusive. Employees are expected to perform other duties as assigned and directed by management. Job descriptions and duties may be modified when deemed appropriate by management. Provident Bank recognizes and supports the importance of creating a socially and culturally diverse employee base. We understand, value, and appreciate the unique perspectives that a diverse workforce can contribute to our organization. We put the employee and the customer at the center of strategy because culture is a critical differentiator for why people choose to work here. We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to age 40 and over, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion, sex, sexual orientation or any other applicable status protected by state or local law. PAY DETAILS: $70,000 - $85,000 annually Please note, the base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, education, geographic location, internal equity, and other applicable business and organizational needs. This role is incentive eligible based upon company, business, and/or individual goal achievement and performance. Team members accrue paid time-off (PTO), receive Holiday (PTO) and are eligible to participate in the bank's Health and Wellness benefits including Medical, Dental and Vision Plans, Flexible and Health Savings Accounts, and a 401(k) Retirement Plan. In addition, the company provides Disability Insurance, an Employee Assistance Program, and Basic Life Insurance. Company sponsored Tuition Disbursement and Loan Repayment programs are also available. Voluntary benefits include Supplemental Life Insurance, Accident, Critical Illness, Hospital Indemnity and Legal plans.
    $70k-85k yearly 3d ago
  • Security Engineer

    Gcstaffing

    Cyber security analyst job in Trenton, NJ

    Contactor will review all current security settings in M365 and Azure. They will work with my team to document environment, make best practice recommendations, and advise Director how to best utilize existing tools. We will have a focus on monitoring the environment and DLP as well. The role will be hands on, but with a strong consulting/advisory component. The candidate must have experience. We are looking for a professional to review our systems and interact with, not someone to offload task -oriented work or trouble tickets. ***Only qualified Security Engineer - Windows/Office 365 Security candidates located at the Trenton, NJ area to be considered due to the position requiring an onsite presence*** Desired Certifications: • Any Microsoft Security certifications Required Skills: • Security assessments and best practices on Azure Office 365 Platforms (5 Years) • Security Assessments on Windows 11 desktops environment (5 Years) • Office 365 Data Loss Protection (5 Years) • Windows Defender Advanced Threat Protection (5 Years) • Remote desktop patch monitoring and reporting (5 Years) • Remote desktop patching (5 Years) • Microsoft Azure Security best practices (5 Years) • Microsoft Cloud monitoring and logging (5 Years) • Server patch maintenance (5 Years) • Familiarity with 3rd party reporting tools such as Nagios, Tenable, Etc (5 Years) • Hands on Microsoft Cloud and on prem security administration (5 Years) • Experience interacting with IT management, IT Systems teams, vendor, and users (5 Years) Desired Skills: • Microsoft GCC (Government Cloud) experience • SharePoint Security assessments • Mandiant Managed Defense
    $83k-115k yearly est. 60d+ ago
  • Security Engineer

    Aspire Technology Partners 3.9company rating

    Cyber security analyst job in Eatontown, NJ

    Full-time Description As a Security Engineer at Aspire, you will play a critical role in strengthening our Clients' network and information security posture. Working within a collaborative technical team, you will design, implement, and manage secure network environments with a focus on Cisco Firepower Threat Defense (FTD) and Cisco Identity Services Engine (ISE). You will ensure that access controls, threat prevention measures, and compliance frameworks are consistently maintained across enterprise systems and client networks. In this role, you'll support both project delivery and operational stability by partnering with architects, engineers, and service delivery teams to translate security requirements into effective, scalable solutions. You'll also contribute to continuous improvement initiatives, helping evolve Aspire's security standards, automation practices, and incident response capabilities. Core Responsibilities: · Deploy, configure, and manage Cisco Firepower Threat Defense (FTD) devices, including policies for intrusion prevention, application control, URL filtering, and VPNs. · Manage and optimize Cisco Firepower Management Center (FMC) for centralized visibility, reporting, and policy orchestration. · Design, implement, and maintain firewall rules and security zones to ensure network segmentation and compliance with security standards. · Administer and support Cisco ISE for network access control (NAC), including 802.1X authentication, profiling, posture assessment, and guest access. · Integrate ISE with Active Directory, switches, wireless controllers, and other security systems. · Troubleshoot and resolve issues related to firewall, FTD, and ISE configurations and access control policies. · Collaborate with the networking and infrastructure teams to implement secure connectivity solutions. · Perform regular security assessments, policy reviews, and compliance checks to identify and mitigate risks. · Monitor and analyze logs and alerts from FTD and ISE to detect and respond to potential threats. · Document network security designs, change requests, and incident response activities. · Provide technical guidance and contribute to security architecture design for new projects or system integrations. Qualifications:· 3-5 years of experience as a Network or Security Engineer.· Strong hands-on experience with Cisco Firepower Threat Defense (FTD) and Firepower Management Center (FMC).· Proven experience managing firewalls (Cisco ASA, FTD, Palo Alto, or Fortinet).· Demonstrated expertise with Cisco Identity Services Engine (ISE) for policy management, authentication, and endpoint security. Preferred Certifications:· Cisco CCNP Security· Cisco Firepower Specialist or equivalent vendor certification.· CompTIA Security+· Cisco Certified CyberOps Associate or similar· Familiarity with Cisco DNA Center/Catalyst Center Requirements ESSENTIAL DUTIES AND RESPONSIBILITIES- MAY INCLUDE THE FOLLOWING: OTHER DUTIES MAY BE ASSIGNED. Minimum Education and Experience: At least 3 years designing and implementing Security Solutions Preferred Education and Experience: More than 3 years designing and implementing Security Solutions OTHER SKILLS and ABILITIES: Technical Proficiency Project Leadership Client-Focused Communication Strategic Consultation Adaptability and Continuous Improvement TRAVEL: Travel to/from client locations will be required. This may involve the local tri-state area or occasional overnight accommodations. PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit and talk, or hear. The employee frequently is required to stand, walk, and use hands to finger, handle, or feel objects, tools, or controls. The employee is occasionally required to reach with hands and arms. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job involve normal vision. WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The noise level in the work environment is usually quiet to moderate. Salary Description 130k salary plus bonus
    $92k-124k yearly est. 1d ago
  • Security Engineer

    Cardinal Integrated 4.4company rating

    Cyber security analyst job in Monmouth Junction, NJ

    Rocket Software located in Waltham MA(Full remote) Title :Security Engineer Duration: -3-6 Months Rates : DOE All visa's accepted As a Security Engineer with Rocket Software, you are part of a global, fast-paced IT organization with a primary mission to provide world class service to software development labs and internal departments ensuring our employees have access and communication systems to perform as the highest level. The successful candidate will be a highly technical individual with primarily responsible for implementing, monitoring, and managing security devices, equipment, controls, and technology. Additional responsibilities include monitoring, analyzing and resolving issues in a proactive way. As this is an opportunity to build the security program from the ground up, the ideal candidate will be comfortable in a fast changing and fluid environment. Essential Duties and Responsibilities: * Manage various security systems and appliances including firewalls, IDS/IPS, MFA, SSO, logging, and other devices * Experience with Active Directory, and operating system security * Privilege Access Management, Web Content Filtering, Email Security, and Endpoint Detection and Response management * Design and architect security systems and solutions * Analyze and respond to threats and other necessary investigations * Develop and support monitoring, data visualizations, data reporting and analytics * Collaborate in creating business monitoring requirements * Protect Rocket customer and intellectual property data Required Qualifications: * 5+ years of experience with security technology management and operations, including system deployment, maintenance and troubleshooting in a global enterprise environment * Experience with managing and operating anti-virus software, intrusion detection/protection, firewalls, email security, load balancers, and content filtering * Experience planning, researching and developing security policies, standards and procedures * Experience working with secure networks, systems and application architectures * Knowledge of building highly available systems with redundancy and DR/BCP in mind * Knowledge of incident response and threat intelligence programs * General routing and switching network understanding * Experience with logging and multifactor authentication * Experience providing user guidance, documentation, and consultation * Excellent troubleshooting skills, self-motivated, results-driven and well organized. * Demonstrate proven track record in addressing technical issues * Experience with explosive growth and variable requirements * Experience with change and incident management processes
    $95k-133k yearly est. 22d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Trenton, NJ

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $84k-107k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Trenton, NJ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago
  • Information Security Specialist (US)

    TD Bank 4.5company rating

    Cyber security analyst job in Mount Laurel, NJ

    Hours: 40 Pay Details: $98,160 - $159,270 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area. Depth & Scope: * Participates on complex, comprehensive or large projects and initiatives * Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors * Has advanced knowledge of organization, technology controls / security/ risk issues Education & Experience: * Bachelor's degree preferred * Information security certification / accreditation an asset * 7+ years of relevant experience * Expert knowledge of IT security and risk disciplines and practices Preferred Qualifications * 5+ years of experience in vulnerability management, security operations, or related fields. * 2+ years of experience in a leadership or management role. * Technical Skills: * Expertise in vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7). * Knowledge of CVSS (Common Vulnerability Scoring System) and threat modeling. * Strong understanding of operating systems, cloud platforms, networks, and application security. * Familiarity with compliance frameworks (e.g., ISO 27001, NIST, PCI-DSS). * Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% * Domestic Travel - Occasional * International Travel - Never * Performing sedentary work - Continuous * Performing multiple tasks - Continuous * Operating standard office equipment - Continuous * Responding quickly to sounds - Occasional * Sitting - Continuous * Standing - Occasional * Walking - Occasional * Moving safely in confined spaces - Occasional * Lifting/Carrying (under 25 lbs.) - Occasional * Lifting/Carrying (over 25 lbs.) - Never * Squatting - Occasional * Bending - Occasional * Kneeling - Never * Crawling - Never * Climbing - Never * Reaching overhead - Never * Reaching forward - Occasional * Pushing - Never * Pulling - Never * Twisting - Never * Concentrating for long periods of time - Continuous * Applying common sense to deal with problems involving standardized situations - Continuous * Reading, writing and comprehending instructions - Continuous * Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $98.2k-159.3k yearly Auto-Apply 5d ago
  • Information Security Specialist

    Ask It Consulting

    Cyber security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Toms River, NJ?

The average cyber security analyst in Toms River, NJ earns between $64,000 and $117,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Toms River, NJ

$87,000
Job type you want
Full Time
Part Time
Internship
Temporary