Post job

Information security analyst jobs in Hillsborough, NJ - 161 jobs

All
Information Security Analyst
Information Security Officer
Information Security Engineer
Senior Security Specialist
Information Security Manager
Securities Analyst
Network Security Analyst
Senior Security Analyst
Security System Engineer
Senior Information Security Consultant
  • Sr. Specialist, Security Operations

    Rennerbrown

    Information security analyst job in Princeton, NJ

    A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments. The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership. Key Responsibilities Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments. Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness. Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments. Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes. Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration. Support remediation and post-incident activities to strengthen resilience across technology domains. Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices. Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards. Required Experience Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection. Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors. Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments. Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings. Strong analytical and communication skills, with the ability to work effectively across technical and business teams. Technical Expertise Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains. Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms. Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF. Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows. Experience collaborating on vulnerability management and remediation across IT and OT environments. Certifications Required: CISSP Preferred: GICSP, GRID, or other OT/ICS-specific certifications. Education Bachelor's degree in Information Security, Computer Science, or a related technical field required. Advanced coursework or training in OT/ICS cybersecurity preferred.
    $86k-133k yearly est. 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 3d ago
  • Information Security Analyst

    Adpcareers

    Information security analyst job in Roseland, NJ

    ADP is hiring a Lead Cloud Security Analyst in our Roseland, NJ office. This is a hybrid role. As a Lead Cloud Security Analyst, you will join a highly skilled team providing world-class infrastructure and network security assessments and security consultation for ADP's Global Security Organization (GSO). This team is responsible for the execution of ADP's global Compliance and Vulnerability Management Program (CVM) program for infrastructure and network across Cloud and on-premises locations. Services provided to the organization include Vulnerability management program management including Zero-day vulnerability response & Secure OS Build Compliance for cloud/container infrastructure as well as on-premises servers/endpoints. You will focus on supporting CVM Cloud initiatives by leveraging a variety of security tools. Working closely with product and technology teams, with your knowledge of industry standards, you will be ensuring our infrastructure meets and maintains the requirements of our CVM security program. To succeed in this position, you'll need knowledge and experience in securing cloud environments (AWS is a MUST) and in developing or being a part of a vulnerability management program working with a variety of product/DevOps teams. Experience with the use of security tools for scanning and detection coupled with the ability to analyze the results across a large data set using database and scripting tools. Balance that with ability to stay ahead of threats and security trends while refining processes in a rapidly changing environment to drive and evolve the program. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers WHAT YOU'LL DO: Here's what you can expect on a typical day in the life of a Lead Cloud Security Analyst at ADP. Develop: Using existing tools, leverage available data to prioritize what should be addressed to reduce risk in the environment. Measure: Develop metrics to track and show the performance of the program. Communicate: From working with technical teams to understand/solve security issues to summarizing status for senior management. Challenges: Across hundreds of products and a large global infrastructure, no day is the same and we must be prepared to respond to challenges presented. Risk Management: Understand and evaluate/respond to risks/vulnerabilities and how to mitigate them. Experience You'll Need: Deep understanding of information security specifically in the realm of vulnerability management (VM) Deep understanding of Cloud Security (AWS - Must, Other Cloud environments - Preferred) Experience managing/building VM programs - defining and building metrics, automation of response and remediation (guidance) Strong analytical/problem solving skills and cross functional knowledge across multiple development and security disciplines. Understanding of security and compliance tools such as Qualys, Crowdstrike etc. Experience working with CSPM tools such as Wiz, Prisma, Dome9/Cloudguard, etc. Ability to communicate security-related concepts to a broad range of technical and non-technical staff. Experience in scripting languages (Python - Preferred) and SQL Queries (Strong emphasis on Data Analytics) To Succeed in This Role: You'll have a bachelor's degree OR equivalent. Any of the following are a plus but not necessary: CISSP, CISM, etc. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 1d ago
  • Security Analyst - Systems Operations

    Blueprint30 LLC

    Information security analyst job in Roseland, NJ

    ADP is Hiring a Security Analyst - Systems Operations Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. The position is required to work on weekends and 2 nd US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice. Well, this may be the role for you. Ready to make your mark? The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO). The primary focus is on Security Information and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more. Like what you see? Apply now! Learn more about ADP at tech.adp.com The Key Responsibilities for Associate Security Analyst in GCS Operations are: -Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage. -Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support. -Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests. -Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure. -Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings. -Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem. To Succeed In This Role- You'll have a bachelor's degree or equivalent. Preferred Qualifications- -Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL. -Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC. -Scripting language (Linux Shell, Python, Powershell etc), SQL, etc. -Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus. -Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM. YOU'LL LOVE WORKING HERE BECAUSE YOU CAN: Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution. Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity. Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes. Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft. Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation. Join a company committed to equality and equity. Our goal is to impact lasting change through our actions. What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 1d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Newark, NJ

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $103k-141k yearly est. Easy Apply 10d ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Kyowa Kirin North America

    Information security analyst job in Princeton, NJ

    Kyowa Kirin is a fast-growing global specialty pharmaceutical company that applies state-of-the-art biotechnologies to discover and deliver novel medicines in four disease areas: bone and mineral; intractable hematologic; hematology oncology; and rare disease. A Japan-based company, our goal is to translate science into smiles by delivering therapies where no adequate treatments currently exist, working from drug discovery to product development and commercialization. In North America, we are headquartered in Princeton, NJ, with offices in California, North Carolina, and Mississauga, Ontario. Summary: We are seeking a Security Operations & OT Cybersecurity Specialist to join our Global Information Security team. This role will serve as the regional lead for North America security operations and OT/ICS security, responsible for incident response, monitoring, and cyber defense across IT and manufacturing environments. The ideal candidate will have strong experience in SOC operations, OT cybersecurity, and regulated industries, with the ability to respond under pressure while also driving continuous improvement. Essential Functions: • Lead incident response for North America, coordinating with the global SOC for escalations, investigations, and recovery. • Manage monitoring solutions to ensure high-quality visibility across IT, cloud, and OT environments. • Own OT/ICS cybersecurity strategy in partnership with manufacturing, infrastructure, and plant leadership, securing SCADA, PLCs, and lab systems. • Vendor management for proactive threat hunting, pen testing and forensic analysis. • Lead remediation activities for both IT and OT environments. • Drive regional execution of global SOC playbooks, escalation models, and threat intelligence integration. • Develop and maintain operational security runbooks and ensure continuous improvement of detection and response capabilities. • Partner with IT, R&D, and Manufacturing to enforce regulatory compliance across GxP, HIPAA, and FDA-controlled systems. Requirements: Education Bachelor's degree in Information Security, Computer Science, or related field required; Advanced training in OT/ICS security preferred. Certifications Required: CISSP Certifications Preferred: GICSP, GRID, or other OT-focused certifications Experience: At least 5 years in cybersecurity operations, with demonstrated experience in SOC or incident response leadership; Strong hands on experience with OT/ICS environments in pharma, biotech, manufacturing, or critical infrastructure; Expertise in SIEM, SOAR, forensic tools, and threat detection engineering; Knowledge of OT security frameworks (ISA/IEC 62443, NIST CSF) and pharmaceutical regulations (GxP, HIPAA, 21 CFR Part 11). Technical Skills • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, cloud, and OT environments. • Hands-on experience with SOC technologies such as SIEM, SOAR, EDR/XDR, and forensic analysis platforms. • Strong background in OT/ICS cybersecurity, including SCADA, PLCs, and lab systems, with application of frameworks such as ISA/IEC 62443 and NIST CSF. • Knowledge of threat detection engineering, use-case development, and integration of threat intelligence into monitoring workflows. • Proficiency in forensic tools and malware analysis to support root-cause identification and post-incident review. • Understanding of regulatory compliance requirements including GxP, HIPAA, and 21 CFR Part 11, as they apply to manufacturing and research systems. • Experience collaborating on vulnerability management, patching, and remediation across IT and OT environments. Working Conditions: Requires up to 10 % domestic and international travel The anticipated salary for this position will be $115,000 to $130,000. The actual salary offered for this role at commencement of employment may vary based on several factors including but not limited to relevant experience, skill set, qualifications, education (including applicable licenses and certifications, job-based knowledge, location, and other business and organizational needs. The listed salary is just one component of the overall compensation package. At Kyowa Kirin North America we provide a comprehensive range of benefits including: 401K with company match Discretionary Profit Share Annual Bonus Program (Sales Bonus for Sales Jobs) Generous PTO and Holiday Schedule which includes Summer and Winter Shut-Downs, Sick Days and, Volunteer Days Healthcare Benefits (Medical, Dental, Prescription Drugs and Vision) HSA & FSA Programs Well-Being and Work/Life Programs Life & Disability Insurance Concierge Services Long Term Incentive Program (subject to job level and performance) Pet Insurance Tuition Assistance Employee Referral Awards The compensation and benefits information set forth in this posting applies to candidates hired in the United States. Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market. KKNA and all of its employees have an obligation to act in accordance with the law and with integrity in all our operations and interactions It is the policy of Kyowa Kirin North America, Inc. to provide equal employment opportunity to all qualified persons without regard to race, religion, creed, color, pregnancy, sex, age, national origin, disability, genetic trait or predisposition, veteran status, marital status, sexual orientation or affection preference or citizenship status or any other category protected by law. When you apply to a job on this site, the personal data contained in your application will be collected and stored by Kyowa Kirin, Inc. (“Controller”), which is located at 510 Carnegie Center Dr. Princeton, NJ 08540 USA and can be contacted by emailing ****************************************. Controller's data protection officer can be contacted at usprivacyoffice@kyowakirin.com. Your personal data will be processed for the purposes of managing Controller's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of General Data Protection Regulation (EU) 2016/679 (“GDPR”) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment. Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller's behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. The transfer will be made using appropriate additional safeguards under the standard contractual clauses approved by regulators for transfers of personal data outside the European Union. Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, if you are located in the European Union, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability, and to lodge a complaint with an EU supervisory authority. If you have any questions about our use of your data, you may contact us by email at usprivacyoffice@kyowakirin.com. Recruitment & Staffing Agencies Kyowa Kirin does not accept agency resumes unless contacted directly by internal Kyowa Kirin Talent Acquisition. Please do not forward resumes to Kyowa Kirin employees or any other company location; Kyowa Kirin is not responsible for any fees related to unsolicited resumes. #LI-Tt1 #Hybrid #Princeton
    $115k-130k yearly Auto-Apply 60d+ ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Information security analyst job in Newark, NJ

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $243.8k-278.2k yearly 60d+ ago
  • Network Security Analyst

    Integrated Resources 4.5company rating

    Information security analyst job in Newark, NJ

    A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing. Job Description: Network Security Analyst 6 months CTH • 3+ years of designing, implementing and supporting CISCO ISE is required Responsibilities: Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions. • Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect • Perform Cisco ISE Authentication and Authorization • Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE • Deploy Cisco ISE Profiling and client provisioning services • Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE • Provide Reports, Monitoring, Troubleshooting, and Security Work with vendor on problem resolution Create policies and reports to meet the business requirements Participate in Planning, Design, and Tests Perform security audits, scan and monitor servers Investigate and report on security alerts and perform security incident reporting Requirements: Expert-level knowledge and experience with design, implementation and support of Cisco ISE 3-5 year of experience working with Network Security applications Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus) Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption Knowledge of Directory Services including Active Directory, LDAP, and TDS Knowledge of F5 load balancers Knowledge of IT security principles, HIPAA, SOX and PCI regulations Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus) Business Analysis skills and ability to translate business requirements into technical requirements Excellent oral/written communication and organizational skills Security certification a plus such as CISSP, CEH or CISA Qualifications Bachelor's Degree in Computer Science, Programming, or IT required Additional Information Contact- 732-549-2030 ext 242 Harshad
    $92k-125k yearly est. 60d+ ago
  • Information Security Officer

    Kabafusion

    Information security analyst job in Edison, NJ

    Job Description Come join a company that is putting the "CARE" back in healthcare. Why do IT Professionals want to work here? The reason people love working for KabaFusion is because of the impact we have on our patients. Here, it doesn't matter what your role is, you will be part of a team that works collaboratively to change lives. You will go home knowing you've made a difference and improved someone's life. About us: What started as a single pharmacy in 2010 has grown into KabaFusion becoming the largest privately held home infusion company in the country. We have a national network of pharmacies and nursing offices strategically placed to service 40+ states. Couple that with over 30 years of combined experience and it's no wonder why KabaFusion is the industry leader in home infusion. About the role: As an Information Security Officer, you will collaboratively with other members of our IT team to ensure that KabaFusion is as protected as possible when it comes to security threats. This will include auditing our current systems and analyzing areas of vulnerability then recommend remediations. This may also lead to gap analysis projects where you'll recommend and assist in the implementation of remedies to ensure we are mitigating risk. Essential Duties & Responsibilities: Design, implement, and maintain robust IT controls across our network, systems, and applications. Conduct advisory projects for key system implementations and business process changes to provide proactive risk and control guidance. Analyzing business and IT process controls, understanding the relationship with the data supporting them, identifying risks and design, and developing innovative data analytic test approaches applicable to audit objectives Owns audits and project engagements. Responsible for overseeing the IT audit staff on engagements and interacting with audit customers during planning, fieldwork and testing, reporting, and follow-up. As an Information Security Officer, you bring: Bachelor's degree or equivalent experience 8+ years of IT audit, cybersecurity, system administration, or network administration experience CISSP, CEH, CCSP, GSEC, CISM certification 2+ years of experience in SaaS application, AWS, or Azure Cloud Previous experience in cybersecurity incident response, auditing, or information security compliance, including expertise in access management, change management, IT operations, and vulnerability management, is desired. Our Benefits: Benefits start on your 1st day of employment. 401k w 4% match - no waiting or vesting period PTO / Floating Holidays / Paid Holidays Company paid life insurance and short-term disability Employee Assistance programs to help with mental health / wellness Learning & Development Programs Perks… includes discounts on travel, cell phone, clothing and more… Generous employee referral program KabaFusion is a mission driven company with a focus on innovation and patient care so, as a IT professional, if that sounds like something you want to be a part of, then look no further.
    $124k-186k yearly est. 3d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Trenton, NJ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 60d+ ago
  • Chief Information Security Officer (CISO)

    1Kosmos

    Information security analyst job in Iselin, NJ

    1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up. About the Role We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement. Key Responsibilities Security Operations Leadership (Primary Focus) Design, implement, and manage a comprehensive security operations infrastructure Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions Build and optimize security monitoring, incident response, and threat detection capabilities Drive automation initiatives to eliminate manual inefficiencies in security processes Compliance and Risk Management Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks Partner with business analysts to navigate regulatory requirements and audits Develop and maintain security policies, procedures, and documentation Manage security risk assessments and remediation programs Technical Security Architecture Secure cloud infrastructure across AWS, Google Cloud, and other platforms Integrate security into CI/CD pipelines, working closely with DevOps teams Implement and manage security tools (CrowdStrike, etc.) across the organization Conduct hands-on security reviews of architecture and code Cross-functional Collaboration Partner directly with development and engineering teams on secure software development Oversee internal IT security (smaller component of role) Communicate security initiatives and status to leadership and stakeholders Coordinate with global teams to ensure consistent security practices Requirements Required Qualifications Technical Expertise Minimum 7+ years in security operations with demonstrated hands-on experience Deep expertise in cloud security (AWS, Google Cloud, Azure) Proven ability to personally deploy and configure enterprise security tools Strong understanding of modern DevOps practices and CI/CD security integration Experience with security automation and orchestration Compliance and Governance Hands-on experience with FedRAMP certification processes Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications Understanding of regulatory compliance requirements and audit processes Leadership and Communication Experience leading security initiatives in fast-growing organizations Strong communication skills for collaborating with global, distributed teams Ability to translate technical security concepts for various stakeholders Comfortable working in a startup environment with evolving requirements Preferred Qualifications Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization Experience in identity management or authentication technologies Background in both security operations and security engineering Previous startup or scale-up experience Located in or willing to work EST hours (strong preference for NY/NJ area) Public-facing CISO experience (client communications) is a plus but not required What We're NOT Looking For Pure policy/governance executives without hands-on technical skills Traditional "big company" CISOs focused only on strategy and presentations Candidates who expect to delegate all technical work from day one Security leaders who haven't maintained current technical skills Benefits What We Offer Opportunity to build and shape security at a growing startup Direct impact on product and company security posture Collaborative environment with talented engineering teams Competitive compensation and equity package Flexible work arrangements with preference for hybrid in NY/NJ area
    $124k-186k yearly est. Auto-Apply 60d+ ago
  • Information Security Manager

    Cardinal Security 3.9company rating

    Information security analyst job in Newark, NJ

    We are seeking an experienced Information Security Manager to spearhead our efforts in safeguarding client data and maintaining a robust organizational threat posture. In this role, you will lead strategic initiatives to protect sensitive information, manage threat intelligence programs, and ensure compliance with relevant regulations. You will also collaborate closely with various internal teams-technical and non\-technical alike-to develop, implement, and continuously improve security best practices. Key Responsibilities Client Data Protection & Compliance Design and enforce policies, procedures, and technical safeguards that secure client information from unauthorized access, disclosure, or misuse. Stay current on data privacy regulations (e.g., GDPR, CCPA) and industry standards (e.g., ISO 27001, SOC 2), incorporating them into organizational processes. Oversee and maintain data classification protocols, ensuring appropriate access controls and encryption methods are applied. Threat Intelligence & Vulnerability Management Establish a comprehensive threat intelligence program, monitoring emerging risks and industry trends that could impact clients' or the organization's security posture. Conduct routine vulnerability assessments, penetration tests, and security audits, prioritizing remediation efforts based on criticality. Collaborate with cross\-functional teams (e.g., DevOps, Network Engineering) to implement and validate fixes or security upgrades. Incident Response & Crisis Management Develop and continuously refine the Incident Response Plan (IRP), outlining clear processes for detecting, containing, and remediating security breaches. Coordinate tabletop exercises and real\-world simulations to test the IRP, training staff to respond effectively in high\-stress scenarios. Serve as the primary point of contact during security incidents, liaising with external agencies (law enforcement, regulatory bodies) as necessary. Security Architecture & Best Practices Work with solution architects and system administrators to integrate robust security controls into infrastructure, software, and cloud environments. Evaluate and recommend new security products, tools, and services that enhance the organization's threat detection and prevention capabilities. Enforce secure coding practices, hardening standards, and network segmentation protocols that align with evolving threats. Governance, Risk & Compliance (GRC) Lead security risk assessments, identifying and documenting vulnerabilities, threats, and overall risk exposure to client data. Define and track security metrics (KPIs), reporting progress, gaps, and action plans to executive leadership. Oversee internal and external security audits, ensuring timely completion of any required corrective measures. Team Leadership & Collaboration Manage a team of security analysts, engineers, and incident responders, providing coaching, mentorship, and clear performance objectives. Foster a culture of security awareness and accountability throughout the organization, conducting regular training sessions for all staff. Coordinate with third\-party vendors, managed security service providers, and consultants to strengthen the organization's security ecosystem. Requirements Education & Experience Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or related field (or equivalent experience). 5+ years of hands\-on experience in information security, including roles in threat intelligence, GRC, and\/or incident response. Experience working within heavily regulated industries (e.g., finance, healthcare, government) is highly desirable. Technical Skills Proficiency with SIEM platforms (e.g., Splunk, QRadar), endpoint protection suites, and vulnerability management tools (e.g., Nessus, Qualys). In\-depth knowledge of security frameworks (NIST CSF, ISO 27001, COBIT) and compliance standards (PCI\-DSS, HIPAA, SOC 2). Hands\-on expertise in cloud security (AWS, Azure, GCP) and containerization platforms (Kubernetes, Docker) is a plus. Certifications Relevant certifications such as CISSP, CISM, CRISC, or GIAC (GSEC, GCIA, GCIH) strongly preferred. Soft Skills Exceptional problem\-solving and analytical abilities, with a keen eye for detail. Excellent communication and presentation skills for both technical and executive audiences. Proven track record of managing diverse teams and collaborating effectively across departments. Personal Attributes Integrity: Upholds the highest ethical standards in protecting sensitive client data. Leadership: Inspires trust and confidence, fostering a culture of teamwork, accountability, and continual learning. Adaptability: Stays agile in a dynamic threat landscape, quickly pivoting security strategies as new risks emerge. Strategic Mindset: Balances day\-to\-day operational demands with long\-term security vision and innovation. BenefitsWhat We Offer Competitive Compensation: Commensurate with experience, plus potential bonus structures. Comprehensive Benefits: Medical, dental, vision, and retirement plan options. Professional Growth: Training allowances, continuing education support, and clear career advancement paths. Impactful Work: Play a pivotal role in safeguarding clients' data and reputations, contributing to the organization's broader mission of secure service delivery. "}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"668264937","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Security and Surveillance"},{"field Label":"City","uitype":1,"value":"Newark"},{"field Label":"State\/Province","uitype":1,"value":"New Jersey"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"07101"}],"header Name":"Information Security Manager","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00209003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********04744106","FontSize":"12","location":"Newark","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $114k-156k yearly est. 60d+ ago
  • Vice President, Information Security Risk Manager

    CLS 4.8company rating

    Information security analyst job in Iselin, NJ

    CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day. Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment: Pivotal purpose Trusted guardian Targeted innovation Facilitate connections Delivering excellence Inclusive culture Job information: Functional title - Vice President, Information Security Risk Manager Department - Risk Management Corporate level - VP Report to - Director, Cyber and Information Risk Lead Location - New Jersey Expected full-time salary range between $ 125K - $160K + variable compensation + 401(k) match + benefits. Note: Disclosure as required by NY/NJ Pay Transparency Law of the expected salary compensation range for this role. Job purpose The Cyber and Information Risk Independent Risk Review Manager is responsible for independent reviews of the efficacy of CLS' Information Security and Data Management programs, including review and challenge of large-scale risk remediation efforts. The successful candidate will provide review and credible challenge of the effectiveness of information security and data management processes and controls in mitigating key risks to the firm. This position is highly engaged with the firm-wide Information Security and Data Management teams who provide security and data management solutions as well as corporate departments that own information security and data management risks. Essential Function / major duties and responsibilities of the job Independent Reviews - Execute horizontal reviews of top information security risks, identifying gaps in control coverage and recommending control improvements to address identified gaps. Complete thematic reviews of information security and data management operational risk events and associated proposed actions to propose control enhancements that reduce risk of recurrence. Work with the Information Security and Data Management teams to review control capabilities against industry standards and lead efforts to strengthen the control environment in line with the evolving threat landscape. Review and challenge actions to address gaps, monitor progress of actions, and validate sufficiency of closure evidence. Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required. Risk Remediation Oversight - Review and challenge the sufficiency of planned actions to address identified problems, provide stated benefits, and meet regulatory expectations. Review and monitor the progress of actions and validate sufficiency of closure evidence. Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required. Governance - Actively present to various committees and forums to keep management educated on status of independent reviews, challenges to risk remediation efforts, and progress on control improvements. Relationship Management - Be a respected point of contact to stakeholders across the business and technology functions in providing credible operational risk coverage for information security and data management risk. Policy & Procedures - Review and challenge relevant policies, standards, and procedures related to CLS information security and data management processes. Leadership Mentorship - Provide guidance and support to junior members of the team. Ability to influence and gain credibility with the business Experience / essential and desired for successful job performance · 5+ years of experience specifically related to information security and data management risk governance, operations, and risk management functions. · Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment. Experience must include time operating within transaction services environments characterized by the need for continuous availability and the highest levels of security. · Experienced working in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment. · Experienced operating within a highly regulated environment, with a preference for experience at the international and federal levels. · Deep knowledge of information security and data management risk and control frameworks and a strong understanding of related policies, procedures, guidelines, and structure. · Functional expertise, with operational knowledge of and exposure to various current and emerging information security and data management areas such as: v Cyber resilience v Identity & privileged access management v Secure coding practices v Cloud security configuration and control frameworks v Network security v Third-party risk management v Incident response v Threat/vulnerability management v Security architecture v Data governance v Data quality v Data architecture/lineage Qualifications / certifications · B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). M.S. desired. · Relevant certification is desirable, e.g., CISSP, CISM, CISA. · Working knowledge of information security and data management life cycles based on an established framework: CRI, NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA, DAMA-DMBOK. · Proficiency in MS PowerPoint and Excel. · Experience in broader MS Office suite, including Project and Visio is a plus · Experience with enterprise GRC tools, e.g. Archer is a plus Knowledge, skills, and abilities / competencies required for successful job performance To carry out the duties of the position effectively, the individual will need to possess the following attributes: · Judgement and decision making · Communication & Influence · Teamwork & Professionalism · Able to work independently, as required Success factors / ‘How'. Personal characteristics contributing to an individual's ability to excel in the position · Possess strong technical, analytical, and problem-solving skills. · Provide thought leadership while willing and able to individually contribute to finding solutions. · Self-motivated to exceed management expectations and objectives. · Clearly communicate complex technical issues to both business and technical staff at all levels. · Able to keep organized and detailed documentation. · Confidence to effectively challenge points of view regardless of seniority or corporate title. · Professionalism to seek out and embrace diversity of thought and experience. · Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups. · Able to effectively cope with change and comfortably handle risk and ambiguity. · Tenacious resolve and positive attitude in challenging situations. Our commitment to employees: At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including: Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days. 2 paid volunteer days so that you can actively support causes within your community that are important to you. Generous parental leave policies to ensure you can enjoy valuable time with your family. Parental transition coaching programmes and support services. Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others. Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity. Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't. Active support of flexible working for all employees where possible. Monthly ‘Heads Down Days' with no meetings across the whole company. Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees. Private medical insurance and dental coverage. Social events that give you opportunities to meet new people and broaden your network across the organisation. Annual flu vaccinations. Discounts and savings and cashback across a wide range of categories including health and retail for UK employees. Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees. All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning. Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
    $125k-160k yearly Auto-Apply 11d ago
  • Need SSO Info Security Analyst

    360 It Professionals 3.6company rating

    Information security analyst job in Newark, NJ

    This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results. Job Description Info Security Analyst - Lead 10 or more years' experience in Web technology; 10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services). OpenToken, OAUTH, RSA technology. Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures. Proven experience providing infrastructure troubleshooting and application support. Qualifications Bachelor's degree or equivalent work experience is required Additional Information Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
    $81k-105k yearly est. 3d ago
  • Chief Information Security Officer

    Saint Peter's Healthcare System 4.7company rating

    Information security analyst job in New Brunswick, NJ

    SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews. 2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board. 3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. 4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers. 5. Develop and manage information security budgets and monitor them for variances. 6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users. 7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk. 8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program. 9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection. 10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance. 11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. 12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. 13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams. 14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. 15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required. 16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. 17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation. 18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action. 19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. 20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. 21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. 22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. 23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management 24. Perform related duties and fulfill responsibilities as required. Requirements: 1. A Master's degree in Business Administration or a Technology related field. 2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role. 3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. 4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST. 5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations. 6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals. 7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical. 8. Strong problem-solving and analytical skills to identify and mitigate potential security risks. Salary Range: 133,715.00 - 220,639.00 USD We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials. The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status. Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards. You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
    $122k-190k yearly est. 60d+ ago
  • Security System Engineer

    Network Mountain

    Information security analyst job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 27d ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 60d+ ago
  • Lead Information Security Analyst - Identity

    Blueprint30 LLC

    Information security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: **************************** (ADA version: **************************** )
    $84k-119k yearly est. 1d ago
  • Lead Information Security Analyst - Identity

    Adpcareers

    Information security analyst job in Roseland, NJ

    ADP is Hiring a Lead Information Security Analyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients. Like what you see? Apply now! Learn more about ADP at tech.adp.com/careers Responsibilities: Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services. Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms. Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools. Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001). Mentor junior team members in support of IAM security program via process documentation and knowledge sharing. Analyze identity-related incidents and participate in incident response and root cause analysis. Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access). To Succeed in This Role: You will have a bachelor's degree or equivalent. Skills: 5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect) Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc. Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR) Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP) Strong scripting or automation skills (e.g., PowerShell, Python) Excellent analytical, communication, and documentation skills What are you waiting for? Apply today! Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY (ADA version: https://youtu.be/IQjUCA8SOoA )
    $84k-119k yearly est. 1d ago
  • Need SSO Info Security Analyst

    360 It Professionals 3.6company rating

    Information security analyst job in Newark, NJ

    This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results. Job Description Info Security Analyst - Lead 10 or more years' experience in Web technology; 10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services). OpenToken, OAUTH, RSA technology. Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures. Proven experience providing infrastructure troubleshooting and application support. Qualifications Bachelor's degree or equivalent work experience is required Additional Information Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
    $81k-105k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Hillsborough, NJ?

The average information security analyst in Hillsborough, NJ earns between $72,000 and $139,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Hillsborough, NJ

$100,000
Job type you want
Full Time
Part Time
Internship
Temporary