Post job

Information security analyst jobs in Franklin, NJ

- 191 jobs
All
Information Security Analyst
Senior Security Specialist
Information Security Manager
Cyber Security Specialist
Information Security Engineer
Security Engineer
Security Architect
Information Technology Analyst
Network Security Analyst
Intrusion Detection Analyst
Security System Engineer
Securities Analyst
  • senior security specialist-Akamai

    Vbeyond Corporation 4.1company rating

    Information security analyst job in Morristown, NJ

    Akamai- Senior Security Specialist Must have skills • SOC/SIEM, Threat Hunting, Incident Response, Endpoint Security - EDR/XDR • WAF/DDoS implementation and configuration using Cloudflare/Akamai platforms • Client management skills 10+ yrs exp Job Description: As a Senior Security Specialist, you will play a critical role in safeguarding our organization's information assets and infrastructure. Your expertise in Cybersecurity, EPP, EDR, XDR, AI Security, threat hunting, network security, WAF, cloud security, threat detection, incident response, malware analysis, data and log analysis, and timeline forensics will be instrumental in identifying and mitigating security risks. You will work collaboratively with cross-functional teams, security analysts, IT professionals, and management to ensure the protection of our systems, networks, and data. Key Responsibilities: Design, develop and implement security solutions and tools like Aurora, Palo Alto Cortex to improve security posture and protect organizations infrastructure and data. Review and validate policy configurations and utilize security tools including EPP, EDR, XDR, cloud security configurations, network security technologies to improve and fine-tuning. Work with MFX and clients for endpoint security related report review and provide technical details. Proven security engineering and administration experience with EPP, EDR, XDR technologies preferably Aurora, Cortex etc. Research the latest security best practices and technologies, staying abreast of new threats and vulnerabilities and helping disseminate this information within the groups at the company. Develop and implement cybersecurity strategies, policies, and procedures. Lead and coordinate incident response activities, including containment, eradication, and recovery. Conduct post-incident analysis to identify lessons learned and recommend improvements. Work closely with internal and external stakeholders to manage and mitigate security incidents. Provide guidance and support to junior security team members during incident response activities. Perform analysis of suspicious files and malware samples. Identify malware behavior, capabilities, and potential impact. Develop and maintain a malware analysis lab and related tools. Provide recommendations for mitigation and response to malware incidents. Stay updated with emerging malware trends and techniques. Familiarity with Cyber Kill chain and MITRE ATT&CK framework. Establish, execute, communicate, and oversee project management for MFX and clients. Education / Work Experience: Minimum 10+ years of experience in cybersecurity, network security, cloud security, threat hunting including a minimum of 5+ years of experience in Endpoint Security technologies. Work experience with securing cloud infrastructure in Azure/AWS. Experience in WAF, DDoS configurations and incident handling skills. Preferred Certifications: GIAC, CISM, CCSP, CISSP, or equivalent certification, work experience, or skills. Strong knowledge of cybersecurity principles, best practices, and industry frameworks (e.g., NIST, ISO 27001). Good to have digital forensic investigations, including timeline analysis. Knowledge / skills: Advanced knowledge and understanding in various disciplines such as security engineering, system and network security, authentication and security protocols, cryptography, and application security. Experience using endpoint security technologies like Aurora, Cortex, or similar. Strong technical experience in cloud security services - network and storage encryption, network security groups, web security and identity and access management. Administering and improving industry standard security controls using security tools like EPP, EDR, XDR etc. and driving operational excellence. Experience with multiple Operating systems (Linux, Unix, Windows) Understanding of forensic principles and methodologies, including timeline forensics (Good to have) Excellent customer relationship and strong communication (i.e., written and verbal), presentation, teamwork skills and resourcefulness.
    $89k-135k yearly est. 5d ago
  • Vice President, Application Cyber Security Specialist

    CLS Group 4.8company rating

    Information security analyst job in Iselin, NJ

    Job information: Functional title - Application Security Specialist Department - IT Security Corporate level - Vice President Report to - Director, Application Security Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits. What you will be doing: Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses, Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities. Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations. Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams. Conduct security reviews and provide guidance on security requirements for new features and projects. Assist in the analysis, selection and rollout of new application security tools, processes, and standards. Stay up to date with the latest security threats, vulnerabilities, and industry best practices. What we're looking for: Proven experience in application security with a focus on application security testing and vulnerability management. Hands-on experience with Application Security tools. Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques. Experience with threat modelling methodologies and tools. Proficiency in at least one programming language (e.g., Java, Python, JavaScript). Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams. Strong understanding of risk management. Professional qualifications / certifications Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
    $140k-180k yearly 1d ago
  • Cyber Security Architect

    Wakefern Food Corp 4.5company rating

    Information security analyst job in Edison, NJ

    The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.). Essential Functions Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments. Design security solutions that align with business objectives while mitigating risk. Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise. Architect cloud security strategies, leveraging best practices for Azure and GCP. Lead security investigations, conduct root cause analysis, and document incident response actions. Provide threat intelligence and recommend proactive security measures to mitigate risk. Implement and maintain cloud security controls in Azure and GCP. Optimize cloud security solutions for web and network protection. Ensure Active Directory (AD) and IAM policies align with best practices. Support identity governance, access reviews, and privileged access management (PAM). Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls. Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS). Recommend, evaluate, and implement new security technologies based on business needs and threat landscape. • Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles. Additional Functions Threat Modeling & Risk Management: Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks. Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations. Develop and maintain security policies, standards, and playbooks for security operations. Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2). Identity & Access Management (IAM) & Authentication: Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC). Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD. Define identity threat detection and response (ITDR) strategies. Security Governance & Compliance: Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK). Assist with audit, regulatory compliance, and security assessments. Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs. Provide security guidance for third-party risk management and vendor security evaluations. Leadership & Collaboration: Act as a subject matter expert (SME) in cybersecurity architecture and best practices. Provide mentorship and training to security engineers and analysts. Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals. Develop security roadmaps and strategic initiatives for continuous security improvement. Maintain and fine-tune security configurations across various security platforms. Identify security gaps and recommend security enhancements and process improvements. Develop playbooks and automation scripts to enhance security operations efficiency. Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications. Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements. Investigate security breaches and other security incidents to determine the root cause and implement corrective actions. Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures. Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure. Participate in security audits and assessments to identify and address security gaps. Develop and maintain incident response plans and procedures. Evaluate and recommend security technologies and solutions to improve the organization's security posture. Qualifications 7-10 years of experience in cybersecurity architecture, security operations, or cloud security. Deep understanding of: Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices Email secure gateway (Proofpoint, Mimecast) Firewalls (Palo Alto, Cisco) and network security principles Cloud security (Azure, GCP) and security automation IAM, MFA, AD, Okta, Microsoft Authenticator Endpoint security, EDR, ITDR, and threat intelligence Data classification, DLP, and information protection Experience designing secure architectures for large-scale enterprises and cloud environments. Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform). Excellent communication and leadership skills, capable of influencing security strategies across the organization. CISSP Certifications (Required): CISM and CCSP is plus A bachelor's degree in computer science, information systems, or a related experience. 7-10 years of experience in cybersecurity, security operations, or network security. Hands-on expertise with: Zscaler, CrowdStrike, Microsoft Defender, Sophos Proofpoint (Email Security Gateway) EDR & ITDR solutions Palo Alto & Cisco Firewalls Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM Cloud Security (Azure and GCP) Data classification and protection strategies Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response. Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks. Strong analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams. Working Conditions & Physical Demands This position requires in person office presence at least 4x a week.
    $123k-162k yearly est. 3d ago
  • Information Security Engineer

    PTR Global

    Information security analyst job in Iselin, NJ

    We are seeking a high-judgment, detail-oriented operator to lead our Threat Modeling Program Operations. This individual will be responsible for orchestrating workflows, triaging intake, designing key metrics, and eliminating process inefficiencies. The role demands an expert in building executive-ready reports and dashboards to track throughput, cycle times, and model quality, ensuring optimal outcomes for complex, multifaceted initiatives in Information Security Engineering. This is a contingent resource assignment, and the candidate may: Consult on complex, large-scale initiatives in Information Security Engineering. Review and analyze intricate, long-term security challenges, considering multiple factors including intangible or unprecedented elements. Contribute to resolving complex issues requiring deep understanding of security policies, procedures, and compliance requirements. Strategically collaborate with client personnel to ensure project success. Key Responsibilities: Lead and optimize workflow orchestration for the Threat Modeling Program. Develop and manage reports and dashboards to monitor program effectiveness (throughput, cycle time, model quality). Analyze and address complex security engineering issues, guiding teams to resolution. Collaborate cross-functionally with stakeholders, delivering executive communication and reporting. Continuously improve processes to eliminate inefficiencies and ensure scalability. Required Qualifications: 5+ years of experience in Information Security Engineering or equivalent (consulting, training, military, education). Proven ability to take initiative, work independently, and drive results. Strong attention to detail and ability to handle ad hoc reporting. Advanced skills in Microsoft Excel (VLookups & Pivot Tables) and PowerPoint. Proficient with Agile methodologies and project management tools like Atlassian JIRA and Confluence. Experience in analytical
    $78k-106k yearly est. 4d ago
  • Cloud Security Engineer - SRE

    Intelliswift-An LTTS Company

    Information security analyst job in Berkeley Heights, NJ

    Job Posting Title: Cloud Security Engineer - SRE Job Profile: Technical Project Management - Advisor II We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation. Technical Skills • Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling. • Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations. • Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure. • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions. • Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift). • Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs. • Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs. • Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI. • A strong understanding of HashiCorp Vault and Terraform will make you stand out. 2. Problem-Solving and Troubleshooting • Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews. • Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error. • Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications. 3. Collaboration and Communication • Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams. • Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports. • Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences. 4. Reliability and Scalability • Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability. • Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands. • Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime. 5. Security and Compliance • Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices. • Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry. Minimum Job Qualifications: • Bachelor degree in business or equivalent work experience • 10 years of previous program leadership and/or relevant consulting experience • Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle • 5+ years' experience in driving large scale data center consolidation efforts • Minimum 5 years' experience with matrix management of cross-functional processes and teams • Proficient with Project Management tools
    $83k-115k yearly est. 3d ago
  • IT Analyst

    Cypress HCM 3.8company rating

    Information security analyst job in Bridgewater, NJ

    This is an exciting opportunity to join a growing global company in the medical equipment industry! This role is responsible for managing the company's response to IT-related requests that have been submitted by our customers. The IT Analyst will utilize a combination of their project management skills, knowledge of company products and services, and input from multiple subject experts to respond to customer's needs. Responsibilities Draft, review and execute responses to IT inquiries submitted by current and prospective customers regarding company products and services, ensuring compliance to company policies and procedures. Complete security assessments, both technical and organizational, for all lines of business (Clinical Labs, Immunohematology, Point of Care, and Molecular). Primarily support North America, but complete global requests when necessary. Understand the customer's requested solution and how to position company products, messaging and services. Work cross functionally to ensure internal alignment, delivering responses that clearly articulate the company's product and service differentiators to attract and retain customers. Task and assign proposal content as needed for subject matter experts' sections, following up with section owners to ensure timely and accurate content delivery. Meet established SLAs, such as two-week turnarounds for standard requests. Manage database of FAQ/Responses by line of business and instrument. Create best in class content to act as a competitive differentiator. Participate in projects and initiatives as required. Qualifications Experience in IT analytics or relevant. Any experience or knowledge with security ideal. Project management and organizational skills. Customer centric approach in resolving customer needs and inquiries. Pay Rate: $28-$30/hour
    $28-30 hourly 1d ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 4h ago
  • Information Security Analyst

    Ra 3.1company rating

    Information security analyst job in Jersey City, NJ

    Why us? You will be part of a team that believes that believes in employees success! They are a dynamic, fast growing company with great opportunities and an employee focused company culture. Join this fantastic team today and make a difference in your life and the lives of those around you! They are an equal opportunity employer and value diversity at our company. Job Description Strong knowledge of Information Security concepts such as: •Encryption, Cloud and Mobile Device Security •Data Loss and Prevention tools and solutions •Risk-Threat Analysis and Vulnerability Assessments •Enterprise Security Monitoring, Role-Based Access Control (RBAC) •Identity and Access Management, Computer Forensic •IT Audit and Compliance, Regulatory Requirements (HIPAA, CMS, FISMA, et. al.) •Knowledge of common vulnerability tools, and the ability to identify basic categories of vulnerability. Sounds like you? then ping us with your most updated resume. We'd love to talk to you! We are excited about the companies growth and the role you will play with them. Qualifications Desired Skills & Experience: You hold a Bachelor's degree in any domain. You are certified in CISSP, or CISA, or CEH, required. You have more than 1 year experience working in the IT security function. You have good experience with Operating System, Database, Network and Application Security. Additional Information All your information will be kept confidential according to EEO guidelines. Ping me at **********************
    $91k-130k yearly est. Easy Apply 60d+ ago
  • Director - Threat Detection Analyst

    Morgan Stanley 4.6company rating

    Information security analyst job in Edison, NJ

    In the Technology division, we leverage innovation to build the connections and capabilities that power our Firm, enabling our clients and colleagues to redefine markets and shape the future of our communities. This is a Lead Data & Analytics Engineering position at the Director level, which is part of the job family responsible for providing specialist data analysis and expertise that drive decision-making and business insights as well as crafting data pipelines, implementing data models, and optimizing data processes for improved data accuracy and accessibility, including applying machine learning and AI-based techniques. About the role: The Director role within Fraud Detection Analytics performs a critical function within the Fraud Department, in safeguarding the organization against diverse fraud risks. This position is responsible for designing, implementing, and overseeing advanced analytics strategies to detect and mitigate fraudulent activities across multiple payment channels and fraud typologies, including account takeover (ATO), deposit fraud, scams, and emerging schemes. The ideal candidate combines deep technical expertise with strategic vision and strong communication skills to drive cross-functional collaboration and deliver actionable insights. What you'll do in the role: Develop and refine fraud detection controls and analytical frameworks targeting fraud risks such as ATO, deposit fraud, scams, and other typologies. Monitor and analyze transaction channels (crypto, wire, ACH, Zelle, bill payments) for suspicious activity and emerging patterns. Leverage data-driven insights by integrating internal data with external intelligence sources for proactive fraud detection. Utilize SQL and advanced analytics to extract, analyze, and interpret large datasets to identify emerging fraud trends. Apply predictive modeling, forecasting, and statistical methodologies to enhance operational efficiency and reporting. Design and validate rules within the fraud rules engine, conducting rigorous pre- and post-production testing. Continuously adjust controls based on observed trends to address evolving risks. Identify automation opportunities to streamline manual processes related to data collection, metric calculation, and loss assessment. Deliver business insights through dashboards and visualization tools (Tableau, SAS, Python, R) and produce on-demand reports. Communicate key trends, findings, and actionable recommendations to management and stakeholders. Prepare and present executive-level reports on suspicious activities and risk management. Set and monitor KPIs for fraud detection, implementing mitigation strategies where needed. Collaborate with Customer Service, Product Management, Engineering, and Data Science teams to enhance fraud detection tools and models. Coordinate with Fraud Operations to align rule strategies with staffing resources. Recommend and implement innovative technologies for fraud detection, prevention, and reporting. What you'll bring to the role: Minimum of 5+ years of experience in fraud analytics, financial crime, or risk management. Bachelor's or Master's degree in Data Science, Computer Science, Finance, or related field. Expert proficiency in SQL (including joins, subqueries, unions, temporary tables) for data extraction, analysis, and reporting. Demonstrated experience designing and implementing fraud detection models, with a strong focus on account takeover, scam & first party fraud scenarios. In-depth understanding of transaction exhaust methods (cryptocurrency, wires, ACH, Zelle, bill payments). Strong analytical, problem-solving, and decision-making skills. Excellent verbal and written communication skills, with the ability to present complex findings to non-technical audiences. Experience working with large datasets and modern analytics tools (Python, R, Tableau, SAS). Desired Skills: Previous experience in banking, fintech, or payments industry. Knowledge of regulatory requirements related to financial fraud and AML. Familiarity with fraud monitoring tools and case management systems. Ability to work in fast-paced, high-pressure environments and manage multiple priorities effectively. Proven track record of leading successful fraud detection initiatives across multiple payment channels. Advanced skills in statistical analysis and visualization platforms. Experience collaborating with Data Science and Product teams to produce fraud risk models and meet business goals WHAT YOU CAN EXPECT FROM MORGAN STANLEY: We are committed to maintaining the first-class service and high standard of excellence that have defined Morgan Stanley for over 89 years. Our values - putting clients first, doing the right thing, leading with exceptional ideas, committing to diversity and inclusion, and giving back - aren't just beliefs, they guide the decisions we make every day to do what's best for our clients, communities and more than 80,000 employees in 1,200 offices across 42 countries. At Morgan Stanley, you'll find an opportunity to work alongside the best and the brightest, in an environment where you are supported and empowered. Our teams are relentless collaborators and creative thinkers, fueled by their diverse backgrounds and experiences. We are proud to support our employees and their families at every point along their work-life journey, offering some of the most attractive and comprehensive employee benefits and perks in the industry. There's also ample opportunity to move about the business for those who show passion and grit in their work. To learn more about our offices across the globe, please copy and paste ***************************************************** into your browser. Morgan Stanley's goal is to build and maintain a workforce that is diverse in experience and background but uniform in reflecting our standards of integrity and excellence. Consequently, our recruiting efforts reflect our desire to attract and retain the best and brightest from all talent pools. We want to be the first choice for prospective employees. It is the policy of the Firm to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, creed, age, sex, sex stereotype, gender, gender identity or expression, transgender, sexual orientation, national origin, citizenship, disability, marital and civil partnership/union status, pregnancy, veteran or military service status, genetic information, or any other characteristic protected by law. Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet).
    $88k-117k yearly est. Auto-Apply 10d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Information security analyst job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $84k-119k yearly est. Auto-Apply 6d ago
  • Lead Information Security Analyst - Identity

    Adpcareers

    Information security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 1d ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Information security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 1d ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Rennerbrown

    Information security analyst job in Princeton, NJ

    A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments. The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership. Key Responsibilities Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments. Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness. Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments. Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes. Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration. Support remediation and post-incident activities to strengthen resilience across technology domains. Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices. Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards. Required Experience Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection. Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors. Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments. Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings. Strong analytical and communication skills, with the ability to work effectively across technical and business teams. Technical Expertise Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains. Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms. Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF. Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows. Experience collaborating on vulnerability management and remediation across IT and OT environments. Certifications Required: CISSP Preferred: GICSP, GRID, or other OT/ICS-specific certifications. Education Bachelor's degree in Information Security, Computer Science, or a related technical field required. Advanced coursework or training in OT/ICS cybersecurity preferred. Compensation Base salary in the range of $120,000 to $140,000, plus annual performance bonus and comprehensive benefits package. Final compensation will align with experience, technical expertise, and leadership capability. Additional Details Hybrid role, North America-based (East Coast preferred). Reports to a regional cybersecurity leader within the global organization. Requires up to 10% travel (domestic and international).
    $120k-140k yearly 55d ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Kyowa Kirin North America

    Information security analyst job in Princeton, NJ

    Kyowa Kirin is a fast-growing global specialty pharmaceutical company that applies state-of-the-art biotechnologies to discover and deliver novel medicines in four disease areas: bone and mineral; intractable hematologic; hematology oncology; and rare disease. A Japan-based company, our goal is to translate science into smiles by delivering therapies where no adequate treatments currently exist, working from drug discovery to product development and commercialization. In North America, we are headquartered in Princeton, NJ, with offices in California, North Carolina, and Mississauga, Ontario. Summary: We are seeking a Security Operations & OT Cybersecurity Specialist to join our Global Information Security team. This role will serve as the regional lead for North America security operations and OT/ICS security, responsible for incident response, monitoring, and cyber defense across IT and manufacturing environments. The ideal candidate will have strong experience in SOC operations, OT cybersecurity, and regulated industries, with the ability to respond under pressure while also driving continuous improvement. Essential Functions: • Lead incident response for North America, coordinating with the global SOC for escalations, investigations, and recovery. • Manage monitoring solutions to ensure high-quality visibility across IT, cloud, and OT environments. • Own OT/ICS cybersecurity strategy in partnership with manufacturing, infrastructure, and plant leadership, securing SCADA, PLCs, and lab systems. • Vendor management for proactive threat hunting, pen testing and forensic analysis. • Lead remediation activities for both IT and OT environments. • Drive regional execution of global SOC playbooks, escalation models, and threat intelligence integration. • Develop and maintain operational security runbooks and ensure continuous improvement of detection and response capabilities. • Partner with IT, R&D, and Manufacturing to enforce regulatory compliance across GxP, HIPAA, and FDA-controlled systems. Requirements: Education Bachelor's degree in Information Security, Computer Science, or related field required; Advanced training in OT/ICS security preferred. Certifications Required: CISSP Certifications Preferred: GICSP, GRID, or other OT-focused certifications Experience: At least 5 years in cybersecurity operations, with demonstrated experience in SOC or incident response leadership; Strong hands on experience with OT/ICS environments in pharma, biotech, manufacturing, or critical infrastructure; Expertise in SIEM, SOAR, forensic tools, and threat detection engineering; Knowledge of OT security frameworks (ISA/IEC 62443, NIST CSF) and pharmaceutical regulations (GxP, HIPAA, 21 CFR Part 11). Technical Skills • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, cloud, and OT environments. • Hands-on experience with SOC technologies such as SIEM, SOAR, EDR/XDR, and forensic analysis platforms. • Strong background in OT/ICS cybersecurity, including SCADA, PLCs, and lab systems, with application of frameworks such as ISA/IEC 62443 and NIST CSF. • Knowledge of threat detection engineering, use-case development, and integration of threat intelligence into monitoring workflows. • Proficiency in forensic tools and malware analysis to support root-cause identification and post-incident review. • Understanding of regulatory compliance requirements including GxP, HIPAA, and 21 CFR Part 11, as they apply to manufacturing and research systems. • Experience collaborating on vulnerability management, patching, and remediation across IT and OT environments. Working Conditions: Requires up to 10 % domestic and international travel The anticipated salary for this position will be $115,000 to $130,000. The actual salary offered for this role at commencement of employment may vary based on several factors including but not limited to relevant experience, skill set, qualifications, education (including applicable licenses and certifications, job-based knowledge, location, and other business and organizational needs. The listed salary is just one component of the overall compensation package. At Kyowa Kirin North America we provide a comprehensive range of benefits including: 401K with company match Discretionary Profit Share Annual Bonus Program (Sales Bonus for Sales Jobs) Generous PTO and Holiday Schedule which includes Summer and Winter Shut-Downs, Sick Days and, Volunteer Days Healthcare Benefits (Medical, Dental, Prescription Drugs and Vision) HSA & FSA Programs Well-Being and Work/Life Programs Life & Disability Insurance Concierge Services Long Term Incentive Program (subject to job level and performance) Pet Insurance Tuition Assistance Employee Referral Awards The compensation and benefits information set forth in this posting applies to candidates hired in the United States. Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market. KKNA and all of its employees have an obligation to act in accordance with the law and with integrity in all our operations and interactions It is the policy of Kyowa Kirin North America, Inc. to provide equal employment opportunity to all qualified persons without regard to race, religion, creed, color, pregnancy, sex, age, national origin, disability, genetic trait or predisposition, veteran status, marital status, sexual orientation or affection preference or citizenship status or any other category protected by law. When you apply to a job on this site, the personal data contained in your application will be collected and stored by Kyowa Kirin, Inc. (“Controller”), which is located at 510 Carnegie Center Dr. Princeton, NJ 08540 USA and can be contacted by emailing ****************************************. Controller's data protection officer can be contacted at usprivacyoffice@kyowakirin.com. Your personal data will be processed for the purposes of managing Controller's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of General Data Protection Regulation (EU) 2016/679 (“GDPR”) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment. Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller's behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. The transfer will be made using appropriate additional safeguards under the standard contractual clauses approved by regulators for transfers of personal data outside the European Union. Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, if you are located in the European Union, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability, and to lodge a complaint with an EU supervisory authority. If you have any questions about our use of your data, you may contact us by email at usprivacyoffice@kyowakirin.com. Recruitment & Staffing Agencies Kyowa Kirin does not accept agency resumes unless contacted directly by internal Kyowa Kirin Talent Acquisition. Please do not forward resumes to Kyowa Kirin employees or any other company location; Kyowa Kirin is not responsible for any fees related to unsolicited resumes. #LI-Tt1 #Hybrid #Princeton
    $115k-130k yearly Auto-Apply 27d ago
  • Information Security Analyst II (E5122)

    Ieee 4.9company rating

    Information security analyst job in Piscataway, NJ

    Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e. g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc. ) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i. e. Self Service Access requests). Good understanding of a programming language (e. g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e. g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences. o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. ===============================================Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons. Min: $91,000. 00 Max: $114,000. 00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Dec 22, 2025, 4:20:40 PM
    $91k-114k yearly Auto-Apply 1d ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Information security analyst job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Information Security Manager

    Atlas Systems 3.9company rating

    Information security analyst job in East Brunswick, NJ

    Job DescriptionSalary: About Us: Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals. For more information, please visit our website ***************************** Please click on the link below to apply for this position: ************************************** Position Summary: We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management. Key Responsibilities: Develop, implement, and maintain information security strategy, policies, and standards. Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2). Oversee daily security operations including monitoring, incident detection, response, and remediation. Manage vulnerability assessments, penetration testing, patching, and threat intelligence. Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments. Implement and manage identity and access controls, endpoint protection, and data loss prevention. Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.). Conduct third-party/vendor risk assessments and application security reviews. Ensure compliance through internal audits, client assessments, and timely remediation. Deliver enterprise-wide security awareness and training programs. Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions. Lead, mentor, and develop security team members while fostering a culture of security awareness. Act as the escalation point for critical incidents and client-facing security discussions. Qualifications: Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field 710+ years of progressive experience in information security with at least 3 years in a leadership role. Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault). Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools. Proven track record managing incident response and SOC operations. Excellent leadership, stakeholder management, and communication skills. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100)
    $110k-140k yearly est. 21d ago
  • Information Security Manager

    Cardinal Security 3.9company rating

    Information security analyst job in Newark, NJ

    We are seeking an experienced Information Security Manager to spearhead our efforts in safeguarding client data and maintaining a robust organizational threat posture. In this role, you will lead strategic initiatives to protect sensitive information, manage threat intelligence programs, and ensure compliance with relevant regulations. You will also collaborate closely with various internal teams-technical and non\-technical alike-to develop, implement, and continuously improve security best practices. Key Responsibilities Client Data Protection & Compliance Design and enforce policies, procedures, and technical safeguards that secure client information from unauthorized access, disclosure, or misuse. Stay current on data privacy regulations (e.g., GDPR, CCPA) and industry standards (e.g., ISO 27001, SOC 2), incorporating them into organizational processes. Oversee and maintain data classification protocols, ensuring appropriate access controls and encryption methods are applied. Threat Intelligence & Vulnerability Management Establish a comprehensive threat intelligence program, monitoring emerging risks and industry trends that could impact clients' or the organization's security posture. Conduct routine vulnerability assessments, penetration tests, and security audits, prioritizing remediation efforts based on criticality. Collaborate with cross\-functional teams (e.g., DevOps, Network Engineering) to implement and validate fixes or security upgrades. Incident Response & Crisis Management Develop and continuously refine the Incident Response Plan (IRP), outlining clear processes for detecting, containing, and remediating security breaches. Coordinate tabletop exercises and real\-world simulations to test the IRP, training staff to respond effectively in high\-stress scenarios. Serve as the primary point of contact during security incidents, liaising with external agencies (law enforcement, regulatory bodies) as necessary. Security Architecture & Best Practices Work with solution architects and system administrators to integrate robust security controls into infrastructure, software, and cloud environments. Evaluate and recommend new security products, tools, and services that enhance the organization's threat detection and prevention capabilities. Enforce secure coding practices, hardening standards, and network segmentation protocols that align with evolving threats. Governance, Risk & Compliance (GRC) Lead security risk assessments, identifying and documenting vulnerabilities, threats, and overall risk exposure to client data. Define and track security metrics (KPIs), reporting progress, gaps, and action plans to executive leadership. Oversee internal and external security audits, ensuring timely completion of any required corrective measures. Team Leadership & Collaboration Manage a team of security analysts, engineers, and incident responders, providing coaching, mentorship, and clear performance objectives. Foster a culture of security awareness and accountability throughout the organization, conducting regular training sessions for all staff. Coordinate with third\-party vendors, managed security service providers, and consultants to strengthen the organization's security ecosystem. Requirements Education & Experience Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or related field (or equivalent experience). 5+ years of hands\-on experience in information security, including roles in threat intelligence, GRC, and\/or incident response. Experience working within heavily regulated industries (e.g., finance, healthcare, government) is highly desirable. Technical Skills Proficiency with SIEM platforms (e.g., Splunk, QRadar), endpoint protection suites, and vulnerability management tools (e.g., Nessus, Qualys). In\-depth knowledge of security frameworks (NIST CSF, ISO 27001, COBIT) and compliance standards (PCI\-DSS, HIPAA, SOC 2). Hands\-on expertise in cloud security (AWS, Azure, GCP) and containerization platforms (Kubernetes, Docker) is a plus. Certifications Relevant certifications such as CISSP, CISM, CRISC, or GIAC (GSEC, GCIA, GCIH) strongly preferred. Soft Skills Exceptional problem\-solving and analytical abilities, with a keen eye for detail. Excellent communication and presentation skills for both technical and executive audiences. Proven track record of managing diverse teams and collaborating effectively across departments. Personal Attributes Integrity: Upholds the highest ethical standards in protecting sensitive client data. Leadership: Inspires trust and confidence, fostering a culture of teamwork, accountability, and continual learning. Adaptability: Stays agile in a dynamic threat landscape, quickly pivoting security strategies as new risks emerge. Strategic Mindset: Balances day\-to\-day operational demands with long\-term security vision and innovation. BenefitsWhat We Offer Competitive Compensation: Commensurate with experience, plus potential bonus structures. Comprehensive Benefits: Medical, dental, vision, and retirement plan options. Professional Growth: Training allowances, continuing education support, and clear career advancement paths. Impactful Work: Play a pivotal role in safeguarding clients' data and reputations, contributing to the organization's broader mission of secure service delivery. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"668264937","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Security and Surveillance"},{"field Label":"City","uitype":1,"value":"Newark"},{"field Label":"State\/Province","uitype":1,"value":"New Jersey"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"07101"}],"header Name":"Information Security Manager","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00209003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********04744106","FontSize":"12","location":"Newark","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $114k-156k yearly est. 60d+ ago
  • Need SSO Info Security Analyst

    360 It Professionals 3.6company rating

    Information security analyst job in Newark, NJ

    This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results. Job Description Info Security Analyst - Lead 10 or more years' experience in Web technology; 10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services). OpenToken, OAUTH, RSA technology. Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures. Proven experience providing infrastructure troubleshooting and application support. Qualifications Bachelor's degree or equivalent work experience is required Additional Information Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
    $81k-105k yearly est. 4h ago
  • Security System Engineer

    Network Mountain

    Information security analyst job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 1d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Franklin, NJ?

The average information security analyst in Franklin, NJ earns between $72,000 and $139,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Franklin, NJ

$100,000

What are the biggest employers of Information Security Analysts in Franklin, NJ?

The biggest employers of Information Security Analysts in Franklin, NJ are:
  1. IEEE Foundation
  2. Institute of Electrical and Electronics Engineers
Job type you want
Full Time
Part Time
Internship
Temporary