Cyber Security Architect
Information security analyst job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Cloud Security Engineer
Information security analyst job in Philadelphia, PA
Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis.
Contract Duration: 6 Month Contract (Potential for extension or conversion)
Required Skills & Experience
At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment.
CISSP Certification
At least six (6) years experience with information security, regulatory compliance and risk management concepts.
At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training.
Experience with Cloud and/or Virtualization technologies.
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications,
Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Daily Responsibilities
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
You will receive the following benefits:
Medical Insurance - Four medical plans to choose from for you and your family
Dental & Orthodontia Benefits
Vision Benefits
Health Savings Account (HSA)
Health and Dependent Care Flexible Spending Accounts
Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
Hospital Indemnity Insurance
401(k) including match with pre and post-tax options
Paid Sick Time Leave
Legal and Identity Protection Plans
Pre-tax Commuter Benefit
529 College Saver Plan
Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
Cloud Security Engineer
Information security analyst job in Philadelphia, PA
The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes.
Proven experience in securing a multi-cloud environment.
Proven experience with Identity and access management in the cloud
Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful.
Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure.
Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities.
Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides.
Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF
Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies.
Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders.
Mentor and support junior InfoSec engineers through documentation, training, and peer reviews.
Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred).
Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols.
Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms.
What you will do
A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also:
Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals.
Skills: Duties (cont'd):
Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies.
Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies.
Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business.
Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering.
Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption).
Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models.
Skills:
Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures.
Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series).
Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls.
Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality.
Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus.
Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus.
General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security.
Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project).
Experience with risk management frameworks.
Information Security Requirements
Understand and comply with all enterprise and IS departmental information security policies, procedures and standards.
Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information.
Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
Information Security Analyst
Information security analyst job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 1 year experience working in the IT security function.
You have good experience with Operating System, Database, Network and
Application Security
.
Additional Information
All your information will be kept confidential according to EEO guidelines. Ping me at
**********************
Easy ApplyInformation Security Specialist (US) - GRC
Information security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
Participates on complex, comprehensive or large projects and initiatives
Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications:
Experience leading assessments of audit and regulatory remediation plans, providing guidance on IT risk governance and compliance frameworks, developing governance oversight practices, identifying emerging risk themes, and leading continuous improvement projects using agile and AI technologies
Expert knowledge of IT audit and control methodologies, project and change management skills, competencies in technology controls and emerging threats, and proficiency in Agile frameworks and AI-driven solution development
7 years of IT risk experience, preferably in regulated industries and financial services, with knowledge of IT governance frameworks like ITIL, NIST, and COBIT.
Certifications such as CRISC, CISA, and optionally CISSP
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyInformation Security Analyst
Information security analyst job in Franklin Lakes, NJ
The Information Security Analyst will be a member of the Threat & Vulnerability team within Security Operations. General responsibilities focus on the identification and proactive mitigation of cyber threats, while collaborating with various teams within Information Security to support the company's strategic goals.
Essential Job Functions: The following duties and responsibilities are intended to be representative of the work performed by the incumbent(s) in this position and are not all-inclusive. The omission of a specific duty or responsibility will not preclude it from the position.
Under direction, report and communicate vulnerabilities to determine objectives, scope, analysis, and the proper actions, needed to respond to security vulnerabilities
Partner with stakeholders to document the lifecycle of vulnerabilities and provide recommendations for mitigation strategies.
Collaborate on patch validation and reporting of remediation planning and compensating controls of mitigation to address open vulnerabilities
Monitors, tracks, responds, investigates, and reports in compliance to security requirements, and partners with the responsible parties to drive timely results and remediation
Perform analysis of cyber threats and process timely tasks to help mitigate the risk of exposure.
This includes reviewing daily intelligence feeds, working with different Security Operations teams to apply technical controls to detect and protect systems.
Experience recognizing threats and conducting analysis on emerging threats.
Provide written reports and analysis of findings to communicate potential risks and impact, with a focus on business impact
Support risk reporting and escalation to cross-functional teams in a cooperative manner
Communicate incidents and vulnerabilities to stakeholders in a timely manner following internal policies and procedures; Follow-up to ensure teams carry-out short-term and long-term remediation.
Organizes and maintains documentation for internal process and procedures
Participation in after-hours incidents when required
Assist with additional projects as needed
Basic Qualifications:
Strong communication and project management skills
Requires a highly motivated, dynamic and customer-centric associate who thrives in a challenging and changing environment
Working knowledge of crisis management communication, incident response and handling methodologies, NIST cybersecurity standards and FDA cybersecurity guidance
Effective meeting management and group facilitation skills
Experience with reviewing intrusion detection systems and identifying host and network-based intrusions via intrusion detection technologies
Information Security Analyst
Information security analyst job in Philadelphia, PA
About the Role: The Network Security Engineer will design, implement, and manage secure network infrastructure to ensure uninterrupted business operations.
Responsibilities:
Configure and maintain firewalls, VPNs, and IDS/IPS systems.
Perform network security monitoring and incident response.
Conduct penetration testing and simulate attacks to identify weaknesses.
Harden routers, switches, and network devices.
Optimize performance without compromising security.
Requirements:
3+ years experience in network engineering/security.
Strong knowledge of Cisco, Palo Alto, or Fortinet firewalls.
Experience with network protocols (TCP/IP, DNS, SSL, VPN).
CCNA Security, CCNP Security, or equivalent certifications.
Required Skills:
Information Security Security
Information Security Specialist
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
Lead Information Security Analyst - Identity
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
Lead Information Security Analyst - Identity
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Head of Cyber Incident Response & Cyber Threat Mitigation Services
Information security analyst job in Bethlehem, PA
Do you want to be part of a collaborative team handling potentially challenging situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity in threat reduction efforts.
A qualified candidate should be a collaborative self-starter who has a combination of strong technical aptitude, knowledge of security attack methods/stages (e.g., MITRE), a strong mindset, strong written and oral communication and can also inspire and develop talent. They must partner across the firm to drive identification, containment, investigations, response and recovery. As part of Guardian, the successful candidate must live by the Guardian operating principles of thinking big & growing, accelerate operational excellence, wowing the consumer, and be able to lead through change with courage.
**You have**
+ The knowledge, experience, length of education needed to accomplish the desired end results.
+ 7+ years broad/deep technology experience including public clouds
+ 3+ years of leader experience in a security role, preferably involving incident response
+ Incident response methodologies and evidence handline
+ Strong written and oral communication skills
+ Experience working across functions including business, legal, HR, communications, IT.
+ Analytical and curious attitude
+ Knowledge of threat hunting and risk mitigation
+ Knowledge of NIST CSF, MITRE, and others frameworks, malware analysis concepts, types of attacks and attackers, common vulnerabilities.
+ Experience with financial services or regulated entities, US privacy regulations.
+ Ability to think in a structured and creative manner to address cyber incidents
+ Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies.
+ Ability to lead a diverse high performing team.
+ Ability to accelerate impact and lead positive cyber security change.
+ Good knowledge of SIEM tools (Splunk preferred) and logging/monitoring, insider and UBA concepts and application.
+ BS/MS in relevant experience in cyber security and/or industry related certifications desired
+ A continuous & lifelong learner.
**You will**
+ Lead a team of cyber security incident response and threat mitigation engineering professionals.
+ Be responsible for planning, design, operating Guardian's cyber incident response and cyber threat mitigations operations across the areas.
+ Run our Corporate Incident Response Team as related to cybersecurity - coordinating actions and responses across teams.
+ Manage the plans, playbooks, quick reference guides necessary - and out-of-band communication plans.
+ Engage with 1st line teams to develop muscle memory and ensure containment actions (shutdown authorities are clear).Coordinate with business continuity/disaster recovery teams to ensure integrated approach to large events.
+ Be responsible for triaging & leading cyber security incidents advanced from the security operations center
+ Manage third-party incident retainers and prepare for any future engagements.
+ Participate-in / coordinate periodic exercises with third-parties.
+ Ensure quality of security incident handling and cyber threat mitigation work.
+ Ensure incidents are appropriately tracked, reported and after-action reports documented. Ensure metrics are timely and accurate.
+ Drive our user behavior analytics (UBA) program working with the business to develop and improve appropriate logging monitoring. Develop standard operating procedures for our 1st line SOC based on threats/observed incidents.
+ Proactively identify gaps and opportunities in our logging and monitoring processes.
+ Host monthly incident response calibration/collaboration meetings across HR, physical security, fraud, legal, compliance to collaborate on issues and shared threats and knowledge
+ Communicate to various levels of the organization, both written and oral concisely and clearly.
+ Provide strong technical understanding of security control monitoring process at different layers.
+ Identify (and champion where applicable) risk mitigation.
+ Collaborate with other leaders across cybersecurity to help define and complete cybersecurity strategy, financial, vendor and talent management.
+ Contribute to the enterprise organizational Data Loss Prevention program
+ Lead, manage, guide, and mentor the staff on a regular basis, including selection/retention, goal setting, annual reviews, and compensation planning and career development.
+ Provide recommendations to management & leadership team to increase effectiveness of security technology solutions to mitigate cyber threats and handle incidents.
+ Respond to and assist with due diligence and internal / external security audit requests.
+ Identify and act on opportunities to further enhance and refine security incident handling & cyber threat mitigation processes & capabilities.
**Location and Travel**
+ Three days a week at a Guardian office in Holmdel, NJ, Bethlehem, PA, or New York, NY.
+ 20% travel to other Guardian Offices as needed
**Reporting Relationships**
As our Head of Cyber Incident Response Threat Services, you will report to Guardian's Chief Information Security Officer.
**Salary Range:**
$148,940.00 - $244,685.00
The salary range reflected above is a good faith estimate of base pay for the primary location of the position. The salary for this position ultimately will be determined based on the education, experience, knowledge, and abilities of the successful candidate. In addition to salary, this role may also be eligible for annual, sales, or other incentive compensation.
**Our Promise**
At Guardian, you'll have the support and flexibility to achieve your professional and personal goals. Through skill-building, leadership development and philanthropic opportunities, we provide opportunities to build communities and grow your career, surrounded by diverse colleagues with high ethical standards.
**Inspire Well-Being**
As part of Guardian's Purpose - to inspire well-being - we are committed to offering contemporary, supportive, flexible, and inclusive benefits and resources to our colleagues. Explore our company benefits at *********************************************** . _Benefits apply to full-time eligible employees. Interns are not eligible for most Company benefits._
**Equal Employment Opportunity**
Guardian is an equal opportunity employer. All qualified applicants will be considered for employment without regard to age, race, color, creed, religion, sex, affectional or sexual orientation, national origin, ancestry, marital status, disability, military or veteran status, or any other classification protected by applicable law.
**Accommodations**
Guardian is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. Guardian also provides reasonable accommodations to qualified job applicants (and employees) to accommodate the individual's known limitations related to pregnancy, childbirth, or related medical conditions, unless doing so would create an undue hardship. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact applicant_accommodation@glic.com .
**Current Guardian Colleagues: Please apply through the internal Jobs Hub in Workday.**
Every day, Guardian helps our 29 million customers realize their dreams through a range of insurance and financial products and services. Our Purpose, to inspire well-being, guides our dedication to the colleagues, consumers, and communities we serve. We know that people count, and we go above and beyond to prepare them for the life they want to live, focusing on their overall well-being - mind, body, and wallet. As one of the largest mutual insurance companies, we put our customers first. Behind every bright future is a GuardianTM. Learn more about Guardian at guardianlife.com .
Visa Sponsorship:
Guardian Life is not currently or in the foreseeable future sponsoring employment visas. In order to be a successful applicant, you must be legally authorized to work in the United States, without the need for employer sponsorship.
Analyst III - Information Security
Information security analyst job in Conshohocken, PA
Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today!
Job Details
Job Description for IAM Hygiene Analyst III role
This role is responsible for supporting the Execution and Improvement of IAM operations across the enterprise, specifically within the IAM Hygiene space. This role will assist with continuously detecting, remediating, and preventing identity-related risks by maintaining accurate, minimal, and secure identity data, access configurations, and authentication mechanisms, as well as assisting with other IAM Governance related functions where needed. The Analyst II will be responsible to generate possible hygiene actions (hypotheses), using approved Cencora tooling, to proactively identify and escalate potential identity-related control gaps, data integrity issues, process deficiencies, and other hygiene concerns; collaborate with stakeholders to validate gaps, evaluate root causes and drive timely remediation.
This role is key to creating and maintaining a mature IAM Hygiene function to ensure access is controlled, organized, and following the concept of “least privilege”. The ideal candidate will have hands-on experience remediating identity and access related risks.
This role works closely with more senior IAM analysts, engineers, and business stakeholders to ensure secure and efficient access to systems and data. The Analyst II also supports the development of IAM procedures, participates in user support and troubleshooting, and contributes to continuous improvement efforts. They are expected to demonstrate learning agility, attention to detail, and a strong commitment to operational excellence and user experience.
Primary Duties and Responsibilities:
Identify and take appropriate actions around unused or stale accounts.
Identify and take appropriate actions around unused or stale accounts.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Monitor and analyze identity-related activities to identify and remediate risky accounts, authorizations, and configurations, ensuring compliance with policies.
Assist in the development and maintenance of comprehensive processes for identity threat detection and response, including the creation of runbooks and workflows.
Collaborate with cross-functional teams to evaluate and align on identity analytics tools and data structures to enhance IAM capabilities.
Develop and track key performance indicators (KPIs) and key risk indicators (KRIs) for IAM hygiene, providing insights and recommendations to improve identity management practices.
Support the establishment of a culture of continuous improvement by leveraging incident learnings to refine IAM processes and protocols.
Ensure Policies and Control Standards are being followed and work toward training, awareness, and resolution where gaps are identified.
Qualifications:
4+ years of experience IAM or related field
1+ years in an IAM Hygiene or IAM Governance role
Bachelors degree or equivalent experience
Skills and Knowledge:
Behavioral:
Strong understanding of IAM concepts, practices, and technologies including Least Privilege, Privileged Access Management (PAM), Identity Lifecycle management and access controls
Familiarity with SailPoint
Familiarity with Axonius (preferred)
Familiarity with NIST framework
Strong analytical and problem-solving skills, with the ability to interpret data and make informed decisions.
Ability to operate independently and within a team structure
Effective communication and collaboration skills
Strong time management, with ability to multi-task and shift from task to task effectively in a fast-paced environment.
Technical Skills:
IAM Lifecycle and Access provisioning
Authentication Support (MFA and SSO)
IAM Policy and Standards (NIST, ISO 27001, HITRUST)
IT Risk and Compliance Awareness
Root Cause Analysis and Incident Support
Reporting and Documentation
Threat Monitoring and Alert Response
Tools Knowledge:
IAM Platforms (e.g., SailPoint, Saviynt, Okta, Ping Identity)
Directory Services (Active Directory, Azure AD)
ITSM Tools (e.g., ServiceNow)
Security Tools (SIEM, EDR, SOAR)
Programming/Scripting (e.g., Python, PowerShell, SQL)
Microsoft Office Suite
What Cencora offers
We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit **************************************
Full time Equal Employment Opportunity
Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law.
The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory.
Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned
Affiliated CompaniesAffiliated Companies: AmerisourceBergen Services Corporation
Auto-ApplyAI Security Analyst
Information security analyst job in Allentown, PA
Company Summary Statement As one of the largest investor-owned utility companies in the United States, PPL Corporation (NYSE: PPL), is committed to creating long-term, sustainable value for our 3.5 million customers, our shareowners and the communities we serve. Our high-performing regulated utilities - PPL Electric Utilities, Louisville Gas and Electric, Kentucky Utilities and Rhode Island Energy - provide an outstanding experience for our customers, consistently ranking among the best utilities in the nation. PPL's companies are also addressing challenges head-on by investing in new infrastructure and technology that is creating a smarter, more reliable and resilient energy grid. We are committed to doing our part to advance a cleaner energy future and drive innovation that enables us to achieve net-zero carbon emissions by 2050 while maintaining energy reliability and affordability for the customers and communities we serve. PPL is a positive force in the cities and towns where we do business, providing support for programs and organizations that empower the success of future generations by helping to build and maintain strong, diverse communities today.
Overview
**NOTE: This is a hybrid position requiring on-site presence three days per week at one of our local offices in: Allentown, PA (Lehigh Valley); Louisville, KY or Providence, RI.** **LI-Hy #INDPPL**
PPL is seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors' controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals.
Responsibilities
+ Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC.
+ Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines.
+ Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations.
+ Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability.
+ Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations.
+ Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection.
+ Help build awareness and training materials for secure AI development practices across agile teams.
+ All other duties and projects as assigned.
Qualifications
**Required Experience** :
+ Bachelor's degree in Computer Science, Information Security, or a related field.
+ 2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
+ Familiarity with secure coding practices, threat modeling, and cloud-native environments.
+ Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
+ Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required.
+ Strong communication and collaboration skills in agile environments (SAFe experience a plus).
+ Strong analytical skills to assess risks and vulnerabilities in complex systems.
**Preferred Qualifications** :
+ Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
+ Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
+ Experience with AI security tools (e.g., Zenity, HiddenLayer).
+ Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
+ Experience specifically in AI security or ML model governance is a strong plus.
+ Proficiency in scripting and automation for security testing is a plus.
**Required Experience** :
+ Bachelor's degree in Computer Science, Information Security, or a related field.
+ 2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
+ Familiarity with secure coding practices, threat modeling, and cloud-native environments.
+ Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
+ Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required.
+ Strong communication and collaboration skills in agile environments (SAFe experience a plus).
+ Strong analytical skills to assess risks and vulnerabilities in complex systems.
**Preferred Qualifications** :
+ Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
+ Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
+ Experience with AI security tools (e.g., Zenity, HiddenLayer).
+ Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
+ Experience specifically in AI security or ML model governance is a strong plus.
+ Proficiency in scripting and automation for security testing is a plus.
+ Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC.
+ Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines.
+ Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations.
+ Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability.
+ Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations.
+ Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection.
+ Help build awareness and training materials for secure AI development practices across agile teams.
+ All other duties and projects as assigned.
Remote Work
The company reserves the right to determine if this position will be assigned to work on-site, remotely, or a combination of both. Assigned work location may change. In the case of remote work, physical presence in the office/on-site may be required to engage in face-to-face interaction and coordination of work among direct reports and co-workers.
Equal Employment Opportunity
Our company is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, national origin, protected veteran status, sexual orientation, gender identify, genetic information, disability status, or any other protected characteristic.
Senior Information Security Analyst - Cloud/SaaS
Information security analyst job in Souderton, PA
Univest Financial Corporation (UVSP), has approximately $7.9 billion in assets and $5.4 billion in assets under management and supervision (as of June, 2025). Headquartered in Souderton, Pa. and founded in 1876, the Corporation and its subsidiaries provide a full-range of financial solutions for individuals, businesses, municipalities and nonprofit organizations in the Mid-Atlantic Region. For nearly 150 years, Univest has stayed true to our philanthropic spirit and the strength of our Committed to Local giving program is one of the things that differentiates us. In 2024, Univest donated $2.1 million to our local nonprofits and our employees volunteered more than 16,000 hours.
We are seeking a Senior Information Security Analyst to join our Souderton based Information Security Team.
Responsibilities
Ensure and continuously improve the confidentiality, integrity, and availability of corporate and customer data in alignment with the company's information security program.
Perform real-time monitoring, detection, and analysis of security events from multiple data sources on a daily basis.
Identify anomalous network traffic, monitor login activity, search for indicators of compromise, and respond appropriately to detected events.
Actively monitor and evaluate emerging threat intelligence from internal and external sources, recommending and implementing preventive and detective measures.
Participate in all phases of the incident response process, including identification, containment, eradication, recovery, and reporting.
Support information security risk assessments and reviews for new or prospective cloud and SaaS technology acquisitions.
Prepare and present evidence for internal and external audits, and assist with remediation of identified gaps.
Collaborate with IT to remediate vulnerabilities and strengthen overall security posture.
Maintain and grow professional knowledge by attending training sessions, webinars, conferences, and earning continuing professional education credits.
Comply with all laws and regulations that apply to the position, including the Univest Code of Conduct
Perform additional duties as required
Qualifications
10+ years of progressive, hands-on experience in information security support roles.
5+ years of direct experience securing and monitoring cloud and SaaS providers, ideally within a financial services environment.
Proven ability to configure, monitor, and manage security controls for Azure, M365, and AWS environments.
Skilled in the use of diverse network and endpoint security monitoring, alerting, and investigative tools across multiple platforms.
Advanced understanding of internet routing and application protocols, with strong emphasis on TCP/IP.
Effective written and verbal communication skills with the ability to explain complex technical and security concepts to non-technical audiences.
Excellent analytical, investigative, and problem-solving skills.
Demonstrated ability to work independently, collaborate across teams, and serve as a technical subject-matter expert to help guide security initiatives.
Highly self-motivated, with a track record of taking on increasing levels of responsibility.
Bachelor's degree in an information technology-related field preferred; relevant industry certifications (CISSP, Azure Security Engineer Associate, AWS Certified Security) a plus.
Wage Range:
The salary for this position ranges from $100,000 - 130,000
Benefits Overview:
Univest offer's a comprehensive benefits package that includes:
* Health Insurance: Medical, dental and vision coverage (single or family; begins the first of the month following start date)
* Retirement Plan: Participation in 401(k) plan with up to a 3% employer match after 6 months of employment
* Paid Time Off (PTO): 20 days annually (prorated your first year)
* Short Term Disability: 10 days annually of sick time with a doctors note (prorated your first year)
* Holiday Time Off: 11 paid holidays
* We offer company paid life insurance: as well as other supplemental insurances
* Tuition reimbursement
* Employee Wellness programs: including fitness club discounts and fitness tracker discounts/ annual reimbursement
* Discounts: on loan products
* Professional development trainings
Click here for Benefit Information
#Univest
#LI-Hybrid
#INDUF
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Auto-ApplyInformation Security Specialist (US) - GRC
Information security analyst job in Mount Laurel, NJ
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications:
* Experience leading assessments of audit and regulatory remediation plans, providing guidance on IT risk governance and compliance frameworks, developing governance oversight practices, identifying emerging risk themes, and leading continuous improvement projects using agile and AI technologies
* Expert knowledge of IT audit and control methodologies, project and change management skills, competencies in technology controls and emerging threats, and proficiency in Agile frameworks and AI-driven solution development
* 7 years of IT risk experience, preferably in regulated industries and financial services, with knowledge of IT governance frameworks like ITIL, NIST, and COBIT.
* Certifications such as CRISC, CISA, and optionally CISSP
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyAI Security Analyst
Information security analyst job in Allentown, PA
Description: CALLOUTS: - This role is remote. - Looking for experience with agents generative AI - Experience in security tooling like Zenity would be nice to have Seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. You will implement and maintain security guardrails for AI solutions including Traditional ML, Generative AI, and Agentic AI. You'll work within our established AI Security Controls framework, which tailors'controls by AI type and emphasizes observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure that AI-driven applications adhere to enterprise security standards and policies. You will help shape and secure the future of AI technologies across our enterprise, ensuring responsible and resilient adoption of AI in alignment with our security modernization goals.
Required Experience:
•Bachelor's degree in Computer Science, Information Security, or a related field.
•2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
•Familiarity with secure coding practices, threat modeling, and cloud-native environments.
•Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
•Knowledge of common AI risks (such as prompt injection, data poisoning, model misuse, etc.) and cybersecurity concepts (authentication, encryption, network security) is required.
•Strong communication and collaboration skills in agile environments (SAFe experience a plus).
•Strong analytical skills to assess risks and vulnerabilities in complex systems.
Preferred Qualifications:
•Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
•Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
•Experience with AI security tools (e.G., Zenity, HiddenLayer).
•Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
•Experience specifically in AI security or ML model governance is a strong plus.
•Proficiency in scripting and automation for security testing is a plus.
Systems Engineer - Cyber Security
Information security analyst job in Reading, PA
**Summary Statement:** You will be working with a team of experts to resolve issues and create new security infrastructure based on current market trends. **What you will be doing:** As a Penske Systems Engineer - Cyber Security you will maintain network, server and workstation firewall protection and provide network and application scanning, security logging, and intrusion detection capabilities. You will provide security reviews and define security models for new systems based on current trends and developments. You will also collaborate with different teams within the IT department to discuss, analyze or resolve usability issues and work on projects to update or create new security infrastructures.
**Major Responsibilities:**
- Ensure associates follow security standards through oversight of the set-up of a user's security access, administer network security access and monitor the associate's use of data systems to safeguard company information
- Provide security reviews and define security models for new systems
- Analyze and recommend security products based on their performance
- Audit access to mission critical applications and to maintain compliance documentation for SOX and PCI
- Analyze and review annual SOX and other compliance reports
- Collaborate with different teams within the IT department to discuss, analyze, or resolve usability issues
- Work on 1-3 mid to large-scale projects concurrently, assigned from department and group senior leadership
- Mentor Security Administrators and Offshore Contractors
- Define, implement, communicate and update security architecture for multiple computing platforms, operating systems, data networks, applications, and client software
- Develop, implement, communicate, and update security policies and procedures for hardware, software, and network infrastructure
- Develop, implement, and maintain tools for effective security administration and monitoring compliance IT security policies and procedures as well as detection of attempted security breaches and intrusion
- Develop, test, and update disaster recovery plans to ensure that plans achieve desired results in protecting company assets and plans meet corporate risk and business resumption goals
- Develop training material to be used to develop awareness within corporation of security policies, procedures, best practices and other issues as needed
- Detailed understanding of Cloud Security fundamentals, including cryptography and the shared responsibility model
- Other projects as assigned
**Qualifications:**
- Bachelor's degree or equivalent experience required, advanced degrees or certifications preferred
- Minimum of 3+ years' experience
- A background in auditing is also desirable
- Knowledge of current state of the art security products is required
- Firewall software/hardware
- Proxy Filtering
- Centralized Log configuration and analysis
- IDS/IPS configuration and analysis.
- SSO Infrastructure
- Network Vulnerability Scanning
- Advanced User Authentication Structures
- OS Hardening and Security
- Application vulnerability scanning
- Networking TCP/IP and packet capture applications
- Endpoint Protection solutions
- Encryption Technology
- Good documentation and presentation skills are also necessary for this position
- Familiarity with disaster recovery planning and test execution
- Regular, predictable, full attendance is an essential function of the job
- Willingness to travel as necessary, work the required schedule, work at the specific location required, complete Penske employment application, submit to a background investigation (to include past employment, education, and criminal history) and drug screening are required
**Physical Requirements:**
-The physical and mental demands described here are representative of those that must be met by an associate to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
-The associate will be required to read; communicate verbally and/or in written form; remember and analyze certain information; and remember and understand certain instructions or guidelines.
-While performing the duties of this job, the associate may be required to stand, walk, and sit. The associate is frequently required to use hands to touch, handle, and feel, and to reach with hands and arms. The associate must be able to occasionally lift and/or move up to 25lbs/12kg.
-Specific vision abilities required by this job include close vision, distance vision, peripheral vision, depth perception and the ability to adjust focus.
Penske is an Equal Opportunity Employer
**About Penske Truck Leasing/Transportation Solutions**
Penske Truck Leasing/Transportation Solutions is a premier global transportation provider that delivers essential and innovative transportation, logistics and technology services to help companies and people move forward. With headquarters in Reading, PA, Penske and its associates are driven by a dedication to excellence and a commitment to customer success. Visit Go Penske to learn more.
Job Category: Information Technology
Job Function: Software Engineering
Job Family: Information Technology
Address: 100 Gundy Drive
Primary Location: US-PA-Reading
Employer: Penske Truck Leasing Co., L.P.
Req ID: 2510735
IT - Security Analyst II
Information security analyst job in Allentown, PA
IT - Security Analyst II Duration: Contract To Hire We are seeking a passionate and technically skilled Junior to Mid-Level AI Security Analyst to join our Product Security team. This role is ideal for someone with a strong foundation in cybersecurity and a growing expertise in AI/ML systems. The selected candidate will implement and maintain security guardrails for AI solutions, including Traditional ML, Generative AI, and Agentic AI. Working within our established AI Security Controls framework, you will focus on observability, traceability, risk management, and specialized safeguards for Generative and Agentic AI. You will collaborate with the Data & AI and Product Teams to ensure AI-driven applications adhere to enterprise security standards and policies, helping to shape and secure the future of AI technologies across the enterprise.
Responsibilities:
* Collaborate with product teams to embed security into AI/ML models, pipelines, and applications throughout the SDLC.
* Conduct security reviews for AI systems, including LLMs, generative models, and data pipelines.
* Support the development of AI security policies, standards, and controls aligned with NIST, ISO, and emerging AI regulations.
* Define and implement AI-specific risk controls, including model validation, bias mitigation, and explainability.
* Collaborate with legal, compliance, and data privacy teams to ensure adherence to evolving AI regulations.
* Assist in evaluating and implementing AI security tools for observability, model scanning, and data protection.
* Help build awareness and training materials for secure AI development practices across agile teams.
* Perform all other duties and projects as assigned.
Qualifications:
* Bachelor's degree in Computer Science, Information Security, or a related field.
* 2+ years of experience in cybersecurity, with exposure to AI/ML technologies.
* Familiarity with secure coding practices, threat modeling, and cloud-native environments.
* Understanding of AI/ML concepts such as model training, inference, data labeling, and adversarial attacks.
* Knowledge of common AI risks (e.g., prompt injection, data poisoning, model misuse) and cybersecurity concepts (authentication, encryption, network security).
* Strong communication and collaboration skills in agile environments (SAFe experience a plus).
* Strong analytical skills to assess risks and vulnerabilities in complex systems.
Preferred Qualifications:
* Professional certifications such as CCSK, CEH, or AI-specific credentials are highly desirable.
* Experience with Microsoft AI security tools (MS Defender for Cloud, MS Defender for Cloud Apps, Azure AI Content Safety, MS Purview).
* Experience with AI security tools (e.g., Zenity, HiddenLayer).
* Exposure to Power Platform, Power BI, or other low-code tools, especially any experience implementing data governance or DLP (Data Loss Prevention) on those, is a plus.
* Experience specifically in AI security or ML model governance is a strong plus.
* Proficiency in scripting and automation for security testing is a plus.
About PTR Global: PTR Global is a leading provider of information technology and workforce solutions. PTR Global has become one of the largest providers in its industry, with over 5000 professionals providing services across the U.S. and Canada. For more information visit www.ptrglobal.com
At PTR Global, we understand the importance of your privacy and security. We NEVER ASK job applicants to:
* Pay any fee to be considered for, submitted to, or selected for any opportunity.
* Purchase any product, service, or gift cards from us or for us as part of an application, interview, or selection process.
* Provide sensitive financial information such as credit card numbers or banking information. Successfully placed or hired candidates would only be asked for banking details after accepting an offer from us during our official onboarding processes as part of payroll setup.
Pay Range: $60 - $65/hr. W2
The specific compensation for this position will be determined by several factors, including the scope, complexity, and location of the role, as well as the cost of labor in the market; the skills, education, training, credentials, and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits, including medical, dental, vision, and 401K contributions, as well as PTO, sick leave, and other benefits mandated by applicable state or localities where you reside or work.
If you receive a suspicious message, email, or phone call claiming to be from PTR Global do not respond or click on any links. Instead, contact us directly at +1 214-740-2424. To report any concerns, please email us at legal@pinnacle1.com
#LI-PS4
Telecommunications & IT Procurement Analyst
Information security analyst job in Lyons, PA
Job Description
Title: Telecommunications & IT Procurement Analyst
Through NRI Resource Management Services (RMS), we offer custom talent solutions to help our clients meet their evolving technology and business needs. We help effectively match the right technology professional to their organization, recruiting for contract, contract-to-hire, and direct roles. Our client in (area/region) has an immediate need for a (job title). Please note that this is a (contract/contract to hire/direct hire) opportunity with our client and NOT with NRI.
Job Purpose/Summary
The Telecommunications and IT Procurement Analyst is responsible for overseeing and optimizing all telecommunications services within the organization-such as landline, mobile, and internet-across different locations. This role includes analyzing telecom usage, auditing vendor bills, finding ways to reduce costs, and implementing process improvements, especially through automation where possible. Additionally, the analyst assists with IT procurement by coordinating with vendors and tracking the lifecycle of IT assets. Their duties also cover sourcing, negotiating, purchasing, and managing the full lifecycle of both telecommunications and IT products and services. By performing these tasks, the analyst helps the organization achieve savings, maintain contract compliance, and ensure vendors deliver top performance-all while supporting IT infrastructure and meeting business needs.
Primary Duties and Responsibilities
· Review and validate monthly invoices from telecom and internet service providers, investigating discrepancies and ensuring prompt resolution.
· Identify, evaluate, and manage suppliers of IT and telecommunications products and services.
· Negotiate contracts and pricing with vendors to achieve cost efficiency and secure favorable terms.
· Oversee purchasing activities for IT hardware, software, cloud services, and telecom plans, ensuring alignment with organizational needs.
· Monitor and assess vendor performance, ensuring service quality and contract compliance.
· Manage renewals of licenses, maintenance agreements, and support contracts in a timely manner.
· Maintain a comprehensive repository of IT and telecom contracts and administer compliance with terms and conditions.
· Collaborate with legal, finance, and IT departments during contract reviews and renewals.
· Analyze spending data to identify savings opportunities and optimize usage across IT and telecom services.
· Forecast and track IT and telecom budgets and expenditures, reporting on key performance indicators, vendor performance, and cost variances.
· Conduct total cost of ownership and ROI analyses for major acquisitions.
· Support IT asset management by coordinating procurement, deployment, and disposal of equipment and services.
· Monitor the lifecycle of telecom devices, software licenses, and hardware assets, ensuring accurate tracking and renewals.
· Serve as the point of contact for procurement-related telecom and IT issues.
· Evaluate current service plans, research vendor offerings, and recommend alternatives to maximize value and minimize expenses.
· Assist in procuring IT equipment, software, and services in accordance with budget and project requirements.
· Track IT hardware and software assets, warranties, and renewals, supporting compliance and documentation efforts.
· Provide onsite support to client sites as needed.
· Perform other duties as assigned by management.
Experience & Qualifications
3+ years of experience in IT or telecom procurement, sourcing, or vendor management.
Experience with procurement or IT asset management tools.
Education/Certification
Bachelor's Degree, preferably in Information Technology, Finance, Business Administration or related field; equivalent level of education, training and experience may be considered.
Skills & Competencies
Understanding of IT and telecommunications technologies, services, and terminology.
Strong analytical skills with attention to detail.
Proficiency in Excel and other data analysis/reporting tools.
Strong vendor negotiation or contract review skills.
Analytical thinking and problem-solving
Financial acumen and cost-awareness
Attention to detail and accuracy
Strong communication and vendor management skills
A high standard in work quality and ability to follow through is a must
Ability to multitask, prioritize, and manage time efficiently and to meet deadlines
Ability to function well in a fast-paced environment
Exceptional interpersonal skills; a team player with proven ability to work across functional areas.
Work Schedule
· Core working hours Monday - Friday 8:00 a.m. to 4:30 p.m.
Information Security Specialist (US) - Crisis Management
Information security analyst job in Mount Laurel, NJ
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications :
* Ability to coordinate with various incidents teams to manage crisis and provide updates to leadership
* Lead and manage incident response and coordination
* Previous Incident Management & Crisis Management Experience in Financial Services industry
* Detail-oriented with the ability to determine appropriate steps for timely escalation and/or resolution.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-Apply