Cyber Security Architect
Security architect job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Cloud Security Engineer - SRE
Security architect job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Sr. Security Researcher - Red Team
Security architect job in Jersey City, NJ
About The Role
The Sr. Security Researcher is responsible for leading and executing offensive security assessments (red teaming) against the organization's systems and networks. This role will leverage advanced penetration testing, social engineering, and other offensive security techniques to identify and exploit vulnerabilities, simulate real-world threats, and enhance the organization's overall security posture.
Responsibilities
Lead and execute red team engagements:
Develop and execute comprehensive red team assessments, including reconnaissance, vulnerability scanning, exploitation, and post-exploitation activities.
Lead and mentor junior red team members, providing guidance, training, and hands-on experience.
Develop and maintain red team methodologies, tools, and infrastructure.
Conduct threat modeling and risk assessments to identify potential attack vectors and prioritize targets.
Develop and execute social engineering campaigns, including phishing, vishing, and physical penetration tests.
Vulnerability research and exploitation:
Stay abreast of the latest threat intelligence, vulnerabilities, and exploits.
Research and develop new exploitation techniques and tools.
Conduct in-depth analysis of vulnerabilities and their potential impact.
Reporting and communication:
Prepare detailed and concise reports documenting red team findings, including technical details, impact assessments, and remediation recommendations.
Effectively communicate findings to technical and non-technical audiences, including senior management.
Present findings and recommendations at security forums and conferences (optional).
Security awareness and training:
Develop and deliver security awareness training programs to employees on topics such as social engineering, phishing, and secure coding practices.
Conduct security awareness campaigns to raise employee awareness of security threats and best practices.
Collaboration:
Collaborate with other security teams (e.g., blue team, incident response) to improve overall security posture.
Work with development teams to identify and remediate security vulnerabilities in applications and systems.
Build and maintain relationships with external security researchers and the cybersecurity community.
Skills and Qualifications
Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience).
5+ years of experience in cybersecurity, with 3+ years of hands-on experience in penetration testing, red teaming.
Understanding of blended attacks.
Proven experience leading and mentoring junior security professionals.
Strong understanding of networking, systems administration, and programming concepts.
Expertise in penetration testing methodologies and tools (e.g., Cobalt Strike, Outflank, Sliver, PowerShell Empire, Metasploit, Kali Linux, Nmap).
Proficiency in scripting languages (e.g., Python, Ruby, PowerShell).
Strong understanding of network protocols (e.g., TCP/IP, HTTP, DNS).
Experience with vulnerability scanners, intrusion detection systems, and firewalls.
Experience with cloud security (e.g., AWS, Azure, GCP) is a plus.
Relevant security certifications (e.g., RTO I, RTO II, OSCP, OSCE, GPEN, CRTP) are highly desired.
Excellent analytical and problem-solving skills.
Strong communication and interpersonal skills.
Ability to work independently and as part of a team.
Strong attention to detail and accuracy.
Ability to adapt to new technologies and challenges.
Project Management.
Vice President, Application Cyber Security Specialist
Security architect job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Principal Information Security Architect
Security architect job in Trenton, NJ
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Modern Infrastructure and Security Architect - Vice President
Security architect job in Jersey City, NJ
Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we're 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for our values, building long-term relationships, serving society, and fostering shared and sustainable growth for a better world.
With a vision to be the world's most trusted financial group, it's part of our culture to put people first, listen to new and diverse ideas and collaborate toward greater innovation, speed and agility. This means investing in talent, technologies, and tools that empower you to own your career.
Join MUFG, where being inspired is expected and making a meaningful impact is rewarded.
The selected colleague will work at an MUFG office or client sites four days per week and work remotely one day. A member of our recruitment team will provide more details.
Job Summary:
We are looking for a talented and experienced Modern Infrastructure and Security Architect, Vice President who is hardworking, collaborative and passionate about solving complex problems on a growing team.
Major Responsibilities:
* As a Modern Infrastructure and Security Architect, Vice President at MUFG, you will help direct the execution of cyber security, working with product managers, architects, tech leads, and individual engineers to identify, proof-of-concept, pilot, and incubate cyber security capabilities across the organization.
* Maintain visibility of cyber security capabilities gaps across all of the bank's technology pillars to help prioritize incubation and help both Evolution Engineering teams and Incubation Engineering teams stay connected to and shape longer term cyber security visibility, remediation, and response.
* Help roll out these capabilities, using system reliability engineering (SRE) practices and open-source software (OSS) for better developer velocity and platform resilience.
* Working with our business partners to architect, design and implement solutions, and your expertise in detailed technical design and development of applications using emerging technology platforms will help lead MUFG towards true technology transformation.
* Improve the overall experience of our product through improving the quality of the security features and processes
* Create integrations and tools to improve the cloud, legacy environments ' security
* Help identify areas of improvement in the code base and help contribute to make it better
* Work with the Journey Owner, Scrum Master, other Engineers and Testers to iterate on new features within the Digital Team.
* Collaborate and teach other Engineers. Everyone can contribute something new to the team regardless of how long they 've been in the industry.
* You 'll fix prioritized issues from the issue tracker.
* Write high quality code to complete scheduled direction issues assigned by your Technical Lead engineering manager.
* Contribute to and follow our CI/CD process, alongside the rest of the Engineering team and the Consumer Bank as a whole.
Requirements:
* 10+ years' experience in engineering, ideally including the administration of software delivery tools, modern scripting languages, cloud automation, and infrastructure design and operating solutions built on AWS, Azure, or GCP
* In depth engineering skills within at least one of these fields: cyber security, machine learning, analytics, CI/CD for software defined infrastructures, data-as-a-service, real time event streaming, intelligence augmentation, systems automation
* Can comfortably work in an Agile environment
* Can work with modern frontend frameworks (e.g., React, Vue.js, Angular) Have hands-on experiences with JavaScript and associated web technologies (CSS, semantics HTML)
* Can collaborate effectively with UX Designers, Developers, and Designers
* Can clearly and concisely communicate complex technical, architectural, and/or organizational problems and propose thorough iterative solutions
* Have experience with performance and optimization problems and a demonstrated ability to both diagnose and prevent these problems
* Are comfortable working in an agile or waterfall software development process
* Can onboard and integrate with an organization long-term
* Have a positive and solution-oriented mindset
"Visa sponsorship/support is based on business needs. We do not anticipate providing visa sponsorship/support for this position.
The typical base pay range for this role is between $155K - $195K depending on job-related knowledge, skills, experience, and location. This role may also be eligible for certain discretionary performance-based bonus and/or incentive compensation. Additionally, our Total Rewards program provides colleagues with a competitive benefits package (in accordance with the eligibility requirements and respective terms of each) that includes comprehensive health and wellness benefits, retirement plans, educational assistance and training programs, income replacement for qualified employees with disabilities, paid maternity and parental bonding leave, paid vacation, sick days, and holidays. For more information on our Total Rewards package, please click the link below.
MUFG Benefits Summary
We will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws (including (i) the San Francisco Fair Chance Ordinance, (ii) the City of Los Angeles' Fair Chance Initiative for Hiring Ordinance, (iii) the Los Angeles County Fair Chance Ordinance, and (iv) the California Fair Chance Act) to the extent that (a) an applicant is not subject to a statutory disqualification pursuant to Section 3(a)(39) of the Securities and Exchange Act of 1934 or Section 8a(2) or 8a(3) of the Commodity Exchange Act, and (b) they do not conflict with the background screening requirements of the Financial Industry Regulatory Authority (FINRA) and the National Futures Association (NFA). The major responsibilities listed above are the material job duties of this role for which the Company reasonably believes that criminal history may have a direct, adverse and negative relationship potentially resulting in the withdrawal of conditional offer of employment, if any.
The above statements are intended to describe the general nature and level of work being performed. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required of personnel so classified.
We are proud to be an Equal Opportunity Employer and committed to leveraging the diverse backgrounds, perspectives and experience of our workforce to create opportunities for our colleagues and our business. We do not discriminate on the basis of race, color, national origin, religion, gender expression, gender identity, sex, age, ancestry, marital status, protected veteran and military status, disability, medical condition, sexual orientation, genetic information, or any other status of an individual or that individual's associates or relatives that is protected under applicable federal, state, or local law.
Auto-ApplySecurity Architect - Only for GC and Citizen
Security architect job in Long Hill, NJ
SOAIS is a leading enterprise IT solutions provider which has a passion for customer satisfaction, technology innovation with profound industry and business process expertise. It offers a full spectrum of technology solutions in the arena of Oracle Cloud Applications, PeopleSoft, WorkSoft, Workday and niche technology areas such as mobility
Job Description
Note: This role is only for GC and US Citizens.
Note: This role is only for GC and US Citizens
Note: This role is only for GC and US Citizens
Responsibilities:
Design and implement secure enterprise architecture, aligning with business objectives and regulatory requirements.
Develop and maintain security policies, standards, and guidelines.
Conduct risk assessments, threat modeling, and vulnerability analysis for applications, networks, and cloud environments.
Lead the evaluation, selection, and deployment of security tools and technologies (firewalls, SIEM, IAM, DLP, etc.).
Provide security architecture guidance during application and infrastructure design phases.
Collaborate with DevOps and engineering teams to embed security into CI/CD pipelines (DevSecOps).
Ensure compliance with security frameworks and standards (ISO 27001, NIST, CIS, GDPR, HIPAA, etc.).
Investigate and respond to security incidents, working with SOC and incident response teams.
Qualifications
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or related field (Master's preferred).
8+ years of IT/security experience, with at least 3+ years in a Security Architect role.
Strong knowledge of network security, application security, cloud security, and cryptography.
Proficiency with security technologies: SIEM, IDS/IPS, IAM, PKI, WAF, endpoint protection, etc.
Experience with cloud platforms (AWS, Azure, GCP) and security services.
Familiarity with secure coding practices, penetration testing, and vulnerability management.
Relevant certifications (CISSP, CISM, CCSP, SABSA, TOGAF) strongly preferred.
Excellent problem-solving, analytical, and communication skills.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Enterprise Information Security Architect
Security architect job in Newark, NJ
A Few Words About Us Integrated Resources, Inc is a premier staffing firm recognized as one of the tri-states most well-respected professional specialty firms. IRI has built its reputation on excellent service and integrity since its inception in 1996. Our mission centers on delivering only the best quality talent, the first time and every time. We provide quality resources in four specialty areas: Information Technology (IT), Clinical Research, Rehabilitation Therapy and Nursing.
Job Description:
The Enterprise Information Security Architect will apply a combination of business process analysis and technical knowledge to develop enterprise security architectural deliverable s that identify and describe the relationships among functions, data, applications and technology. The person will perform individual assignments and lead project teams composed of Business Analysts, Systems Engineers and Research Specialists, as well as analyze systems and technology integration requirements across multiple applications and organizations. It is important that the candidate communicate and work closely with process and system owners, IT management, peers, and technical staff to ensure the relevance of the security architecture and system designs to business process requirements. Additionally, the candidate will be responsible for setting the strategic direction, developing advanced enterprise wide security ideas, determining the security technology/standards and then guiding their development into a final product.
This position reports to the Director of Technology Architecture and will:
• Provide technical guidance and renders decisions regarding Security Technology designs and engineering.
• Act as an advisor to management and technology stakeholders on advanced Security research studies and applications.
• Maintain standards for system documentation.
• Develop Enterprise-wide and cross-functional Security Solutions.
• Research and recommend new industry IT Security models, management strategies and effective resource utilization models.
• Monitor, benchmark and report progress and performance of Security systems management and service levels.
• Conduct security technology reviews and audits that ensure computer systems are built to security architecture principles, follow Enterprise standards and are optimized to maximum efficiency.
• Interface with external business partners, vendors and subcontractors on issues of interoperability.
• Promote security technology.
Qualifications
Basic Qualifications:
• Bachelor's degree in Information Technology or related discipline from an accredited college or university, advanced degree or other professional certification in Management Information Systems is preferred
• 10+ years of professional business experience in Security Architecture, including security with Applications, Infrastructure, external internet security, or Access and Identity Management
• Experience with information privacy and security laws (covering such items as data breaches, records management and structured/unstructured data)
• Must have prior hands on experience reviewing code designs from a security standpoint
• Prior experience with Internal and External Applications Security Assessment
• Demonstrated experience with Secure Development Lifecycle
• Demonstrated experience with defending OWASP Top Ten Attack types
• Must have prior experience with SSL, and can articulate what it can/cannot cover and why it's important
• Experience with C, Python, Ruby, C++ and other relevant languages
• Demonstrated experience with Vulnerability assessments, penetration testing and experience fixing vulnerabilities.
• Prior Data Encryption solutions experience
• Prior ITCAM/SOA experience
Additional Qualifications/Knowledge:
• Prefer 5+ years of management experience
• Experience working in controlled regulatory environment is preferred
Skills and Abilities
• Strong understanding of application security principles
• Ability to articulate the 3 components of AAA (AuthN, AuthZ and Audit)
• Strong understanding of TOGAF and can articulate it's importance and relevance
• Strong project management and leadership skills
• Good vendor relationship management and negotiation skills
• Excellent presentation skills and able to speak in front of senior Executives
• Good interpersonal skills with the ability to interact with all levels of management and staff
• Good written communication skills
Additional Information
Kind Regards
Nishit Malakar
Technical Recruiter
Integrated Resources, Inc.
IT Life Sciences Allied Healthcare CRO
Certified MBE |GSA - Schedule 66 I GSA - Schedule 621I
(BOARD) # 732-549-2030 - Ext - 217
Email id - nishit @irionline.com www.irionline.com
LinkedIn: https://www.linkedin.com/in/nmalakar
Gold Seal JCAHO Certified ™ for Health Care Staffing
“INC 5000's FASTEST GROWING, PRIVATELY HELD COMPANIES” (8th Year in a Row)
Principal IAM Security Architect
Security architect job in Roseland, NJ
ADP is Hiring a Principal IAM Security Architect
The Cyber Security Architecture (CSA) team within ADP's Global Security Organization (GSO) is responsible for the research, design, and standardization of ADP's integrated global protection and security infrastructure.
The CSA team is responsible for leading these efforts for ADP worldwide across a broad set of security disciplines providing an integrated security ecosystem to detect, defend, and respond to business impacting cyber and physical security, data protection, and fraud prevention.
The CSA team must have strong skills in conducting technical analysis of security and business problems, as well as threats, incidents, investigations, and other general security related issues. The Architect must have the ability to communicate well, motivate, and lead cross-functional teams.
Responsibilities:
Document security standards, requirements, and best practices for Identity and Access Management.
Conduct architecture reviews of Identity and Access Management platforms and process to identify risks and recommend mitigations.
Provide internal security consulting services for ADP applications, and IT shared services Identity related projects.
Motivate and lead cross functional teams through effective communication, delegation, and prioritization.
Stay current with the latest security trends, technologies, and threats in Identity and Access Management security.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
To Succeed in This Role:
You'll have a bachelor's degree or equivalent.
Qualifications Required:
8 years minimum related experience in Identity and Access Management security architecture or a related field.
Technical experience with Identity technologies (Entra ID, Active Directory, SailPoint, CyberArk, Okta, etc.).
PKI and certificate lifecycle management experience.
Understanding of Passwordless Authentication (FIDO2, biometrics, certificates, etc.)
Deep knowledge of authentication protocols (SAML, Oauth 2.0, OIDC) and directory services (LDAP).
Experience with applying IAM principles to securing access to public cloud services.
Privileged access management and just in time access control expertise.
Proficient in creating technical security policies, standards, and best practices.
Must be able to function in a dynamic environment subject to impromptu changes in schedules and priorities.
Demonstrate well-developed organizational, written communication, and analytical skills.
CISSP and other security certifications are preferred.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Principal IAM Security Architect
Security architect job in Roseland, NJ
ADP is Hiring a Principal IAM Security Architect
The Cyber Security Architecture (CSA) team within ADP's Global Security Organization (GSO) is responsible for the research, design, and standardization of ADP's integrated global protection and security infrastructure.
The CSA team is responsible for leading these efforts for ADP worldwide across a broad set of security disciplines providing an integrated security ecosystem to detect, defend, and respond to business impacting cyber and physical security, data protection, and fraud prevention.
The CSA team must have strong skills in conducting technical analysis of security and business problems, as well as threats, incidents, investigations, and other general security related issues. The Architect must have the ability to communicate well, motivate, and lead cross-functional teams.
Responsibilities:
Document security standards, requirements, and best practices for Identity and Access Management.
Conduct architecture reviews of Identity and Access Management platforms and process to identify risks and recommend mitigations.
Provide internal security consulting services for ADP applications, and IT shared services Identity related projects.
Motivate and lead cross functional teams through effective communication, delegation, and prioritization.
Stay current with the latest security trends, technologies, and threats in Identity and Access Management security.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
To Succeed in This Role:
You'll have a bachelor's degree or equivalent.
Qualifications Required:
8 years minimum related experience in Identity and Access Management security architecture or a related field.
Technical experience with Identity technologies (Entra ID, Active Directory, SailPoint, CyberArk, Okta, etc.).
PKI and certificate lifecycle management experience.
Understanding of Passwordless Authentication (FIDO2, biometrics, certificates, etc.)
Deep knowledge of authentication protocols (SAML, Oauth 2.0, OIDC) and directory services (LDAP).
Experience with applying IAM principles to securing access to public cloud services.
Privileged access management and just in time access control expertise.
Proficient in creating technical security policies, standards, and best practices.
Must be able to function in a dynamic environment subject to impromptu changes in schedules and priorities.
Demonstrate well-developed organizational, written communication, and analytical skills.
CISSP and other security certifications are preferred.
Like what you see? Apply now!
Learn more about ADP at tech.adp.com/careers
Security Architect - Cloud & Enterprise Security - Edison NJ
Security architect job in Edison, NJ
Senior Network Security Architect
We are seeking a Senior Network Security Architect with deep expertise in Palo Alto firewalls and GlobalProtect VPN to lead the design, architecture, and implementation of our enterprise network security strategy. This role goes beyond operations - it requires strategic oversight, hands-on architecture, and leadership in building secure, scalable, and resilient environments.
Responsibilities:
Design and architect enterprise network security solutions, with a primary focus on Palo Alto firewalls and GlobalProtect VPN.
Define security standards, frameworks, and roadmaps to ensure scalability, compliance, and resilience.
Lead the evaluation, design, and deployment of next-generation firewall architectures, segmentation strategies, and remote access solutions.
Collaborate with IT, security, and business stakeholders to align network security with organizational goals.
Provide expert-level troubleshooting and guidance for complex firewall and VPN issues.
Mentor and provide technical direction to engineering staff and cross-functional teams.
Evaluate new technologies, tools, and methods to continuously improve the security posture.
Ensure solutions align with compliance standards (NIST, ISO, CIS, etc.).
Qualifications:
10+ years of experience in network security architecture and design.
Hands-on expertise with Palo Alto Networks firewalls and GlobalProtect (must-have).
Proven ability to design and implement secure network architectures in enterprise environments.
Strong understanding of VPNs, secure remote access, and advanced firewall policies.
Familiarity with cloud integrations (Azure, AWS, or GCP) and hybrid security models preferred.
Excellent communication skills - ability to explain complex architectures to both executives and technical teams.
Relevant certifications such as Palo Alto PCNSE, CISSP, or CCNP Security strongly preferred.
Why This Role Matters:
This is not a maintenance role - it's an opportunity to own the strategy and design of enterprise-wide security architecture while still applying deep technical expertise in Palo Alto and GlobalProtect. You'll directly shape how our organization protects its data, people, and infrastructure.
Laurie Roth
President/Sr. Consultant
DSN-IT
************
*************
**************
****************************************************
Easy ApplySecurity Architect
Security architect job in Middletown, NJ
Complete Description:
· The Enterprise Architect will also be tasked with preparing security standards, policies and procedures - as well as mentoring team members and executive staff on security matters. CISSP REQUIRED.
· The department is seeking an Enterprise Architect to work in conjunction with the Modernization Team, as well as the DHS Information Security and Privacy Office, to analyze and document the existing information security environment.
· Conducting system security and vulnerability analyses and risk assessments
· Evaluating the systems architecture and identifying integration issues
· Serve as Information Security Subject Matter Expert (SME), while working with a Systems Integrator and software vendors, to develop the approach for implementing an enterprise security infrastructure that ensures compliance to standards, policies and procedures
· Monitor delivery efforts to ensure compliance to standards, policies, and procedures
· Deliver evidence, demonstrating project deliverables meet federal certification requirements
· Improves DHS Incident Response efforts by analyzing existing systems\/processes and recommending future technologies and associated processes
· Participate in the RFI\/RFP process for systems module selection
· Participate in the procurement process to select a Systems Integrator to execute the DDI phase
· CISSP certification REQUIRED
· Extensive experience designing and implementing enterprise security architectures based on NIST Risk Management Framework (NIST 800\-53), state and federal security standards, and security industry best practices
· An extensive understanding of security tools and software products, including Identity Access Management (IAM), Security Incident and Event Management (SIEM), and Cloud Access Security Brokers (CASB)
· In\-depth experience in creating, documenting, and implementing enterprise security policies and standards - including enterprise\-wide communication and training
"}}],"is Mobile":false,"iframe":"true","job Type":"Contract","apply Name":"Apply Now","zsoid":"659070196","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Contract Duration","uitype":1,"value":"6 months"},{"field Label":"On\-Site vs Remote","uitype":2,"value":"On\-Site"},{"field Label":"Visa Requirement","uitype":1,"value":"Any"},{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"City","uitype":1,"value":"Middletown"},{"field Label":"State\/Province","uitype":1,"value":"Iowa"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"52638"}],"header Name":"Security Architect","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00187003","attach Arr":[],"custom Template":"4","is CandidateLoginEnabled":false,"job Id":"**********04811011","FontSize":"15","google IndexUrl":"https:\/\/palettetechnologies.zohorecruit.com\/recruit\/ViewJob.na?digest=Lh304XeNwlnJptzUT2shAdEFCp5SP0AbABceCROpQO8\-&embedsource=Google","location":"Middletown","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
Application Security Architect
Security architect job in Jersey City, NJ
US Tech Solutions is a global staff augmentation firm providing a wide-range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit our website ************************ We are constantly on the lookout for professionals to fulfill the staffing needs of our clients, sets the correct expectation and thus becomes an accelerator in the mutual growth of the individual and the organization as well.
Keeping the same intent in mind, we would like you to consider the job opening with US Tech Solutions that fits your expertise and skillset.
Job Description
Position Responsibilities:
• Work with IT project community and advise on application security standard controls and best practices.
• Work closely with other IT operation groups for identifying and remediation of systems with security issues.
• Should have practical implementation knowledge to advise IT development and implementation teams on how to fix potential vulnerabilities.
• Advise senior management including business sponsors on Security risks and should be able to translate security risks to business impact.
• Review application, database and network architecture and highlight risks.
• Onboard applications into the existing Security frameworks and participate in an advisory capacity until project deployment.
Position Qualifications:
Candidate Background
• 1-3 years professional experience as an Application Developer.
• 8-10 years of professional experience in an information security function for a financial, insurance, pharmaceutical, or similar commercial industry preferred.
• Bachelor's Degree in Computer Science or related field preferred.
Qualifications
Required Skills
• Perform Risk assessments for applications and underlying systems and recommend security requirements based on upstream Business requirements.
• Should have knowledge on Network and Infrastructure architecture.
• Ability to review and understand organizational security policies and incorporate into standard processes in a project.
• Expert understanding of HTTP, HTTPS, and other application layer protocols.
• Expert understanding of network layer protocols & industry best practices.
• Demonstrated proficiency in developing secure solutions developed using common development frameworks (J2EE, .NET, Spring, Struts, Hibernate, etc) and languages (Java, C#, C++, etc)
• Actively contributes to strategic security departmental planning in alignment with architectural goals.
• Strong analytical and problem solving skills.
• Excellent written, verbal communication & presentation skills.
• Should be able to work as a team player.
Additional Information
Kushal kumar
Direct.No: ************
SAP BO Admin
Security architect job in Princeton, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Preferred
• At least 1 year of experience in software development life cycle.
• At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
• At least 1 year of experience in writing Nested and Complex queries.
• At least 1 year of experience in creating reports using drill down, prompts and variables.
• At least 1year of experience 0n Query Tuning mechanisms.
• Good understanding of Data Warehouse concepts.
• Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
• Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
• Good Analytical Skills
• High impact communication
• Ability to ramp up in new technologies
• Ability to work in team environment with diverse/multiple stakeholders.
• Experience and desire to work in a Global delivery environment.
Qualifications
Qualifications
Basic
• Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Full-Time Permanent
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Information Security Manager
Security architect job in East Brunswick, NJ
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
7-10+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Director, Business Information Security Officer
Security architect job in Princeton, NJ
The Director, Business Information Security Officer is responsible for providing leadership and operational oversight in safeguarding enterprise information assets. This role is pivotal in delivering the services for information security assurance across third-party suppliers, business applications, cloud platforms and other core technologies, as well as the development and delivery of solutions for the protection of information assets.
As a senior member of the information security team reporting to the CISO, this role leads a team that serves as the key interface between the business, IT, and information security - driving the identification, evaluation and prioritization of information security risks and measuring the progress of the overall information security program through benchmarking and metrics. The position also acts as a trusted representative of the CISO in the delivery of security training & awareness to the organization and contributes to the evolution of the enterprise-wide information security program.
****
The Director, Business Information Security Officer leads a team in identifying and managing information security risks through assessments and cybersecurity risk management processes and owns services for both security awareness & training and information protection. The Director works with and coordinates across business functions, compliance teams, IT, and shared services groups. The Business Information Security Officer's core responsibilities include:
+ Lead cross-functional initiatives to establish and mature cybersecurity risk management processes in collaboration with business and IT colleagues.
+ Deliver security assurance services for third-party suppliers, cloud services, and business technologies.
+ Manage and mentor a specialized team focused on cybersecurity risk management, cybersecurity assurance, awareness & training/phishing awareness, and information protection.
+ Support the CISO in development of an information protection strategy to protect sensitive data from loss, leakage, or unauthorized exfiltration.
+ Execute against the information protection strategy through implementation and management of services for information protection, leveraging data loss prevention (DLP) and data security posture management technologies in partnership with business, information security, and IT colleagues.
+ Conduct periodic assessments of information handling practices and work with colleagues to classify and identify vital information and apply controls that mitigate risks.
+ Monitor emerging threats and regulatory changes related to information/data protection.
+ Support the CISO in establishing and reporting on metrics for key risk indicators (KRIs) and key performance indicators (KPIs) that measure the effectiveness of the information security program.
+ Conduct periodic benchmarking to assess information security maturity and recommend enhancements.
+ Develop and communicate training and awareness on security best practices throughout the organization.
+ Manage the ongoing delivery of phishing campaigns and responses to phishing alerts in coordination with the cybersecurity operations team.
+ Remain current on information security frameworks, guidance, best practices, and regulatory requirements impacting the pharmaceutical industry.
+ Collaborate deeply with peers in Security Operations and Information Security Architecture, taking an integrated approach to managing and reducing cyber risk across the organization.
**Qualifications/ Required**
Knowledge/ Experience and Skills:
+ 10+ years of experience within information security or IT GRC organizations; experience in the pharmaceutical/life sciences industry is desirable.
+ 5+ years of experience in development and management of information security risk assessment processes for applications and third parties.
+ 5+ years of experience in assessment of systems hosted in company or third-party cloud environments (e.g., AWS, Oracle, Azure).
+ Extensive knowledge of solutions and best practices for information protection / data loss protection, including Microsoft Purview and other solutions.
+ Expert understanding of risk management, compliance, and governance frameworks related to cybersecurity.
+ Ability to think strategically, lead initiatives, and provide leadership in the definition of solutions for risk mitigation.
+ Demonstrated ability to influence through leadership and collaboration - fostering a community of knowledge-sharing, collaboration, and forward-thinking.
+ The capacity to actively learn and apply security domain knowledge, knowledge, and best practices to guide the definition of security requirements in support of business initiatives.
+ Strong skills for critical thinking, analyzing, and assessing problems and implications, identifying patterns, making connections of underlying issues, understanding risks, and developing mitigation strategies, and taking ownership of the outcome.
+ Proven record as a strong communicator both in written and oral presentations; capable of rapidly creating detailed, yet concise written reports.
+ Ability to communicate technical ideas and concepts clearly, verbally and written, to technical and non-technical audiences, especially in articulating technical vision to executive levels.
Educational Qualifications
+ Bachelor's degree in computer science, Information Security, or a related field. A master's degree is desirable.
+ Certifications such as CISSP, CISM, CISA, or similar are highly desirable.
**Competencies**
**Accountability for Results -** Stay focused on key strategic objectives, be accountable for high standards of performance, and take an active role in leading change.
**Strategic Thinking & Problem Solving -** Make decisions considering the long-term impact to customers, patients, employees, and the business.
**Patient & Customer Centricity -** Maintain an ongoing focus on the needs of our customers and/or key stakeholders.
**Impactful Communication -** Communicate with logic, clarity, and respect. Influence at all levels to achieve the best results for Otsuka.
**Respectful Collaboration -** Seek and value others' perspectives and strive for diverse partnerships to enhance work toward common goals.
**Empowered Development -** Play an active role in professional development as a business imperative.
Minimum $164,530.00 - Maximum $245,985.00, plus incentive opportunity: The range shown represents a typical pay range or starting pay for individuals who are hired in the role to perform in the United States. Other elements may be used to determine actual pay such as the candidate's job experience, specific skills, and comparison to internal incumbents currently in role. Typically, actual pay will be positioned within the established range, rather than at its minimum or maximum. This information is provided to applicants in accordance with states and local laws.
**Application Deadline** : This will be posted for a minimum of 5 business days.
**Company benefits:** Comprehensive medical, dental, vision, prescription drug coverage, company provided basic life, accidental death & dismemberment, short-term and long-term disability insurance, tuition reimbursement, student loan assistance, a generous 401(k) match, flexible time off, paid holidays, and paid leave programs as well as other company provided benefits.
Come discover more about Otsuka and our benefit offerings; ********************************************* .
**Disclaimer:**
This job description is intended to describe the general nature and level of the work being performed by the people assigned to this position. It is not intended to include every job duty and responsibility specific to the position. Otsuka reserves the right to amend and change responsibilities to meet business and organizational needs as necessary.
Otsuka is an equal opportunity employer. All qualified applicants are encouraged to apply and will be given consideration for employment without regard to race, color, sex, gender identity or gender expression, sexual orientation, age, disability, religion, national origin, veteran status, marital status, or any other legally protected characteristic.
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation, if you are unable or limited in your ability to apply to this job opening as a result of your disability. You can request reasonable accommodations by contacting Accommodation Request (EEAccommodations@otsuka-us.com) .
**Statement Regarding Job Recruiting Fraud Scams**
At Otsuka we take security and protection of your personal information very seriously. Please be aware individuals may approach you and falsely present themselves as our employees or representatives. They may use this false pretense to try to gain access to your personal information or acquire money from you by offering fictitious employment opportunities purportedly on our behalf.
Please understand, Otsuka will **never** ask for financial information of any kind or for payment of money during the job application process. We do not require any financial, credit card or bank account information and/or any payment of any kind to be considered for employment. We will also not offer you money to buy equipment, software, or for any other purpose during the job application process. If you are being asked to pay or offered money for equipment fees or some other application processing fee, even if claimed you will be reimbursed, this is not Otsuka. These claims are fraudulent and you are strongly advised to exercise caution when you receive such an offer of employment.
Otsuka will also never ask you to download a third-party application in order to communicate about a legitimate job opportunity. Scammers may also send offers or claims from a fake email address or from Yahoo, Gmail, Hotmail, etc, and not from an official Otsuka email address. Please take extra caution while examining such an email address, as the scammers may misspell an official Otsuka email address and use a slightly modified version duplicating letters.
To ensure that you are communicating about a legitimate job opportunity at Otsuka, please only deal directly with Otsuka through its official Otsuka Career website ******************************************************* .
Otsuka will not be held liable or responsible for any claims, losses, damages or expenses resulting from job recruiting scams. If you suspect a position is fraudulent, please contact Otsuka's call center at: ************. If you believe you are the victim of fraud resulting from a job recruiting scam, please contact the FBI through the Internet Crime Complaint Center at: ******************* , or your local authorities.
Otsuka America Pharmaceutical Inc., Otsuka Pharmaceutical Development & Commercialization, Inc., and Otsuka Precision Health, Inc. ("Otsuka") does not accept unsolicited assistance from search firms for employment opportunities. All CVs/resumes submitted by search firms to any Otsuka employee directly or through Otsuka's application portal without a valid written search agreement in place for the position will be considered Otsuka's sole property. No fee will be paid if a candidate is hired by Otsuka as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id
***********************
and contact no is
**************.
Easy ApplySAP Security Analyst
Security architect job in Raritan, NJ
A highly skilled and experienced SAP Security Specialist is needed to join the team. The specialist will focus on the secure and compliant operation of the SAP landscape, specifically across SAP BusinessObjects Data Services BODS, SAP Landscape Transformation Replication Server SLT, SAP Ariba, and SAP Signavio. The specialist will be responsible for designing, implementing, and maintaining robust security solutions that meet business needs and compliance requirements. This role requires a strong understanding of SAP authorization concepts, risk management, and the ability to work collaboratively across various teams.
Responsibilities:
Design, develop, and maintain SAP security roles and authorizations within BODS, SLT, Ariba, and Signavio environments, aligning with security policies, standards, and SoD requirements.
Administer user access, troubleshoot issues, and oversee GRC implementation and user access reviews for the specified SAP applications.
Conduct security assessments, monitor and report on security events, and support audits.
Collaborate with IT and functional teams to define and implement security policies and provide user support.
Lead SAP security tasks in projects, supporting implementations and managing change control processes.
Develop and maintain the SAP Signavio Process Intelligence security model and ensure secure data access control.
Manage SSO, user provisioning, and integrations with IdMGRC if applicable.
Analyze and troubleshoot access issues, ensuring least privilege and SoD compliance.
Maintain audit trails and ensure system compliance with internal and external controls e.g., SOX.
Work closely with SAP Basis and Cloud Identity Services for user lifecycle and identity federation.
Participate in system upgrades, patching, and cutovers by validating security impacts.
Provide documentation and knowledge transfer to support and audit teams.
Qualifications:
Bachelor's degree in a relevant field.
Minimum of 10+ years of SAP Security experience with proven project delivery.
Strong knowledge in:
SAP BODS repository and runtime user security.
SLT rolebased access control and connection configurations.
SAP Ariba user provisioning via Ariba Administration, CIG or BTP, integration with SSO and Active Directory.
Signavio cloud user management and role assignments through SAP BTP cockpit or SCIMbased provisioning.
Expert knowledge of SAP authorization security, implementation methodologies, and SoD concepts.
Experience with SAP GRC Access Control.
Demonstrated ability to design SAP security solutions and experience in endtoend SAP security project lifecycles.
Excellent communication and collaboration skills.
Preferred Qualifications:
SAP Ariba certification.
Experience with EIMSailPoint, SAP Solution ManagerChaRM, and SAP Business Technology Platform BTP.
Bachelor's degree in Computer Science, Information Technology, or related discipline.
SAP Security or GRC certification is a plus.
Experience in multitenant SAP Ariba or Signavio deployment models.
Knowledge of compliance frameworks e.g., ISO, NIST, SOX.
This job description provides an overview of the responsibilities and qualifications required for an SAP Security Specialist role with a focus on BODS, SLT, Ariba, and Signavio. It can be further customized based on specific organizational needs and the seniority level of the position.
Auto-ApplySecurity System Engineer
Security architect job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Information Security Manager
Security architect job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)