Post job

Information security analyst jobs in Lakewood, NJ - 108 jobs

All
Information Security Analyst
Information Security Officer
Senior Security Specialist
Information Security Engineer
Information Security Manager
Senior Information Security Analyst
Securities Analyst
Manager, Information Assurance
Information Systems Engineer
Senior Information Security Engineer
Security Architect
  • Chief Information Security Officer

    Arma International 4.4company rating

    Information security analyst job in Princeton, NJ

    Department Information Security Office Category Information Technology Job Type Full-Time The Chief Information Security Officer (CISO) at Princeton is responsible for developing, expanding and maturing the University information security policy and strategy and draws on domain expertise, a capacity for vision and change management and communication skills to establish a high level of understanding of and attention to information security in a world-class institution of teaching, learning and research. The CISO works collaboratively with University leadership and departmental technical and administrative staff throughout campus. The CISO develops and leads outreach, communication and education efforts to raise campus-wide awareness of information security risk, requirements and solutions; provides strategic and technical guidance and assistance in the design and implementation of appropriate security processes for campus-wide information systems; directs the University IT Risk Assessment process; recommends and monitors computing practices to prevent and recover from security breaches and handles breaches when they occur; provides vision, leadership and development of robust security operations and vulnerability management; and leads the operations and success of access security requirements. The CISO reports to the Vice President for Information Technology and Chief Information Officer and collaborates with OIT senior staff and key campus business and IT leaders to shape security and business-continuity standards and action plans. The CISO also plays a leadership role in the implementation of security practices and policies through collaboration with technical staff. The CISO has dotted line responsibilities to the VP and Dean for Research, and is designated as the University Information Security Officer for federal grants and projects. The CISO also plays a key role in preparing and presenting strategic updates and recommendations to the University's Board of Trustees, ensuring transparency, accountability, and informed decision-making at the highest level of governance. Responsibilities Strategic Planning and Policy Development Provides guidance and counsel on information security to the CIO, the University's Board of Trustees, University Cabinet members, OIT senior staff and senior level University stakeholders. Works with campus leadership to develop a strategy for information security that balances Princeton's academic values with institutional attention to the risks and requirements generated by the University's increasingly information-rich environment and external regulations. Recommends strategies and practices to ensure information security and leads the design, development and implementation of the University's security and data-governance policies and procedures in consultation with University leadership, OIT and campus technical staff and IT advisory bodies. Represents the University in assessing and approving research security needs and establishes and maintains a strong partnership with Research Protections and Administration, and the Research Integrity Office. Advises University leaders on emerging information security risks and opportunities created by Princeton's role as a world-class institution of teaching, learning and research with increasing global relationships and activities. Tracks industry and higher-ed information security best practices to keep abreast of current techniques, systems and applications. Assumes responsibility for information-security policies and effective IT risk management and compliance across the University; coordinates campus-wide data governance and security initiatives. As a member of the CIO leadership team, contributes to the overall development of OIT's strategic goals, performance metrics, communication practices and culture. Management Leads the overall management and success of a robust, current and expanding information security office. Leads an annual IT Risk Assessment process and maintains the efficacy of an IT Business Continuity Plan. Maintains a close relationship with the offices of General Counsel, Audit and Compliance and Public Safety; serves as liaison between these groups and IT professionals for matters pertaining to campus IT security. Assesses hardware/software/services being considered for purchase or implementation for security strengths/risks and information security features; provides security requirements for software/services RFPs. Training and Outreach Develops and leads education and training programs on institutional policy, guidelines, federal and state laws and regulations and best practices around information security. Qualifications Essential Qualifications: At least 10 years of current experience directly related to the responsibilities of the role Demonstrated domain expertise A strategic grasp of information security at both institutional and operational levels The capacity to articulate a vision for information security that engages all constituents, satisfies internal and external requirements, and enables Princeton's ongoing pursuit of excellence and innovation in its academic and research fields Communication and collaboration skills to build support for security-related initiatives and objectives Experience in higher education or a research environment is preferred Broad knowledge of computer security issues, requirements, and trends Exceptional interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration and cooperation Demonstrated ability to work effectively with an array of constituencies in a community that is both demographically and technologically diverse Skill in developing policy and procedure in a complex, decentralized, and mission-oriented environment that maintains in a department-based model of resource allocation and deployment Experience providing education and training programs on security policies and practices to a range of technical and non-technical constituents The ability to establish, implement, maintain, and modify computer and data security guidelines and procedures to achieve the compliance objectives of an organization in harmony with the principles of academic freedom that remain core to a world-class university The ability to evaluate security software products, oversee their installation and implementation, and interpret findings for practical use by law enforcement, legal counsel, and senior management as applicable Experience evaluating and providing guidance on the information-security elements of software and hardware acquisitions, IT services, cloud-based solutions, mobility, and other present and emerging dimensions of IT solutions and services in a complex environment Integrity and high standards of personal and professional conduct Education : Bachelor's degree required, preferably in computer science or information technology Graduate degree preferred in computer science or related field, or equivalent experience and relevant professional credentials Preferred Qualifications: Graduate degree in computer science or related field, or equivalent experience and relevant professional credentials Princeton University has retained Boyden Executive Search to support the recruitment of this position. Confidential inquiries, applications, and nominations should be sent by email to Sara Swisher-Anderson, Senior Associates at Boyden. Princeton University is an Equal Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, sexual orientation, gender identity or expression, national origin, disability status, protected veteran status, or any other characteristic protected by law. The University considers factors such as scope and responsibilities of the position, candidate's qualifications, work experience, education/training, key skills, market, collective bargaining agreements as applicable, and organizational considerations when extending an offer. The posted salary range represents the University's good faith and reasonable estimate for a full-time position; salaries for part-time positions are pro-rated accordingly. If the salary range on the posted position shows an hourly rate, this is the baseline; the actual hourly rate may be higher, depending on the position and factors listed above. The University also offers a comprehensive benefit program to eligible employees. Please see this link for more information. Standard Weekly Hours 36.25 Eligible for Overtime No Benefits Eligible Yes Probationary Period 180 days Essential Services Personnel (see policy for detail) No Physical Capacity Exam Required No Valid Drivers License Required No Experience Level Director Salary Range $265,000 to $325,000 PI279427080 #J-18808-Ljbffr
    $265k-325k yearly 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Sr. Specialist, Security Operations

    Rennerbrown

    Information security analyst job in Princeton, NJ

    A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments. The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership. Key Responsibilities Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments. Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness. Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments. Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes. Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration. Support remediation and post-incident activities to strengthen resilience across technology domains. Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices. Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards. Required Experience Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection. Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors. Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments. Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings. Strong analytical and communication skills, with the ability to work effectively across technical and business teams. Technical Expertise Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains. Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms. Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF. Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows. Experience collaborating on vulnerability management and remediation across IT and OT environments. Certifications Required: CISSP Preferred: GICSP, GRID, or other OT/ICS-specific certifications. Education Bachelor's degree in Information Security, Computer Science, or a related technical field required. Advanced coursework or training in OT/ICS cybersecurity preferred.
    $86k-133k yearly est. 16h ago
  • Information Security Specialist

    Atria Group 4.2company rating

    Information security analyst job in Trenton, NJ

    We specialize in Staffing, Consulting, Software Development, and Training along with IT services to small to medium size companies. AG's primary objective is to help companies maximize their IT resources and meet the ever-changing IT needs and challenges. In addition, AG offers enterprise resource planning and enterprise application integration, supply-chain management, e-commerce solutions, and B2B public exchanges and B2B process integration solutions. Our company provides application analysis, design, development and programming, software engineering, systems development, testing, integration, and implementation, and management consulting services to various clients - including governmental agencies and private companies - throughout the United States and India. We provide these services in multiple computing environments and use technologies such as client/server architecture, object-oriented programming languages and tools, distributed database management systems, state-of-the-art networking, and communications infrastructures. Our honest and realistic approach to recruiting dictates that AG does not entice or lure engineers from their employers. We represent only high caliber technical professionals who have committed to making a change required by career. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Monitor use of data files and regulate access to safeguard information in computer files. Document and maintain a repository with version control of all policies, procedures and best practices Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels Monitor use of data files and safeguard computer files against authorized access and unauthorized access Modify computer security files to incorporate new software, correct errors or access changes Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers. Identify and track issues, risks and action items. Document information security policies, standards, and procedures spanning and encompassing the range of topics such as organization security, asset ID and classification, personal security, communications and operations management, access control, system development and maintenance, business continuity management, and compliance. Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Train users and promote security awareness to ensure system security and to improve server and network efficiency. Prior experience in the following are essential for the role: Websense 7.8 E policy Orchestrator 4.6 Mc Afee email gateway (MEG) 7.6 Airwatch 8.0.6.0 Qualifications SKILLS: Prior hands on experience with Websense 7.8 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with E policy Orchestrator 4.6 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with Mc Afee email gateway (MEG) 7.6 and above REQUIRED EXPERIENCE: 3 Years SKILLS: Prior experience monitoring use of data files and safeguard computer files against authorized access and unauthorized access REQUIRED EXPERIENCE: 3 Years SKILLS: Prior hands on experience with Airwatch 8.0.6.0 REQUIRED EXPERIENCE: 3 Years SKILLS: Train users and promote security awareness to ensure system security and to improve server and network efficiency. REQUIRED EXPERIENCE: 2 Years Does the candidate have experience with any of the following products: antivirus, SIEM, encryption tools, web content filtering, MDM. Please list What versions of McAfee email gateway, Airwatch, EPolicy Orchestrator and Websense does the candidate possess? Additional Information Good comm skills are a big priority Duration: 12+ months to renewal
    $93k-141k yearly est. 1d ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 1d ago
  • Sr Information Security Specialist (US) - AI BISO

    TD Bank 4.5company rating

    Information security analyst job in Mount Laurel, NJ

    Hours: 40 Pay Details: $123,680 - $200,200 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Business Information Security Officer (BISO) leads development and/or implementation of significant or Bank-wide Technology Controls / Information Security strategies, policies, programs, tools and provides expert advice and guidance on technical solutions. Oversees control and governance activities and identifies and assesses potential security risks, breaches/ exposures impacting highly complex / high risk businesses or transformational (change the bank) strategic initiatives primarily interfacing with executive and/or functional stakeholders across the Bank. The BISO AI provides technology risk advice and consultation to business partners, enabling effective risk management within their risk appetite and supporting business objectives. This role facilitates communication and execution of enterprise-wide information security programs, delivers awareness training, and conducts risk assessments on business applications, third parties, and infrastructure. The BISO validates that security and technology controls are implemented to support business requirements and oversees control and governance activities, identifying and assessing potential security risks and exposures that impact complex or high-risk businesses and strategic initiatives. Depth & Scope: * Works autonomously on high profile, complex and/or high risk technology projects with significant impact to the organization * Provides technical leadership / consulting / direction to a larger team / portfolio on all aspects of technology controls / information security * Foresees issues / gaps and identifies emerging industry trends (i.e. future focused) * Provides recommendations on value-added improvements / enhancements * Top technical expert individual contributor with expert knowledge of IT security and risk disciplines and practices * Advanced and highly specialized knowledge of organization, technology controls / security/ risk issues * Provides recommendations on value-added improvements / enhancements Education & Experience: * Bachelor's degree preferred * Information security certification / accreditation an asset * 10+ years of relevant experience Preferred Qualifications: AI-Specific Skills & Industry Best Practices * Deep understanding of AI risk management frameworks (e.g., NIST AI Risk Management Framework, ISO/IEC 23894, ISO42001, OWASP, MITRE). * Familiarity with financial services industry regulations and standards (e.g., FFIEC, GLBA, GDPR, PCI DSS, NYDFS Cybersecurity Regulation). * Experience implementing AI governance and ethical guidelines in financial institutions. * Ability to assess and mitigate risks associated with AI models, including bias, explainability, and robustness. * Knowledge of secure AI development lifecycle and best practices for model validation and monitoring. * Expertise integrating AI security controls into enterprise architecture and technology platforms. * Awareness of emerging AI threats, adversarial attacks, and evolving regulatory requirements. * Ability to communicate complex AI risk concepts to executive stakeholders and non-technical audiences. * Experience with incident response and remediation for AI-related security events. * Commitment to continuous learning and staying current with industry trends, frameworks, and best practices in AI and financial services. Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% * Domestic Travel - Occasional * International Travel - Never * Performing sedentary work - Continuous * Performing multiple tasks - Continuous * Operating standard office equipment - Continuous * Responding quickly to sounds - Occasional * Sitting - Continuous * Standing - Occasional * Walking - Occasional * Moving safely in confined spaces - Occasional * Lifting/Carrying (under 25 lbs.) - Occasional * Lifting/Carrying (over 25 lbs.) - Never * Squatting - Occasional * Bending - Occasional * Kneeling - Never * Crawling - Never * Climbing - Never * Reaching overhead - Never * Reaching forward - Occasional * Pushing - Never * Pulling - Never * Twisting - Never * Concentrating for long periods of time - Continuous * Applying common sense to deal with problems involving standardized situations - Continuous * Reading, writing and comprehending instructions - Continuous * Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $123.7k-200.2k yearly Auto-Apply 4d ago
  • Manager, Information Security Assurance

    Otsuka America Pharmaceutical Inc. 4.9company rating

    Information security analyst job in Princeton, NJ

    The Information Security Assurance Manager reports to the Business Information Security Officer (BISO) and collaborates with business and IT colleagues to deliver critical capabilities in support of strategic information security goals. This includes the operational management of information protection solutions, the development of security awareness & training, the management of phishing campaigns, the delivery and reporting of information security metrics, and other business-facing information security services as assigned. The role requires excellent communication skills and the ability to support multiple efforts across information security disciplines. **** As a member of the Information Security team and under the supervision of the BISO, the Information Security Assurance Manager is responsible for information protection solutions in alignment with the IS strategy and roadmap. Responsibilities include working with the business and IT on the identification and protection of vital information and data ("crown jewels"). The Information Security Assurance Manager leads the information security awareness program, which is a suite of continuous activities that promote safe computing practices for colleagues, including ongoing phishing campaigns. In addition, this role supports the BISO on the development and ongoing management/reporting of key metrics that demonstrate the value and progress of the information security program. The expectation is that the individual successfully coordinates multiple tasks and priorities continuously with limited supervision. **Data Protection** + Support the business and IT on identification of company vital information/data and establishing corresponding protections. + Monitor and respond to alerts and reports of information or data exposure in coordination with SOC and IT teams as required. + Conduct root cause analysis and implement corrective actions for identified threats. + Maintain and improve information protection rulesets in coordination with information security, business, and IT colleagues, and assist in the identification and remediation or mitigation of exposures. + Support the BISO in collection of data and reporting for key performance and risk indicators (KPIs/KRIs) as defined to measure the information security program. + Manage periodic benchmarking of the information security program in support of the BISO through coordination with IS, IT and other stakeholders. **Security Awareness & Training** + Support the BISO in the development and delivery of organization-wide information security training content. + Measure the effectiveness of training initiatives and continuously improve content. + Maintain the Information Security SharePoint presence to communicate policy, best practices, guidance, and other materials. + Develop and deliver awareness materials to educate personnel about information security best practices and promote a culture of security awareness within the organization. + Establish and publish technical security guidance in coordination with information security colleagues. **Phishing Simulations** + Design and execute phishing simulation campaigns to assess employee awareness through the company's phishing delivery platform. + Analyze and report on results, conduct surveys and interviews to gain feedback to identify improvements that will strengthen user behavior. + Collaborate with internal teams to tailor simulations to specific business contexts. To be successful in this Information Security Assurance Manager role, you must have and maintain knowledge of the information and cybersecurity frameworks and best practices, exhibit strong analytical skills and judgement, and demonstrate excellent communication in collaboration with stakeholders. You must also stay up to date with industry advancements and continuously improve security protocols to protect the organization's data from threats. **Qualifications/ Required** Knowledge/ Experience and Skills: + 5+ years of experience in information security, including experience in data loss protection, insider risk management, and information security awareness and training. + Strong understanding of cybersecurity frameworks and best practices. + Excellent communication and interpersonal skills, with the ability to explain complex technical concepts to non-technical stakeholders, both verbally and written. + Experience with cloud security (e.g., AWS, Azure, Google Cloud) is desirable. + Convey a can-do approach, even in the face of obstacles and constraints, by assessing what is in front of you and effectively and efficiently optimizing what you have, whether it is working on something new or thinking about how to do something better. + Demonstrate teamwork and communication skills through knowledge sharing, collaboration, and relationship-building. + Exhibit the capacity to actively learn and apply specific domain knowledge and best practices to continually enhance and improve. Educational Qualifications + Bachelor's degree in computer science, Information Security, or a related field. + Certifications such as CISSP, CISM, CISA, or similar are highly desirable. **Competencies** **Accountability for Results -** Stay focused on key strategic objectives, be accountable for high standards of performance, and take an active role in leading change. **Strategic Thinking & Problem Solving -** Make decisions considering the long-term impact to customers, patients, employees, and the business. **Patient & Customer Centricity -** Maintain an ongoing focus on the needs of our customers and/or key stakeholders. **Impactful Communication -** Communicate with logic, clarity, and respect. Influence at all levels to achieve the best results for Otsuka. **Respectful Collaboration -** Seek and value others' perspectives and strive for diverse partnerships to enhance work toward common goals. **Empowered Development -** Play an active role in professional development as a business imperative. Minimum $121,103.00 - Maximum $181,125.00, plus incentive opportunity: The range shown represents a typical pay range or starting pay for individuals who are hired in the role to perform in the United States. Other elements may be used to determine actual pay such as the candidate's job experience, specific skills, and comparison to internal incumbents currently in role. Typically, actual pay will be positioned within the established range, rather than at its minimum or maximum. This information is provided to applicants in accordance with states and local laws. **Application Deadline** : This will be posted for a minimum of 5 business days. **Company benefits:** Comprehensive medical, dental, vision, prescription drug coverage, company provided basic life, accidental death & dismemberment, short-term and long-term disability insurance, tuition reimbursement, student loan assistance, a generous 401(k) match, flexible time off, paid holidays, and paid leave programs as well as other company provided benefits. Come discover more about Otsuka and our benefit offerings; ********************************************* . **Disclaimer:** This job description is intended to describe the general nature and level of the work being performed by the people assigned to this position. It is not intended to include every job duty and responsibility specific to the position. Otsuka reserves the right to amend and change responsibilities to meet business and organizational needs as necessary. Otsuka is an equal opportunity employer. All qualified applicants are encouraged to apply and will be given consideration for employment without regard to race, color, sex, gender identity or gender expression, sexual orientation, age, disability, religion, national origin, veteran status, marital status, or any other legally protected characteristic. If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation, if you are unable or limited in your ability to apply to this job opening as a result of your disability. You can request reasonable accommodations by contacting Accommodation Request (EEAccommodations@otsuka-us.com) . **Statement Regarding Job Recruiting Fraud Scams** At Otsuka we take security and protection of your personal information very seriously. Please be aware individuals may approach you and falsely present themselves as our employees or representatives. They may use this false pretense to try to gain access to your personal information or acquire money from you by offering fictitious employment opportunities purportedly on our behalf. Please understand, Otsuka will **never** ask for financial information of any kind or for payment of money during the job application process. We do not require any financial, credit card or bank account information and/or any payment of any kind to be considered for employment. We will also not offer you money to buy equipment, software, or for any other purpose during the job application process. If you are being asked to pay or offered money for equipment fees or some other application processing fee, even if claimed you will be reimbursed, this is not Otsuka. These claims are fraudulent and you are strongly advised to exercise caution when you receive such an offer of employment. Otsuka will also never ask you to download a third-party application in order to communicate about a legitimate job opportunity. Scammers may also send offers or claims from a fake email address or from Yahoo, Gmail, Hotmail, etc, and not from an official Otsuka email address. Please take extra caution while examining such an email address, as the scammers may misspell an official Otsuka email address and use a slightly modified version duplicating letters. To ensure that you are communicating about a legitimate job opportunity at Otsuka, please only deal directly with Otsuka through its official Otsuka Career website ******************************************************* . Otsuka will not be held liable or responsible for any claims, losses, damages or expenses resulting from job recruiting scams. If you suspect a position is fraudulent, please contact Otsuka's call center at: ************. If you believe you are the victim of fraud resulting from a job recruiting scam, please contact the FBI through the Internet Crime Complaint Center at: ******************* , or your local authorities. Otsuka America Pharmaceutical Inc., Otsuka Pharmaceutical Development & Commercialization, Inc., and Otsuka Precision Health, Inc. ("Otsuka") does not accept unsolicited assistance from search firms for employment opportunities. All CVs/resumes submitted by search firms to any Otsuka employee directly or through Otsuka's application portal without a valid written search agreement in place for the position will be considered Otsuka's sole property. No fee will be paid if a candidate is hired by Otsuka as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
    $121.1k yearly 60d+ ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Kyowa Kirin North America

    Information security analyst job in Princeton, NJ

    Kyowa Kirin is a fast-growing global specialty pharmaceutical company that applies state-of-the-art biotechnologies to discover and deliver novel medicines in four disease areas: bone and mineral; intractable hematologic; hematology oncology; and rare disease. A Japan-based company, our goal is to translate science into smiles by delivering therapies where no adequate treatments currently exist, working from drug discovery to product development and commercialization. In North America, we are headquartered in Princeton, NJ, with offices in California, North Carolina, and Mississauga, Ontario. Summary: We are seeking a Security Operations & OT Cybersecurity Specialist to join our Global Information Security team. This role will serve as the regional lead for North America security operations and OT/ICS security, responsible for incident response, monitoring, and cyber defense across IT and manufacturing environments. The ideal candidate will have strong experience in SOC operations, OT cybersecurity, and regulated industries, with the ability to respond under pressure while also driving continuous improvement. Essential Functions: • Lead incident response for North America, coordinating with the global SOC for escalations, investigations, and recovery. • Manage monitoring solutions to ensure high-quality visibility across IT, cloud, and OT environments. • Own OT/ICS cybersecurity strategy in partnership with manufacturing, infrastructure, and plant leadership, securing SCADA, PLCs, and lab systems. • Vendor management for proactive threat hunting, pen testing and forensic analysis. • Lead remediation activities for both IT and OT environments. • Drive regional execution of global SOC playbooks, escalation models, and threat intelligence integration. • Develop and maintain operational security runbooks and ensure continuous improvement of detection and response capabilities. • Partner with IT, R&D, and Manufacturing to enforce regulatory compliance across GxP, HIPAA, and FDA-controlled systems. Requirements: Education Bachelor's degree in Information Security, Computer Science, or related field required; Advanced training in OT/ICS security preferred. Certifications Required: CISSP Certifications Preferred: GICSP, GRID, or other OT-focused certifications Experience: At least 5 years in cybersecurity operations, with demonstrated experience in SOC or incident response leadership; Strong hands on experience with OT/ICS environments in pharma, biotech, manufacturing, or critical infrastructure; Expertise in SIEM, SOAR, forensic tools, and threat detection engineering; Knowledge of OT security frameworks (ISA/IEC 62443, NIST CSF) and pharmaceutical regulations (GxP, HIPAA, 21 CFR Part 11). Technical Skills • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, cloud, and OT environments. • Hands-on experience with SOC technologies such as SIEM, SOAR, EDR/XDR, and forensic analysis platforms. • Strong background in OT/ICS cybersecurity, including SCADA, PLCs, and lab systems, with application of frameworks such as ISA/IEC 62443 and NIST CSF. • Knowledge of threat detection engineering, use-case development, and integration of threat intelligence into monitoring workflows. • Proficiency in forensic tools and malware analysis to support root-cause identification and post-incident review. • Understanding of regulatory compliance requirements including GxP, HIPAA, and 21 CFR Part 11, as they apply to manufacturing and research systems. • Experience collaborating on vulnerability management, patching, and remediation across IT and OT environments. Working Conditions: Requires up to 10 % domestic and international travel The anticipated salary for this position will be $115,000 to $130,000. The actual salary offered for this role at commencement of employment may vary based on several factors including but not limited to relevant experience, skill set, qualifications, education (including applicable licenses and certifications, job-based knowledge, location, and other business and organizational needs. The listed salary is just one component of the overall compensation package. At Kyowa Kirin North America we provide a comprehensive range of benefits including: 401K with company match Discretionary Profit Share Annual Bonus Program (Sales Bonus for Sales Jobs) Generous PTO and Holiday Schedule which includes Summer and Winter Shut-Downs, Sick Days and, Volunteer Days Healthcare Benefits (Medical, Dental, Prescription Drugs and Vision) HSA & FSA Programs Well-Being and Work/Life Programs Life & Disability Insurance Concierge Services Long Term Incentive Program (subject to job level and performance) Pet Insurance Tuition Assistance Employee Referral Awards The compensation and benefits information set forth in this posting applies to candidates hired in the United States. Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market. KKNA and all of its employees have an obligation to act in accordance with the law and with integrity in all our operations and interactions It is the policy of Kyowa Kirin North America, Inc. to provide equal employment opportunity to all qualified persons without regard to race, religion, creed, color, pregnancy, sex, age, national origin, disability, genetic trait or predisposition, veteran status, marital status, sexual orientation or affection preference or citizenship status or any other category protected by law. When you apply to a job on this site, the personal data contained in your application will be collected and stored by Kyowa Kirin, Inc. (“Controller”), which is located at 510 Carnegie Center Dr. Princeton, NJ 08540 USA and can be contacted by emailing ****************************************. Controller's data protection officer can be contacted at usprivacyoffice@kyowakirin.com. Your personal data will be processed for the purposes of managing Controller's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of General Data Protection Regulation (EU) 2016/679 (“GDPR”) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment. Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller's behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. The transfer will be made using appropriate additional safeguards under the standard contractual clauses approved by regulators for transfers of personal data outside the European Union. Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, if you are located in the European Union, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability, and to lodge a complaint with an EU supervisory authority. If you have any questions about our use of your data, you may contact us by email at usprivacyoffice@kyowakirin.com. Recruitment & Staffing Agencies Kyowa Kirin does not accept agency resumes unless contacted directly by internal Kyowa Kirin Talent Acquisition. Please do not forward resumes to Kyowa Kirin employees or any other company location; Kyowa Kirin is not responsible for any fees related to unsolicited resumes. #LI-Tt1 #Hybrid #Princeton
    $115k-130k yearly Auto-Apply 48d ago
  • Chief Information Security Officer (CISO)

    1Kosmos

    Information security analyst job in Iselin, NJ

    Job Description 1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up. About the Role We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement. Key Responsibilities Security Operations Leadership (Primary Focus) Design, implement, and manage a comprehensive security operations infrastructure Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions Build and optimize security monitoring, incident response, and threat detection capabilities Drive automation initiatives to eliminate manual inefficiencies in security processes Compliance and Risk Management Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks Partner with business analysts to navigate regulatory requirements and audits Develop and maintain security policies, procedures, and documentation Manage security risk assessments and remediation programs Technical Security Architecture Secure cloud infrastructure across AWS, Google Cloud, and other platforms Integrate security into CI/CD pipelines, working closely with DevOps teams Implement and manage security tools (CrowdStrike, etc.) across the organization Conduct hands-on security reviews of architecture and code Cross-functional Collaboration Partner directly with development and engineering teams on secure software development Oversee internal IT security (smaller component of role) Communicate security initiatives and status to leadership and stakeholders Coordinate with global teams to ensure consistent security practices Requirements Required Qualifications Technical Expertise Minimum 7+ years in security operations with demonstrated hands-on experience Deep expertise in cloud security (AWS, Google Cloud, Azure) Proven ability to personally deploy and configure enterprise security tools Strong understanding of modern DevOps practices and CI/CD security integration Experience with security automation and orchestration Compliance and Governance Hands-on experience with FedRAMP certification processes Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications Understanding of regulatory compliance requirements and audit processes Leadership and Communication Experience leading security initiatives in fast-growing organizations Strong communication skills for collaborating with global, distributed teams Ability to translate technical security concepts for various stakeholders Comfortable working in a startup environment with evolving requirements Preferred Qualifications Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization Experience in identity management or authentication technologies Background in both security operations and security engineering Previous startup or scale-up experience Located in or willing to work EST hours (strong preference for NY/NJ area) Public-facing CISO experience (client communications) is a plus but not required What We're NOT Looking For Pure policy/governance executives without hands-on technical skills Traditional "big company" CISOs focused only on strategy and presentations Candidates who expect to delegate all technical work from day one Security leaders who haven't maintained current technical skills Benefits What We Offer Opportunity to build and shape security at a growing startup Direct impact on product and company security posture Collaborative environment with talented engineering teams Competitive compensation and equity package Flexible work arrangements with preference for hybrid in NY/NJ area
    $124k-186k yearly est. 8d ago
  • Security Analyst

    Ventures Unlimited

    Information security analyst job in Moorestown, NJ

    Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs Position : Security Analyst (SIEM) Location: Moorestown, NJ Duration: Full Time Job Description : Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc. Working knowledge of SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions Windows and UNIX administration experience Perl or Python scripting knowledge Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers Ability to work independently and within a team environment Demonstrated ability to stay current with information security best practices, existing and emerging technology Good oral communications and written communication skills Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred Thanks & Regards Rahul Kumar Additional Information Contact "Rahul Kumar" for more details at ************ Ext :157
    $76k-109k yearly est. 60d+ ago
  • Vice President, Information Security Risk Manager

    CLS 4.8company rating

    Information security analyst job in Iselin, NJ

    CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day. Created by the market for the market, our unrivalled global settlement infrastructure reduces systemic risk and provides standardization for participants in many of the world's most actively traded currencies. We deliver huge efficiencies and savings for our clients: in fact, our approach to multilateral netting shrinks funding requirements by over 96% on average, so clients can put their capital and resources to better use. CLS products are designed to enable clients to manage risk most effectively across the full FX lifecycle - whether through more efficient processing tools or market intelligence derived from the largest single source of FX executed data available to the market. Our ambition to make a positive difference starts with our people. Our values underpin everything that we do at CLS and define our working environment: Pivotal purpose Trusted guardian Targeted innovation Facilitate connections Delivering excellence Inclusive culture Job information: Functional title - Vice President, Information Security Risk Manager Department - Risk Management Corporate level - VP Report to - Director, Cyber and Information Risk Lead Location - New Jersey Expected full-time salary range between $ 125K - $160K + variable compensation + 401(k) match + benefits. Note: Disclosure as required by NY/NJ Pay Transparency Law of the expected salary compensation range for this role. Job purpose The Cyber and Information Risk Independent Risk Review Manager is responsible for independent reviews of the efficacy of CLS' Information Security and Data Management programs, including review and challenge of large-scale risk remediation efforts. The successful candidate will provide review and credible challenge of the effectiveness of information security and data management processes and controls in mitigating key risks to the firm. This position is highly engaged with the firm-wide Information Security and Data Management teams who provide security and data management solutions as well as corporate departments that own information security and data management risks. Essential Function / major duties and responsibilities of the job Independent Reviews - Execute horizontal reviews of top information security risks, identifying gaps in control coverage and recommending control improvements to address identified gaps. Complete thematic reviews of information security and data management operational risk events and associated proposed actions to propose control enhancements that reduce risk of recurrence. Work with the Information Security and Data Management teams to review control capabilities against industry standards and lead efforts to strengthen the control environment in line with the evolving threat landscape. Review and challenge actions to address gaps, monitor progress of actions, and validate sufficiency of closure evidence. Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required. Risk Remediation Oversight - Review and challenge the sufficiency of planned actions to address identified problems, provide stated benefits, and meet regulatory expectations. Review and monitor the progress of actions and validate sufficiency of closure evidence. Prepare status reports as needed and present to Technology Leadership, Audit, and regulatory bodies as required. Governance - Actively present to various committees and forums to keep management educated on status of independent reviews, challenges to risk remediation efforts, and progress on control improvements. Relationship Management - Be a respected point of contact to stakeholders across the business and technology functions in providing credible operational risk coverage for information security and data management risk. Policy & Procedures - Review and challenge relevant policies, standards, and procedures related to CLS information security and data management processes. Leadership Mentorship - Provide guidance and support to junior members of the team. Ability to influence and gain credibility with the business Experience / essential and desired for successful job performance · 5+ years of experience specifically related to information security and data management risk governance, operations, and risk management functions. · Broad-based technology experience at substantial scale and complexity in a global, highly regulated, high-volume transaction environment. Experience must include time operating within transaction services environments characterized by the need for continuous availability and the highest levels of security. · Experienced working in a complex matrixed organization, ideally in a global firm with a dynamic and rapidly changing environment. · Experienced operating within a highly regulated environment, with a preference for experience at the international and federal levels. · Deep knowledge of information security and data management risk and control frameworks and a strong understanding of related policies, procedures, guidelines, and structure. · Functional expertise, with operational knowledge of and exposure to various current and emerging information security and data management areas such as: v Cyber resilience v Identity & privileged access management v Secure coding practices v Cloud security configuration and control frameworks v Network security v Third-party risk management v Incident response v Threat/vulnerability management v Security architecture v Data governance v Data quality v Data architecture/lineage Qualifications / certifications · B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). M.S. desired. · Relevant certification is desirable, e.g., CISSP, CISM, CISA. · Working knowledge of information security and data management life cycles based on an established framework: CRI, NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA, DAMA-DMBOK. · Proficiency in MS PowerPoint and Excel. · Experience in broader MS Office suite, including Project and Visio is a plus · Experience with enterprise GRC tools, e.g. Archer is a plus Knowledge, skills, and abilities / competencies required for successful job performance To carry out the duties of the position effectively, the individual will need to possess the following attributes: · Judgement and decision making · Communication & Influence · Teamwork & Professionalism · Able to work independently, as required Success factors / ‘How'. Personal characteristics contributing to an individual's ability to excel in the position · Possess strong technical, analytical, and problem-solving skills. · Provide thought leadership while willing and able to individually contribute to finding solutions. · Self-motivated to exceed management expectations and objectives. · Clearly communicate complex technical issues to both business and technical staff at all levels. · Able to keep organized and detailed documentation. · Confidence to effectively challenge points of view regardless of seniority or corporate title. · Professionalism to seek out and embrace diversity of thought and experience. · Strong collaboration skills to tackle complex security challenges that may span across multiple internal and external departments and groups. · Able to effectively cope with change and comfortably handle risk and ambiguity. · Tenacious resolve and positive attitude in challenging situations. Our commitment to employees: At CLS, we celebrate inclusion and consider this to be one of our strongest assets. We are committed to fostering an environment in which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including: Holiday - UK/Asia: 25 holiday days and 3 ‘life days' (in addition to bank holidays). US: 23 holiday days. 2 paid volunteer days so that you can actively support causes within your community that are important to you. Generous parental leave policies to ensure you can enjoy valuable time with your family. Parental transition coaching programmes and support services. Wellbeing and mental health support resources to ensure you are looking after yourself, and able to support others. Employee Networks (including our Women's Forum, Black Employee Network and Pride Network) in support of our organisational commitment to embrace and always be learning more about inclusivity. Hybrid working to promote a healthy work/life balance, enabling employees to work collaboratively in the office when needed and work from home when they don't. Active support of flexible working for all employees where possible. Monthly ‘Heads Down Days' with no meetings across the whole company. Generous non-contributory pension provision for UK/Asia employees, and 401K match from CLS for US employees. Private medical insurance and dental coverage. Social events that give you opportunities to meet new people and broaden your network across the organisation. Annual flu vaccinations. Discounts and savings and cashback across a wide range of categories including health and retail for UK employees. Discounted Gym membership - Complete Body Gym Discount/Sweat equity program for US employees. All employees have access to Discover - our comprehensive learning platform with 1000+ courses from LinkedIn Learning. Access to frequent development sessions on a number of topics to help you be successful and develop your career at CLS.
    $125k-160k yearly Auto-Apply 7d ago
  • IT Senior Security Engineer

    Gellert Global Group

    Information security analyst job in Elizabeth, NJ

    Gellert Global Group consists of many of the leading North American food importing companies (Atalanta Corporation, Camerican International, Finica, Tipico Cheese Products) and has been importing food products for over 100 years. The combined revenues of GGG exceed $1.7 billion. GGG companies provide strength in sourcing, insurance, finance, logistics, food safety, and information technology, and supply the needs of retailers, distributors, food service chains, hotels, cruise lines, and food manufacturers alike. Summary/Objective: As a key member of the IT Infrastructure team, the IT Senior Security Engineer plays a pivotal role in safeguarding the organization s information assets and supporting cybersecurity across the group. This position is responsible for overseeing the identification, management, and resolution of complex cybersecurity incidents, ensuring robust governance and assurance across the Gellert Global group. Strategic Responsibilities Lead the implementation of information security and data loss prevention strategies, aligning with organizational objectives and regulatory requirements. Oversee the prioritization and resolution of security alerts, minimizing risk exposure and ensuring business continuity. Manage escalations from managed security service providers, ensuring timely and effective incident response. Drive continuous improvement by reviewing and enhancing security processes, documentation, and runbooks. Champion proactive technology adoption to mitigate emerging security threats and reduce the organization s attack surface. Collaboration Foster a culture of security awareness and best practices across IT and business units. Collaborate with cross-functional teams including IT Security Operations, offshore partners, and business stakeholders to deliver enterprise-wide security initiatives. Mentor and guide team members, promoting professional development and knowledge sharing. Engage with executive leadership, customers, and vendors to instill confidence in the organization s security posture. Required Expertise Bachelor s degree (or equivalent) in cybersecurity, IT, or a related field. Minimum 5 years of hands-on experience in IT security, with a proven track record in managing network and endpoint security incidents. Proficiency with industry-standard security tools and platforms (e.g., MFA, KnowBe4, Carbon Black, Microsoft Defender, Entra ID, ConnectWise, Splunk, Rapid7, ProofPoint). Strong understanding of cloud and on-premises infrastructure (Azure, AWS, Cisco, Microsoft, Citrix, Oracle, SQL). Familiarity with regulatory frameworks (PCI, Sarbanes-Oxley, privacy laws) and annual penetration testing requirements. Excellent problem-solving, communication, and stakeholder management skills. Relevant certifications (GCIA, GCIH, GCFA, CISSP) are highly valued. Additional Expectations Ability to work flexible hours and respond to urgent situations as needed. Commitment to building quality and customer satisfaction into all aspects of work. Willingness to travel and engage with both internal and external partners. Internal and External Contacts/Relationships Internal: Develop and maintain positive professional relationships team members (including contractors), all-level group colleagues including office and field personnel, executive team, customers and vendors. External: Develop and maintain positive professional relationships with contractors, vendors, 3 rd party providers, customers via sales contacts Treat all interactions with a Customer Service focus, striving to provide a high level of customer satisfaction. Physical Requirements: The individual must occasionally lift and/or move up to 25 lbs. Ability to perform computer responsibilities. While performing the duties of this job, the employee is frequently required to stand, walk and sit. The employee must have use of hands to finger, handle or feel objects, tools, or controls; reach with hands and arms; speak and hear. Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception and the ability to adjust focus. Ability to travel by car or public transportation as needed. Salary Range: $92,000 - $138,000 annually Our company will be relocating to a new corporate headquarters in Madison, NJ in Q4 of 2026. Candidates should be comfortable with this upcoming change in location. Our Benefits We care about your total well-being and will support you with the following, subject to your location and role. Health: Medical, dental and vision insurance, Company-paid life, accident and long-term disability insurance, flexible spending accounts Wealth: Competitive pay, annual bonus opportunity, matching 401(k) with immediate vesting upon enrollment, generous employee referral program Happiness: Professional Growth: Online training courses, virtual and classroom development experiences, education assistance program Work-Life Balance: Paid-time off, parental leave, flexible work schedules (subject to your location and role) Team Building: Employee engagement and recognition programs, wellness, philanthropic and DE&I initiatives, Company-sponsored celebrations, and team-building events The Gellert Global Group of companies is an equal opportunity employer and considers qualified applicants for employment without regard to sex, race, color, religion, ethnic or national origin, gender, sexual orientation, gender identity or expression, age, pregnancy, leave status, disability, veteran status, genetic information and/or any other characteristic or status protected by national, federal, state, or local law. Gellert Global Group is committed to providing access, equal opportunity, and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please contact ************************* . We may use AI-assisted tools, including Clear Co's screening technology, to help review applications for all positions. These tools may analyze resume content and application responses to assess job-related qualifications such as experience, skills, and education. All final hiring decisions are made by human recruiters. If you would like to request an alternative selection process or a reasonable accommodation, or for more information about how we use AI in hiring practices, please contact *************************.
    $92k-138k yearly Easy Apply 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Trenton, NJ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 59d ago
  • Chief Information Security Officer

    Saint Peter's Healthcare System 4.7company rating

    Information security analyst job in New Brunswick, NJ

    SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews. 2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board. 3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. 4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers. 5. Develop and manage information security budgets and monitor them for variances. 6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users. 7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk. 8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program. 9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection. 10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance. 11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. 12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. 13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams. 14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. 15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required. 16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. 17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation. 18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action. 19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. 20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. 21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. 22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. 23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management 24. Perform related duties and fulfill responsibilities as required. Requirements: 1. A Master's degree in Business Administration or a Technology related field. 2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role. 3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. 4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST. 5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations. 6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals. 7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical. 8. Strong problem-solving and analytical skills to identify and mitigate potential security risks. Salary Range: 133,715.00 - 220,639.00 USD We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials. The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status. Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards. You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
    $122k-190k yearly est. 60d+ ago
  • Senior Information Security Analyst

    Provident Bank 4.7company rating

    Information security analyst job in Iselin, NJ

    How would you like to join one of the most highly regarded financial institutions in New Jersey with deep roots in the community? Provident is a successful and highly regarded multi-billion-dollar bank that continues to grow with branches in New Jersey, Eastern Pennsylvania and New York. Our longevity is a testament to our commitment to placing our employees, customers, and the communities we serve at the center of all we do. At Provident Bank, we are committed to enhancing our customer and employees' experience. POSITION OVERVIEW: The Information Security Senior Analyst will set security strategies, interact with senior management, and work in conjunction with all areas of the business. The Information Security department is responsible for identifying and securing the Bank's information assets and providing customers, employees, and other stakeholders with the assurance that their sensitive information and privacy is protected. KEY RESPONSIBILITIES: Management of various security tools used by the bank: EDR, SIEM, Email Security, Webfilter, vulnerability management program and privilege access management Research emerging security trends and provide recommendations for improvement of security policies, procedures, training, and incident response Support the execution of critical bank projects by representing the IS department as a project team member and providing directions on security implementation Responsible for supporting the bank's information security oversight of policy through monitoring and analyzing security system alerts, incidents, vulnerabilities and coordinating the triage, analysis, and remediation process Manage internal security projects to implement best practice security practices throughout organization by working hand in hand with IT staff on implementation Collaborate with business lines to ensure security processes and tools are aligned with overall organization risk appetite Author, test, and evaluate security policy and controls to support the maturation process of the organization's information security standards Develop and present Information Security training to organizations to improve end user behaviors Assist the Audit organization in documenting evidence of technology controls and compliance in meeting regulatory and legal requirements MINIMUM QUALIFICATIONS: Associate degree or bachelor's degree in the related field 3+ years in Information Security or Information Technology role Thorough knowledge of and security aspects of network systems. Familiarity with network security concepts including firewalls, IPS and IDS Knowledge of tools in following categories: WEB Filtering, EDR, SIEM, AV, IAM, PAM and Email Protection Systems Ability to work under stress of meeting numerous deadlines and requests that sometimes compete in priority. Ability and willingness to work a flexible schedule including weekends as necessary. Ability to troubleshoot problems and implement suitable solutions. Must keep current with technical aspects of position and know and use job-related functions and skills. Ability to communicate effectively with both technical and non-technical colleagues. Experience with risk assessment, certification and accreditation and enterprise security planning. Understanding of best practice security methodologies. Knowledge of any of: Critical Security Controls, FFIEC Examination Handbooks, NIST Cyber Security framework and Mitre ATT&CK framework. Ability to train others. LICENSES AND/OR CERTIFICATES At least one of: Security+, SSCP, CEH, GIAC, CISSP, CISA, CISM, or comparable certification highly desired WORKING CONDITIONS: Work is performed in a normal office environment. Noise levels are usually moderate. This position involves travel to customers and property locations. Prolonged sitting Lifting from 5 to 10 lbs. (printer paper, storage boxes) Occasional bending or overhead lifting (storing files or boxes) The hazards are mainly those present in a normal office setting This may not be all-inclusive. Employees are expected to perform other duties as assigned and directed by management. Job descriptions and duties may be modified when deemed appropriate by management. Provident Bank recognizes and supports the importance of creating a socially and culturally diverse employee base. We understand, value, and appreciate the unique perspectives that a diverse workforce can contribute to our organization. We put the employee and the customer at the center of strategy because culture is a critical differentiator for why people choose to work here. We are an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to age 40 and over, color, disability, gender identity, genetic information, military or veteran status, national origin, race, religion, sex, sexual orientation or any other applicable status protected by state or local law. PAY DETAILS: $70,000 - $85,000 annually Please note, the base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, education, geographic location, internal equity, and other applicable business and organizational needs. This role is incentive eligible based upon company, business, and/or individual goal achievement and performance. Team members accrue paid time-off (PTO), receive Holiday (PTO) and are eligible to participate in the bank's Health and Wellness benefits including Medical, Dental and Vision Plans, Flexible and Health Savings Accounts, and a 401(k) Retirement Plan. In addition, the company provides Disability Insurance, an Employee Assistance Program, and Basic Life Insurance. Company sponsored Tuition Disbursement and Loan Repayment programs are also available. Voluntary benefits include Supplemental Life Insurance, Accident, Critical Illness, Hospital Indemnity and Legal plans.
    $70k-85k yearly 3d ago
  • Security Architect

    Palette Technologies 3.9company rating

    Information security analyst job in Middletown, NJ

    Complete Description: · The Enterprise Architect will also be tasked with preparing security standards, policies and procedures - as well as mentoring team members and executive staff on security matters. CISSP REQUIRED. · The department is seeking an Enterprise Architect to work in conjunction with the Modernization Team, as well as the DHS Information Security and Privacy Office, to analyze and document the existing information security environment. · Conducting system security and vulnerability analyses and risk assessments · Evaluating the systems architecture and identifying integration issues · Serve as Information Security Subject Matter Expert (SME), while working with a Systems Integrator and software vendors, to develop the approach for implementing an enterprise security infrastructure that ensures compliance to standards, policies and procedures · Monitor delivery efforts to ensure compliance to standards, policies, and procedures · Deliver evidence, demonstrating project deliverables meet federal certification requirements · Improves DHS Incident Response efforts by analyzing existing systems\/processes and recommending future technologies and associated processes · Participate in the RFI\/RFP process for systems module selection · Participate in the procurement process to select a Systems Integrator to execute the DDI phase · CISSP certification REQUIRED · Extensive experience designing and implementing enterprise security architectures based on NIST Risk Management Framework (NIST 800\-53), state and federal security standards, and security industry best practices · An extensive understanding of security tools and software products, including Identity Access Management (IAM), Security Incident and Event Management (SIEM), and Cloud Access Security Brokers (CASB) · In\-depth experience in creating, documenting, and implementing enterprise security policies and standards - including enterprise\-wide communication and training "}}],"is Mobile":false,"iframe":"true","job Type":"Contract","apply Name":"Apply Now","zsoid":"659070196","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Contract Duration","uitype":1,"value":"6 months"},{"field Label":"On\-Site vs Remote","uitype":2,"value":"On\-Site"},{"field Label":"Visa Requirement","uitype":1,"value":"Any"},{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"City","uitype":1,"value":"Middletown"},{"field Label":"State\/Province","uitype":1,"value":"Iowa"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"52638"}],"header Name":"Security Architect","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00187003","attach Arr":[],"custom Template":"4","is CandidateLoginEnabled":false,"job Id":"**********04811011","FontSize":"15","google IndexUrl":"https:\/\/palettetechnologies.zohorecruit.com\/recruit\/ViewJob.na?digest=Lh304XeNwlnJptzUT2shAdEFCp5SP0AbABceCROpQO8\-&embedsource=Google","location":"Middletown","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
    $110k-158k yearly est. 60d+ ago
  • Senior Security Specialist

    Armada 3.9company rating

    Information security analyst job in Lakehurst, NJ

    Type: Full Time Overtime Exempt: Yes Reports To: ARMADA HQ Security Clearance Required: Active TS/SCI The Senior Security Specialist establishes and maintains a process for Sensitive Compartmented Information (SCI) and Special Access Program (SAP) security administration. The Senior Security Specialist acts as the functional team lead for teams at the specific site. This includes coordinating and overseeing the tasking of other team members, providing training, mentoring, or supervision of other team members, tracking project progress, and participating in planning of projects, resourcing, and events. The Senior Security Specialist considers all aspects of security, to include personnel security, physical security, operations security, communications security, and associated oversight. Duties & Responsibilities: The Senior Security Specialist performs security and administrative management of assigned SCI and SAP. The Senior Security Specialist shall provide daily support to the appointed Special Security Representative (SSR) or Government SAP Security officer (GSSO) to fully implement all applicable enhanced security policies and procedures. The Senior SS shall perform Visitor Control duties by greeting and documenting all visitors according to facility security procedures, including but not limited to customers, tour groups, base public works, inspectors, and maintainers. The Senior SS shall monitor and control access to facility(s) and restricted areas under their responsibility by checking personnel passes, Common Access Cards (CAC) and validating security clearances utilizing DISS or other security database systems and visit requests. The Senior SS shall maintain facility visitor logs. Prepare and process visit request documentation packages. Perform visitor escort duties for assigned facilities and events and support the coordination and training of additional escorts as required for each event. The Senior SS shall support document control and document configuration management activities. Support data entry and maintenance of a variety of security databases. The Senior SS shall support Personnel Access Request /Access nomination processing. Support the classification, handling, transport, and destruction of classified/sensitive information. Support the creation of Standard Operating Procedures, Facility Check In - Check Out procedures, Fixed Facility Checklists, Security Education and Training Awareness materials, OPSEC Plans, Security Classification Guides, and other applicable security documentation. The Senior SS shall provide classified meeting support to include, but not limited to, coordination, facility preparation, attendee clearance validation, presentation material classification validation. Support program access list preparation and maintenance. Support the generation and maintenance of program security documentation. The Senior SS shall support self-inspection activities including but not limited to, checklist preparation. Support media control and inventory functions. Support the processing, inventory, and control of COMSEC. Support the performance of physical security inspections. Support the preparation of document and performance of indoctrination and debriefings. The Senior SS shall support foreign travel tracking and monitoring. Support facility security management duties including but not limited to key / control management, facility security inspections and assessments, alarm response including implement receipt/dispatch as applicable, and maintaining Intrusion Detection System and other facility security systems operability. The Senior SS shall support the preparation and submission of all required TEMPEST documentation. The Senior SS shall maintain DISS accounts to perform all personnel security functions. Other duties as assigned. Knowledge, Skills, and Abilities (KSAs): Ability to provide clear, concise, and accurate written and verbal communication. Skill in satisfactorily dealing with customers. Skill in operating a personal computer and standard office equipment. Knowledge of a variety of computer software applications in word processing, spreadsheets, database, (MSWord, Excel, Access, PowerPoint), and Outlook. Minimum/General Experience: At least ten (10) years of recent and relevant experience. Minimum Education: High School diploma or GED. Must obtain Security Fundamental Professional Certification (SFPC) certification within 1 (one) year of employment and maintain certification for the duration of employment. Disclaimer: The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ****************** Special Notes: Relocation is not available for these jobs. ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
    $92k-140k yearly est. 60d+ ago
  • Information Security - Sr. Manager

    Wells Fargo 4.6company rating

    Information security analyst job in Iselin, NJ

    **About this role:** Wells Fargo is seeking an Information Security Senior Manager in Technology as part of Cybersecurity. Learn more about the career areas and lines of business at wellsfargojobs.com. Wells Fargo is seeking an Information Security Senior Manager to join our Cyber Security team. This leadership role is essential for maintaining the successful operation and long-term stability of our organization. This position is responsible for setting strategic directions, overseeing program delivery, and driving continuous improvement including managing and enforcing web access security as well as email security enforcements, implementation and oversight of transport rules that protect sensitive data and ensure regulatory compliance. The leader also facilitates cross-departmental collaboration, supports talent development, and maintains adherence to industry standards. **In this role, you will:** + Manage and develop a team of individual contributors in roles to address security risks in the Web and Email domains. + Maintain a broad awareness of the state of information security companywide. + Identify, recommend, and drive complex and innovative solutions addressing cybersecurity risks inclusive of data loss concerns and mitigation strategies + Set guidelines for compliance and risk management requirements for supported area and work with other stakeholders to implement key risk initiatives + Advocate and adhere to Wells Fargo Risk Management Framework and practices + Advise more experienced management on issues with high, critical impact + Partnership with DLP to reduce risk to data exfiltration. + Collaborate and influence all levels of professionals including more experienced managers + Interface with Information Security Industry Leaders, Financial industry Leaders, Analysts and Regulators + Manage allocation of people and financial resources for Information Security Analysis + Develop and guide a culture of talent development to meet business objectives and strategy **Required Qualifications, US:** + 6+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education. + 3+ years of Management experience + 6+ years of people or project leadership + 5 years of developing and implementing solutions **Desired Qualifications:** + Proxy, CASB, Email Security + Broad set of information risk management practices + CISSP or related Security certifications for on-prem or cloud. **Job Expectations:** + 10-20% Travel **Pay Range** Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates. $159,000.00 - $305,000.00 **Benefits** Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit Benefits - Wells Fargo Jobs (*************************************************************** for an overview of the following benefit plans and programs offered to employees. + Health benefits + 401(k) Plan + Paid time off + Disability benefits + Life insurance, critical illness insurance, and accident insurance + Parental leave + Critical caregiving leave + Discounts and savings + Commuter benefits + Tuition reimbursement + Scholarships for dependent children + Adoption reimbursement **Posting End Date:** 16 Jan 2026 ***** **_Job posting may come down early due to volume of applicants._** **We Value Equal Opportunity** Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic. Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements. **Applicants with Disabilities** To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo (****************************************************************** . **Drug and Alcohol Policy** Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy (********************************************************************** to learn more. **Wells Fargo Recruitment and Hiring Requirements:** a. Third-Party recordings are prohibited unless authorized by Wells Fargo. b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process. **Req Number:** R-514030
    $98k-122k yearly est. 5d ago
  • Information Systems Security Engineer

    Data Intelligence 4.5company rating

    Information security analyst job in Moorestown, NJ

    Data Intelligence, LLC (DI) is searching for a full time ISSE in Moorestown, NJ. This is an onsite position. Job Responsibilities: The candidate will provide full life cycle Risk Management Framework (RMF) support to a wide range of systems. Assist in the development of a Systems Engineering Risk Management Plan that is consistent and compatible with current DoW Risk Management Framework policies and practices where applicable. DHS SELC DoW SDLC Develop and maintain a Plan of Action and Milestone (POA&M) for all IA-related tasks and deliverables in accordance with the Security Technical Implementation Guide (STIG) Develop Risk Assessment Reports (RARs) based on vulnerability test results, automated scan reviews, Assured Compliance Assessment Solution (ACAS) scans, and other DoW-mandated assessment-utilities. Document A&A-information in the A&A Package consistent with all other Packages, and ensure that there are no omissions Input reports in eMASS, or deliver in MS Office-products/Visio formats, as appropriate Monitor JFHQDODIN WARNORD/TASKORD/FRAGO alerts. Work with Program SOs and ISSOs to determine applicability. Develop responses and POA&Ms as necessary. Initiate and facilitate MS Teams meeting and Task Cards. Required Skills/Experience USN ISSO/ISSE experience. USCG experience is a plus. Experience with NIST SP 800 series, DOWI/D 8500 series eMASS eMASTER Experience with Red and Blue teams Experience with IA vulnerability testing and related and system test tools; e.g. NMap, ACAS/Nessus, Security Content Automation Protocol (SCAP) Must be IAT/IAM Level II Tech Writing experience Good in-person communication skills Must have at least secret level security clearance Preferred Skills and Experience Bachelor's degree At least 3-5 years experience network/systems engineering security About Data Intelligence, LLC: Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission. Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C. Why you should join us: Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $82k-112k yearly est. 9d ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 60d+ ago
  • Information Security Specialist (US)

    TD Bank 4.5company rating

    Information security analyst job in Mount Laurel, NJ

    Hours: 40 Pay Details: $98,160 - $159,270 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs. As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role. Line of Business: Technology Solutions Job Description: The Information Security Specialist defines, develops and/or implements Technology Controls / Information Security related policies, programs, tools and provides specialized expertise and guidance on assessing risks, identifying potential gaps and providing security solutions to mitigate risks and protect the Bank. Participates on projects of moderate to high complexity and provides complex reporting, analysis, and assessments at the functional, business line or enterprise level for own area. Depth & Scope: * Participates on complex, comprehensive or large projects and initiatives * Acts as a lead expert resource in technology controls / information security for project teams, the business / organization and/or outside vendors * Has advanced knowledge of organization, technology controls / security/ risk issues Education & Experience: * Bachelor's degree preferred * Information security certification / accreditation an asset * 7+ years of relevant experience * Expert knowledge of IT security and risk disciplines and practices Preferred Qualifications * 5+ years of experience in vulnerability management, security operations, or related fields. * 2+ years of experience in a leadership or management role. * Technical Skills: * Expertise in vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7). * Knowledge of CVSS (Common Vulnerability Scoring System) and threat modeling. * Strong understanding of operating systems, cloud platforms, networks, and application security. * Familiarity with compliance frameworks (e.g., ISO 27001, NIST, PCI-DSS). * Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience). Physical Requirements: Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100% * Domestic Travel - Occasional * International Travel - Never * Performing sedentary work - Continuous * Performing multiple tasks - Continuous * Operating standard office equipment - Continuous * Responding quickly to sounds - Occasional * Sitting - Continuous * Standing - Occasional * Walking - Occasional * Moving safely in confined spaces - Occasional * Lifting/Carrying (under 25 lbs.) - Occasional * Lifting/Carrying (over 25 lbs.) - Never * Squatting - Occasional * Bending - Occasional * Kneeling - Never * Crawling - Never * Climbing - Never * Reaching overhead - Never * Reaching forward - Occasional * Pushing - Never * Pulling - Never * Twisting - Never * Concentrating for long periods of time - Continuous * Applying common sense to deal with problems involving standardized situations - Continuous * Reading, writing and comprehending instructions - Continuous * Adding, subtracting, multiplying and dividing - Continuous The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes. Who We Are: TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues. TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you. Our Total Rewards Package Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more Additional Information: We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home. Colleague Development If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals. Training & Onboarding We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role. Interview Process We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call. Accommodation TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law. If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
    $98.2k-159.3k yearly Auto-Apply 5d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Lakewood, NJ?

The average information security analyst in Lakewood, NJ earns between $72,000 and $139,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Lakewood, NJ

$100,000
Job type you want
Full Time
Part Time
Internship
Temporary