Information security analyst jobs in Hillsborough, NJ - 161 jobs
All
Information Security Analyst
Information Security Officer
Information Security Engineer
Senior Security Specialist
Information Security Manager
Securities Analyst
Network Security Analyst
Senior Security Analyst
Security System Engineer
Senior Information Security Consultant
Sr. Specialist, Security Operations
Rennerbrown
Information security analyst job in Princeton, NJ
A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments.
The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership.
Key Responsibilities
Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments.
Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness.
Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments.
Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes.
Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration.
Support remediation and post-incident activities to strengthen resilience across technology domains.
Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices.
Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards.
Required Experience
Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection.
Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors.
Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments.
Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings.
Strong analytical and communication skills, with the ability to work effectively across technical and business teams.
Technical Expertise
Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains.
Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms.
Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF.
Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows.
Experience collaborating on vulnerability management and remediation across IT and OT environments.
Certifications
Required: CISSP
Preferred: GICSP, GRID, or other OT/ICS-specific certifications.
Education
Bachelor's degree in InformationSecurity, Computer Science, or a related technical field required.
Advanced coursework or training in OT/ICS cybersecurity preferred.
$86k-133k yearly est. 5d ago
Looking for a job?
Let Zippia find it for you.
Information Security Specialist
Ask It Consulting
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The InformationSecurity Specialist (ISS)
is responsible for developing and documenting informationsecurity policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement informationsecurity & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document informationsecurity policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 3d ago
Information Security Analyst
Adpcareers
Information security analyst job in Roseland, NJ
ADP is hiring a Lead Cloud SecurityAnalyst in our Roseland, NJ office. This is a hybrid role.
As a Lead Cloud SecurityAnalyst, you will join a highly skilled team providing world-class infrastructure and network security assessments and security consultation for ADP's Global Security Organization (GSO). This team is responsible for the execution of ADP's global Compliance and Vulnerability Management Program (CVM) program for infrastructure and network across Cloud and on-premises locations.
Services provided to the organization include Vulnerability management program management including Zero-day vulnerability response & Secure OS Build Compliance for cloud/container infrastructure as well as on-premises servers/endpoints.
You will focus on supporting CVM Cloud initiatives by leveraging a variety of security tools. Working closely with product and technology teams, with your knowledge of industry standards, you will be ensuring our infrastructure meets and maintains the requirements of our CVM security program.
To succeed in this position, you'll need knowledge and experience in securing cloud environments (AWS is a MUST) and in developing or being a part of a vulnerability management program working with a variety of product/DevOps teams.
Experience with the use of security tools for scanning and detection coupled with the ability to analyze the results across a large data set using database and scripting tools. Balance that with ability to stay ahead of threats and security trends while refining processes in a rapidly changing environment to drive and evolve the program.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
WHAT YOU'LL DO:
Here's what you can expect on a typical day in the life of a Lead Cloud SecurityAnalyst at ADP.
Develop: Using existing tools, leverage available data to prioritize what should be addressed to reduce risk in the environment.
Measure: Develop metrics to track and show the performance of the program.
Communicate: From working with technical teams to understand/solve security issues to summarizing status for senior management.
Challenges: Across hundreds of products and a large global infrastructure, no day is the same and we must be prepared to respond to challenges presented.
Risk Management: Understand and evaluate/respond to risks/vulnerabilities and how to mitigate them.
Experience You'll Need:
Deep understanding of informationsecurity specifically in the realm of vulnerability management (VM)
Deep understanding of Cloud Security (AWS - Must, Other Cloud environments - Preferred)
Experience managing/building VM programs - defining and building metrics, automation of response and remediation (guidance)
Strong analytical/problem solving skills and cross functional knowledge across multiple development and security disciplines.
Understanding of security and compliance tools such as Qualys, Crowdstrike etc.
Experience working with CSPM tools such as Wiz, Prisma, Dome9/Cloudguard, etc.
Ability to communicate security-related concepts to a broad range of technical and non-technical staff.
Experience in scripting languages (Python - Preferred) and SQL Queries (Strong emphasis on Data Analytics)
To Succeed in This Role:
You'll have a bachelor's degree OR equivalent.
Any of the following are a plus but not necessary: CISSP, CISM, etc.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
$84k-119k yearly est. 1d ago
Security Analyst - Systems Operations
Blueprint30 LLC
Information security analyst job in Roseland, NJ
ADP is Hiring a SecurityAnalyst - Systems Operations
Unlock Your Career Potential:
Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data.
We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times.
From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
The position is required to work on weekends and 2
nd
US shift on a rotational basis, and to be on off hours on-call schedule, when necessary, with advanced notice.
Well, this may be the role for you. Ready to make your mark?
The Global Cybersecurity Services (GCS) Security Operations Team is responsible for implementing, managing, and supporting the applications, technologies, and underlying infrastructure delivered by the Global Security Organization (GSO).
The primary focus is on SecurityInformation and Event Management (SIEM) platforms and a wide range of standard security applications and tools, including both internal-home-grown and third-party solutions related to Data Governance, End-User Computing Protection, Data Loss Prevention (DLP), Unstructured Data Protection (UDP), Deep Packet Inspection (DPI), Threat Management, SOAR, and more.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com
The Key Responsibilities for
Associate SecurityAnalyst in GCS Operations
are:
-Support, manage, and troubleshoot SIEM platforms and various security technologies/tools; deploy and maintain monitoring systems, review alerts, and perform initial investigation and triage.
-Troubleshoot and resolve issues related to operating systems, databases, applications, and security tools; conduct compliance assessments, vulnerability scanning, mitigation planning, and patching/upgrade; participate in disaster recovery (DR) setup, testing, and ongoing support.
-Collaborate with Engineering, Project Management, Global IT teams, and end users to fulfill service requests.
-Provide feedback to enhance the functionality, reliability, and stability of security technologies and infrastructure.
-Be able to adapt quickly to new tools and solutions and support ongoing improvements to GSO service offerings.
-Communicate clearly (written and verbal), present technical information effectively, and work efficiently within team-based and fast-paced environments. This role contributes directly to the stability, performance, and effectiveness of ADP's enterprise security ecosystem.
To Succeed In This Role-
You'll have a bachelor's degree or equivalent.
Preferred Qualifications-
-Knowledge on ITIL process, Windows and Linux/Unix operating systems, MySql/MSSQL.
-Networking Protocols on TCP/IP, DNS, DHCP, HTTP, FTP, SMTP, SSL, Syslogd, PKI, DLP, Load Balancer, IDS, IPS, SIEM, DPI, UDP, GRC.
-Scripting language (Linux Shell, Python, Powershell etc), SQL, etc.
-Experience with CrowdStrike, Qualys, Snare, Snowflake, or knowledge on AWS/Azure are plus.
-Any of the following certifications is a plus: CISSP, GSEC, CISA, CRISC, CISM.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We're obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Give back to others. Always do the right thing for our clients and our community and humbly give back to the community where we live and work. Support our associates in times of need through ADP's Philanthropic Foundation.
Join a company committed to equality and equity. Our goal is to impact lasting change through our actions.
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
$84k-119k yearly est. 1d ago
Sr. Security Analyst
Maximus 4.3
Information security analyst job in Newark, NJ
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in informationsecurity, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$103k-141k yearly est. Easy Apply 10d ago
Sr. Specialist, Security Operations & OT Cybersecurity
Kyowa Kirin North America
Information security analyst job in Princeton, NJ
Kyowa Kirin is a fast-growing global specialty pharmaceutical company that applies state-of-the-art biotechnologies to discover and deliver novel medicines in four disease areas: bone and mineral; intractable hematologic; hematology oncology; and rare disease. A Japan-based company, our goal is to translate science into smiles by delivering therapies where no adequate treatments currently exist, working from drug discovery to product development and commercialization. In North America, we are headquartered in Princeton, NJ, with offices in California, North Carolina, and Mississauga, Ontario.
Summary:
We are seeking a Security Operations & OT Cybersecurity Specialist to join our Global InformationSecurity team. This role will serve as the regional lead for North America security operations and OT/ICS security, responsible for incident response, monitoring, and cyber defense across IT and manufacturing environments. The ideal candidate will have strong experience in SOC operations, OT cybersecurity, and regulated industries, with the ability to respond under pressure while also driving continuous improvement.
Essential Functions:
• Lead incident response for North America, coordinating with the global SOC for escalations, investigations, and recovery.
• Manage monitoring solutions to ensure high-quality visibility across IT, cloud, and OT environments.
• Own OT/ICS cybersecurity strategy in partnership with manufacturing, infrastructure, and plant leadership, securing SCADA, PLCs, and lab systems.
• Vendor management for proactive threat hunting, pen testing and forensic analysis.
• Lead remediation activities for both IT and OT environments.
• Drive regional execution of global SOC playbooks, escalation models, and threat intelligence integration.
• Develop and maintain operational security runbooks and ensure continuous improvement of detection and response capabilities.
• Partner with IT, R&D, and Manufacturing to enforce regulatory compliance across GxP, HIPAA, and FDA-controlled systems.
Requirements:
Education
Bachelor's degree in InformationSecurity, Computer Science, or related field required; Advanced training in OT/ICS security preferred.
Certifications Required:
CISSP
Certifications
Preferred: GICSP, GRID, or other OT-focused certifications
Experience:
At least 5 years in cybersecurity operations, with demonstrated experience in SOC or incident response leadership; Strong hands on experience with OT/ICS environments in pharma, biotech, manufacturing, or critical infrastructure; Expertise in SIEM, SOAR, forensic tools, and threat detection engineering; Knowledge of OT security frameworks (ISA/IEC 62443, NIST CSF) and pharmaceutical regulations (GxP, HIPAA, 21 CFR Part 11).
Technical Skills
• Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, cloud, and OT environments.
• Hands-on experience with SOC technologies such as SIEM, SOAR, EDR/XDR, and forensic analysis platforms.
• Strong background in OT/ICS cybersecurity, including SCADA, PLCs, and lab systems, with application of frameworks such as ISA/IEC 62443 and NIST CSF.
• Knowledge of threat detection engineering, use-case development, and integration of threat intelligence into monitoring workflows.
• Proficiency in forensic tools and malware analysis to support root-cause identification and post-incident review.
• Understanding of regulatory compliance requirements including GxP, HIPAA, and 21 CFR Part 11, as they apply to manufacturing and research systems.
• Experience collaborating on vulnerability management, patching, and remediation across IT and OT environments.
Working Conditions:
Requires up to 10 % domestic and international travel
The anticipated salary for this position will be $115,000 to $130,000. The actual salary offered for this role at commencement of employment may vary based on several factors including but not limited to relevant experience, skill set, qualifications, education (including applicable licenses and certifications, job-based knowledge, location, and other business and organizational needs.
The listed salary is just one component of the overall compensation package. At Kyowa Kirin North America we provide a comprehensive range of benefits including:
401K with company match
Discretionary Profit Share
Annual Bonus Program (Sales Bonus for Sales Jobs)
Generous PTO and Holiday Schedule which includes Summer and Winter Shut-Downs, Sick Days and, Volunteer Days
Healthcare Benefits (Medical, Dental, Prescription Drugs and Vision)
HSA & FSA Programs
Well-Being and Work/Life Programs
Life & Disability Insurance
Concierge Services
Long Term Incentive Program (subject to job level and performance)
Pet Insurance
Tuition Assistance
Employee Referral Awards
The compensation and benefits information set forth in this posting applies to candidates hired in the United States. Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market.
KKNA and all of its employees have an obligation to act in accordance with the law and with integrity in all our operations and interactions
It is the policy of Kyowa Kirin North America, Inc. to provide equal employment opportunity to all qualified persons without regard to race, religion, creed, color, pregnancy, sex, age, national origin, disability, genetic trait or predisposition, veteran status, marital status, sexual orientation or affection preference or citizenship status or any other category protected by law.
When you apply to a job on this site, the personal data contained in your application will be collected and stored by Kyowa Kirin, Inc. (“Controller”), which is located at 510 Carnegie Center Dr. Princeton, NJ 08540 USA and can be contacted by emailing ****************************************. Controller's data protection officer can be contacted at usprivacyoffice@kyowakirin.com. Your personal data will be processed for the purposes of managing Controller's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of General Data Protection Regulation (EU) 2016/679 (“GDPR”) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment.
Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller's behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. The transfer will be made using appropriate additional safeguards under the standard contractual clauses approved by regulators for transfers of personal data outside the European Union.
Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, if you are located in the European Union, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability, and to lodge a complaint with an EU supervisory authority. If you have any questions about our use of your data, you may contact us by email at usprivacyoffice@kyowakirin.com.
Recruitment & Staffing Agencies
Kyowa Kirin does not accept agency resumes unless contacted directly by internal Kyowa Kirin Talent Acquisition. Please do not forward resumes to Kyowa Kirin employees or any other company location; Kyowa Kirin is not responsible for any fees related to unsolicited resumes.
#LI-Tt1 #Hybrid #Princeton
$115k-130k yearly Auto-Apply 60d+ ago
Senior Manager, Information Security Office Consultant
Dev 4.2
Information security analyst job in Newark, NJ
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, InformationSecurity Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in InformationSecurity. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central InformationSecurity point of contact for the Enterprise Platform team
Coordinate and execute proactive InformationSecurity consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's InformationSecurity capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special InformationSecurity hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall InformationSecurity health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
$243.8k-278.2k yearly 60d+ ago
Network Security Analyst
Integrated Resources 4.5
Information security analyst job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
Network SecurityAnalyst
6 months CTH
• 3+ years of designing, implementing and supporting CISCO ISE is required
Responsibilities:
Work with vendor to ensure the quality design, implementation, installation/configuration, and provide technical admin support for Cisco ISE Authentication Authorization, Posture Assessment, and AnyConnect end point Malware Prevention solutions.
• Upgrade Cisco ISE infrastructure including hardware, software, and AnyConnect
• Perform Cisco ISE Authentication and Authorization
• Enforce security Posture compliance for wired and wireless endpoints and enhance infrastructure security using the Cisco ISE
• Deploy Cisco ISE Profiling and client provisioning services
• Integrate Endpoint Malware Protection Services (AMP) with AnyConnect and Cisco ISE
• Provide Reports, Monitoring, Troubleshooting, and Security
Work with vendor on problem resolution
Create policies and reports to meet the business requirements
Participate in Planning, Design, and Tests
Perform security audits, scan and monitor servers
Investigate and report on security alerts and perform security incident reporting
Requirements:
Expert-level knowledge and experience with design, implementation and support of Cisco ISE
3-5 year of experience working with Network Security applications
Complex routing and switching solutions (Cisco is a must, Nexus strongly preferred, other manufacturers are a plus)
Advance knowledge of networking, TCP/IP, FTP, SCP, firewalls, ACLs, Authentication protocols, Authorization, VPN, PKI, RSA, and Encryption
Knowledge of Directory Services including Active Directory, LDAP, and TDS
Knowledge of F5 load balancers
Knowledge of IT security principles, HIPAA, SOX and PCI regulations
Knowledge of IDS/IPS, Malware Prevention (Sourcefire & Fireye desired, Palo Alto a plus)
Business Analysis skills and ability to translate business requirements into technical requirements
Excellent oral/written communication and organizational skills
Security certification a plus such as CISSP, CEH or CISA
Qualifications
Bachelor's Degree in Computer Science, Programming, or IT required
Additional Information
Contact- 732-549-2030 ext 242
Harshad
$92k-125k yearly est. 60d+ ago
Information Security Officer
Kabafusion
Information security analyst job in Edison, NJ
Job Description
Come join a company that is putting the "CARE" back in healthcare.
Why do IT Professionals want to work here? The reason people love working for KabaFusion is because of the impact we have on our patients. Here, it doesn't matter what your role is, you will be part of a team that works collaboratively to change lives. You will go home knowing you've made a difference and improved someone's life.
About us:
What started as a single pharmacy in 2010 has grown into KabaFusion becoming the largest privately held home infusion company in the country. We have a national network of pharmacies and nursing offices strategically placed to service 40+ states. Couple that with over 30 years of combined experience and it's no wonder why KabaFusion is the industry leader in home infusion.
About the role:
As an InformationSecurity Officer, you will collaboratively with other members of our IT team to ensure that KabaFusion is as protected as possible when it comes to security threats. This will include auditing our current systems and analyzing areas of vulnerability then recommend remediations. This may also lead to gap analysis projects where you'll recommend and assist in the implementation of remedies to ensure we are mitigating risk.
Essential Duties & Responsibilities:
Design, implement, and maintain robust IT controls across our network, systems, and applications.
Conduct advisory projects for key system implementations and business process changes to provide proactive risk and control guidance.
Analyzing business and IT process controls, understanding the relationship with the data supporting them, identifying risks and design, and developing innovative data analytic test approaches applicable to audit objectives
Owns audits and project engagements. Responsible for overseeing the IT audit staff on engagements and interacting with audit customers during planning, fieldwork and testing, reporting, and follow-up.
As an InformationSecurity Officer, you bring:
Bachelor's degree or equivalent experience
8+ years of IT audit, cybersecurity, system administration, or network administration experience
CISSP, CEH, CCSP, GSEC, CISM certification
2+ years of experience in SaaS application, AWS, or Azure Cloud
Previous experience in cybersecurity incident response, auditing, or informationsecurity compliance, including expertise in access management, change management, IT operations, and vulnerability management, is desired.
Our Benefits:
Benefits start on your 1st day of employment.
401k w 4% match - no waiting or vesting period
PTO / Floating Holidays / Paid Holidays
Company paid life insurance and short-term disability
Employee Assistance programs to help with mental health / wellness
Learning & Development Programs
Perks… includes discounts on travel, cell phone, clothing and more…
Generous employee referral program
KabaFusion is a mission driven company with a focus on innovation and patient care so, as a IT professional, if that sounds like something you want to be a part of, then look no further.
$124k-186k yearly est. 3d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Chief Information Security Officer (CISO)
1Kosmos
Information security analyst job in Iselin, NJ
1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up.
About the Role
We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement.
Key Responsibilities
Security Operations Leadership (Primary Focus)
Design, implement, and manage a comprehensive security operations infrastructure
Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions
Build and optimize security monitoring, incident response, and threat detection capabilities
Drive automation initiatives to eliminate manual inefficiencies in security processes
Compliance and Risk Management
Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks
Partner with business analysts to navigate regulatory requirements and audits
Develop and maintain security policies, procedures, and documentation
Manage security risk assessments and remediation programs
Technical Security Architecture
Secure cloud infrastructure across AWS, Google Cloud, and other platforms
Integrate security into CI/CD pipelines, working closely with DevOps teams
Implement and manage security tools (CrowdStrike, etc.) across the organization
Conduct hands-on security reviews of architecture and code
Cross-functional Collaboration
Partner directly with development and engineering teams on secure software development
Oversee internal IT security (smaller component of role)
Communicate security initiatives and status to leadership and stakeholders
Coordinate with global teams to ensure consistent security practices
Requirements
Required Qualifications
Technical Expertise
Minimum 7+ years in security operations with demonstrated hands-on experience
Deep expertise in cloud security (AWS, Google Cloud, Azure)
Proven ability to personally deploy and configure enterprise security tools
Strong understanding of modern DevOps practices and CI/CD security integration
Experience with security automation and orchestration
Compliance and Governance
Hands-on experience with FedRAMP certification processes
Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications
Understanding of regulatory compliance requirements and audit processes
Leadership and Communication
Experience leading security initiatives in fast-growing organizations
Strong communication skills for collaborating with global, distributed teams
Ability to translate technical security concepts for various stakeholders
Comfortable working in a startup environment with evolving requirements
Preferred Qualifications
Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization
Experience in identity management or authentication technologies
Background in both security operations and security engineering
Previous startup or scale-up experience
Located in or willing to work EST hours (strong preference for NY/NJ area)
Public-facing CISO experience (client communications) is a plus but not required
What We're NOT Looking For
Pure policy/governance executives without hands-on technical skills
Traditional "big company" CISOs focused only on strategy and presentations
Candidates who expect to delegate all technical work from day one
Security leaders who haven't maintained current technical skills
Benefits
What We Offer
Opportunity to build and shape security at a growing startup
Direct impact on product and company security posture
Collaborative environment with talented engineering teams
Competitive compensation and equity package
Flexible work arrangements with preference for hybrid in NY/NJ area
$124k-186k yearly est. Auto-Apply 60d+ ago
Information Security Manager
Cardinal Security 3.9
Information security analyst job in Newark, NJ
We are seeking an experienced InformationSecurity Manager to spearhead our efforts in safeguarding client data and maintaining a robust organizational threat posture. In this role, you will lead strategic initiatives to protect sensitive information, manage threat intelligence programs, and ensure compliance with relevant regulations. You will also collaborate closely with various internal teams-technical and non\-technical alike-to develop, implement, and continuously improve security best practices.
Key Responsibilities
Client Data Protection & Compliance
Design and enforce policies, procedures, and technical safeguards that secure client information from unauthorized access, disclosure, or misuse.
Stay current on data privacy regulations (e.g., GDPR, CCPA) and industry standards (e.g., ISO 27001, SOC 2), incorporating them into organizational processes.
Oversee and maintain data classification protocols, ensuring appropriate access controls and encryption methods are applied.
Threat Intelligence & Vulnerability Management
Establish a comprehensive threat intelligence program, monitoring emerging risks and industry trends that could impact clients' or the organization's security posture.
Conduct routine vulnerability assessments, penetration tests, and security audits, prioritizing remediation efforts based on criticality.
Collaborate with cross\-functional teams (e.g., DevOps, Network Engineering) to implement and validate fixes or security upgrades.
Incident Response & Crisis Management
Develop and continuously refine the Incident Response Plan (IRP), outlining clear processes for detecting, containing, and remediating security breaches.
Coordinate tabletop exercises and real\-world simulations to test the IRP, training staff to respond effectively in high\-stress scenarios.
Serve as the primary point of contact during security incidents, liaising with external agencies (law enforcement, regulatory bodies) as necessary.
Security Architecture & Best Practices
Work with solution architects and system administrators to integrate robust security controls into infrastructure, software, and cloud environments.
Evaluate and recommend new security products, tools, and services that enhance the organization's threat detection and prevention capabilities.
Enforce secure coding practices, hardening standards, and network segmentation protocols that align with evolving threats.
Governance, Risk & Compliance (GRC)
Lead security risk assessments, identifying and documenting vulnerabilities, threats, and overall risk exposure to client data.
Define and track security metrics (KPIs), reporting progress, gaps, and action plans to executive leadership.
Oversee internal and external security audits, ensuring timely completion of any required corrective measures.
Team Leadership & Collaboration
Manage a team of securityanalysts, engineers, and incident responders, providing coaching, mentorship, and clear performance objectives.
Foster a culture of security awareness and accountability throughout the organization, conducting regular training sessions for all staff.
Coordinate with third\-party vendors, managed security service providers, and consultants to strengthen the organization's security ecosystem.
Requirements
Education & Experience
Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or related field (or equivalent experience).
5+ years of hands\-on experience in informationsecurity, including roles in threat intelligence, GRC, and\/or incident response.
Experience working within heavily regulated industries (e.g., finance, healthcare, government) is highly desirable.
Technical Skills
Proficiency with SIEM platforms (e.g., Splunk, QRadar), endpoint protection suites, and vulnerability management tools (e.g., Nessus, Qualys).
In\-depth knowledge of security frameworks (NIST CSF, ISO 27001, COBIT) and compliance standards (PCI\-DSS, HIPAA, SOC 2).
Hands\-on expertise in cloud security (AWS, Azure, GCP) and containerization platforms (Kubernetes, Docker) is a plus.
Certifications
Relevant certifications such as CISSP, CISM, CRISC, or GIAC (GSEC, GCIA, GCIH) strongly preferred.
Soft Skills
Exceptional problem\-solving and analytical abilities, with a keen eye for detail.
Excellent communication and presentation skills for both technical and executive audiences.
Proven track record of managing diverse teams and collaborating effectively across departments.
Personal Attributes
Integrity: Upholds the highest ethical standards in protecting sensitive client data.
Leadership: Inspires trust and confidence, fostering a culture of teamwork, accountability, and continual learning.
Adaptability: Stays agile in a dynamic threat landscape, quickly pivoting security strategies as new risks emerge.
Strategic Mindset: Balances day\-to\-day operational demands with long\-term security vision and innovation.
BenefitsWhat We Offer
Competitive Compensation: Commensurate with experience, plus potential bonus structures.
Comprehensive Benefits: Medical, dental, vision, and retirement plan options.
Professional Growth: Training allowances, continuing education support, and clear career advancement paths.
Impactful Work: Play a pivotal role in safeguarding clients' data and reputations, contributing to the organization's broader mission of secure service delivery.
"}}],"is Mobile":false,"iframe":"true","job Type":"Full time","apply Name":"Apply Now","zsoid":"668264937","FontFamily":"Verdana, Geneva, sans\-serif","job OtherDetails":[{"field Label":"Industry","uitype":2,"value":"Security and Surveillance"},{"field Label":"City","uitype":1,"value":"Newark"},{"field Label":"State\/Province","uitype":1,"value":"New Jersey"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"07101"}],"header Name":"InformationSecurity Manager","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00209003","attach Arr":[],"custom Template":"3","is CandidateLoginEnabled":true,"job Id":"**********04744106","FontSize":"12","location":"Newark","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
$114k-156k yearly est. 60d+ ago
Vice President, Information Security Risk Manager
CLS 4.8
Information security analyst job in Iselin, NJ
CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day.
Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use.
CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market.
Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment:
Pivotal purpose
Trusted guardian
Targeted innovation
Facilitate connections
Delivering excellence
Inclusive culture
Job information:
Functional title - Vice President, InformationSecurity Risk Manager
Department - Risk Management
Corporate level - VP
Report to - Director, Cyber and Information Risk Lead
Location - New Jersey
Expected full-time salary range between $ 125K - $160K + variable compensation + 401(k) match + benefits.
Note: Disclosure as required by NY/NJ Pay Transparency Law of the expected salary compensation range for this role.
Job purpose
The Cyber and Information Risk Independent Risk Review Manager is responsible for independent reviews of the efficacy of CLS' InformationSecurity and Data Management programs, including review and challenge of large-scale risk remediation efforts. The successful candidate will provide review and credible challenge of the effectiveness of informationsecurity and data management processes and controls in mitigating key risks to the firm. This position is highly engaged with the firm-wide InformationSecurity and Data Management teams who provide security and data management solutions as well as corporate departments that own informationsecurity and data management risks.
Essential Function / major duties and responsibilities of the job
Independent Reviews -
Execute horizontal reviews of top informationsecurity risks, identifying gaps in control coverage and recommending control improvements to address identified gaps.
Complete thematic reviews of informationsecurity and data management operational risk events and associated proposed actions to propose control enhancements that reduce risk of recurrence.
Work with the InformationSecurity and Data Management teams to review control capabilities against industry standards and lead efforts to strengthen the control environment in line with the evolving threat landscape.
Review and challenge actions to address gaps, monitor progress of actions, and validate sufficiency of closure evidence.
Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
Risk Remediation Oversight -
Review and challenge the sufficiency of planned actions to address identified problems, provide stated benefits, and meet regulatory expectations.
Review and monitor the progress of actions and validate sufficiency of closure evidence.
Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required.
Governance - Actively present to various committees and forums to keep management educated on status of independent reviews, challenges to risk remediation efforts, and progress on control improvements.
Relationship Management - Be a respected point of contact to stakeholders across the business and technology functions in providing credible operational risk coverage for informationsecurity and data management risk.
Policy & Procedures - Review and challenge relevant policies, standards, and procedures related to CLS informationsecurity and data management processes.
Leadership
Mentorship - Provide guidance and support to junior members of the team.
Ability to influence and gain credibility with the business
Experience / essential and desired for successful job performance
· 5+ years of experience specifically related to informationsecurity and data management risk governance, operations, and risk management functions.
· Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment. Experience must include time operating within transaction services environments characterized by the need for continuous availability and the highest levels of security.
· Experienced working in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment.
· Experienced operating within a highly regulated environment, with a preference for experience at the international and federal levels.
· Deep knowledge of informationsecurity and data management risk and control frameworks and a strong understanding of related policies, procedures, guidelines, and structure.
· Functional expertise, with operational knowledge of and exposure to various current and emerging informationsecurity and data management areas such as:
v Cyber resilience
v Identity & privileged access management
v Secure coding practices
v Cloud security configuration and control frameworks
v Network security
v Third-party risk management
v Incident response
v Threat/vulnerability management
v Security architecture
v Data governance
v Data quality
v Data architecture/lineage
Qualifications / certifications
· B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). M.S. desired.
· Relevant certification is desirable, e.g., CISSP, CISM, CISA.
· Working knowledge of informationsecurity and data management life cycles based on an established framework: CRI, NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA, DAMA-DMBOK.
· Proficiency in MS PowerPoint and Excel.
· Experience in broader MS Office suite, including Project and Visio is a plus
· Experience with enterprise GRC tools, e.g. Archer is a plus
Knowledge, skills, and abilities / competencies required for successful job performance
To carry out the duties of the position effectively, the individual will need to possess the following attributes:
· Judgement and decision making
· Communication & Influence
· Teamwork & Professionalism
· Able to work independently, as required
Success factors / ‘How'. Personal characteristics contributing to an individual's ability to excel in the position
· Possess strong technical, analytical, and problem-solving skills.
· Provide thought leadership while willing and able to individually contribute to finding solutions.
· Self-motivated to exceed management expectations and objectives.
· Clearly communicate complex technical issues to both business and technical staff at all levels.
· Able to keep organized and detailed documentation.
· Confidence to effectively challenge points of view regardless of seniority or corporate title.
· Professionalism to seek out and embrace diversity of thought and experience.
· Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups.
· Able to effectively cope with change and comfortably handle risk and ambiguity.
· Tenacious resolve and positive attitude in challenging situations.
Our commitment to employees:
At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including:
Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days.
2 paid volunteer days so that you can actively support causes within your community that are important to you.
Generous parental leave policies to ensure you can enjoy valuable time with your family.
Parental transition coaching programmes and support services.
Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others.
Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity.
Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't.
Active support of flexible working for all employees where possible.
Monthly ‘Heads Down Days' with no meetings across the whole company.
Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees.
Private medical insurance and dental coverage.
Social events that give you opportunities to meet new people and broaden your network across the organisation.
Annual flu vaccinations.
Discounts and savings and cashback across a wide range of categories including health and retail for UK employees.
Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees.
All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning.
Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
$125k-160k yearly Auto-Apply 11d ago
Need SSO Info Security Analyst
360 It Professionals 3.6
Information security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info SecurityAnalyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on
510-254-33-00 Ext. 130
$81k-105k yearly est. 3d ago
Chief Information Security Officer
Saint Peter's Healthcare System 4.7
Information security analyst job in New Brunswick, NJ
SPHS-Info Tech-General The Chief InformationSecurity Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise informationsecurity and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's informationsecurity organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
2. Facilitate informationsecurity governance through the implementation of a hierarchical governance program, including the formation of an informationsecurity steering committee or advisory board.
3. Develop, maintain and publish up-to-date informationsecurity policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
5. Develop and manage informationsecurity budgets and monitor them for variances.
6. Create and manage informationsecurity and risk management awareness training programs for all employees, contractors and approved system users.
7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
8. Provide regular reporting on the current status of the informationsecurity program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
10. Develop and enhance an informationsecurity management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance.
11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
13. Coordinate informationsecurity and risk management projects with resources from the IT organization and business unit teams.
14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
15. Liaise among the informationsecurity team and corporate compliance, audit, legal and HR management teams as required.
16. Define and facilitate the informationsecurity risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.
20. Coordinate the use of external resources involved in the informationsecurity program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.
21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.
22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management
24. Perform related duties and fulfill responsibilities as required.
Requirements:
1. A Master's degree in Business Administration or a Technology related field.
2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, informationsecurity, and IT roles, with at least four (4) years of those in a senior leadership role.
3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.
4. Knowledge of common informationsecurity management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST.
5. Experience developing informationsecurity policies and procedures, successfully executing programs, and experience with contract/vendor negotiations.
6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals.
7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical.
8. Strong problem-solving and analytical skills to identify and mitigate potential security risks.
Salary Range: 133,715.00 - 220,639.00 USD
We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials.
The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status.
Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards.
You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
$122k-190k yearly est. 60d+ ago
Security System Engineer
Network Mountain
Information security analyst job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
$78k-108k yearly est. 27d ago
Information Security Specialist
Ask It Consulting
Information security analyst job in Trenton, NJ
Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations.
Job Description
The InformationSecurity Specialist (ISS) is responsible for developing and documenting informationsecurity policies and standards, in addition to planning, coordinating, and implementing security measures for information systems.
Years of Relevant Experience: 5 plus years
Preferred Education 4 year college degree or equivalent technical study
• -Define, develop and implement informationsecurity & risk management policies, procedures & best practices to comply with industry standards
• -Develop plans to safeguard computer files against accidental or unauthorized
• modification, destruction, or disclosure and to meet emergency data processing
• needs. Monitor use of data files and regulate access to safeguard information in
• computer files.
• -Document and maintain a repository with version control of all policies, procedures and best practices
• -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels
• -Monitor use of data files and safeguard computer files against authorized access and unauthorized access
• -Modify computer security files to incorporate new software, correct errors or access changes
• -Perform risk assessments and execute tests of data processing system to ensure
• functioning of data processing activities and security measures.
• -Encrypt data transmissions and erect firewalls to conceal confidential information as it
• is being transmitted and to keep out tainted digital transfers.
• -Identify and track issues, risks and action items.
• -Document informationsecurity policies, standards, and procedures spanning and
• encompassing the range of topics such as organization security, asset ID and
• classification, personal security, communications and operations management,
• access control, system development and maintenance, business continuity
• management, and compliance.
• -Confer with users to discuss issues such as computer data access needs, security
• violations, and programming changes.
• -Train users and promote security awareness to ensure system security and to
• improve server and network efficiency.
Qualifications
Prior experience in the following are essential for the role:
• Websense 7.8
• E policy Orchestrator 4.6
• Mc Afee email gateway (MEG) 7.6
• Airwatch 8.0.6.0
Additional Information
If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
$84k-119k yearly est. 60d+ ago
Lead Information Security Analyst - Identity
Blueprint30 LLC
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead InformationSecurityAnalyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: ****************************
(ADA version: **************************** )
$84k-119k yearly est. 1d ago
Lead Information Security Analyst - Identity
Adpcareers
Information security analyst job in Roseland, NJ
ADP is Hiring a Lead InformationSecurityAnalyst - Identity Unlock Your Career Potential: Global Security Organization at ADP. Do you have a passion for going on the offensive to safeguard critical information? As ADP's Global Security Organization (GSO), we know that our clients rely on us for human capital management solutions, but beyond that, they entrust us with one of their most valuable assets -- their employee data. We are honored by this trust and are laser focused on securing data at every step in the information lifecycle, ensuring integrity, confidentiality and compliance with industry and government regulations at all times. From the cloud to the data center and across every emerging device, you'll join a team of experts in the GSO who are always staying one step ahead in this ever-changing world of data by continually evolving our strategies and technologies to protect ADP and our clients.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Responsibilities:
Develop and lead IAM security programs, with a primary focus on Active Directory (on-prem and Azure AD), identity lifecycle management, authentication systems, and overall directory hygiene
Provide security oversight and guidance for directory services (Active Directory, Azure AD), including accounts, Group Policy, OU structure, domain trusts, and federation services.
Oversight and compliance monitoring for role-based access control (RBAC), conditional access, and least privilege principles across AD and cloud identity platforms.
Oversight and compliance monitoring for SSO, MFA, Privileged Access Management (PAM), and Identity Governance & Administration (IGA) tools.
Align IAM configurations and controls to meet compliance, audit, and security requirements as necessary (e.g., CIS, SOX, NIST, ISO 27001).
Mentor junior team members in support of IAM security program via process documentation and knowledge sharing.
Analyze identity-related incidents and participate in incident response and root cause analysis.
Knowledge of modern identity strategies (Zero Trust, passwordless authentication, Just-In-Time access).
To Succeed in This Role:
You will have a bachelor's degree or equivalent.
Skills:
5+ years of experience in IAM or Security Operations, with hands-on expertise in Active Directory and Azure AD
Strong knowledge of identity protocols (LDAP, Kerberos, SAML, OAuth2, OpenID Connect)
Experience with hybrid identity environments, including Azure AD Connect, conditional access, and authentication flows
Familiarity with IAM and PAM solutions such as SailPoint, CyberArk, etc.
Understanding of security frameworks (NIST, ISO, CIS) and regulatory compliance requirements (SOX, HIPAA, GDPR)
Strong knowledge of Cloud IAM concepts and implementations across the major cloud providers (AWS, Azure, OCI, GCP)
Strong scripting or automation skills (e.g., PowerShell, Python)
Excellent analytical, communication, and documentation skills
What are you waiting for? Apply today!
Find out why people come to ADP and why they stay: https://youtu.be/ODb8lxBrxrY
(ADA version: https://youtu.be/IQjUCA8SOoA )
$84k-119k yearly est. 1d ago
Need SSO Info Security Analyst
360 It Professionals 3.6
Information security analyst job in Newark, NJ
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
Info SecurityAnalyst - Lead
10 or more years' experience in Web technology;
10 or more years' experience SSO technologies (Siteminder/PingFederate/ PingAccess/CA directory services).
OpenToken, OAUTH, RSA technology.
Proven experience gathering and documenting technical requirements, systems architecture design, process flow, and operational support procedures.
Proven experience providing infrastructure troubleshooting and application support.
Qualifications
Bachelor's degree or equivalent work experience is required
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
$81k-105k yearly est. 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Hillsborough, NJ?
The average information security analyst in Hillsborough, NJ earns between $72,000 and $139,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Hillsborough, NJ