Cyber security analyst jobs in Ventnor City, NJ - 509 jobs
All
Cyber Security Analyst
Information Security Analyst
Security Engineer
Senior Security Analyst
Information Security Officer
Network Security Analyst
Security System Engineer
Chief Information Security Officer
Arma International 4.4
Cyber security analyst job in Princeton, NJ
Department Information Security Office Category Information Technology Job Type Full-Time
The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research.
The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements.
The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance.
Responsibilities
Strategic Planning and Policy Development
Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders.
Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations.
Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies.
Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office.
Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities.
Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications.
Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives.
As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture.
Management
Leads the overall management and success of a robust, current and expanding information security office.
Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan.
Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security.
Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs.
Training and Outreach
Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security.
Qualifications
Essential Qualifications:
At least 10 years of current experience directly related to the responsibilities of the role
Demonstrated domain expertise
A strategic grasp of information security at both institutional and operational levels
The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields
Communication and collaboration skills to build support for security-related initiatives and objectives
Experience in higher education or a research environment is preferred
Broad knowledge of computer security issues, requirements, and trends
Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation
Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse
Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment
Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents
The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university
The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable
Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment
Integrity and high standards of personal and professional conduct
Education :
Bachelor's degree required, preferably in computer science or information technology
Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials
Preferred Qualifications:
Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials
Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden.
Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law.
The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly.
If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above.
The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information.
Standard Weekly Hours
36.25
Eligible for Overtime
No
Benefits Eligible
Yes
Probationary Period
180 days
Essential Services Personnel (see policy for detail)
No
Physical Capacity Exam Required
No
Valid Drivers License Required
No
Experience Level
Director
Salary Range
$265,000 to $325,000
PI279427080
#J-18808-Ljbffr
$265k-325k yearly 4d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security
Forhyre
Cyber security analyst job in Philadelphia, PA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the CyberSecurity framework
Manage the existing cybersecurity training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
$73k-100k yearly est. 22d ago
Cyber Security Analyst II
Cuc Corporate Brand
Cyber security analyst job in Dover, DE
CyberSecurityAnalyst II Location: Hybrid - residing within commutable distance to Newark or Dover, DE
What makes us great
At the heart of our Company is a dedication to delivering energy that drives progress. We put people first, work to keep them safe and build trusting relationships.
Your role in our success:
This position will be responsible for protecting the corporation's critical information and assets by integrating cybersecurity risk management best practices throughout the enterprise. This position will be responsible for detection and analysis of opportunistic and persistent threats, deploying counter measures and conducting risk and vulnerability assessments across the enterprise (including cloud). As a specialist on the Cybersecurity team, you will participate in detection and response of cyber incidents, assist in recovery of operations and assist in formulating, updating, and communicating short- and long-term organizational cybersecurity strategies and policies. In addition, you will provide technical support to others on adjacent technical teams and the greater organization. The ideal candidate will have a thorough understanding of incident response protocol and have an understanding of nation state threat actors and their TTPs.
What you'll be working on:
Monitor and analyze security intel generated by company security controls. Lead triage, containment and eradication.
Participate in threat hunting activities and “deep dive” analysis to maintain a high degree of awareness on the current threat landscape.
Participate in simulated “adversary emulation” exercises and have working knowledge of Red Team tools such as Atomic Red Team and Caldera.
Provide effective incident response, by correlating intelligence from IPS systems, endpoints and third parties.
Administer security awareness training and enterprise vulnerability management solutions, as required.
Administer and maintain leading enterprise commercial endpoint and network based security solutions
Develop and produce reports on all activities and incidents to help maintain day to day status,
Develop and report on trends, and provide focus and situational awareness on all issues.
Maintain documentation for all systems and create user guides and standard operating procedures.
Adhere to enterprise change management procedures and corporate security policies, including SLAs for responding to cyber related incidents.
Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management.
Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management.
Ensure changes are made using an approval process agreed to in advance.
Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible.
Additional Responsibilities
Maintain knowledge of the current threat landscape via OSINT.
Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training.
Interface to third party vendors as necessary for external audits.
Manage investigations involving CyberSecurity, including the use of specialized software.
Create system performance metrics and trending for capacity planning
Meet availability and update requirements
Ability to travel 10%
Who you are:
Bachelor's Degree in computer engineering, computer science, or other closely related IT discipline OR 5 years of relevant work experience.
Must hold one of the following certifications: Security+, CEH, GCIH, GREM or CISSP
3 years specialized experience providing technical and end-user assistance on computer hardware and application software support.
2 years of progressively responsible experience in cybersecurity analysis, incident response, or related experience.
Working knowledge of MITRE ATT&CK and Lockheed Martin's Cyber Killchain
Working knowledge of memory analysis tools and DFIR best practices
Experience administering enterprise vulnerability management and security awareness solutions
Experience designing and implementing controls to protect OT environments.
Experience administering multi-factor authentication systems
Experience managing enterprise security appliances and/or security monitoring software (IPSs, firewalls etc.)
Experience with enterprise change management and test procedures.
Demonstrated experience dealing with customers and organizational skills are required.
Demonstrated strength in providing strong customer service support.
Strong analytical and problem solving skills.
Good interpersonal, organizational, written and verbal communication skills.
Experience working in a highly regulated environment.
Maintain composure and professional approach when dealing with employees and vendors.
Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form.
Ability to make decisions logically.
Capable of focusing on details with regards to procedures and workflow.
Ability to lift up to 40 pounds.
Benefits/what's in it for you?
Flexible work arrangement
Competitive base salary
Fantastic opportunities for career growth
Cooperative, supportive and empowered team atmosphere
Annual bonus and salary increase opportunities
Monthly recognition events
Endless wellness initiatives and community events
Robust and customizable benefit packages-choose what works best with your life. Options include generous 401k, medical, dental and life insurance, tuition reimbursement, compensated volunteer hours and MORE!
Paid time off, holidays and a separate bank of sick time!
Chesapeake Utilities Corporation is an equal opportunity employer committed to creating a diverse workforce. We consider all qualified applicants without regard to race, religion, color, sex, national origin, age, sexual orientation, gender identity, disability or veteran status, among other factors. Applicants with a disability that need assistance applying for a position may email ****************.
$76k-103k yearly est. 38d ago
Network Security Analyst
Integrated Resources 4.5
Cyber security analyst job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network SecurityAnalyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
$92k-125k yearly est. 60d+ ago
Information Security Specialist (US)
TDI 4.1
Cyber security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$98,160 - $159,270 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
Participates on complex, comprehensive or large projects and initiatives
Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications
5+ years of experience in vulnerability management, security operations, or related fields.
2+ years of experience in a leadership or management role.
Technical Skills:
Expertise in vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7).
Knowledge of CVSS (Common Vulnerability Scoring System) and threat modeling.
Strong understanding of operating systems, cloud platforms, networks, and application security.
Familiarity with compliance frameworks (e.g., ISO 27001, NIST, PCI-DSS).
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
$98.2k-159.3k yearly Auto-Apply 3d ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Cherry Hill, NJ
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client.*
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$103k-140k yearly est. Easy Apply 2d ago
Information Security / Cybersecurity Specialist
Enterprise Engineering Service
Cyber security analyst job in Egg Harbor, NJ
The INFOSEC/Cybersecurity Specialist applies advanced computer science and cybersecurity practices to design, develop, evaluate, and integrate secure computer systems and networks. The role provides information assurance, system security engineering, and integration support to internal and external customers. Responsibilities span a wide range of security functions including secure architectures, electronic data protection, network access control, encryption technologies, vulnerability and penetration analysis, and cybersecurity research.
Key Responsibilities
System Security Officer (SSO) Support
* Perform SSO duties for all ATO‑owned systems-Operations (OPS) and Facilities & Equipment (F&E)-across the entire system lifecycle.
Program Control & Governance
* Provide program control and governance management support.
Security Management Functions
* Support budget management
* Provide privacy management support
* Coordinate responses for data calls
* Support audit management activities
* Develop and maintain Standard Operating Procedures (SOPs)
* Provide policy management support
Cybersecurity Engineering & Lifecycle Support
* Support system development lifecycle activities for NAS enterprise‑level F&E‑funded cybersecurity services and OPS‑funded cybersecurity efforts.
* Support development of cybersecurity standards and policies.
* Assist with integration of NAS systems into enterprise architecture at strategic and tactical levels.
Cybersecurity Engineering & Technical Services
* Deliver cybersecurity engineering management support
* Develop cybersecurity requirements
* Support development, management, and operation of cybersecurity tools
* Provide domain subject matter expertise
* Conduct cyber engineering reviews
* Support enterprise solution development
* Support cybersecurity monitoring standards, requirements, and management
Qualifications
* U.S. Citizenship is required
* Must be able to obtain a Public Trust clearance
* Bachelor's degree in related field
* Minimum 2 years of relevant experience
* FAA experience a bonus
Preferred Qualifications
* Experience with encryption technologies, penetration testing, vulnerability assessments, and information assurance
* Experience supporting federal, aviation, or enterprise‑level systems
* Strong analytical, communication, and documentation skills
* Ability to collaborate with technical, program, and leadership teams
$84k-119k yearly est. 1d ago
Information Security Analyst II (E5122)
Institute of Electrical and Electronics Engineers
Cyber security analyst job in Piscataway, NJ
The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports.
Key Responsibilities
Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Education
Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req
Work Experience
2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req
Licenses and Certifications
Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref
Skills and Requirements
Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response)
Knowledge or familiarity on conducting and mitigating security/risk assessments
Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.)
Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests).
Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool
Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & Solaris
Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:
As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================
Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
$84k-119k yearly est. Auto-Apply 23d ago
Lead Information Security Analyst - Identity
Blueprint30 LLC
Cyber security analyst job in Roseland, NJ
ADP is Hiring a Lead Information SecurityAnalyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
$84k-119k yearly est. 22h ago
Security Analyst - Systems Operations
Adpcareers
Cyber security analyst job in Roseland, NJ
ADP is Hiring a SecurityAnalyst - Systems Operations
Unlock Your Career Potential:
Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data.
We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times.
From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
The position is required to work on weekends and 2
nd
US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice.
Well, this may be the role for you. Ready to make your mark?
The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO).
The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com
The Key Responsibilities for
Associate SecurityAnalyst in GCS Operations
are:
-Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage.
-Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support.
-Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests.
-Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure.
-Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings.
-Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem.
To Succeed In This Role-
You'll have a bachelor's degree or equivalent.
Preferred Qualifications-
-Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL.
-Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC.
-Scripting language (Linux Shell, Python, Powershell etc), SQL, etc.
-Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus.
-Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
$84k-119k yearly est. 22h ago
Information Security Specialist (US)
TD Bank 4.5
Cyber security analyst job in Mount Laurel, NJ
Mount Laurel, New Jersey, United States of America **Hours:** 40 **Pay Details:** $98,160 - $159,270 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
**Line of Business:**
Technology Solutions
**Job Description:**
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
**Depth & Scope:**
+ Participates on complex, comprehensive or large projects and initiatives
+ Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
+ Has advanced knowledge of organization, technology controls / security/ risk issues
**Education & Experience:**
+ Bachelor's degree preferred
+ Information security certification / accreditation an asset
+ 7+ years of relevant experience
+ Expert knowledge of IT security and risk disciplines and practices
**Preferred Qualifications**
+ 5+ years of experience in vulnerability management, security operations, or related fields.
+ 2+ years of experience in a leadership or management role.
+ Technical Skills:
+ Expertise in vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7).
+ Knowledge of CVSS (Common Vulnerability Scoring System) and threat modeling.
+ Strong understanding of operating systems, cloud platforms, networks, and application security.
+ Familiarity with compliance frameworks (e.g., ISO 27001, NIST, PCI-DSS).
+ Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
**Physical Requirements:**
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
+ Domestic Travel - Occasional
+ International Travel - Never
+ Performing sedentary work - Continuous
+ Performing multiple tasks - Continuous
+ Operating standard office equipment - Continuous
+ Responding quickly to sounds - Occasional
+ Sitting - Continuous
+ Standing - Occasional
+ Walking - Occasional
+ Moving safely in confined spaces - Occasional
+ Lifting/Carrying (under 25 lbs.) - Occasional
+ Lifting/Carrying (over 25 lbs.) - Never
+ Squatting - Occasional
+ Bending - Occasional
+ Kneeling - Never
+ Crawling - Never
+ Climbing - Never
+ Reaching overhead - Never
+ Reaching forward - Occasional
+ Pushing - Never
+ Pulling - Never
+ Twisting - Never
+ Concentrating for long periods of time - Continuous
+ Applying common sense to deal with problems involving standardized situations - Continuous
+ Reading, writing and comprehending instructions - Continuous
+ Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
**Who We Are:**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more (***************************************
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at *************** . Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
$98.2k-159.3k yearly 2d ago
Information Security Analyst
Ra 3.1
Cyber security analyst job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
$91k-130k yearly est. Easy Apply 3d ago
Information Security Analyst II (E5122)
Ieee 4.9
Cyber security analyst job in Piscataway, NJ
Information SecurityAnalyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices.
This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place.
The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption.
The role reports to the Manager, Information Security and manages 0 direct reports.
Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape.
Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements.
Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security.
Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies.
Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures.
Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization.
Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO).
Participates in development and update of security policies, procedures, standards, guidelines, and architectures.
Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings.
Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them.
Assists in the formulation and enforcement of security policies and procedures.
Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering.
In lieu of a degree equivalent experience will be considered.
ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.
g.
Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment.
ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus.
PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.
) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory.
Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM.
Knowledge and experience Windows Active Directory.
Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.
e.
Self Service Access requests).
Good understanding of a programming language (e.
g.
Java, C, Perl), HTML/XML and Unix “shells” scripting (e.
g.
CSH, KSH, SH).
Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.
o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization.
Anticipates problems and identifies long-term implications of decisions and actions.
Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus.
Familiarity with load balancer technologies and ESSO integration capabilities is a plus.
Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus.
Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply.
PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status.
For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements.
This position is classified under Category I - Office Positions.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
===============================================Disclaimer: This is proprietary to IEEE.
It outlines the general nature and key features performed by various positions that share the same job classification.
It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job.
Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
Min: $91,000.
00 Max: $114,000.
00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Jan 5, 2026, 5:38:52 PM
$91k-114k yearly Auto-Apply 19h ago
3014 - Specialist, Information System Security III (SISS3)
Alakai Services and Poe'Hana Group, Inc.
Cyber security analyst job in Philadelphia, PA
Provide senior-level cybersecurity and information system security support for Navy systems by leading RMF activities, security authorization packages, continuous monitoring, and cybersecurity compliance in support of mission operations.
Key Responsibilities
Lead and support RMF Steps 16 for assigned Navy information systems
Develop and maintain SSPs, SAPs, SARs, POA&Ms, and security artifacts
Coordinate system authorization activities with Authorizing Officials (AOs)
Conduct risk assessments and vulnerability analysis
Support continuous monitoring, audits, and inspections
Advise leadership on cybersecurity risk and mitigation strategies
Qualifications (Citizenship, Education, Experience, Skills)
Citizenship: U.S. Citizenship required
Education: Bachelors degree in Cybersecurity, IT, or related field (or equivalent experience)
Certification: Must possess and maintain a DoD 8140 / IAWFapproved Information Assurance Technical (IAT) Level II certification (e.g., CompTIA Security+ CE, CySA+, SSCP, GSEC, or equivalent)
Experience: Minimum 8 years cybersecurity / ISS experience; 5+ years RMF support
Skills: RMF; NIST 800-53; risk analysis; technical writing; coordination with government stakeholders
Required Systems, Tools, and Framework Experience
Frameworks: DoD RMF, NIST SP 800-53, 800-37, 800-30
Systems: eMASS, ACAS, HBSS, STIG Viewer
Tools: Nessus, SCAP, vulnerability scanning tools
Security Handling: CUI, controlled system documentation
We are an Equal Opportunity Employer and strive to provide equal employment opportunity to all applicants and staff in accordance with sound employee relations practices and federal and state laws. All qualified applicants will receive consideration without regard to race, color, religion, sex, national origin, age, disability, veteran status, sexual orientation, gender identity or expression, marital status, ancestry, genetic information, pregnancy status, or any other characteristic protected by law.
$80k-114k yearly est. 3d ago
Information Security Analyst
Vurke
Cyber security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information SecuritySecurity
$80k-114k yearly est. 60d+ ago
Information Security Specialist
Ask It Consulting
Cyber security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 3d ago
Security Systems Engineer
Dagostino Electronic Services 4.1
Cyber security analyst job in Pittsburgh, PA
The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required.
Requirements
Essential functions and responsibilities:
Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems.
Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards
Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment.
Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer.
Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions.
Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project.
Direct the work responsibilities of union labor personnel based on specific project needs.
Design and oversee training programs for new and existing customers; Determine which customers receive training.
Collaborate with Customer Relationship Managers on demonstrations for new and potential clients.
Perform installation, configuration, programming, and final commissioning of customer systems.
Work collaboratively with installation, project management and engineering teams.
Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required.
Perform system wiring and terminations services, as required.
Deliver on-going remote and on-site technical support for existing customers and systems.
Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting.
Organizes and manage parts stock and tools.
Perform other duties as needed.
Success factors/job competencies:
Effectively communicate both in writing and verbally
Work independently and prioritize multiple tasks and adapt to needed change
Analysis
Mechanical aptitude
Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics
Safety orientation
Customer Focus
Attention to Detail
Teamwork/Collaboration
Stay abreast of changes in security technology
Physical demands and work environment:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Individual will be required to travel to customer sites as needed.
While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts.
The employee is occasionally exposed to outside weather conditions and risk of electrical shock.
Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds.
Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed.
Incumbent must be able to read, see, hear, and speak.
Workdays and Shifts:
Position works Monday-Friday, daylight hours, and additional time as needed to complete work.
Education/Certification(s)/License(s) required:
Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience.
May be required to participate in safety trainings and/or certifications provided by the Company or customers.
Valid driver's license, as employee will be required to travel to local and overnight client sites as needed.
Manufacturer specific certifications, as required.
Responsible to maintain active certifications and obtain new and updated certifications as required by the Company.
Experience/Other required:
Position requires two (2) to three (3) years of relevant experience in the electronic services.
Strong knowledge of Microsoft Office.
Strong computer skills with advanced software aptitude.
Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP.
Applicants must be currently authorized to work in the United States on a full-time basis.
Visa sponsorship is not available for this position.
This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
$90k-127k yearly est. 60d+ ago
Information Security Analyst
Creston
Cyber security analyst job in Rockleigh, NJ
The Information SecurityAnalyst plays a key role in advancing the company's Governance, Risk & Compliance (GRC) program by protecting enterprise information assets and ensuring compliance with regulatory, contractual, and ethical standards. This position offers hands-on experience across multiple security domains including policy governance, risk management, AI governance, and data security, making it an excellent opportunity for early career professionals or recent graduates passionate about cybersecurity and emerging technology risks. In this role, you will collaborate with teams across Information Security, IT, and Legal to drive initiatives that safeguard sensitive data, maintain compliance obligations, and promote responsible use of artificial intelligence and other advanced technologies.
Responsibilities
Governance & Policy Management
Assist in developing, maintaining, and aligning information security policies with frameworks such as NIST CSF, ISO 27001, SOC 2, CIS, and the NIST AI RMF.
Contribute to documentation and control mapping for new or updated regulations related to AI, privacy, and data protection (e.g., GDPR, CCPA, NIST 800-53 Rev 5).
Support internal policy review cycles, ensuring consistent version control and executive approval.
Risk Management
Participate in enterprise risk assessments, including third-party, application, and AI model risk reviews.
Help identify, document, and track remediation of security and privacy risks within the GRC platform (e.g., Drata, ServiceNow GRC, OneTrust, Vanta, etc.).
Support the development of risk metrics and dashboards for leadership reporting.
Learn to evaluate AI-related risks such as model bias, data leakage, data lineage, model transparency, and unintended data exposure.
Data Governance & Data Security
Assist with data classification, retention, and handling standards, ensuring sensitive data is appropriately protected.
Support data inventory and mapping efforts to improve visibility where critical data resides.
Help review access controls, encryption standards, and secure data transfer processes in coordination with IT teams.
Collaborate with the IT team to ensure alignment between data quality, privacy, and security controls.
Compliance & Audit Support
Gather and organize evidence for internal and external audits (ISO 27001, PCI, HIPAA, etc.).
Maintain control documentation and track audit remediation activities.
Support continuous monitoring of compliance requirements and updates to regulatory obligations, including emerging AI governance and data-related laws.
AI Governance Support
Contribute to inventories of AI tools and use cases across the enterprise.
Assist in risk assessments for AI systems, ensuring they align with responsible AI principles such as fairness, accountability, and transparency.
Collaborate with IT and legal teams to ensure that AI use complies with company policies.
Security Awareness & Communication
Help design and distribute training materials related to cybersecurity, data protection, and responsible AI practices.
Support internal campaigns promoting secure data handling and ethical technology usage.
Prepare metrics, dashboards, and presentations for leadership briefings.
Continuous Improvement
Participate in projects that automate or streamline GRC processes, such as policy lifecycle management or risk scoring.
Stay informed about new threats, regulatory trends, and AI governance frameworks.
Engage in ongoing professional development and certification opportunities.
Qualifications
Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Data Science, or a related field is preferred
0-2 years of experience in cybersecurity, risk management, compliance, or data governance (internship or coursework acceptable).
Understanding of cybersecurity principles, risk management, and data privacy fundamentals.
Basic familiarity with AI systems, data governance concepts, or information security practices.
Strong analytical, communication, and documentation skills.
Ability to manage multiple priorities in a fast-paced environment.
Proficient in Microsoft Excel, PowerPoint, and data analysis or GRC tools.
Exposure to frameworks such as NIST CSF, ISO 27001, SOC 2, NIST AI RMF, or COBIT.
Must be able to work in the U.S. without sponsorship
Per applicable state requirements, the annual pay range for this position ($60,500 - $84,000) which consists of base salary (subject to performance), reflects the hiring range for candidates. Also note, an individual's offer may vary from this range as it may be impacted by additional factors, including but not limited to the candidate's hiring location, qualifications, experience, and market factors.
$60.5k-84k yearly 4d ago
Specialist, Information System Security III (SISS3)
Armada Ltd. 3.9
Cyber security analyst job in Philadelphia, PA
Job Description
Type: Full Time
Overtime Exempt: Exempt
Reports To: ARMADA HQ
Travel Required: Yes
Security Clearance Required: Active Secret Security Clearance
************CONTINGENT UPON AWARD***************
Duties & Responsibilities:
Specialist, Information System Security III (SISS3) will conduct risk and vulnerability assessments of planned and installed systems to identify vulnerabilities, risks and protection needs; conduct systems security evaluation, audits, and reviews; determine the residual risk of a package based on package content and assessment results and documenting for the Security Controls Assessor's (SCA) and higher level review.
Execute Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Specialist, Information System Security III (SISS3) will conduct systems security reviews, audits, or evaluations, as appropriate, to ensure accreditation documents are accurate and represent the current risk posture of the system.
Perform analysis of logs, events, and reporting of various data collections tools including: vulnerability monitoring via Assured Compliance Assessment System (ACAS) and related tools, Host Based Security Systems (HBSS), web content filters, Security Information and event management (SIEM), firewall systems, network devices, server devices, workstations, and intrusion detection and prevention systems (ID/PS).
Specialist, Information System Security III (SISS3) will assess impacts from observed risks and report via the Cybersecurity Program chain of command.
Executing Security Assessment Plans (SAPs) by conducting on-site testing for afloat and PIT ashore systems. Examples include executing STIGs, SRGs, ACAS scanning, and applying patches assets to obtain cybersecurity compliance and remediate vulnerabilities.
Perform the evaluation of system administrator, security engineer, and/or system owner proposed corrections to ensure compliance and best-fit solution.
Specialist, Information System Security III (SISS3) will present and submit data to management, develop reports, and produce procedural documentation in a comprehensive and cohesive manner.
Perform risk management and security engineering for Research, Development, Testing, and Evaluation (RDT&E) RMF Afloat systems include Information Assurance Vulnerability Management (IAVM) support, remediation, patching, scanning and associated boundary maintenance.
Specialist, Information System Security III (SISS3) will document residual risks in a plan of actions and milestones formatted in compliance with the current package system, currently eMASS.
Specialist, Information System Security III (SISS3) will maintain current vulnerability scan data and residual risk plan of actions and milestones in Vulnerability Remediation Asset Manager (VRAM).
Manage, attend, and support configuration control board practices.
Create and verify the accuracy of POA&Ms/RARs as identified by vulnerability actual test results.
Specialist, Information System Security III (SISS3) shall write technical documentation such as user manuals, reports, documentation, policies, presentations, Plan of Action and Milestones (POA&Ms), risk assessments, proposals, outlines, and summaries in support of both ashore and afloat systems across multiple platforms. Support developing of technical documents across multiple platforms including configuration management, milestone, issue tracking, web site content management and RMF documentation.
Specialist, Information System Security III (SISS3) may be required to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe). The estimated number of trips is 14 per year (estimated 25%-30% travel).
Other duties as assigned.
Knowledge, Skills, and Abilities (KSAs):
Ability to travel CONUS (any state in USA) and OCONUS (primarily Japan, and any country in Europe).
Proficient in Microsoft Windows Operating System Administration, including Windows 11, Windows 10, Windows 7, and Windows XP (at a minimum).
Ability to work as a team member, communicate, perform office functions and use office tools, customer focused and deliver exceptional performance.
Possess excellent organizational and file management skills and the ability to plan and execute administrative work with little supervision.
Possess excellent oral and written communication skills.
Required Certifications:
Minimum of one (1) IAT Level II listed certificate required:
CompTIA Security+ (CE)
CompTIA CySA+
GIAC Security Essentials (GSEC)
ISC² SSCP (Systems Security Certified Practitioner)
Minimum/General Experience:
Five (5) years of experience in the following:
Cybersecurity, Engineering, Test and Evaluation (T&E) or Authorization and Assessment (A&A) (formerly C&A) related field.
Information Assurance tools such as Defense Information Systems Agency (DISA) Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS).
Command line interface, PowerShell, and performing automated tasking through use of code.
Minimum Education:
College degree in any technical discipline from an accredited college or university.
Disclaimer:
The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ******************
Special Notes: Relocation is not available for these jobs
ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training.
Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
$84k-127k yearly est. 26d ago
Security Engineer
Semcon Group LLC
Cyber security analyst job in Atlantic City, NJ
Job DescriptionDescription:
At SEMCON, we are dedicated to supporting the Federal Aviation Administration (FAA) by providing top-tier technical, managerial, and professional resources to meet their needs. Our team is made up of talented individuals who contribute to a collaborative, dynamic work environment.
We believe in fostering a culture that focuses on career growth, enriching experiences, and collaboration. At SEMCON, we work together to create an environment where everyone thrives, and our collective success is greater than the sum of our parts.
We're looking for a Security Engineer to join our team at the William J. Hughes Technical Center to support the Voice Switching and Recording (VS&R) program. This role will involve performing security assessments and implementing security controls on a range of systems and technologies.
Requirements:
The Security Engineer should be proficient in Linux and will focus on Security Assessments and Security Implementation and experience should include all or a combination of the following :
Linux System Administration: (High Priority - Must have)
Proficient Linux experience (comfortable on the terminal, writing bash scripts, configuring packages and servers)
Hands-on working knowledge of Linux OS system structure and configuration (e.g. directory structure, device files, network configuration, file management)
Proficient using automation tools such as Ansible, Docker, Jenkins, etc.
System Networking: (Essential)
Hands-on experience of networking, including network design, VLAN/subnetting, configuring managed routers/switches
Knowledge of network protocol interactions
Ability to coordinate IP address/subnet requests and firewall rule requests using tables and spreadsheets
System Security: (Essential)
Experience performing hands-on port scanning & vulnerability scanning, including remediating, at the technical level, each finding in the scans, including proving false failures (why a scan result may be invalid)
Working knowledge of security standards, e.g. NIST 800-53, HSPD-23, ISO 27001
Experience performing penetration testing to verify new security controls are effective.
Familiarity using cryptographic protocols (asymmetric/symmetric ciphers, hashing, key exchange)
From a system acquisition perspective, experience documenting security requirements for Statements of Work (SOWs), Contract Data Requirements Lists (CDRLs), and Data Item Descriptions (DIDs)
Communication & Project Management: (Essential)
Strong logic/reasoning skills (e.g., can understand/analyze requirements, and identify logical gaps)
Experience conducting and participating in technical interchange meetings
Strong, clear verbal and written communication skills
Software/Programming skills: (Last Priority)
Software Development: (Important)
Proficient in two or more of: C/C++, Python, Golang, Rust
Usage of version control software (e.g., Git)
Knowledge of software design patterns and anti-patterns
Comfortable with common software data structures and algorithms
As a plus: Familiarity with embedded Linux system design and implementation, including performance optimization
A Bachelor's Degree in Computer Science, Engineering, or related discipline and at least 6-15 years of experience is preferred.
SEMCON will offers a competitive salary and complete benefits package which includes health benefits (medical, dental, vision, and life), 401K with a generous employer match, paid time off, and paid holidays. Some hybrid/telework may be available for candidates with a long commuting distance from the facility in Egg Harbor Township, NJ, however a regular on-site presence is also required.
Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. This is an in-person position with a requirement to work on site 5 days per week.
How much does a cyber security analyst earn in Ventnor City, NJ?
The average cyber security analyst in Ventnor City, NJ earns between $65,000 and $117,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Ventnor City, NJ