Security Analyst 247790
Information security analyst job in Bridgeton, NJ
The Information Security Engineer is responsible for ensuring the secure operation of systems, applications, and networks. This role involves implementing and supporting security solutions, maintaining policies and standards, conducting vulnerability audits, and collaborating with SOC teams on remediation and risk reduction.
Key Responsibilities:
Implement and support security tools and projects.
Partner with the SOC for incident response and remediation.
Serve as a handoff point between projects and ongoing operations.
Support and mentor Level 1 security analysts.
Conduct risk assessments and vulnerability audits.
Maintain and enhance security policies, standards, and procedures.
Qualifications:
Bachelor's degree or equivalent experience (technical certification + 10 years IT experience).
5+ years of experience in Information Security.
Hands-on experience with enterprise firewall technologies and infrastructure communication analysis.
Familiarity with scripting, APIs, and automation.
Experience with HIPAA, PCI, and NIST CSF frameworks.
Experience with SIEM tools, DLP, and user behavior analysis.
Certifications such as CompTIA Security+, CEH, or CISSP required.
Tech Stack:
Defender for Endpoint (EDR)
Proofpoint (email security)
Palo Alto firewalls
Tenable / BigFix
Managed SOC tools (log correlation, alerts)
Microsoft 365, Active Directory
Preferred Skills:
Experience with EDR, risk scoring, and vulnerability prioritization.
Experience coordinating across SOC and infrastructure teams.
Familiarity with Proofpoint, BigFix, or Tenable.
MFA implementation experience.
Cyber Security Architect
Information security analyst job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Cloud Security Architect
Information security analyst job in Bridgewater, NJ
Practice - CIS - Cloud, Infrastructure, and Security Services
About Cloud Infrastructure & Security Services: Cognizant's Cloud, Infrastructure, and Security Services Practice (CIS), is all about embracing digital transformation by driving core modernization holistically across layers. We help customers transform infrastructure and workplace to meet the rapidly evolving needs of the digital era. Our holistic approach delivers key results for our customers by achieving cloud driven modernization and workplace and operational transformation to run the business in a secure environment.
*Please note, this role is not able to offer visa transfer or sponsorship now or in the future*
Job Summary
This role is responsible for managing and optimizing our cloud security tooling and ensuring robust cloud security operations across IaaS, PaaS, and SaaS environments. The role will involve triaging and managing cloud security issues alongside providing expert consultancy to the business on cloud security risks and driving remediation efforts. Additionally, this role involves developing automation scripts, generating actionable security reports, and enabling data-driven insights through analytics and BI tools.
In this role, you will:
Security Tooling:
Perform BAU operations for cloud security tooling across IaaS, PaaS, and SaaS platforms.
Drive and maintain full coverage of CNAPP and SSPM solutions across all cloud platforms, workloads, and SaaS applications.
Manage IAM operations related to cloud security tooling, including role-based access control, group management, and JML (Joiner-Mover-Leaver) processes.
Ensure integration and continuous improvement of security tooling to meet evolving business and compliance requirements.
Understanding of Kubernetes, Helm and YAML to support deployment of security capabilities across Kubernetes Clusters.
Security Monitoring:
Design and implement security monitoring processes to detect, analyze, and respond to potential threats.
Monitor cloud security tooling for misconfigurations, vulnerabilities, and compliance gaps collaborating with business partners to ensure timely notification and remediation within agreed SLAs.
Provide expert level consultancy to business stakeholders on cloud security risks, clearly articulating technical issues and their business impact. Where remediation is not feasible, identify and guide implementation of compensating controls.
Evaluate and clearly articulate the operational impact of configuration changes to cloud resources, ensuring informed decision-making on business continuity.
Excellent written communication in documenting cloud security risk statements used to capture, manage and drive risk remediation of cloud security issues.
Collaborate with engineering and application teams to remediate issues and continuously improve the organization's cloud security posture.
Security Reporting & Development:
Develop and maintain scripts to extract security data from APIs and transform it into consumable formats.
Generate regular and ad-hoc security reports for management, highlighting key risks, trends, and remediation progress.
Leverage BI tools (e.g., Power BI) to create dashboards and visualizations that provide actionable insights into cloud security posture.
Explore opportunities for automation and analytics to enhance operational efficiency and risk visibility.
What you need to have to be considered
5+ years of experience in cloud security engineering
Strong hands-on experience with major cloud platforms (AWS, Azure, GCP), cloud security tools and cloud-native security controls
Deep understanding of cloud security concepts, compliance frameworks, and best practices
Excellent problem-solving and analytical skills
Certifications such as CISSP, CCSP and/or cloud service provider security certifications such as AWS-SCS, AZ-500 and GCP PCSE.
Knowledge and experience working with cloud security tooling such as CSPM, CWP, CNAPP.
#LI-EF1
#CB
#Ind123
Applications will be accepted until 12 Dec 2025.
Salary and Other Compensation:
The annual salary for this position is between $[136,500 -160,000] depending on experience and other qualifications of the successful candidate.
This position is also eligible for Cognizant's discretionary annual incentive program, based on performance and subject to the terms of Cognizant's applicable plans.
Benefits: Cognizant offers the following benefits for this position, subject to applicable eligibility requirements:
· Medical/Dental/Vision/Life Insurance
· Paid holidays plus Paid Time Off
· 401(k) plan and contributions
· Long-term/Short-term Disability
· Paid Parental Leave
· Employee Stock Purchase Plan
Sailpoint Security Analyst
Information security analyst job in Pittsburgh, PA
About the Role
We are seeking a Security Analyst II to support our IAMO Transformation Program, contributing to the configuration, implementation, and support of the new SailPoint IdentityIQ (IIQ) platform. This role plays a key part in advancing our Identity and Access Management (IAM) capabilities through automation, governance, and improved operational efficiency.
The ideal candidate will leverage technical expertise in SailPoint and IAM processes to help reduce manual provisioning, streamline access management, and strengthen security controls across the enterprise.
Key Responsibilities
Configure, customize, and implement SailPoint IdentityIQ (IIQ) solutions to support enterprise IAM transformation.
Provide ongoing SailPoint product support including design, implementation, maintenance, and troubleshooting activities.
Develop and maintain workflows, forms, roles, policies, reports, certifications, and segregation of duties (SOD) controls.
Perform business-critical analysis to improve application access request and workflow processes within IAM.
Support access provisioning and remediation for audit findings, client onboarding, and offboarding activities.
Ensure compliance with corporate access certification and revocation policies.
Partner with internal stakeholders to meet Client Service Level Objectives and internal project deadlines.
Required Skills & Experience
3-5 years of experience in Identity and Access Management (IAM) or Cybersecurity.
Hands-on experience with SailPoint IdentityIQ (IIQ) design, customization, and support.
Strong understanding of IAM processes including Joiner, Mover, Leaver, Certification, and SOD workflows.
Proficiency in Project Management and Business Analysis practices.
Ability to identify, troubleshoot, and resolve complex IAM functional and technical issues.
Preferred Technical Skills
Excel, PowerPoint, SharePoint, and Jira proficiency.
IT analyst- IAM
Information security analyst job in Mount Laurel, NJ
Job Title: IT analyst ( IAM)
12-Month Contract
Schedule: Monday - Friday, core business hours (OT as needed)
Contract Duration: 12 months (extension possible, conversion possible)
Team Size: 21
About the Role:
We are looking for a detail-oriented IT professional to join our team as an Access Management / IAM Operations Analyst. In this role, you will support application and network access provisioning for Retail, Call Center, and Back Office users, ensuring compliance with access policies and minimizing operational risk. You will also provide front-line support to users and assist with onboarding new hires in AML projects.
This is a great opportunity for someone early in their IT career to gain hands-on experience in identity and access management (IAM) and work on meaningful IT operations projects.
Key Responsibilities:
Provision, modify, and remove application and network access for users in accordance with IAM policies.
Provide first-line support for access-related issues, translating technical information effectively for users.
Handle incidents related to access provisioning and escalate issues as needed.
Assist the Access Management IT Operations Manager in daily operations.
Participate in projects, including AML new-hire onboarding.
Utilize available tools and information to process requests independently while minimizing operational risk.
Maintain accurate records of access provisioning activities.
Required Qualifications:
Undergraduate degree or relevant technical certificate.
0-2 years of IT experience, preferably in access provisioning or IAM.
Knowledge of IAM principles, policies, and governance (separation of duties, access certifications).
Strong proficiency in Microsoft Excel.
Comfortable interacting with technical teams, business partners, and vendors.
Ability to work independently under general guidance.
Preferred / Nice-to-Have Skills:
Experience with SailPoint or other IAM platforms.
Knowledge of Active Directory (ARS).
Basic PowerShell scripting skills.
Why Join Us:
Work in a hybrid environment with flexibility.
Gain hands-on experience with IAM, access provisioning, and incident management.
Collaborate with a supportive IT operations team in a leading financial organization.
Opportunities for career growth, contract extension, and possible conversion.
IT Operations Analyst
Information security analyst job in Englewood, NJ
NTT DATA is a team of more than 190,000 diverse professionals, operating in more than 50 countries throughout the world. The sectors where we have activities include: telecommunications, finance, industry, utilities, energy, public administration and health.
Our mission? Offer technological solutions, business, strategy, development and maintenance of applications, while being a benchmark in consulting. All thanks to the collaboration between teams, the human quality of our people and the fact that we do not conform to what is established, we always seek innovation that brings us closer to the future.
Our essence has led us to the forefront of technology, breaking paradigms and providing solutions that truly respond to the needs of each client. Our talent has led us to be one of the top 6 technology companies in the world.
Because #Greattech, needs #GreatPeople, like you
NTT DATA is looking for high-achieving team players that are quickly adaptable to new challenges and entrepreneurial ventures. We are looking for a IT Operations Analyst to work in Englewood, NJ with our global client. This is a hybrid position, working onsite 2 days per week.
Rate: $40/hr
Responsibilities:
Act as a liaison between business stakeholders and IT department to ensure any IT related requests, etc. are managed accordingly.
Perform Level 1 (L1) triage for incoming IT related issues/requests and ensure they are managed accordingly.
Requirements:
3+ years of experience as a business analyst.
Strong communication skills.
Strong critical thinking and analytical skills.
Basic knowledge of IT Service Management, with proven experience understanding ITIL basics/fundamentals.
Previous experience working in the IT space, either functional or technical.
Why NTT DATA?
Empowerment and rewards are the cornerstone of our career development model. We are a young, fast-growing company, with a highly innovative and entrepreneurial spirit, because of this professional experience and growth will be unmatched. Our talent and positive attitude allows us to transform our goals into achievements, and projects into realities.
NTT DATA is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action-Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. NTT DATA is an Equal Opportunity Employer Male/Female/Disabled/Veteran and a VEVRAA Federal Contractor.
Sr Information Security Specialist (US) - Domain Engagement Lead
Information security analyst job in Mount Laurel, NJ
Hours:
40
Pay Details:
$113,000 - $196,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Senior Information Security Specialist leads development and/or implementation of significant or Bank-wide Technology Controls / Information Security strategies, policies, programs, tools and provides expert advice and guidance on technical solutions. Oversees control and governance activities and identifies and assesses potential security risks, breaches/ exposures impacting highly complex / high risk businesses or transformational (change the bank) strategic initiatives primarily interfacing with executive and/or functional stakeholders across the Bank.
Depth & Scope:
Works autonomously on high profile, complex and/or high risk technology projects with significant impact to the organization
Provides technical leadership / consulting / direction to a larger team / portfolio on all aspects of technology controls / information security
Foresees issues / gaps and identifies emerging industry trends (i.e. future focused)
Provides recommendations on value-added improvements / enhancements
Top technical expert individual contributor with expert knowledge of IT security and risk disciplines and practices
Advanced and highly specialized knowledge of organization, technology controls / security/ risk issues
Provides recommendations on value-added improvements / enhancements
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
10+ years of relevant experience
Preferred Qualifications :
Strong GRC experience
Understanding of core technology and security areas such as identity, cloud, data protection, and engineering practices
Security Certifications (CRISC, CISA, Security+)
Strong governance discipline, an enterprise mindset, and the ability to bring clarity, structure, and consistency across diverse teams
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyInformation Security Expert
Information security analyst job in Jersey City, NJ
Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you!
They are an equal opportunity employer and value diversity at our company.
Job Description
Strong knowledge of Information Security concepts such as:
•Encryption, Cloud and Mobile Device Security
•Data Loss and Prevention tools and solutions
•Risk-Threat Analysis and Vulnerability Assessments
•Enterprise Security Monitoring, Role-Based Access Control (RBAC)
•Identity and Access Management, Computer Forensic
•IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.)
•Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability.
What's in it for YOU?
Salary: $120000 to $140000
10% bonus, exceptional perks and benefits
Professional development training, mentoring, career coaching, and more!
Sounds like you? then ping us with your most updated resume. We'd love to talk to you!
We are excited about the companies growth and the role you will play with them.
Qualifications
Desired Skills & Experience:
You hold a Bachelor's degree in any domain.
You are certified in CISSP, or CISA, or CEH, required.
You have more than 10 years experience working in the IT security function.
You have working experience in the health care and/or financial services industries with project management and program management experience.
You have good experience with Operating System, Database, Network and Application Security.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Specialist
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The Information Security Specialist (ISS)
is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document information security policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
Jr. Information Security Analyst (Controls Testing)
Information security analyst job in Malvern, PA
At Customers Bank, we believe in working hard, working smart, working together to deliver memorable customer experiences and having fun. Our vision, mission, and values guide us along our path to achieve excellence. Passion, attitude, creativity, integrity, alignment, and execution are cornerstones of our behaviors. They define who we are as an organization and as individuals. Everyone is encouraged to have personal development plans. By doing so, our team members are on their way to achieve their highest potential and be successful in their personal and professional lives.
This role is required to be ONSITE in Malvern, PA Monday through Thursday with Friday remote.
Must be eligible to work in the U.S. without requiring sponsorship now or in the future.
Who is Customers Bank?
Founded in 2009, Customers Bank is a super-community bank with over $22 billion in assets. We believe in dedicated personal service for the businesses, professionals, individuals, and families we work with.
We get you further, faster.
Focused on you: We provide every customer with a single point of contact. A dedicated team member who's committed to meeting your needs today and tomorrow.
On the leading edge: We're innovating with the latest tools and technology so we can react to market conditions quicker and help you get ahead.
Proven reliability: We always ground our innovation in our deep experience and strong financial foundation, so we're a partner you can trust.
What you'll do:
* Control Testing & Evaluation: Assist in definition of and execute testing procedures to assess the design and effectiveness of key internal controls across business units, technology, and operational processes.
* Risk & Compliance Alignment: Ensure testing activities are aligned with regulatory standards (SOX, FFIEC, FDIC, etc.) and internal policies.
* Issue Identification & Reporting: Document test results, identify control deficiencies, and provide clear recommendations for remediation.
* Collaboration: Work closely with business process owners, auditors, compliance, and risk teams to ensure timely resolution of identified issues.
* Process Improvement: Recommend enhancements to testing methodologies, control design, and risk management practices to strengthen the bank's control environment. Maintain awareness of industry regulatory environment and threat landscape.
* Documentation & Communication: Prepare executive-ready reports, dashboards, and presentations for senior management and regulators, and information technology peers.
* Continuous Monitoring: Participate in ongoing monitoring and follow-up activities to confirm remediation effectiveness and sustainability.
What do you need?
* Must-Haves
* 3+ years of experience in internal audit, compliance testing, risk management, or internal controls.
* Strong knowledge of information security and IT risk control frameworks (e.g., COSO, COBIT, NIST).
* Understanding of financial, operational, and IT control environments.
* Strong analytical skills with attention to detail and accuracy.
* Excellent written and verbal communication skills with the ability to present complex findings clearly.
* Bachelor's degree in information systems, or related field.
* Key Skills
* Risk and control assessments in highly regulated environments
* Understanding of information technology infrastructure (networking, Active Directory, backups, etc.)
* Process analysis and documentation.
* Strong interpersonal skills to work across departments.
* Proficiency with Microsoft Office applications (Excel, Word, PowerPoint).
* Develop and maintain working relationships with audit, GRC, and IT teams to promote continuous control awareness and improvements.
* Nice-to-Haves
* Professional certifications such as CIA, CISSP, CISA, Microsoft certifications, or CRMA.
* Experience with GRC (Governance, Risk, and Compliance) tools.
* Banking or financial services industry experience
Customers Bank is an equal opportunity employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
We also provide "reasonable accommodations", upon request, to qualified individuals with disabilities, in accordance with the Americans with Disabilities Act and applicable state and local laws.
Diversity Statement:
At Customers Bank, we believe in working smart, working together, and having fun while delivering innovative solutions and memorable experiences for our customers. We are committed to the continual advancement of a culture which reflects the value we place on diversity, equity, and inclusion. We honor the diverse experiences, perspectives, and identities of our team members, and we recognize that it is their passion, creativity, and integrity that drives our success. Step into your future with us! Let's take on tomorrow.
Auto-ApplyInformation Security Analyst- Top Secret Clearance Required
Information security analyst job in West Mifflin, PA
Opportunity
Information Security Analyst to support cybersecurity initiatives across various network systems, focusing on protecting data integrity and system security. They will implement the Risk Management Framework, conduct audits, monitor for vulnerabilities, manage encryption, and respond to security breaches. The Information Security Analyst will also perform routine IT tasks with varying complexity to maintain overall system protection.
Key Responsibilities
Implement and manage the Risk Management Framework (RMF) to ensure compliance and secure system operations
Provide ongoing cybersecurity support across a variety of network systems
Conduct IT audits, develop and refine monitoring strategies, review access controls, identify system vulnerabilities, manage data encryption, and respond to security incidents
Perform a range of routine and complex IT tasks to support daily operations and system integrity
Safeguard the confidentiality, integrity, and availability of computer networks, systems, and data
Qualifications
Requirements
Bachelor's Degree and 4+ years of experience
OR, Associate's degree with 6+ years of experience
OR, High School Degree and 10+ years of experience
ISC2, CISSP, or similar certification with customer approval
Active Top Secret or Q security clearance
Preferred Qualifications
Excellent customer support experience and soft skills to ensure end-user satisfaction
Ability to lead small teams or projects through cross functional coordination/collaboration with other departments
Assist key stakeholders in overall project execution and find solutions through creative problem solving
Ability to demonstrate proven success with adaptability - willingness to evolve with technology while ensuring data accuracy standards
Salary
100-130k
About IMG
Founded in 1987, IMG is a leading small business that exemplifies competence, integrity and follow-through. We consistently provide customer focused professional services, which ensures our company is recognized for continually exceeding expectations. We believe that at the core of our success stand our people. Our people have provided professional services in the Information Technology field for our customers with a commitment to customer satisfaction for over 35 years.
IMG Benefits:
Health, dental, vision, and life insurance
Short term and long term disability insurance
401(k) with generous company match
Health Savings Accounts (HSA)
Personal leave plus paid federal holidays
Professional development and training assistance
IMG is an equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Auto-ApplyLead Information Security Analyst - Identity
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
Lead Information Security Analyst - Identity
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
Information Security Analyst
Information security analyst job in Philadelphia, PA
A best-in-class city that attracts best-in-class talent, Philadelphia is an incredible place to build a career. From our thriving arts scene and rich history to our culture of passion and grit, there are countless reasons to love living and working here. With a workforce of over 30,000 people, and more than 1,000 different job categories, the City of Philadelphia offers boundless opportunities to make an impact.
As an employer, the City of Philadelphia values inclusion, integrity, innovation, empowerment, and hard work above all else. We offer a vibrant work environment, comprehensive health care and benefits, and the experience you need to grow and excel. If you're interested in working with a passionate team of people who care about the future of Philadelphia, start here.
What We Offer:
• Impact - The work you do here matters to millions.
• Growth - Philadelphia is growing, why not grow with it?
• Diversity & Inclusion - Find a career in a place where everyone belongs.
• Benefits - We care about your well-being.
The Office of Innovation & Technology (OIT) is the central IT agency for the City of Philadelphia headed by the Chief Information Officer (CIO). OIT oversees all major information and communications technology initiatives for the City of Philadelphia - increasing the effectiveness of the information technology infrastructure, where the services provided are advanced, optimized, and responsive to the needs of the City of Philadelphia's businesses, residents, and visitors. OIT responsibilities include: identifying the most effective approach for implementing new information technology directions throughout city government; improving the value of the city's technology assets and the return on the city's technology investments; ensuring data security continuity; planning for continuing operations in the event of disruption of information technology or communications services; and supporting accountable, efficient and effective government across every city department, board, commission and agency.
Job Description
The Information Security Analyst - Security Operations Center (SOC) position will play a critical role in the City of Philadelphia's, Information Security Group's, monitoring, detecting, analyzing, and responding to cybersecurity threats in real time. This position is responsible for safeguarding the City's digital infrastructure by leveraging advanced security tools, threat intelligence, and incident response protocols. The ideal candidate will have hands-on experience in a SOC environment, a strong understanding of cyber threat landscapes, and the ability to collaborate across departments.
Essential Functions
Monitor and analyze security events using SIEM and other SOC tools.
Detect, investigate, and respond to cybersecurity incidents.
Conduct vulnerability assessments and penetration testing.
Document and communicate risks, incidents, and remediation plans.
Develop and maintain security monitoring procedures and incident response playbooks.
Track and report on the effectiveness of security controls and technologies.
Support compliance efforts with relevant regulatory frameworks (e.g., NIST, CJIS, HIPAA).
Participate in security projects and continuous improvement initiatives.
Perform other duties as assigned.
Competencies, Knowledge, Skills and Abilities
An Information Security Analyst plays a critical role in protecting the City's information systems and data from security breaches, cyber threats, and other vulnerabilities. Some core competencies required for this position include, but not limited to:
Technical Proficiency
Experience with SIEM, EDR, IDS/IPS, firewalls, and vulnerability management tools. (e.g, Splunk, Crowdstrike, Nessus, Rapid7, CloudFlare)
Strong understanding of Windows, Linux, and network security principles.
Familiarity with GRC platforms and forensic tools.
Cybersecurity Expertise
Knowledge of threat intelligence, attack vectors, and incident response.
Understanding of regulatory frameworks (e.g, NIST, HIPAA, CJIS, PCI-DSS, OWASP, etc.).
Ability to conduct ethical hacking and penetration testing using available tools is preferred but not required.
Analytical & Communication Skills
Strong critical thinking and problem-solving abilities.
Ability to communicate technical issues to non-technical stakeholders.
Skilled in writing clear, actionable reports and documentation.
Professional Attributes
High ethical standards and commitment to confidentiality.
Adaptability to evolving threats and technologies.
Collaborative mindset and ability to work across departments.
Continuous learner and cybersecurity community contributor.
Qualifications
Minimum of 3 years of experience in a SOC or cybersecurity analyst role.
Experience in government, higher education, or large enterprise environments preferred.
Bachelor's degree in Computer Science, Information Security, or related field preferred.
Relevant industry and/or vendor certifications (e.g., CompTIA Security+, CEH, GCIA, GCIH, CISSP) required.
Must pass a CJIS background check.
Must be a Philadelphia resident within six months of hire.
Or an acceptable combination of the above acceptable to OIT.
Additional Information
Salary: $70k-$90k
Important: To be considered, candidates must provide a cover letter and resume.
All applications should include the following:
• A one-page cover letter clarifying your interest and qualifications for the role. It really helps us understand why you're interested in this position. We read every single one!
• Your resume or curriculum vitae.
• Optionally, an online professional portfolio or public GitHub account.
We won't accept or review incomplete applications.
Work Setting: in-person (onsite)
Discover the Perks of Being a City of Philadelphia Employee:
• We offer Comprehensive health coverage for employees and their eligible dependents
• Our wellness program offers eligibility into the discounted medical plan
• Employees receive paid vacation, sick leave, and holidays
• Generous retirement savings options are available
• Pay off your student loans faster - As a qualifying employer, City of Philadelphia employees are eligible to participate in the Public Service Loan Forgiveness program. Join the ranks of hundreds of employees who have already benefited from this program and achieved student loan forgiveness.
• Enjoy a Free Commute on SEPTA - Starting September 1, 2023, eligible City employees will no longer have to worry about paying for SEPTA public transportation. Whether you're a full-time, part-time, or provisional employee, you can seize the opportunity to sign up for the SEPTA Key Advantage Program and receive free Key cards for free rides on SEPTA buses, trains, trolleys, and regional rails.
• Unlock Tuition Discounts and Scholarships - The City of Philadelphia has forged partnerships with over a dozen esteemed colleges and universities in the area, ensuring that our employees have access to a wide range of tuition discounts and scholarships. Experience savings of 10% to 40% on your educational expenses, extending not only to City employees but in some cases, spouse and dependents too!
Join the City of Philadelphia team today and seize these incredible benefits designed to enhance your financial well-being and personal growth!
*The successful candidate must be a city of Philadelphia resident within six months of hire
Effective May 22, 2023, vaccinations are no longer required for new employees that work in non-medical, non-emergency or patient facing positions with the City of Philadelphia. As a result, only employees in positions providing services that are patient-facing medical care (ex: Nurses, doctors, emergency medical personnel), must be fully vaccinated.
The City of Philadelphia is an Equal Opportunity employer and does not permit discrimination based on race, ethnicity, color, sex, sexual orientation, gender identity, religion, national origin, ancestry, age, disability, marital status, source of income, familial status, genetic information or domestic or sexual violence victim status. If you believe you were discriminated against, call the Philadelphia Commission on Human Relations at ************ or send an email to *****************.
Cyber Security Analyst
Information security analyst job in New Jersey
Founded over 35 years ago, First Quality is a family-owned company that has grown from a small business in McElhattan, Pennsylvania into a group of companies, employing over 5,000 team members, while maintaining our family values and entrepreneurial spirit. With corporate offices in New York and Pennsylvania and 8 manufacturing campuses across the U.S. and Canada, the companies within the First Quality group produce high-quality personal care and household products for large retailers and healthcare organizations. Our personal care and household product portfolio includes baby diapers, wipes, feminine pads, paper towels, bath tissue, adult incontinence products, laundry detergents, fabric finishers, and dishwash solutions. In addition, we manufacture certain raw materials and components used in the manufacturing of these products, including flexible print and packaging solutions.
Guided by our values of humility, unity, and integrity, we leverage advanced technology and innovation to drive growth and create new opportunities. At First Quality, you'll find a collaborative environment focused on continuous learning, professional development, and our mission to Make Things Better.
We are actively seeking an experienced Cyber Security Analyst to join our Security Operations Center in Great Neck, New York, or work in a hybrid capacity from CT, GA, NY, NJ, PA, or SC. In this role, you will be responsible for incident detection, investigation and response, rules development tuning and improvement, defining and developing automations, and incorporating Threat Intelligence and Threat Hunting activities to enhance detection and mitigation strategies.
Primary responsibilities include:
* Incident Detection and Response - Monitor and analyze alerts generated by SIEM/SOAR platforms and user reports, investigate security incidents, and execute containment and eradication procedures to minimize impact and restore normal operations.
* Tuning & Optimization - Continuously refine detection rules and SOC processes to reduce false positives, enhance detection accuracy, and improve overall operational efficiency.
* Research & Development - Explore emerging threats and attack techniques to develop and implement new detection rules to expand visibility and strengthen the organization's security posture.
* Threat Hunting - Proactively hunt for hidden threats by analyzing logs and identifying gaps missed by existing security tools and improve security posture.
* Threat Intelligence - Review threat intelligence feeds, channels and articles to identify potential risks and proactively strengthen defenses.
* Automation Development - Design, implement, and maintain automation solutions to streamline SOC workflows, reduce manual effort, and accelerate incident response times.
* Reporting - Prepare and present comprehensive reports on key SOC activities, metrics, and security trends to stakeholders and management.
* Penetration Testing - Participate in Red and Purple Team exercises to assess and improve the effectiveness of security controls and incident response capabilities.
The ideal candidate should possess the following:
* Bachelor's degree in Computer Security, Cybersecurity, Information Security, or a related field preferred. Additional relevant experience may be considered in lieu of a degree.
* Experience with advanced SIEM content development, including custom correlation rules, dashboards, and reporting.
* Minimum of 1 year of experience working in a Security Operations Center (SOC) environment, either in-house or with a Managed Security Service Provider (MSSP).
* Proficiency in scripting languages such as Python, PowerShell, or Bash for automating security tasks and processes.
* Direct involvement in end-to-end incident response, including root cause determination and post-incident reporting.
* Experience monitoring and securing cloud environments (e.g., Microsoft Azure, AWS, Google Cloud Platform).
* Hands-on experience working with SIEM (e.g. Splunk, Microsoft Sentinel, Qradar)
* Familiarity with EDR solutions like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint or Cortex XDR.
* Understanding and familiarity with interpreting common log sources for monitoring and investigation (e.g. Firewall, Azure AD, Windows Security Log, Email, Proxy\URL Filtering etc.)
* Solid grasp of prevalent attack types, including phishing, brute-force attacks, malware, and data exfiltration techniques.
* Excellent verbal and written communication skills, with the ability to collaborate effectively with team members both within and outside the SOC.
* High level of situational awareness and problem sensitivity, with the ability to proactively identify issues and escalate concerns as appropriate.
* Demonstrated proactive mindset, strong sense of responsibility, and urgency in addressing security incidents and tasks.
* Ability to work independently, manage multiple priorities, and succeed in a fast-paced, dynamic environment.
* Strong motivation and willingness to continually learn and grow, adapting to new tools and evolving threat landscapes.
What We Offer You
We believe that by continuously improving the quality of our benefits, we can help to raise the quality of life for our team members and their families. At First Quality you will receive:
* Competitive base salary and bonus opportunities
* Paid time off (three-week minimum)
* Medical, dental and vision starting day one
* 401(k) with employer match
* Paid parental leave
* Child and family care assistance (dependent care FSA with employer match up to $2500)
* Bundle of joy benefit (year's worth of free diapers to all team members with a new baby)
* Tuition assistance
* Wellness program with savings of up to $4,000 per year on insurance premiums
* ...and more!
The estimated annual base salary range for this position is $110,000 - $140,000.
Base pay is only part of our total compensation package, which also includes an attractive annual discretionary bonus and robust suite of employee benefits for which you are eligible to participate in starting on your first day of employment.
Base pay offered will be determined on an individualized basis and we will consider your location, experience, and other job-related factors.
First Quality is committed to protecting information under the care of First Quality Enterprises commensurate with leading industry standards and applicable regulations. As such, First Quality provides at least annual training regarding data privacy and security to employees who, as a result of their role specifications, may come in to contact with sensitive data.
First Quality is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, sexual orientation, gender identification, or protected Veteran status.
Auto-ApplyHead of Cyber Incident Response & Cyber Threat Mitigation Services
Information security analyst job in Bethlehem, PA
Do you want to be part of a collaborative team handling potentially challenging situations as a leader of our cyber incident response and threat mitigation? The ideal candidate demonstrates analytical skills, leadership, and curiosity in threat reduction efforts.
A qualified candidate should be a collaborative self-starter who has a combination of strong technical aptitude, knowledge of security attack methods/stages (e.g., MITRE), a strong mindset, strong written and oral communication and can also inspire and develop talent. They must partner across the firm to drive identification, containment, investigations, response and recovery. As part of Guardian, the successful candidate must live by the Guardian operating principles of thinking big & growing, accelerate operational excellence, wowing the consumer, and be able to lead through change with courage.
**You have**
+ The knowledge, experience, length of education needed to accomplish the desired end results.
+ 7+ years broad/deep technology experience including public clouds
+ 3+ years of leader experience in a security role, preferably involving incident response
+ Incident response methodologies and evidence handline
+ Strong written and oral communication skills
+ Experience working across functions including business, legal, HR, communications, IT.
+ Analytical and curious attitude
+ Knowledge of threat hunting and risk mitigation
+ Knowledge of NIST CSF, MITRE, and others frameworks, malware analysis concepts, types of attacks and attackers, common vulnerabilities.
+ Experience with financial services or regulated entities, US privacy regulations.
+ Ability to think in a structured and creative manner to address cyber incidents
+ Ability to process cyber threat intelligence and translate into actionable mitigation techniques and strategies.
+ Ability to lead a diverse high performing team.
+ Ability to accelerate impact and lead positive cyber security change.
+ Good knowledge of SIEM tools (Splunk preferred) and logging/monitoring, insider and UBA concepts and application.
+ BS/MS in relevant experience in cyber security and/or industry related certifications desired
+ A continuous & lifelong learner.
**You will**
+ Lead a team of cyber security incident response and threat mitigation engineering professionals.
+ Be responsible for planning, design, operating Guardian's cyber incident response and cyber threat mitigations operations across the areas.
+ Run our Corporate Incident Response Team as related to cybersecurity - coordinating actions and responses across teams.
+ Manage the plans, playbooks, quick reference guides necessary - and out-of-band communication plans.
+ Engage with 1st line teams to develop muscle memory and ensure containment actions (shutdown authorities are clear).Coordinate with business continuity/disaster recovery teams to ensure integrated approach to large events.
+ Be responsible for triaging & leading cyber security incidents advanced from the security operations center
+ Manage third-party incident retainers and prepare for any future engagements.
+ Participate-in / coordinate periodic exercises with third-parties.
+ Ensure quality of security incident handling and cyber threat mitigation work.
+ Ensure incidents are appropriately tracked, reported and after-action reports documented. Ensure metrics are timely and accurate.
+ Drive our user behavior analytics (UBA) program working with the business to develop and improve appropriate logging monitoring. Develop standard operating procedures for our 1st line SOC based on threats/observed incidents.
+ Proactively identify gaps and opportunities in our logging and monitoring processes.
+ Host monthly incident response calibration/collaboration meetings across HR, physical security, fraud, legal, compliance to collaborate on issues and shared threats and knowledge
+ Communicate to various levels of the organization, both written and oral concisely and clearly.
+ Provide strong technical understanding of security control monitoring process at different layers.
+ Identify (and champion where applicable) risk mitigation.
+ Collaborate with other leaders across cybersecurity to help define and complete cybersecurity strategy, financial, vendor and talent management.
+ Contribute to the enterprise organizational Data Loss Prevention program
+ Lead, manage, guide, and mentor the staff on a regular basis, including selection/retention, goal setting, annual reviews, and compensation planning and career development.
+ Provide recommendations to management & leadership team to increase effectiveness of security technology solutions to mitigate cyber threats and handle incidents.
+ Respond to and assist with due diligence and internal / external security audit requests.
+ Identify and act on opportunities to further enhance and refine security incident handling & cyber threat mitigation processes & capabilities.
**Location and Travel**
+ Three days a week at a Guardian office in Holmdel, NJ, Bethlehem, PA, or New York, NY.
+ 20% travel to other Guardian Offices as needed
**Reporting Relationships**
As our Head of Cyber Incident Response Threat Services, you will report to Guardian's Chief Information Security Officer.
**Salary Range:**
$148,940.00 - $244,685.00
The salary range reflected above is a good faith estimate of base pay for the primary location of the position. The salary for this position ultimately will be determined based on the education, experience, knowledge, and abilities of the successful candidate. In addition to salary, this role may also be eligible for annual, sales, or other incentive compensation.
**Our Promise**
At Guardian, you'll have the support and flexibility to achieve your professional and personal goals. Through skill-building, leadership development and philanthropic opportunities, we provide opportunities to build communities and grow your career, surrounded by diverse colleagues with high ethical standards.
**Inspire Well-Being**
As part of Guardian's Purpose - to inspire well-being - we are committed to offering contemporary, supportive, flexible, and inclusive benefits and resources to our colleagues. Explore our company benefits at *********************************************** . _Benefits apply to full-time eligible employees. Interns are not eligible for most Company benefits._
**Equal Employment Opportunity**
Guardian is an equal opportunity employer. All qualified applicants will be considered for employment without regard to age, race, color, creed, religion, sex, affectional or sexual orientation, national origin, ancestry, marital status, disability, military or veteran status, or any other classification protected by applicable law.
**Accommodations**
Guardian is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. Guardian also provides reasonable accommodations to qualified job applicants (and employees) to accommodate the individual's known limitations related to pregnancy, childbirth, or related medical conditions, unless doing so would create an undue hardship. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact applicant_accommodation@glic.com .
**Current Guardian Colleagues: Please apply through the internal Jobs Hub in Workday.**
Every day, Guardian helps our 29 million customers realize their dreams through a range of insurance and financial products and services. Our Purpose, to inspire well-being, guides our dedication to the colleagues, consumers, and communities we serve. We know that people count, and we go above and beyond to prepare them for the life they want to live, focusing on their overall well-being - mind, body, and wallet. As one of the largest mutual insurance companies, we put our customers first. Behind every bright future is a GuardianTM. Learn more about Guardian at guardianlife.com .
Security Analyst/Engineer
Information security analyst job in Warrington, PA
Who We Are…
Since our founding in 1901, Limbach's primary core value has always been simple: We Care. That commitment extends to our people, our customers, and the communities we serve-driving a culture of belonging across our industry.
Limbach Facility Services LLC, a subsidiary of Limbach Holdings, Inc., (NASDAQ: LMB), is a leading building systems solutions firm delivering mission-critical systems that support life's most important moments. We specialize in revitalizing and maintaining HVAC, mechanical, electrical, plumbing, and control systems within existing facilities-ensuring buildings are always ready to perform when it matters most.
Learn more about Limbach by checking out our YouTube channel: We Are Limbach - YouTube
From healthcare and education to government and commercial facilities, we partner with building owners and operators to safeguard reliability, efficiency, and comfort where it's needed most.
Our vision is to create value for building owners targeting opportunities for long term relationships.
Our purpose is to create great opportunities for people.
Learn more about Limbach's commitment to our people and career opportunities, straight from our employees via the Limbach Unlocked podcast: Limbach Unlocked - Why We Chose Limbach
We carry out our vision and purpose through a commitment to our four core values…
We Care
We Act with Integrity
We Are Innovative
We Are Accountable
The Benefits & Perks…
Base salary range of $120K - $130K
Full portfolio of medical, dental, and vision benefits, along with 401K plan and company match.
HSA, FSA, and life insurance offerings.
Maximize your professional development with our award-winning Learning & Engagement team.
Engage in our “We Care” culture through our ERGs, brought to you by EMBRACE.
Career pathing flexibility and mobility.
Who You Are…
As Security Analyst / Engineer, you will serve as the organization's primary, hands-on security operations lead. Reporting directly to the CIO, the candidate will triage SOC outputs, tune detection logic, drive automated response through SOAR playbooks, own the vulnerability management lifecycle, and lead incident response from detection through remediation and post-incident lessons learned. They act as a trusted partner to our outsourced SOC, the quarterback for IR, and the technical voice to the CIO and Board on operational security posture working closely with our IT Operations leader.
This Position…
Some examples of the work you might do includes:
Security Operations & Monitoring: Serves as the primary liaison to our outsourced SOC and vCISO. Triage, validate, and prioritize alerts from SIEM (e.g., Google Chronicle, GrayMatter, or equivalent). Ensures log integrity, enrichment, and actionable alerting.
SOAR & Automation: Builds, maintains, and iterates SOAR playbooks (Google SOAR or comparable) to automate containment, enrichment, and evidence collection; lowers MTTR by automating low-risk actions while preserving human judgment for high-impact events.
Incident Response: Lead detection → containment → eradication → recovery workflows. Owns post-incident reviews, creates remediation roadmaps, and tracks closure of corrective actions. Conducts regular tabletop exercises and maintains IR runbooks and escalation paths.
EDR/MDR/XDR Management: Administers and tunes EDR/MDR/XDR platforms (deployment health, telemetry, detection rules, containment capabilities). Investigates endpoint events, performs root cause analysis, and coordinates remediation with IT operations.
Vulnerability Management: Operates the vulnerability management program (Rapid7, Tenable.io, or equivalent): schedules scans, triages findings, prioritizes by risk and asset criticality, and shepherds remediation with engineering teams. Proposes and verifies system hardening measures and baselines.
Detection Engineering: Authors correlation rules, analytic searches, and detection content; reduces false positives while increasing meaningful detections. Builds dashboards and KPIs that communicate detection coverage and efficacy.
M&A & Integration Security: Leads security due diligence and integration activities for acquisitions: identities & accesses reviews, vulnerability scans, endpoint posture checks, and integration playbooks to onboard new entities into Limbach's security baselines.
Training & Knowledge Transfer: Develops and delivers IR and detection training for IT and business teams. Produces clear operational documentation, SOPs, and playbooks. Coaches SOC engineers and champions continuous improvement.
Reporting & Executive Communication: Produces monthly operational and executive risk reports (incidents, vulnerability trends, MTTR, coverage gaps). Briefs the CIO and Board with concise risk-based recommendations.
Third-Party Coordination: Manages relationships and SLAs with MDR/MSSP/MDR providers, forensic firms, and other security partners.
What You Need…
5+ years of progressive, hands-on cybersecurity experience, with significant time spent in SOC and incident response environments.
Demonstrated expertise with SIEM and SOAR platforms (Google Chronicle, GrayMatter, Chronicle SOAR, or comparable).
Proven track record managing EDR/MDR/XDR solutions and performing endpoint investigations.
Hands-on experience owning vulnerability programs with Rapid7, Tenable.io, or similar tooling.
Experience writing detection logic, playbooks, and incident runbooks; demonstrable success in alert tuning and automation.
Real-world experience coordinating cross-functional incident response activities and driving remediation to completion.
Scripting and automation skills (PowerShell, Python, Bash) to automate enrichment, containment, and evidence collection.
Strong Windows and Linux administration/forensics fundamentals; network fundamentals and packet-level troubleshooting.
Familiarity with cloud security (Azure, Microsoft 365, Intune, Conditional Access) and endpoint management tools.
Knowledge of security controls, hardening standards, and configuration baselines.
Ability to read and interpret logs and telemetry across endpoints, network devices, and cloud services.
Superior written and verbal communication; able to explain technical findings to non-technical and executive audiences.
Decisive under pressure, methodical in evidence collection, and disciplined in documentation.
Collaborative, tactful, and experienced at working with cross-functional teams (IT ops, HR, Legal, vendor partners).
Strong project management and organizational skills with an eye for measurable outcomes.
Ability to travel up to 15% of the time.
Preferred Qualifications:
Certifications: CISSP, GCIH, GCFA, ECIH, or Security+ (or equivalent).
Prior role as a dedicated incident responder or IR team lead.
Experience with Microsoft Defender for Endpoint, Azure Security Center, and native cloud telemetry.
Familiarity with compliance frameworks (SOC 2, NIST CSF/800-171, ISO 27001) and how detection/IR maps to them.
Experience in multi-site enterprise environments and with M&A integration security.
Conduct Standards:
Maintains appropriate Company confidentiality at all times.
Protects the assets of the Company and ethically upholds the Code of Conduct & Ethics in all situations.
Cultivates and promotes the “Hearts & Minds” safety culture.
Consistently exemplifies the Core Values of the Company (we CARE, we act with INTEGRITY, we are INNOVATIVE, and we are ACCOUNTABLE).
Work Environment:
This position operates primarily in an office environment and routinely utilizes standard office equipment, such as computers, phones, copiers, and filing cabinets.
The Company's Remote Work Policy is applicable to this position.
Physical Demands:
In performing the duties of this job, the incumbent is regularly required to talk, hear, perform repetitive motion, and possess an appropriate degree of both visual acuity and manual dexterity.
This is considered a sedentary position, which means possible exertion up to ten (10) pounds of force occasionally, and/or negligible amount of force frequently or constantly to lift, carry, push, pull, or otherwise move objects.
This job description is intended to describe the general nature of work being performed by the individual who assumes this role, not an exhaustive list of responsibilities. Duties, responsibilities, and activities may change at any time, with or without notice, as business needs dictate. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position. Limbach Facility Services LLC is an Equal Opportunity Employer.
#LFS
Information Security Specialist (US) - Penetration Tester
Information security analyst job in Mount Laurel, NJ
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
Job Description:
The Information Security Specialist - Penetration Tester defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area.
Responsibilities:
* Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
* Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
* Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
* Develop and Execute Test Plans: Design and execute detailed test plans
* Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
* Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
* Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
* Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies
Depth & Scope:
* Participates on complex, comprehensive or large projects and initiatives
* Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors
* Has advanced knowledge of organization, technology controls / security/ risk issues
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
* Expert knowledge of IT security and risk disciplines and practices
Preferred Qualifications :
* Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
* Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
* Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
* Familiarity with security standards and frameworks Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplyTelecommunications & IT Procurement Analyst
Information security analyst job in Lyons, PA
Job Description
Title: Telecommunications & IT Procurement Analyst
Through NRI Resource Management Services (RMS), we offer custom talent solutions to help our clients meet their evolving technology and business needs. We help effectively match the right technology professional to their organization, recruiting for contract, contract-to-hire, and direct roles. Our client in (area/region) has an immediate need for a (job title). Please note that this is a (contract/contract to hire/direct hire) opportunity with our client and NOT with NRI.
Job Purpose/Summary
The Telecommunications and IT Procurement Analyst is responsible for overseeing and optimizing all telecommunications services within the organization-such as landline, mobile, and internet-across different locations. This role includes analyzing telecom usage, auditing vendor bills, finding ways to reduce costs, and implementing process improvements, especially through automation where possible. Additionally, the analyst assists with IT procurement by coordinating with vendors and tracking the lifecycle of IT assets. Their duties also cover sourcing, negotiating, purchasing, and managing the full lifecycle of both telecommunications and IT products and services. By performing these tasks, the analyst helps the organization achieve savings, maintain contract compliance, and ensure vendors deliver top performance-all while supporting IT infrastructure and meeting business needs.
Primary Duties and Responsibilities
· Review and validate monthly invoices from telecom and internet service providers, investigating discrepancies and ensuring prompt resolution.
· Identify, evaluate, and manage suppliers of IT and telecommunications products and services.
· Negotiate contracts and pricing with vendors to achieve cost efficiency and secure favorable terms.
· Oversee purchasing activities for IT hardware, software, cloud services, and telecom plans, ensuring alignment with organizational needs.
· Monitor and assess vendor performance, ensuring service quality and contract compliance.
· Manage renewals of licenses, maintenance agreements, and support contracts in a timely manner.
· Maintain a comprehensive repository of IT and telecom contracts and administer compliance with terms and conditions.
· Collaborate with legal, finance, and IT departments during contract reviews and renewals.
· Analyze spending data to identify savings opportunities and optimize usage across IT and telecom services.
· Forecast and track IT and telecom budgets and expenditures, reporting on key performance indicators, vendor performance, and cost variances.
· Conduct total cost of ownership and ROI analyses for major acquisitions.
· Support IT asset management by coordinating procurement, deployment, and disposal of equipment and services.
· Monitor the lifecycle of telecom devices, software licenses, and hardware assets, ensuring accurate tracking and renewals.
· Serve as the point of contact for procurement-related telecom and IT issues.
· Evaluate current service plans, research vendor offerings, and recommend alternatives to maximize value and minimize expenses.
· Assist in procuring IT equipment, software, and services in accordance with budget and project requirements.
· Track IT hardware and software assets, warranties, and renewals, supporting compliance and documentation efforts.
· Provide onsite support to client sites as needed.
· Perform other duties as assigned by management.
Experience & Qualifications
3+ years of experience in IT or telecom procurement, sourcing, or vendor management.
Experience with procurement or IT asset management tools.
Education/Certification
Bachelor's Degree, preferably in Information Technology, Finance, Business Administration or related field; equivalent level of education, training and experience may be considered.
Skills & Competencies
Understanding of IT and telecommunications technologies, services, and terminology.
Strong analytical skills with attention to detail.
Proficiency in Excel and other data analysis/reporting tools.
Strong vendor negotiation or contract review skills.
Analytical thinking and problem-solving
Financial acumen and cost-awareness
Attention to detail and accuracy
Strong communication and vendor management skills
A high standard in work quality and ability to follow through is a must
Ability to multitask, prioritize, and manage time efficiently and to meet deadlines
Ability to function well in a fast-paced environment
Exceptional interpersonal skills; a team player with proven ability to work across functional areas.
Work Schedule
· Core working hours Monday - Friday 8:00 a.m. to 4:30 p.m.
IT Applications Analyst
Information security analyst job in Limerick, PA
Job Description: Senior IT Applications Analyst Are You Ready?CAI is a professional services company established in 1996 that has grown year over year to nearly 800 people worldwide. For Life Sciences and Mission Critical industries that need to deliver critical solutions in high-stakes environments, we provide accelerated operational readiness and unparalleled performance at the highest standard through our rigorous approach, field-tested processes, and elite expertise developed over 30 years.
Our approach is simple because our Purpose informs everything we do:• We exist to be the trusted solution for our clients as they strive to build a better working world and improve the human experience.
At CAI, we are committed to living our Foundational Principles, both professionally and personally: • We act with integrity • We serve each other • We serve society • We work for our future
At CAI, we believe in a relentless dedication to excellence, pushing boundaries and surpassing expectations. From the beginning, we've challenged ourselves to do what others wouldn't. Not just setting industry standards, but redefining them entirely. We are bold in our thinking and creative in our approach. We operate at the intersection of wisdom and technology and thrive when they come together with humanity. For us, operational readiness isn't simply a goal. It's a way of life. Because tomorrow demands to be at the forefront of today. We do this through tireless effort, precision, efficiency and an unwavering belief that there is always room for advancement. We're not interested in how it used to be done. We're obsessed with how it will be done.
Job Summary
The Senior IT Applications Analyst plays a key role in the deployment and lifecycle management of business-critical IT applications. This individual will partner with cross-functional teams to gather requirements, configure systems, manage upgrades, and provide expert-level support, ensuring that applications operate securely, efficiently, and in line with client needs.
Key Responsibilities
• Collaborate with business users and internal stakeholders to collect requirements, assess improvement opportunities, and implement approved system changes. • Serve as the primary technical contact and subject matter expert for assigned applications and related projects. • Create and maintain technical documentation, including detailed design specifications, configuration plans, testing protocols, and system summaries. • Develop and adjust reports and dashboards to support operational and compliance requirements. • Oversee the change-control process for IT applications, ensuring that modifications meet established quality and regulatory standards. • Coordinate closely with validation and quality teams to support system testing and ensure adherence to the software development life cycle (SDLC). • Mentor junior team members, provide application training, and share best practices across the IT department. • Manage application security, including user access controls, periodic audits, and data integrity reviews. • Provide advanced troubleshooting and technical support for end users, resolving issues at the application or server level. • Prioritize daily activities for IT team members to ensure efficient resolution of application-related issues. • Maintain accurate training records and ensure compliance with internal procedures. • Contribute to continuous improvement initiatives and take on additional tasks as required.
Qualifications
• Bachelor's degree in Information Technology, Computer Science, or a related discipline, or equivalent experience. • At least 5 years of hands-on experience supporting or implementing enterprise IT applications. • Demonstrated project management skills; professional certifications are a plus. • Strong understanding of SDLC methodologies, IT change management, and system validation practices. • Excellent analytical, organizational, and communication skills, with the ability to work independently and within a team environment.
Other Requirements
• Must be able to commit to a minimum 40-hour work week, with flexibility to meet project needs. • Willingness and ability to travel to client sites as required. • Must be eligible to work in the EU without the need for visa sponsorship, now or in the future.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-Apply