Cyber Security Architect
Security architect job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Information Security Engineer
Security architect job in Iselin, NJ
We are seeking a high-judgment, detail-oriented operator to lead our Threat Modeling Program Operations. This individual will be responsible for orchestrating workflows, triaging intake, designing key metrics, and eliminating process inefficiencies. The role demands an expert in building executive-ready reports and dashboards to track throughput, cycle times, and model quality, ensuring optimal outcomes for complex, multifaceted initiatives in Information Security Engineering.
This is a contingent resource assignment, and the candidate may:
Consult on complex, large-scale initiatives in Information Security Engineering.
Review and analyze intricate, long-term security challenges, considering multiple factors including intangible or unprecedented elements.
Contribute to resolving complex issues requiring deep understanding of security policies, procedures, and compliance requirements.
Strategically collaborate with client personnel to ensure project success.
Key Responsibilities:
Lead and optimize workflow orchestration for the Threat Modeling Program.
Develop and manage reports and dashboards to monitor program effectiveness (throughput, cycle time, model quality).
Analyze and address complex security engineering issues, guiding teams to resolution.
Collaborate cross-functionally with stakeholders, delivering executive communication and reporting.
Continuously improve processes to eliminate inefficiencies and ensure scalability.
Required Qualifications:
5+ years of experience in Information Security Engineering or equivalent (consulting, training, military, education).
Proven ability to take initiative, work independently, and drive results.
Strong attention to detail and ability to handle ad hoc reporting.
Advanced skills in Microsoft Excel (VLookups & Pivot Tables) and PowerPoint.
Proficient with Agile methodologies and project management tools like Atlassian JIRA and Confluence.
Experience in analytical
Vice President, Application Cyber Security Specialist
Security architect job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Principal IAM Security Architect
Security architect job in Holmdel, NJ
Guardian Life is seeking a Principal IAM Security Architect to serve as a thought leader and subject-matter expert within the IAM domain. This role will involve defining enterprise-wide IAM strategies, guiding the organization's adoption of best practices across cloud and on-premises technologies, and driving innovation to support the business's strategic objectives.
You Will:
Lead the definition and execution of the organization's IAM strategy, aligning with the overall enterprise security and technology roadmap.
Serve as the top-tier authority on all IAM topics, with an emphasis on integrating cloud and on-premises enterprise architectures.
Design scalable, reusable, and forward-thinking IAM solutions that meet current business needs while anticipating future requirements.
Establish IAM architectural standards, patterns, and guidelines to ensure consistent implementation across the organization.
Champion the adoption of cutting-edge cybersecurity controls across IAM, AppSec, and DevSecOps domains.
Drive organization-wide API security implementations, promoting the use of modern open standards like OAuth, OIDC, and strong authentication protocols.
Conduct in-depth evaluations of emerging IAM tools and technologies, shaping the organization's future investments.
Act as a mentor and advisor to senior architects and engineers, providing technical guidance and fostering talent development.
Collaborate closely with business leaders, solution architects, and engineering teams to ensure seamless integration of IAM capabilities into enterprise solutions.
Represent the organization in industry forums and maintain awareness of evolving regulatory compliance standards related to data privacy and security.
Advocate for the strategic importance of IAM to executive leadership, articulating risks and opportunities in business terms.
Oversee technical delivery for critical IAM projects, ensuring adherence to timelines, quality benchmarks, and security policies.
You Have:
15+ years of experience in cybersecurity with a strong focus on Identity and Access Management.
10+ years of expertise in security architecture, including enterprise-level IAM solution design and implementation.
Proven experience leading IAM initiatives across Amazon Web Services (AWS), Microsoft Azure, and hybrid environments.
Extensive knowledge of IAM technologies and protocols, including SSO, MFA, Federation, PAM, OIDC, OAuth, SAML, and SCIM.
Deep familiarity with identity proofing, fraud prevention, and verification technologies.
Hands-on experience with leading IAM platforms, such as Ping Identity, Okta, and Microsoft EntraID, and Identity as a Service (IDaaS) solutions.
Advanced understanding of regulatory compliance frameworks (e.g., NYDFS, CCPA, GDPR) and security standards (e.g., NIST, ISO 27001).
Strong knowledge of API security, application security (OWASP Top 10), and encryption technologies.
Demonstrated leadership in managing cross-functional teams, mentoring technical staff, and influencing organizational strategy.
Relevant certifications (e.g., CISSP, CISM, CCSP) are strongly preferred.
Key Attributes:
Strategic thinker with the ability to align IAM initiatives with business objectives.
Exceptional communication and presentation skills, capable of influencing stakeholders at all levels.
Collaborative leader with a passion for developing teams and fostering innovation.
Location:
Three days a week at a Guardian office in Holmdel, NJ, or Bethlehem, PA.
Salary Range:
$152,290.00 - $250,195.00
The salary range reflected above is a good faith estimate of base pay for the primary location of the position. The salary for this position ultimately will be determined based on the education, experience, knowledge, and abilities of the successful candidate. In addition to salary, this role may also be eligible for annual, sales, or other incentive compensation.
Our Promise
At Guardian, you'll have the support and flexibility to achieve your professional and personal goals. Through skill-building, leadership development and philanthropic opportunities, we provide opportunities to build communities and grow your career, surrounded by diverse colleagues with high ethical standards.
Inspire Well-Being
As part of Guardian's Purpose - to inspire well-being - we are committed to offering contemporary, supportive, flexible, and inclusive benefits and resources to our colleagues. Explore our company benefits at ************************************************
Benefits apply to full-time eligible employees. Interns are not eligible for most Company benefits.
Equal Employment Opportunity
Guardian is an equal opportunity employer. All qualified applicants will be considered for employment without regard to age, race, color, creed, religion, sex, affectional or sexual orientation, national origin, ancestry, marital status, disability, military or veteran status, or any other classification protected by applicable law.
Accommodations
Guardian is committed to providing access, equal opportunity and reasonable accommodation for individuals with disabilities in employment, its services, programs, and activities. Guardian also provides reasonable accommodations to qualified job applicants (and employees) to accommodate the individual's known limitations related to pregnancy, childbirth, or related medical conditions, unless doing so would create an undue hardship. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact *************. Please note: this resource is for accommodation requests only. For all other inquires related to your application and careers at Guardian, refer to the Guardian Careers site.
Visa Sponsorship
Guardian is not currently or in the foreseeable future sponsoring employment visas. In order to be a successful applicant. you must be legally authorized to work in the United States, without the need for employer sponsorship.
Current Guardian Colleagues: Please apply through the internal Jobs Hub in Workday.
Auto-ApplyProduct Security Architect
Security architect job in Monmouth Junction, NJ
RESPONSIBILITIES This position is responsible for designing and implementing software security controls in an implantable neuromodulation system, including: * mobile applications used by physicians and patients, * firmware for implantable pulse generators and communication wands,
* supplemental services, such as cloud-based keystores, continuous deployment pipelines, and mobile device management tools.
PRIMARY ACTIVITIES
* Lead the product security team for Neuromodulation R&D
* Conduct application security assessments, threat modeling, quantitative vulnerability analysis and architecture reviews.
* Work with software development, product management, quality, and regulatory personnel to ensure that LivaNova's product security policies and procedures are fully integrated within our products and services.
* Assist with security testing of products, including internal penetration testing and working with third-party security assessment and pen testing vendors.
* Analyze software, firmware, and hardware for security vulnerabilities and collaborate with developers and infrastructure teams to plan/implement security controls.
* Document compliance of security controls to regulatory guidelines and standards.
* Author externally facing security communications, such as design documents for regulatory bodies, cybersecurity bill of materials, manufacturer disclosure statements.
REQUIREMENTS AND QUALIFICATIONS
* 6+ years of experience in product security in a large organization
* Excellent knowledge of Information Security standards, frameworks, and standard methodologies for product security
* Solid understanding of Cybersecurity with software/application or product development
* Prior experience with threat modeling and hazard-analysis frameworks such as STAMP, STRIDE etc.
* Knowledge of software development lifecycle
* DevSecOps mindset and experience integrating security tools into CI/CD pipelines.
* Experience in making security design trade-offs (e.g.: complexity vs. speed vs. vulnerability).
* Proficiency in writing protocols, reports, and engineering documentation
* Experience working in a regulatory environment
NICE TO HAVE
* Experience in Medical device industry and HIPAA regulations
* BS or MS in Electrical Engineering, Computer Engineering, Computer Science, Biomedical Engineering, or a related field.
Position type: contract to hire
Duration 6 Months CTH
Rate:/Salary: DOE
Location: Anywhere in USA, remote is ok
No Sponsorship
Employee benefits once fulltime :
* Health benefits Medical, Dental, Vision
* Personal and Vacation Time
* Retirement & Savings Plan (401K)
* Employee Stock Purchase Plan
* Training & Education Assistance
* Bonus Referral Program
* Service Awards
* Employee Recognition Program
* Flexible Work Schedules
Security Architect - Cloud & Enterprise Security - Edison NJ
Security architect job in Edison, NJ
Senior Network Security Architect
We are seeking a Senior Network Security Architect with deep expertise in Palo Alto firewalls and GlobalProtect VPN to lead the design, architecture, and implementation of our enterprise network security strategy. This role goes beyond operations - it requires strategic oversight, hands-on architecture, and leadership in building secure, scalable, and resilient environments.
Responsibilities:
Design and architect enterprise network security solutions, with a primary focus on Palo Alto firewalls and GlobalProtect VPN.
Define security standards, frameworks, and roadmaps to ensure scalability, compliance, and resilience.
Lead the evaluation, design, and deployment of next-generation firewall architectures, segmentation strategies, and remote access solutions.
Collaborate with IT, security, and business stakeholders to align network security with organizational goals.
Provide expert-level troubleshooting and guidance for complex firewall and VPN issues.
Mentor and provide technical direction to engineering staff and cross-functional teams.
Evaluate new technologies, tools, and methods to continuously improve the security posture.
Ensure solutions align with compliance standards (NIST, ISO, CIS, etc.).
Qualifications:
10+ years of experience in network security architecture and design.
Hands-on expertise with Palo Alto Networks firewalls and GlobalProtect (must-have).
Proven ability to design and implement secure network architectures in enterprise environments.
Strong understanding of VPNs, secure remote access, and advanced firewall policies.
Familiarity with cloud integrations (Azure, AWS, or GCP) and hybrid security models preferred.
Excellent communication skills - ability to explain complex architectures to both executives and technical teams.
Relevant certifications such as Palo Alto PCNSE, CISSP, or CCNP Security strongly preferred.
Why This Role Matters:
This is not a maintenance role - it's an opportunity to own the strategy and design of enterprise-wide security architecture while still applying deep technical expertise in Palo Alto and GlobalProtect. You'll directly shape how our organization protects its data, people, and infrastructure.
Laurie Roth
President/Sr. Consultant
DSN-IT
************
*************
**************
****************************************************
Easy ApplySAP BO Admin
Security architect job in Princeton, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Preferred
• At least 1 year of experience in software development life cycle.
• At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
• At least 1 year of experience in writing Nested and Complex queries.
• At least 1 year of experience in creating reports using drill down, prompts and variables.
• At least 1year of experience 0n Query Tuning mechanisms.
• Good understanding of Data Warehouse concepts.
• Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
• Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
• Good Analytical Skills
• High impact communication
• Ability to ramp up in new technologies
• Ability to work in team environment with diverse/multiple stakeholders.
• Experience and desire to work in a Global delivery environment.
Qualifications
Qualifications
Basic
• Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Full-Time Permanent
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Detection & Response Security Engineer, Threat Intelligence
Security architect job in Trenton, NJ
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Mgr Information Security - Pen Testing
Security architect job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
:
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
Job Description:
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
Responsibilities:
Vendor Management: Manage and coordinate penetration testing engagements with vendors.
People Management: Manage a team of Junior level penetration testers and their development.
DAST: Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
Facilitate Penetration Tests: Perform thorough and methodical penetration testing.
Evaluate and Assign: penetration tests to appropriate resources.
Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
Develop Test Procedures: Design and execute detailed test requirements.
Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
Incidents: Act as a testing SME on incident calls; support testers on the calls.
Depth & Scope:
Advanced knowledge of Bank, technology standards and managing people / projects
Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Preferred Qualifications :
Technical Skills:
Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
Penetration testing, DAST, Manual Code Review knowledge.
Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
Organizational Skills: Manage documents and procedures for testing team.
Multi-tasking: This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
Familiarity with security standards and frameworks.
Previous experience managing and developing teams.
Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
#TDCyberSecurity #Hybrid
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplySenior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id
***********************
and contact no is
**************.
Easy ApplyInformation Security Manager
Security architect job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Engineer, Information Security and Risk
Security architect job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Chief Information Security Officer (CISO)
Security architect job in Iselin, NJ
Job Description
1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up.
About the Role
We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement.
Key Responsibilities
Security Operations Leadership (Primary Focus)
Design, implement, and manage a comprehensive security operations infrastructure
Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions
Build and optimize security monitoring, incident response, and threat detection capabilities
Drive automation initiatives to eliminate manual inefficiencies in security processes
Compliance and Risk Management
Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks
Partner with business analysts to navigate regulatory requirements and audits
Develop and maintain security policies, procedures, and documentation
Manage security risk assessments and remediation programs
Technical Security Architecture
Secure cloud infrastructure across AWS, Google Cloud, and other platforms
Integrate security into CI/CD pipelines, working closely with DevOps teams
Implement and manage security tools (CrowdStrike, etc.) across the organization
Conduct hands-on security reviews of architecture and code
Cross-functional Collaboration
Partner directly with development and engineering teams on secure software development
Oversee internal IT security (smaller component of role)
Communicate security initiatives and status to leadership and stakeholders
Coordinate with global teams to ensure consistent security practices
Requirements
Required Qualifications
Technical Expertise
Minimum 7+ years in security operations with demonstrated hands-on experience
Deep expertise in cloud security (AWS, Google Cloud, Azure)
Proven ability to personally deploy and configure enterprise security tools
Strong understanding of modern DevOps practices and CI/CD security integration
Experience with security automation and orchestration
Compliance and Governance
Hands-on experience with FedRAMP certification processes
Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications
Understanding of regulatory compliance requirements and audit processes
Leadership and Communication
Experience leading security initiatives in fast-growing organizations
Strong communication skills for collaborating with global, distributed teams
Ability to translate technical security concepts for various stakeholders
Comfortable working in a startup environment with evolving requirements
Preferred Qualifications
Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization
Experience in identity management or authentication technologies
Background in both security operations and security engineering
Previous startup or scale-up experience
Located in or willing to work EST hours (strong preference for NY/NJ area)
Public-facing CISO experience (client communications) is a plus but not required
What We're NOT Looking For
Pure policy/governance executives without hands-on technical skills
Traditional "big company" CISOs focused only on strategy and presentations
Candidates who expect to delegate all technical work from day one
Security leaders who haven't maintained current technical skills
Benefits
What We Offer
Opportunity to build and shape security at a growing startup
Direct impact on product and company security posture
Collaborative environment with talented engineering teams
Competitive compensation and equity package
Flexible work arrangements with preference for hybrid in NY/NJ area
Chief Information Security Officer
Security architect job in New Brunswick, NJ
SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
5. Develop and manage information security budgets and monitor them for variances.
6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance.
11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.
20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.
21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.
22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management
24. Perform related duties and fulfill responsibilities as required.
Requirements:
1. A Master's degree in Business Administration or a Technology related field.
2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role.
3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.
4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST.
5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations.
6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals.
7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical.
8. Strong problem-solving and analytical skills to identify and mitigate potential security risks.
Salary Range: 133,715.00 - 220,639.00 USD
We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials.
The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status.
Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards.
You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
Mgr Information Security - Pen Testing
Security architect job in Mount Laurel, NJ
Mount Laurel, New Jersey, United States of America **Hours:** 40 **Pay Details:** $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
**Line of Business:**
Technology Solutions
**:**
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
**Job Description:**
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
**Responsibilities:**
+ **Vendor Management:** Manage and coordinate penetration testing engagements with vendors.
+ **People Management:** Manage a team of Junior level penetration testers and their development.
+ **DAST:** Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
+ **Facilitate Penetration Tests:** Perform thorough and methodical penetration testing.
+ **Evaluate and Assign:** penetration tests to appropriate resources.
+ **Vulnerability Assessment:** Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
+ **Report Findings:** Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
+ **Develop Test Procedures:** Design and execute detailed test requirements.
+ **Stay Current:** Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
+ **Collaborate with Teams:** Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
+ **Perform Risk Assessments:** Evaluate and assess potential security risks related to new and existing systems and technologies.
+ **Compliance:** Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
+ **Incidents:** Act as a testing SME on incident calls; support testers on the calls.
**Depth & Scope:**
+ Advanced knowledge of Bank, technology standards and managing people / projects
+ Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
+ Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
**Education & Experience:**
+ Bachelor's degree preferred
+ Information security certification / accreditation an asset
+ 7+ years of relevant experience
**Preferred Qualifications :**
+ **Technical Skills:**
+ Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
+ Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
+ Penetration testing, DAST, Manual Code Review knowledge.
+ **Analytical Skills:** Strong analytical and problem-solving abilities with attention to detail.
+ **Organizational Skills:** Manage documents and procedures for testing team.
+ **Multi-tasking** : This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
+ **Communication:** Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
+ **Ethical Standards:** Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
+ Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
+ Familiarity with security standards and frameworks.
+ Previous experience managing and developing teams.
+ **Certifications:** Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
+ Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
+ Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
\#TDCyberSecurity #Hybrid
**Physical Requirements:**
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
+ Domestic Travel - Occasional
+ International Travel - Never
+ Performing sedentary work - Continuous
+ Performing multiple tasks - Continuous
+ Operating standard office equipment - Continuous
+ Responding quickly to sounds - Occasional
+ Sitting - Continuous
+ Standing - Occasional
+ Walking - Occasional
+ Moving safely in confined spaces - Occasional
+ Lifting/Carrying (under 25 lbs.) - Occasional
+ Lifting/Carrying (over 25 lbs.) - Never
+ Squatting - Occasional
+ Bending - Occasional
+ Kneeling - Never
+ Crawling - Never
+ Climbing - Never
+ Reaching overhead - Never
+ Reaching forward - Occasional
+ Pushing - Never
+ Pulling - Never
+ Twisting - Never
+ Concentrating for long periods of time - Continuous
+ Applying common sense to deal with problems involving standardized situations - Continuous
+ Reading, writing and comprehending instructions - Continuous
+ Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
**Who We Are:**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more (***************************************
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at *************** . Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Security Engineer - Job ID 3067
Security architect job in Bridgewater, NJ
Your business and your customers need to confidently access and exchange information simply, seamlessly and securely. iconectiv's extensive experience in information services, digital identity and numbering intelligence helps you do just that. In fact, more than 5K customers rely on our data exchange platforms each day to keep their networks, devices and applications connected and 2B consumers and businesses protected. Our cloud-based information as a service network and operations management and numbering solutions span trusted communications, digital identity management and fraud prevention. For more information, visit ***************** . Follow us on X and Linkedln.
**Responsibilities:**
Your role as the Security Engineer will include platform Security Monitoring and Analytics; overseeing and performing Security Engineering tasks and functions; and developing and maintaining application security services for lab and production environments, which support number porting services for the NPAC (Number Porting Administration Center). In addition, the candidate will be responsible for securing existing systems and applications; evaluating the security for 3 rd party applications, host systems, development software, devices, and technologies for vulnerabilities; and developing requirements for related security solutions. Candidate must develop a thorough understanding of the solution (platform, application, and processes being developed and implemented) to fully meet the technical requirements of the position.
**In addition, you will have the following responsibilities:**
+ Have the capacity to evolve to technical lead for the NPAC Security Operations team
+ Maintain highly visible "hands on" profile
+ Design and implement a continuous process improvement program for security engineering tasks
+ Perform Security Monitoring using SIEM, HIDS and IPS
+ Perform Security Incident Response Process (SIRP)
+ SIEM rule parsing development and testing
+ WAF Policy development, implementation, testing and maintenance
+ HIDS alert development, testing and implementation
+ Perform CCURE System Application Administration, Maintenance and Management
+ Manage and Maintain Physical Security Devices - Cameras, NVRs, Card Readers and Door Controller
+ Perform Security Threat Vulnerability evaluations and remediations
+ Collaborate with, and serve as the technical security representative to other teams as needed to include, but not limited to: Operations, Product Engineering, Quality Assurance, Program Management, and Software Development
+ Develop, enhance, and execute documented procedures for security related tasks, and ensure the overall availability of the security infrastructure
+ Communicate with the executive team, the business clients and the implementation teams on status, experiences, lessons learned, and on-going needs
**Skills and Qualifications:**
+ Bachelors in Computer Science, Information Management Systems and/or Cybersecurity or significant IT and Security work experience (5+ years)
+ At least 5 years' experience in designing, managing, or supporting data center or enterprise security systems and monitoring
+ Security and IT certifications are a plus
+ Experience with intrusion detection and protection systems, network security, segmentation, and management - SIEM, HIDS and IPS knowledge are a plus
+ Knowledge and experience with Linux OS, Solaris OS, Windows OS, and Scripting (Python, etc.)
+ Knowledge and experience with IT service and security operations and management
+ Superb troubleshooting, problem determination and resolution skills required
+ Ability to translate business and regulatory security requirements into product deployment and operational processes
+ Experience designing and operating network security systems and controls for medium to large enterprises
+ Previous participation in a complete, ground-up product deployment
+ Strong organizational skills, attention to detail and the ability to handle multiple projects simultaneously while meeting deadlines
+ **US Citizenship Required**
At iconectiv, we expect to pay between $79k- $113k for this role. This role is eligible for variable pay (bonus). The final pay offered to a successful candidate will be dependent on several factors that may include, but are not limited to, the type and years of experience within the job, the type of years and experience within the industry, education, skills, abilities and geographic region.
**Benefits:** On the first of the month following date of hire, employees working more than 30 hours/week are eligible for medical, dental, vision, disability (short and long term) and basic and supplemental life insurances. Employees will be eligible to participate in our Company's 401k plan and will be eligible for Company Matching and Automatic Contributions. Employees will also receive annual allotments of paid time off in the form of Vacation Days, Floating Holidays, Personal Business Days, a Volunteer Day, as well as paid holidays and paid sick leave.
DISCLAIMER: The above statements are intended to describe the general nature and level of work being performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and skills required of employees assigned to this position. Therefore, employees assigned may be required to perform additional job tasks required by the manager.
We are proud to be an EOE Minorities/Females/Protected Veterans/Disabled employer. The Company's status is a VEVRAA Federal Contractor. Request Priority Protected Veteran Referrals. We maintain a drug-free workplace and perform pre-employment substance abuse testing.
SAP BO Administrator
Security architect job in Pennington, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
At least 1 year of experience in software development life cycle.
At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
At least 1 year of experience in writing Nested and Complex queries.
At least 1 year of experience in creating reports using drill down, prompts and variables.
At least 1year of experience 0n Query Tuning mechanisms.
Good understanding of Data Warehouse concepts.
Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
Good Analytical Skills
High impact communication
Ability to ramp up in new technologies
Ability to work in team environment with diverse/multiple stakeholders.
Experience and desire to work in a Global delivery environment.
Qualifications
Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
. We are unable to sponsor at this time.
Note:-
This is a Full-Time Permanent job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD, H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your Visa Status in your email or resume.
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id *********************** and contact no is **************.
Easy ApplyInformation Security Manager
Security architect job in East Brunswick, NJ
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
7-10+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Chief Information Security Officer (CISO)
Security architect job in Iselin, NJ
1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up.
About the Role
We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement.
Key Responsibilities
Security Operations Leadership (Primary Focus)
Design, implement, and manage a comprehensive security operations infrastructure
Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions
Build and optimize security monitoring, incident response, and threat detection capabilities
Drive automation initiatives to eliminate manual inefficiencies in security processes
Compliance and Risk Management
Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks
Partner with business analysts to navigate regulatory requirements and audits
Develop and maintain security policies, procedures, and documentation
Manage security risk assessments and remediation programs
Technical Security Architecture
Secure cloud infrastructure across AWS, Google Cloud, and other platforms
Integrate security into CI/CD pipelines, working closely with DevOps teams
Implement and manage security tools (CrowdStrike, etc.) across the organization
Conduct hands-on security reviews of architecture and code
Cross-functional Collaboration
Partner directly with development and engineering teams on secure software development
Oversee internal IT security (smaller component of role)
Communicate security initiatives and status to leadership and stakeholders
Coordinate with global teams to ensure consistent security practices
Requirements
Required Qualifications
Technical Expertise
Minimum 7+ years in security operations with demonstrated hands-on experience
Deep expertise in cloud security (AWS, Google Cloud, Azure)
Proven ability to personally deploy and configure enterprise security tools
Strong understanding of modern DevOps practices and CI/CD security integration
Experience with security automation and orchestration
Compliance and Governance
Hands-on experience with FedRAMP certification processes
Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications
Understanding of regulatory compliance requirements and audit processes
Leadership and Communication
Experience leading security initiatives in fast-growing organizations
Strong communication skills for collaborating with global, distributed teams
Ability to translate technical security concepts for various stakeholders
Comfortable working in a startup environment with evolving requirements
Preferred Qualifications
Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization
Experience in identity management or authentication technologies
Background in both security operations and security engineering
Previous startup or scale-up experience
Located in or willing to work EST hours (strong preference for NY/NJ area)
Public-facing CISO experience (client communications) is a plus but not required
What We're NOT Looking For
Pure policy/governance executives without hands-on technical skills
Traditional "big company" CISOs focused only on strategy and presentations
Candidates who expect to delegate all technical work from day one
Security leaders who haven't maintained current technical skills
Benefits
What We Offer
Opportunity to build and shape security at a growing startup
Direct impact on product and company security posture
Collaborative environment with talented engineering teams
Competitive compensation and equity package
Flexible work arrangements with preference for hybrid in NY/NJ area
Auto-Apply