Post job

Information security analyst jobs in Princeton Meadows, NJ

- 107 jobs
All
Information Security Analyst
Information Security Engineer
Senior Security Specialist
Information Security Officer
Information Security Manager
Cyber Security Engineer
Cyber Security Specialist
Security Engineer
Intrusion Detection Analyst
Security System Engineer
Securities Analyst
  • Vice President, Application Cyber Security Specialist

    CLS Group 4.8company rating

    Information security analyst job in Iselin, NJ

    Job information: Functional title - Application Security Specialist Department - IT Security Corporate level - Vice President Report to - Director, Application Security Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits. What you will be doing: Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses, Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities. Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations. Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams. Conduct security reviews and provide guidance on security requirements for new features and projects. Assist in the analysis, selection and rollout of new application security tools, processes, and standards. Stay up to date with the latest security threats, vulnerabilities, and industry best practices. What we're looking for: Proven experience in application security with a focus on application security testing and vulnerability management. Hands-on experience with Application Security tools. Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques. Experience with threat modelling methodologies and tools. Proficiency in at least one programming language (e.g., Java, Python, JavaScript). Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams. Strong understanding of risk management. Professional qualifications / certifications Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
    $140k-180k yearly 3d ago
  • Cloud Security Engineer - SRE

    Intelliswift-An LTTS Company

    Information security analyst job in Berkeley Heights, NJ

    Job Posting Title: Cloud Security Engineer - SRE Job Profile: Technical Project Management - Advisor II We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation. Technical Skills • Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling. • Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations. • Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure. • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions. • Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift). • Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs. • Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs. • Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI. • A strong understanding of HashiCorp Vault and Terraform will make you stand out. 2. Problem-Solving and Troubleshooting • Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews. • Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error. • Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications. 3. Collaboration and Communication • Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams. • Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports. • Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences. 4. Reliability and Scalability • Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability. • Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands. • Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime. 5. Security and Compliance • Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices. • Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry. Minimum Job Qualifications: • Bachelor degree in business or equivalent work experience • 10 years of previous program leadership and/or relevant consulting experience • Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle • 5+ years' experience in driving large scale data center consolidation efforts • Minimum 5 years' experience with matrix management of cross-functional processes and teams • Proficient with Project Management tools
    $83k-115k yearly est. 5d ago
  • Information Security Engineer

    PTR Global

    Information security analyst job in Iselin, NJ

    We are seeking a high-judgment, detail-oriented operator to lead our Threat Modeling Program Operations. This individual will be responsible for orchestrating workflows, triaging intake, designing key metrics, and eliminating process inefficiencies. The role demands an expert in building executive-ready reports and dashboards to track throughput, cycle times, and model quality, ensuring optimal outcomes for complex, multifaceted initiatives in Information Security Engineering. This is a contingent resource assignment, and the candidate may: Consult on complex, large-scale initiatives in Information Security Engineering. Review and analyze intricate, long-term security challenges, considering multiple factors including intangible or unprecedented elements. Contribute to resolving complex issues requiring deep understanding of security policies, procedures, and compliance requirements. Strategically collaborate with client personnel to ensure project success. Key Responsibilities: Lead and optimize workflow orchestration for the Threat Modeling Program. Develop and manage reports and dashboards to monitor program effectiveness (throughput, cycle time, model quality). Analyze and address complex security engineering issues, guiding teams to resolution. Collaborate cross-functionally with stakeholders, delivering executive communication and reporting. Continuously improve processes to eliminate inefficiencies and ensure scalability. Required Qualifications: 5+ years of experience in Information Security Engineering or equivalent (consulting, training, military, education). Proven ability to take initiative, work independently, and drive results. Strong attention to detail and ability to handle ad hoc reporting. Advanced skills in Microsoft Excel (VLookups & Pivot Tables) and PowerPoint. Proficient with Agile methodologies and project management tools like Atlassian JIRA and Confluence. Experience in analytical
    $78k-106k yearly est. 1d ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 23h ago
  • Director - Threat Detection Analyst

    Morgan Stanley 4.6company rating

    Information security analyst job in Edison, NJ

    In the Technology division, we leverage innovation to build the connections and capabilities that power our Firm, enabling our clients and colleagues to redefine markets and shape the future of our communities. This is a Lead Data & Analytics Engineering position at the Director level, which is part of the job family responsible for providing specialist data analysis and expertise that drive decision-making and business insights as well as crafting data pipelines, implementing data models, and optimizing data processes for improved data accuracy and accessibility, including applying machine learning and AI-based techniques. About the role: The Director role within Fraud Detection Analytics performs a critical function within the Fraud Department, in safeguarding the organization against diverse fraud risks. This position is responsible for designing, implementing, and overseeing advanced analytics strategies to detect and mitigate fraudulent activities across multiple payment channels and fraud typologies, including account takeover (ATO), deposit fraud, scams, and emerging schemes. The ideal candidate combines deep technical expertise with strategic vision and strong communication skills to drive cross-functional collaboration and deliver actionable insights. What you'll do in the role: Develop and refine fraud detection controls and analytical frameworks targeting fraud risks such as ATO, deposit fraud, scams, and other typologies. Monitor and analyze transaction channels (crypto, wire, ACH, Zelle, bill payments) for suspicious activity and emerging patterns. Leverage data-driven insights by integrating internal data with external intelligence sources for proactive fraud detection. Utilize SQL and advanced analytics to extract, analyze, and interpret large datasets to identify emerging fraud trends. Apply predictive modeling, forecasting, and statistical methodologies to enhance operational efficiency and reporting. Design and validate rules within the fraud rules engine, conducting rigorous pre- and post-production testing. Continuously adjust controls based on observed trends to address evolving risks. Identify automation opportunities to streamline manual processes related to data collection, metric calculation, and loss assessment. Deliver business insights through dashboards and visualization tools (Tableau, SAS, Python, R) and produce on-demand reports. Communicate key trends, findings, and actionable recommendations to management and stakeholders. Prepare and present executive-level reports on suspicious activities and risk management. Set and monitor KPIs for fraud detection, implementing mitigation strategies where needed. Collaborate with Customer Service, Product Management, Engineering, and Data Science teams to enhance fraud detection tools and models. Coordinate with Fraud Operations to align rule strategies with staffing resources. Recommend and implement innovative technologies for fraud detection, prevention, and reporting. What you'll bring to the role: Minimum of 5+ years of experience in fraud analytics, financial crime, or risk management. Bachelor's or Master's degree in Data Science, Computer Science, Finance, or related field. Expert proficiency in SQL (including joins, subqueries, unions, temporary tables) for data extraction, analysis, and reporting. Demonstrated experience designing and implementing fraud detection models, with a strong focus on account takeover, scam & first party fraud scenarios. In-depth understanding of transaction exhaust methods (cryptocurrency, wires, ACH, Zelle, bill payments). Strong analytical, problem-solving, and decision-making skills. Excellent verbal and written communication skills, with the ability to present complex findings to non-technical audiences. Experience working with large datasets and modern analytics tools (Python, R, Tableau, SAS). Desired Skills: Previous experience in banking, fintech, or payments industry. Knowledge of regulatory requirements related to financial fraud and AML. Familiarity with fraud monitoring tools and case management systems. Ability to work in fast-paced, high-pressure environments and manage multiple priorities effectively. Proven track record of leading successful fraud detection initiatives across multiple payment channels. Advanced skills in statistical analysis and visualization platforms. Experience collaborating with Data Science and Product teams to produce fraud risk models and meet business goals WHAT YOU CAN EXPECT FROM MORGAN STANLEY: We are committed to maintaining the first-class service and high standard of excellence that have defined Morgan Stanley for over 89 years. Our values - putting clients first, doing the right thing, leading with exceptional ideas, committing to diversity and inclusion, and giving back - aren't just beliefs, they guide the decisions we make every day to do what's best for our clients, communities and more than 80,000 employees in 1,200 offices across 42 countries. At Morgan Stanley, you'll find an opportunity to work alongside the best and the brightest, in an environment where you are supported and empowered. Our teams are relentless collaborators and creative thinkers, fueled by their diverse backgrounds and experiences. We are proud to support our employees and their families at every point along their work-life journey, offering some of the most attractive and comprehensive employee benefits and perks in the industry. There's also ample opportunity to move about the business for those who show passion and grit in their work. To learn more about our offices across the globe, please copy and paste ***************************************************** into your browser. Morgan Stanley's goal is to build and maintain a workforce that is diverse in experience and background but uniform in reflecting our standards of integrity and excellence. Consequently, our recruiting efforts reflect our desire to attract and retain the best and brightest from all talent pools. We want to be the first choice for prospective employees. It is the policy of the Firm to ensure equal employment opportunity without discrimination or harassment on the basis of race, color, religion, creed, age, sex, sex stereotype, gender, gender identity or expression, transgender, sexual orientation, national origin, citizenship, disability, marital and civil partnership/union status, pregnancy, veteran or military service status, genetic information, or any other characteristic protected by law. Morgan Stanley is an equal opportunity employer committed to diversifying its workforce (M/F/Disability/Vet).
    $88k-117k yearly est. Auto-Apply 7d ago
  • Information Security Analyst II (E5122)

    Institute of Electrical and Electronics Engineers

    Information security analyst job in Piscataway, NJ

    Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e.g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & Solaris Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE\: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer\: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons. Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies\: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures.
    $84k-119k yearly est. Auto-Apply 3d ago
  • Information Security Analyst II (E5122)

    Ieee 4.9company rating

    Information security analyst job in Piscataway, NJ

    Information Security Analyst II (E5122) - 250363: KNW-B40 Description Job Summary The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key ResponsibilitiesProactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). Participates in development and update of security policies, procedures, standards, guidelines, and architectures. Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. Assists in the formulation and enforcement of security policies and procedures. Qualifications Education Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. ReqWork Experience 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e. g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. ReqLicenses and Certifications Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. PrefSkills and Requirements Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) Knowledge or familiarity on conducting and mitigating security/risk assessments Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc. ) Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. Knowledge and experience Windows Active Directory. Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i. e. Self Service Access requests). Good understanding of a programming language (e. g. Java, C, Perl), HTML/XML and Unix “shells” scripting (e. g. CSH, KSH, SH). Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences. o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool Ability to work alone and build relationships across the organization. Anticipates problems and identifies long-term implications of decisions and actions. Familiarity with server operating systems, such as; Windows, Linux & SolarisFamiliarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. Familiarity with load balancer technologies and ESSO integration capabilities is a plus. Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements:As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. ===============================================Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons. Min: $91,000. 00 Max: $114,000. 00 Job: Technology Primary Location: United States-New Jersey-Piscataway Schedule: Full-time Job Type: Regular Job Posting: Dec 22, 2025, 4:20:40 PM
    $91k-114k yearly Auto-Apply 9h ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Rennerbrown

    Information security analyst job in Princeton, NJ

    A large global enterprise operating in a highly regulated industry is seeking a Senior Specialist, Security Operations and OT Cybersecurity. This position will lead regional security operations and help expand and mature Operational Technology (OT) cybersecurity programs. The role will focus on incident response leadership, OT security strategy, and vendor performance management across IT, cloud, and manufacturing environments. The ideal candidate is both technically hands-on and strategically aware, capable of managing complex incidents, guiding SOC operations, and building secure industrial environments in coordination with global security leadership. Key Responsibilities Lead incident response activities for the region, coordinating with global teams for investigation, escalation, and remediation across IT, OT, and cloud environments. Manage and continuously improve security monitoring and detection to ensure high-quality visibility and responsiveness. Build and mature OT cybersecurity capabilities, partnering with manufacturing, infrastructure, and operations teams to secure industrial control systems, SCADA, PLCs, and laboratory environments. Manage and hold vendors accountable for activities such as threat hunting, penetration testing, and forensic analysis, ensuring service quality and effective outcomes. Drive the execution of global SOC playbooks, escalation procedures, and threat intelligence integration. Support remediation and post-incident activities to strengthen resilience across technology domains. Develop, maintain, and enhance operational runbooks and processes to support consistent, repeatable cyber defense practices. Collaborate with IT, engineering, and compliance teams to uphold corporate and regulatory security standards. Required Experience Minimum 5 years of cybersecurity operations experience, with direct involvement in SOC management, incident response, and threat detection. Demonstrated hands-on experience in OT/ICS environments within manufacturing, utilities, or other regulated sectors. Proven ability to lead cross-functional investigations and vendor-driven engagements in complex enterprise environments. Knowledge of relevant cybersecurity frameworks, such as NIST CSF and ISA/IEC 62443, and their application in industrial and regulated settings. Strong analytical and communication skills, with the ability to work effectively across technical and business teams. Technical Expertise Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, OT, and cloud domains. Hands-on experience with SOC technologies, including SIEM, SOAR, EDR/XDR, and forensic analysis platforms. Strong background in OT/ICS cybersecurity, securing SCADA, PLCs, and manufacturing systems using frameworks such as ISA/IEC 62443 and NIST CSF. Familiarity with threat detection engineering, use case development, and integration of threat intelligence into monitoring workflows. Experience collaborating on vulnerability management and remediation across IT and OT environments. Certifications Required: CISSP Preferred: GICSP, GRID, or other OT/ICS-specific certifications. Education Bachelor's degree in Information Security, Computer Science, or a related technical field required. Advanced coursework or training in OT/ICS cybersecurity preferred. Compensation Base salary in the range of $120,000 to $140,000, plus annual performance bonus and comprehensive benefits package. Final compensation will align with experience, technical expertise, and leadership capability. Additional Details Hybrid role, North America-based (East Coast preferred). Reports to a regional cybersecurity leader within the global organization. Requires up to 10% travel (domestic and international).
    $120k-140k yearly 52d ago
  • Sr. Specialist, Security Operations & OT Cybersecurity

    Kyowa Kirin North America

    Information security analyst job in Princeton, NJ

    Kyowa Kirin is a fast-growing global specialty pharmaceutical company that applies state-of-the-art biotechnologies to discover and deliver novel medicines in four disease areas: bone and mineral; intractable hematologic; hematology oncology; and rare disease. A Japan-based company, our goal is to translate science into smiles by delivering therapies where no adequate treatments currently exist, working from drug discovery to product development and commercialization. In North America, we are headquartered in Princeton, NJ, with offices in California, North Carolina, and Mississauga, Ontario. Summary: We are seeking a Security Operations & OT Cybersecurity Specialist to join our Global Information Security team. This role will serve as the regional lead for North America security operations and OT/ICS security, responsible for incident response, monitoring, and cyber defense across IT and manufacturing environments. The ideal candidate will have strong experience in SOC operations, OT cybersecurity, and regulated industries, with the ability to respond under pressure while also driving continuous improvement. Essential Functions: • Lead incident response for North America, coordinating with the global SOC for escalations, investigations, and recovery. • Manage monitoring solutions to ensure high-quality visibility across IT, cloud, and OT environments. • Own OT/ICS cybersecurity strategy in partnership with manufacturing, infrastructure, and plant leadership, securing SCADA, PLCs, and lab systems. • Vendor management for proactive threat hunting, pen testing and forensic analysis. • Lead remediation activities for both IT and OT environments. • Drive regional execution of global SOC playbooks, escalation models, and threat intelligence integration. • Develop and maintain operational security runbooks and ensure continuous improvement of detection and response capabilities. • Partner with IT, R&D, and Manufacturing to enforce regulatory compliance across GxP, HIPAA, and FDA-controlled systems. Requirements: Education Bachelor's degree in Information Security, Computer Science, or related field required; Advanced training in OT/ICS security preferred. Certifications Required: CISSP Certifications Preferred: GICSP, GRID, or other OT-focused certifications Experience: At least 5 years in cybersecurity operations, with demonstrated experience in SOC or incident response leadership; Strong hands on experience with OT/ICS environments in pharma, biotech, manufacturing, or critical infrastructure; Expertise in SIEM, SOAR, forensic tools, and threat detection engineering; Knowledge of OT security frameworks (ISA/IEC 62443, NIST CSF) and pharmaceutical regulations (GxP, HIPAA, 21 CFR Part 11). Technical Skills • Expertise in Security Operations and Incident Response, including triage, investigation, containment, and recovery across IT, cloud, and OT environments. • Hands-on experience with SOC technologies such as SIEM, SOAR, EDR/XDR, and forensic analysis platforms. • Strong background in OT/ICS cybersecurity, including SCADA, PLCs, and lab systems, with application of frameworks such as ISA/IEC 62443 and NIST CSF. • Knowledge of threat detection engineering, use-case development, and integration of threat intelligence into monitoring workflows. • Proficiency in forensic tools and malware analysis to support root-cause identification and post-incident review. • Understanding of regulatory compliance requirements including GxP, HIPAA, and 21 CFR Part 11, as they apply to manufacturing and research systems. • Experience collaborating on vulnerability management, patching, and remediation across IT and OT environments. Working Conditions: Requires up to 10 % domestic and international travel The anticipated salary for this position will be $115,000 to $130,000. The actual salary offered for this role at commencement of employment may vary based on several factors including but not limited to relevant experience, skill set, qualifications, education (including applicable licenses and certifications, job-based knowledge, location, and other business and organizational needs. The listed salary is just one component of the overall compensation package. At Kyowa Kirin North America we provide a comprehensive range of benefits including: 401K with company match Discretionary Profit Share Annual Bonus Program (Sales Bonus for Sales Jobs) Generous PTO and Holiday Schedule which includes Summer and Winter Shut-Downs, Sick Days and, Volunteer Days Healthcare Benefits (Medical, Dental, Prescription Drugs and Vision) HSA & FSA Programs Well-Being and Work/Life Programs Life & Disability Insurance Concierge Services Long Term Incentive Program (subject to job level and performance) Pet Insurance Tuition Assistance Employee Referral Awards The compensation and benefits information set forth in this posting applies to candidates hired in the United States. Candidates hired outside the United States will be eligible for compensation and benefits in accordance with their local market. KKNA and all of its employees have an obligation to act in accordance with the law and with integrity in all our operations and interactions It is the policy of Kyowa Kirin North America, Inc. to provide equal employment opportunity to all qualified persons without regard to race, religion, creed, color, pregnancy, sex, age, national origin, disability, genetic trait or predisposition, veteran status, marital status, sexual orientation or affection preference or citizenship status or any other category protected by law. When you apply to a job on this site, the personal data contained in your application will be collected and stored by Kyowa Kirin, Inc. (“Controller”), which is located at 510 Carnegie Center Dr. Princeton, NJ 08540 USA and can be contacted by emailing ****************************************. Controller's data protection officer can be contacted at usprivacyoffice@kyowakirin.com. Your personal data will be processed for the purposes of managing Controller's recruitment related activities, which include setting up and conducting interviews and tests for applicants, evaluating and assessing the results thereto, and as is otherwise needed in the recruitment and hiring processes. Such processing is legally permissible under Art. 6(1)(f) of General Data Protection Regulation (EU) 2016/679 (“GDPR”) as necessary for the purposes of the legitimate interests pursued by the Controller, which are the solicitation, evaluation, and selection of applicants for employment. Your personal data will be shared with Greenhouse Software, Inc., a cloud services provider located in the United States of America and engaged by Controller to help manage its recruitment and hiring process on Controller's behalf. Accordingly, if you are located outside of the United States, your personal data will be transferred to the United States once you submit it through this site. The transfer will be made using appropriate additional safeguards under the standard contractual clauses approved by regulators for transfers of personal data outside the European Union. Your personal data will be retained by Controller as long as Controller determines it is necessary to evaluate your application for employment. Under the GDPR, if you are located in the European Union, you have the right to request access to your personal data, to request that your personal data be rectified or erased, and to request that processing of your personal data be restricted. You also have the right to data portability, and to lodge a complaint with an EU supervisory authority. If you have any questions about our use of your data, you may contact us by email at usprivacyoffice@kyowakirin.com. Recruitment & Staffing Agencies Kyowa Kirin does not accept agency resumes unless contacted directly by internal Kyowa Kirin Talent Acquisition. Please do not forward resumes to Kyowa Kirin employees or any other company location; Kyowa Kirin is not responsible for any fees related to unsolicited resumes. #LI-Tt1 #Hybrid #Princeton
    $115k-130k yearly Auto-Apply 24d ago
  • Cyber Security Solutions Engineer - GES

    Cisco Systems, Inc. 4.8company rating

    Information security analyst job in Trenton, NJ

    States: MA, NH, RI, ME, CT, VT, NJ, NY is home office based. Meet the Team You will provide guidance and assist Security Sellers and Account teams within the territory in a pre-sales technical role, showcasing Cisco security product solutions, setting up demonstrations, explaining features and benefits to customers, and designing and configuring products to address specific customer security needs. You will form relationships with our customer's key decision-makers, positioning Cisco security solutions aligned accurately to their requirements. You will be a part of an outstanding technical pre-sales team in our Global Security Sales Organization (GSSO), responsible for driving the success of Cisco's Security Portfolio and focusing on protecting Customer Application Environments no matter where they live (on-prem / any cloud). Our mission is simple: democratize security by making it easy and effective for everyone. We're transforming security from the ground up by solving the world's most pressing geopolitical challenge - safe, secure information access. We engineer our business to enable our customers to easily address their ever-evolving security challenges. We believe that impactful work is rewarding work and that our team is at its best when everyone feels empowered to bring their whole self to work. We learn together by hiring for cultural contribution, not cultural fit, and recognize that diversity in background and thought are essential to building high-impact teams. We invest in growth and learning opportunities and encourage our people to never stop learning. We foster collaboration and believe in being recognized (and rewarded!) for hard work. We champion a healthy work-life balance. We're kinder than necessary. Together we build for the future by designing simple solutions for complex problems. And that's why we're the most loved and trusted name in security. Your Impact As an advisor to the customer, you'll be working with technology experts to craft architectures and configure products to meet customer-specific needs, are prepared to lead all technical aspects of pre-sales activities, and position security solutions effectively against competing offerings. You are an aggressive starter, self-starter with the ability to build executive relationships, develop and execute sales strategies and tactics that improve Cisco's opportunity with a customer environment, position and promote the partner and customer value proposition for Cisco security architecture, articulate Cisco's product and business strategies, and create the demand that makes deals happen! You will: * Serve as the subject matter expert in Cisco security solutions * Provide guidance and assist account teams within the territory in building solutions to address specific customer security needs * Understand business requirements for a customer base and be able to translate them into technical requirements * Understand and articulate Cisco's architecture and services within security technologies * Create, present, and document technical solutions * Perform in-depth and high-level technical presentations for customers partners and prospects * Drive identified major account opportunities (i.e. technical consulting, upper-level management presentations, and Cisco technology solutions) while allowing local account teams to maintain long-term ownership Who You Are You are passionate about the customer experience and excited about new technology. You are a true teammate and love to learn. Being a self-starter, our SEs act as an industry domain authority, and strive to help Cisco make customers for life. Minimum Qualifications * Minimum of 4 years of pre-sales experience * Hands on experience with one or more of these Cisco Security Products (or their competitive equivalent): ******************************************************************** * Experience with whiteboard discussions that transform customer requirements into security solutions Preferred Qualifications * History of successful quota achievement. * Ability to demo / POV any of these Cisco Security products (the more the better): ******************************************************************** * Knowledge of public clouds AWS, Azure, GCP, and OCI. * Experience with incident response a plus * Experience with administering security for a company (e.g. purchased and deployed Cisco security products as a customer) is a plus. * Solid presentation and interpersonal skills. * Highly motivated self-starter who does not need day-to-day management * Experience with APIs and scripting languages Why Cisco? At Cisco, we're revolutionizing how data and infrastructure connect and protect organizations in the AI era - and beyond. We've been innovating fearlessly for 40 years to create solutions that power how humans and technology work together across the physical and digital worlds. These solutions provide customers with unparalleled security, visibility, and insights across the entire digital footprint. Fueled by the depth and breadth of our technology, we experiment and create meaningful solutions. Add to that our worldwide network of doers and experts, and you'll see that the opportunities to grow and build are limitless. We work as a team, collaborating with empathy to make really big things happen on a global scale. Because our solutions are everywhere, our impact is everywhere. We are Cisco, and our power starts with you. Message to applicants applying to work in the U.S. and/or Canada: The starting salary range posted for this position is $217,200.00 to $274,100.00 and reflects the projected salary range for new hires in this position in U.S. and/or Canada locations, not including incentive compensation*, equity, or benefits. Individual pay is determined by the candidate's hiring location, market conditions, job-related skillset, experience, qualifications, education, certifications, and/or training. The full salary range for certain locations is listed below. For locations not listed below, the recruiter can share more details about compensation for the role in your location during the hiring process. U.S. employees are offered benefits, subject to Cisco's plan eligibility rules, which include medical, dental and vision insurance, a 401(k) plan with a Cisco matching contribution, paid parental leave, short and long-term disability coverage, and basic life insurance. Please see the Cisco careers site to discover more benefits and perks. Employees may be eligible to receive grants of Cisco restricted stock units, which vest following continued employment with Cisco for defined periods of time. U.S. employees are eligible for paid time away as described below, subject to Cisco's policies: * 10 paid holidays per full calendar year, plus 1 floating holiday for non-exempt employees * 1 paid day off for employee's birthday, paid year-end holiday shutdown, and 4 paid days off for personal wellness determined by Cisco * Non-exempt employees receive 16 days of paid vacation time per full calendar year, accrued at rate of 4.92 hours per pay period for full-time employees * Exempt employees participate in Cisco's flexible vacation time off program, which has no defined limit on how much vacation time eligible employees may use (subject to availability and some business limitations) * 80 hours of sick time off provided on hire date and each January 1st thereafter, and up to 80 hours of unused sick time carried forward from one calendar year to the next * Additional paid time away may be requested to deal with critical or emergency issues for family members * Optional 10 paid days per full calendar year to volunteer For non-sales roles, employees are also eligible to earn annual bonuses subject to Cisco's policies. Employees on sales plans earn performance-based incentive pay on top of their base salary, which is split between quota and non-quota components, subject to the applicable Cisco plan. For quota-based incentive pay, Cisco typically pays as follows: * .75% of incentive target for each 1% of revenue attainment up to 50% of quota; * 1.5% of incentive target for each 1% of attainment between 50% and 75%; * 1% of incentive target for each 1% of attainment between 75% and 100%; and * Once performance exceeds 100% attainment, incentive rates are at or above 1% for each 1% of attainment with no cap on incentive compensation. For non-quota-based sales performance elements such as strategic sales objectives, Cisco may pay 0% up to 125% of target. Cisco sales plans do not have a minimum threshold of performance for sales incentive compensation to be paid. The applicable full salary ranges for this position, by specific state, are listed below: New York City Metro Area: $223,000.00 - $330,300.00 Non-Metro New York state & Washington state: $217,200.00 - $315,300.00 * For quota-based sales roles on Cisco's sales plan, the ranges provided in this posting include base pay and sales target incentive compensation combined. Employees in Illinois, whether exempt or non-exempt, will participate in a unique time off program to meet local requirements.
    $92k-119k yearly est. 21d ago
  • Security Analyst

    Ventures Unlimited

    Information security analyst job in Moorestown, NJ

    Ventures Unlimited is a service centric organization. Our success begins with our ability to apply our relationships, leverage technologies, and identify talent - often in combination - to an endless array of real-world customer needs Position : Security Analyst (SIEM) Location: Moorestown, NJ Duration: Full Time Job Description : Overall experience of 8+ years in the field of information security with 2+years of experience in handling Security Analytics/SIEM tools such as Arcsight, Loglogic, Splunk etc. Working knowledge of SQL and Oracle databases, Windows operating systems and Cisco and Juniper network solutions Windows and UNIX administration experience Perl or Python scripting knowledge Familiar with Regular Expressions. Can create regular expressions to search for evidence of malicious activity Able to interpret log files from various network devices to include firewall, proxy, endpoints and web servers Ability to work independently and within a team environment Demonstrated ability to stay current with information security best practices, existing and emerging technology Good oral communications and written communication skills Certifications such as CEH, ECSA, CISSP, GISP etc. are preferred Thanks & Regards Rahul Kumar Additional Information Contact "Rahul Kumar" for more details at ************ Ext :157
    $76k-109k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Trenton, NJ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 35d ago
  • Information Security Manager

    Atlas Systems 3.9company rating

    Information security analyst job in East Brunswick, NJ

    Job DescriptionSalary: About Us: Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals. For more information, please visit our website ***************************** Please click on the link below to apply for this position: ************************************** Position Summary: We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management. Key Responsibilities: Develop, implement, and maintain information security strategy, policies, and standards. Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2). Oversee daily security operations including monitoring, incident detection, response, and remediation. Manage vulnerability assessments, penetration testing, patching, and threat intelligence. Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments. Implement and manage identity and access controls, endpoint protection, and data loss prevention. Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.). Conduct third-party/vendor risk assessments and application security reviews. Ensure compliance through internal audits, client assessments, and timely remediation. Deliver enterprise-wide security awareness and training programs. Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions. Lead, mentor, and develop security team members while fostering a culture of security awareness. Act as the escalation point for critical incidents and client-facing security discussions. Qualifications: Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field 710+ years of progressive experience in information security with at least 3 years in a leadership role. Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault). Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools. Proven track record managing incident response and SOC operations. Excellent leadership, stakeholder management, and communication skills. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100)
    $110k-140k yearly est. 18d ago
  • Chief Information Security Officer (CISO)

    1Kosmos

    Information security analyst job in Iselin, NJ

    Job Description 1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up. About the Role We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement. Key Responsibilities Security Operations Leadership (Primary Focus) Design, implement, and manage a comprehensive security operations infrastructure Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions Build and optimize security monitoring, incident response, and threat detection capabilities Drive automation initiatives to eliminate manual inefficiencies in security processes Compliance and Risk Management Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks Partner with business analysts to navigate regulatory requirements and audits Develop and maintain security policies, procedures, and documentation Manage security risk assessments and remediation programs Technical Security Architecture Secure cloud infrastructure across AWS, Google Cloud, and other platforms Integrate security into CI/CD pipelines, working closely with DevOps teams Implement and manage security tools (CrowdStrike, etc.) across the organization Conduct hands-on security reviews of architecture and code Cross-functional Collaboration Partner directly with development and engineering teams on secure software development Oversee internal IT security (smaller component of role) Communicate security initiatives and status to leadership and stakeholders Coordinate with global teams to ensure consistent security practices Requirements Required Qualifications Technical Expertise Minimum 7+ years in security operations with demonstrated hands-on experience Deep expertise in cloud security (AWS, Google Cloud, Azure) Proven ability to personally deploy and configure enterprise security tools Strong understanding of modern DevOps practices and CI/CD security integration Experience with security automation and orchestration Compliance and Governance Hands-on experience with FedRAMP certification processes Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications Understanding of regulatory compliance requirements and audit processes Leadership and Communication Experience leading security initiatives in fast-growing organizations Strong communication skills for collaborating with global, distributed teams Ability to translate technical security concepts for various stakeholders Comfortable working in a startup environment with evolving requirements Preferred Qualifications Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization Experience in identity management or authentication technologies Background in both security operations and security engineering Previous startup or scale-up experience Located in or willing to work EST hours (strong preference for NY/NJ area) Public-facing CISO experience (client communications) is a plus but not required What We're NOT Looking For Pure policy/governance executives without hands-on technical skills Traditional "big company" CISOs focused only on strategy and presentations Candidates who expect to delegate all technical work from day one Security leaders who haven't maintained current technical skills Benefits What We Offer Opportunity to build and shape security at a growing startup Direct impact on product and company security posture Collaborative environment with talented engineering teams Competitive compensation and equity package Flexible work arrangements with preference for hybrid in NY/NJ area
    $124k-186k yearly est. 15d ago
  • Chief Information Security Officer

    Saint Peter's Healthcare System 4.7company rating

    Information security analyst job in New Brunswick, NJ

    SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews. 2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board. 3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices. 4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers. 5. Develop and manage information security budgets and monitor them for variances. 6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users. 7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk. 8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program. 9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection. 10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance. 11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls. 12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures. 13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams. 14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings. 15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required. 16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings. 17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation. 18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action. 19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture. 20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources. 21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas. 22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security. 23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management 24. Perform related duties and fulfill responsibilities as required. Requirements: 1. A Master's degree in Business Administration or a Technology related field. 2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role. 3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard. 4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST. 5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations. 6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals. 7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical. 8. Strong problem-solving and analytical skills to identify and mitigate potential security risks. Salary Range: 133,715.00 - 220,639.00 USD We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials. The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status. Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards. You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
    $122k-190k yearly est. 40d ago
  • Security System Engineer

    Network Mountain

    Information security analyst job in Summit, NJ

    Job Description Security | Access Control + Video + Networking About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement. What You Get To Do You are the one who makes the system work. Configure and commission IP cameras, access control panels, and video intercoms Prepare Windows servers for deployment (RAID setup, NIC configuration, software installs, roles) Validate and troubleshoot network pathing on Cisco and HP switches (VLANs, routing, firewall ports, device communication) Work on point to point wireless and WLAN connectivity when needed Identify and correct video performance issues Resolve access control and video software issues Document configurations and device changes using Visio and Excel Meet with customers onsite to complete configurations and final commissioning Month to month you are roughly: 60 percent at home or office behind the keyboard 40 percent onsite with customers making the system live Technicians handle the physical installation. You step in when it is time to bring it online and prove it works. What You've Already Done Programmed access control or video surveillance systems (Example: Omnicast, Synergis, Identicard, Keri, or equivalent) Worked in networking at a practical level (Cisco or HP switches, VLANs, routing, firewalls) Supported Windows environments (group policy, imaging, local security, hardware troubleshooting) Used Wireshark or similar tools to troubleshoot TCP/IP traffic Communicated directly with customers and closed out technical issues You do not need to be a CCNP expert. A CCNA level skill set or equivalent experience is the goal. Keys To Winning Here Strong follow up and completion Consistency Positive attitude Curiosity to learn and get better Time management Attention to detail This is a role for someone who enjoys being the person that others rely on when it has to work. If that sounds like where you want to be, let's talk.
    $78k-108k yearly est. 28d ago
  • Senior Security Specialist

    Armada 3.9company rating

    Information security analyst job in Lakehurst, NJ

    Type: Full Time Overtime Exempt: Yes Reports To: ARMADA HQ Security Clearance Required: Active TS/SCI The Senior Security Specialist establishes and maintains a process for Sensitive Compartmented Information (SCI) and Special Access Program (SAP) security administration. The Senior Security Specialist acts as the functional team lead for teams at the specific site. This includes coordinating and overseeing the tasking of other team members, providing training, mentoring, or supervision of other team members, tracking project progress, and participating in planning of projects, resourcing, and events. The Senior Security Specialist considers all aspects of security, to include personnel security, physical security, operations security, communications security, and associated oversight. Duties & Responsibilities: The Senior Security Specialist performs security and administrative management of assigned SCI and SAP. The Senior Security Specialist shall provide daily support to the appointed Special Security Representative (SSR) or Government SAP Security officer (GSSO) to fully implement all applicable enhanced security policies and procedures. The Senior SS shall perform Visitor Control duties by greeting and documenting all visitors according to facility security procedures, including but not limited to customers, tour groups, base public works, inspectors, and maintainers. The Senior SS shall monitor and control access to facility(s) and restricted areas under their responsibility by checking personnel passes, Common Access Cards (CAC) and validating security clearances utilizing DISS or other security database systems and visit requests. The Senior SS shall maintain facility visitor logs. Prepare and process visit request documentation packages. Perform visitor escort duties for assigned facilities and events and support the coordination and training of additional escorts as required for each event. The Senior SS shall support document control and document configuration management activities. Support data entry and maintenance of a variety of security databases. The Senior SS shall support Personnel Access Request /Access nomination processing. Support the classification, handling, transport, and destruction of classified/sensitive information. Support the creation of Standard Operating Procedures, Facility Check In - Check Out procedures, Fixed Facility Checklists, Security Education and Training Awareness materials, OPSEC Plans, Security Classification Guides, and other applicable security documentation. The Senior SS shall provide classified meeting support to include, but not limited to, coordination, facility preparation, attendee clearance validation, presentation material classification validation. Support program access list preparation and maintenance. Support the generation and maintenance of program security documentation. The Senior SS shall support self-inspection activities including but not limited to, checklist preparation. Support media control and inventory functions. Support the processing, inventory, and control of COMSEC. Support the performance of physical security inspections. Support the preparation of document and performance of indoctrination and debriefings. The Senior SS shall support foreign travel tracking and monitoring. Support facility security management duties including but not limited to key / control management, facility security inspections and assessments, alarm response including implement receipt/dispatch as applicable, and maintaining Intrusion Detection System and other facility security systems operability. The Senior SS shall support the preparation and submission of all required TEMPEST documentation. The Senior SS shall maintain DISS accounts to perform all personnel security functions. Other duties as assigned. Knowledge, Skills, and Abilities (KSAs): Ability to provide clear, concise, and accurate written and verbal communication. Skill in satisfactorily dealing with customers. Skill in operating a personal computer and standard office equipment. Knowledge of a variety of computer software applications in word processing, spreadsheets, database, (MSWord, Excel, Access, PowerPoint), and Outlook. Minimum/General Experience: At least ten (10) years of recent and relevant experience. Minimum Education: High School diploma or GED. Must obtain Security Fundamental Professional Certification (SFPC) certification within 1 (one) year of employment and maintain certification for the duration of employment. Disclaimer: The above information has been designed to indicate the general nature and level of work to be performed. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of the contractor assigned to this position. Applying: If you feel you have the knowledge, skills and abilities for this position visit our careers page at ****************** Special Notes: Relocation is not available for these jobs. ARMADA provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state and local laws. ARMADA complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Must be able to successfully pass a background check, and pre-employment drug testing. Job offers are contingent upon results of background check and drug testing.
    $92k-140k yearly est. 60d+ ago
  • Information Security Specialist

    Ask It Consulting

    Information security analyst job in Trenton, NJ

    Ask IT Consulting Inc, backed by a $500 million Microtek group company, provides an industry leading blend of technology, business consulting, and outsourcing services. Ask IT is a minority-owned enterprise; it has been founded on providing the highest quality possible and on the devotion to customer satisfaction. ASK IT consulting is an equal opportunity employer, which is a global staffing, consulting and technology solutions company, offering industry-specific solutions to fortune 500 clients and worldwide corporations. Job Description The Information Security Specialist (ISS) is responsible for developing and documenting information security policies and standards, in addition to planning, coordinating, and implementing security measures for information systems. Years of Relevant Experience: 5 plus years Preferred Education 4 year college degree or equivalent technical study • -Define, develop and implement information security & risk management policies, procedures & best practices to comply with industry standards • -Develop plans to safeguard computer files against accidental or unauthorized • modification, destruction, or disclosure and to meet emergency data processing • needs. Monitor use of data files and regulate access to safeguard information in • computer files. • -Document and maintain a repository with version control of all policies, procedures and best practices • -Perform compliance reviews, risk management functions, test executions and encryptions for application and infrastructure service levels • -Monitor use of data files and safeguard computer files against authorized access and unauthorized access • -Modify computer security files to incorporate new software, correct errors or access changes • -Perform risk assessments and execute tests of data processing system to ensure • functioning of data processing activities and security measures. • -Encrypt data transmissions and erect firewalls to conceal confidential information as it • is being transmitted and to keep out tainted digital transfers. • -Identify and track issues, risks and action items. • -Document information security policies, standards, and procedures spanning and • encompassing the range of topics such as organization security, asset ID and • classification, personal security, communications and operations management, • access control, system development and maintenance, business continuity • management, and compliance. • -Confer with users to discuss issues such as computer data access needs, security • violations, and programming changes. • -Train users and promote security awareness to ensure system security and to • improve server and network efficiency. Qualifications Prior experience in the following are essential for the role: • Websense 7.8 • E policy Orchestrator 4.6 • Mc Afee email gateway (MEG) 7.6 • Airwatch 8.0.6.0 Additional Information If you are interested in finding out more about opportunities near you, if you are in need of a staffing firm such as ours, or if you just have a question regarding your resume and career path, please email me at ryanaskitc.com
    $84k-119k yearly est. 60d+ ago
  • Information Security Analyst II (E5122)

    IEEE 4.9company rating

    Information security analyst job in Piscataway, NJ

    The overall purpose of this position is to protect the security and integrity of IEEE data through the implementation and maintenance of information security practices, measures, and technologies consistent with industry best practices. This position will act as a subject matter expert who will diligently assist with the maintenance and improvement of information and systems to ensure appropriate safeguards are in place. The incumbent must possess a thorough understanding and knowledge of security controls, strategies and methodologies as well as knowledge of some of the following technologies: firewalls, identity and access management, advanced authentication, single sing on, security audits, security diagnostics and encryption. The role reports to the Manager, Information Security and manages 0 direct reports. Key Responsibilities * Proactively identify and remediates vulnerabilities using industry best practices and maintains a strong awareness and understanding of the current threat landscape. * Performs internal and external security audits to ensure compliance with agreed security practices, policy and procedures to adhere with legal and regulatory requirements. * Identifies security policy violations and leads in the corrective actions to maintain data and infrastructure security. * Provides guidance and technical expertise to other technical employees and project teams and enforces established security policies. * Assists project teams with the application and implementation of IEEE security policies, standards, processes and agreed architectures. * Makes recommendations for enhancing security services, participates and, at times, leads the evaluation of commercial information security products and services to determine which of these should be adopted by or tested by the organization. * Assists with the installation, maintenance and support of information security tools and services including, but not limited to, identity and access management systems including single sign on (SSO). * Participates in development and update of security policies, procedures, standards, guidelines, and architectures. * Assists with the execution vulnerability and penetration tests of IEEE network and systems including the remediation of findings. * Assists with the investigation of security incidents, recommends and implements solutions to remediate or mitigate them. * Assists in the formulation and enforcement of security policies and procedures. Education * Bachelor's degree or equivalent experience Bachelor's Degree in computer related field such as Computer Science, Mathematics or Engineering. In lieu of a degree equivalent experience will be considered. Req Work Experience * 2-4 years At least 4 years direct experience involving security, network architectures and Internet communications protocols (TCP/IP), monitoring and intrusion prevention strategies (e.g. Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts (Enterprise Directory Services, Virtual Directory, Enterprise Single Sign-On / Web Access Controls and Authorization models) in a large, distributed, high performance, business critical networked environment. Req Licenses and Certifications * Relevant professional qualifications / certifications (CISSP, CEH, CISM, CISA, CSSLP, SANS, CHECK, CREST) a plus. Pref Skills and Requirements * Knowledge or familiarity of security technologies and concepts, including but not limited to, encryption, Public Key Infrastructure (PKI), two factor authentication, network security (firewall, intrusion detection / protection, and network anomaly detection), host based security (Anti-malware, firewall, intrusion detection / protection, patch management and file integrity), web application security (web application firewall, secure application development, authentication, session management, access control, single sign-on and error handling), database security (authentication, access control, auditing and integrity), secure remote access (VPN, terminal and console), security data analysis (security event monitoring, correlation, analysis and response) * Knowledge or familiarity on conducting and mitigating security/risk assessments * Knowledge of Authentication & Authorization technologies (LDAP, RADIUS, Two-factor authentication, SAML, OpenToken, OAuth, etc.) * Knowledge and experience installing and administering Enterprise Directory Services technologies, such as; Oracle Unified Directory, Oracle Virtual Directory, OpenLDAP, and Microsoft Active Directory. * Knowledge or familiarity installing and administering Enterprise Single Sign-On (ESSO) and Access Management (AM) technologies, such as; Computer Associates SiteMinder, Oracle Access Manager, IBM Tivoli, PingFederate, PingAccess and OpenSSO / OpenAM. * Knowledge and experience Windows Active Directory. * Knowledge of Self Service Account Management technologies, concepts and best practices, such as; Identity validation, user provisioning, self-service password recovery and automation workflows (i.e. Self Service Access requests). * Good understanding of a programming language (e.g. Java, C, Perl), HTML/XML and Unix "shells" scripting (e.g. CSH, KSH, SH). * Excellent communication skills (written and verbal) and able to articulate key messages to a range of audiences.o Can effectively discuss security challenges with developers and testerso Experience of at least one code security review tool * Ability to work alone and build relationships across the organization. * Anticipates problems and identifies long-term implications of decisions and actions. * Familiarity with server operating systems, such as; Windows, Linux & Solaris * Familiarity with web application security concepts, such as; secure application development, secure session management, cryptography, input validation, logging and error handling a plus. * Familiarity with load balancer technologies and ESSO integration capabilities is a plus. * Familiarity of Authentication, Authorization concepts, such as; Identity Federation, Multi-Factor Authentication (MFA), Public Key Infrastructure (PKI), RADIUS / TACACS a plus. Other Requirements: As defined in IEEE Policies, individuals currently serving on an IEEE board or committee are not eligible to apply. PLEASE NOTE: This position is not budgeted for employer-sponsored immigration support, this includes all persons in F (both CPT and OPT), J, H, L, or O status. For information on work demands and conditions required for this position, please consult the reference document, ADA Requirements. This position is classified under Category I - Office Positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. =============================================== Disclaimer: This is proprietary to IEEE. It outlines the general nature and key features performed by various positions that share the same job classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties and qualifications required of all employees assigned to the job. Nothing in this job description restricts management's right to assign or re-assign duties to this job at any time due to reasonable accommodations or other business reasons.
    $72k-103k yearly est. 3d ago
  • Information Security Manager

    Atlas Systems 3.9company rating

    Information security analyst job in East Brunswick, NJ

    About Us: Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals. For more information, please visit our website ***************************** ************************************** Position Summary: We are seeking an experienced Information Security Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management. Key Responsibilities: Develop, implement, and maintain information security strategy, policies, and standards. Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2). Oversee daily security operations including monitoring, incident detection, response, and remediation. Manage vulnerability assessments, penetration testing, patching, and threat intelligence. Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments. Implement and manage identity and access controls, endpoint protection, and data loss prevention. Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.). Conduct third-party/vendor risk assessments and application security reviews. Ensure compliance through internal audits, client assessments, and timely remediation. Deliver enterprise-wide security awareness and training programs. Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions. Lead, mentor, and develop security team members while fostering a culture of security awareness. Act as the escalation point for critical incidents and client-facing security discussions. Qualifications: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field 7-10+ years of progressive experience in information security with at least 3 years in a leadership role. Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault). Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools. Proven track record managing incident response and SOC operations. Excellent leadership, stakeholder management, and communication skills. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) Microsoft Certified: Azure Security Engineer Associate (AZ-500) Microsoft Certified: Cybersecurity Architect Expert (SC-100)
    $110k-140k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Princeton Meadows, NJ?

The average information security analyst in Princeton Meadows, NJ earns between $72,000 and $139,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Princeton Meadows, NJ

$100,000
Job type you want
Full Time
Part Time
Internship
Temporary