Information Security Architect
Security architect job in Philadelphia, PA
Job Description
We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices.
This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
To be Successful in this Role
Develop an architectural vision to support the continued growth of the product suite
Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use
Experience with privacy-enhancing technologies and encryption techniques.
Working knowledge of cloud security architecture strategies, frameworks, and reference models
Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives
Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management
Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc.
Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure
Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design.
Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture
Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward.
Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans.
Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally
Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security.
Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment.
Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives.
Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs
Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components.
You Will Have
8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture
Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.)
Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations.
Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics.
Hands-on experience with Cloud Technologies AWS, Azure & GCP
Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks
Experience in managing and contributing to incident response
Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation.
Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
Azure Cloud Security Architect - ONSITE Branchburg, NJ
Security architect job in Branchburg, NJ
Financial Resources FCU has been designated one of the Best Places to Work in NJ since 2022! At FRFCU, we are "putting people first" and that starts with our employees! Come see why our team members have voted us for Best Places to Work in NJ for 4 consecutive years!
Financial Resources is a not-for-profit federal credit union with locations in Somerset, Hunterdon, Middlesex, Hudson and Union Counties. With a history of serving our members for more than 100 years, we have grown to more than $650 million in assets serving more than 29,000 members with 6 public access branches and a team of 100 employees. We are available Nationwide!
Financial Resources Federal Credit Union (FRFCU) is looking for an Azure Cloud Security Architect to join our Information Technology team in making a difference in peoples' lives and helping us achieve our digital transformation goals! THIS POSITION IS LOCATED ON SITE IN BRANCHBURG, NJ.
The Azure Cloud Security Architect will lead the design and implementation of secured cloud solutions and data lakes across our financial services cloud infrastructure. This person is critical in deploying solutions on the cloud with ensuring the confidentiality, integrity and availability of sensitive data while maintaining compliance with industry regulations such as FFIEC, PCI-DSS and GLBA.
We are looking for someone who exemplifies the following traits:
Caring
Initiative
Ethics
Job Knowledge
Self-Development
Teamwork
Results Driven
Problem Solving
Communication
Leadership
Some of your essential duties will include, but are not limited to:
Design and deploy secure Azure cloud architectures for financial applications and data platforms.
Develop and enforce security policies, standards, and procedures aligned with financial regulatory frameworks.
Lead risk assessments, threat modeling, and vulnerability management across cloud environments.
Integrate Zero Trust principles, identity and access management (IAM), and encryption strategies.
Collaborate with IT, network, risk and audit teams to ensure regulatory alignment and compliance.
Implement and manage SIEM, SOAR, and cloud-native security tools (e.g., Microsoft Defender for Cloud, Sentinel).
Collaborate with IT team to deploy and maintain Azure virtual desktops.
Provide oversight for DevSecOps practices, embedding security into CI/CD pipelines.
Respond to and investigate security incidents, ensuring rapid containment and remediation.
Conduct security awareness training and provide guidance to engineering and operations teams.
Collaborate with the credit union's network and IT teams during build out of resources on the cloud
Collaborate with the credit union's Data Operations and Automation team to build data resources and pipelines on the cloud
What we offer to our team members:
Work Life Balance Programs that includes a 4 Day Work Week and Hybrid work environment after satisfactory completion of your training period
A competitive salary
Generous paid time off
Health, dental and vision plans for employees and their families
Health Savings and Flex Spending Accounts
Paid Parental Leave Programs
Short and Long-Term Disability Programs
Company provided life insurance and low-cost supplemental insurance plans
401K with 100% employer match, up to 6%, after one year and potential for additional profit-sharing contributions
Paid volunteer days
Opportunities for career advancement with continuous learning and development
Tuition reimbursement
We ask that you have:
Bachelor's Degree in Cybersecurity, Computer Science, Engineering, related field. MS degree will be a plus, but not required
Minimum 4+ years of experience in infrastructure as code (IaC) - such as Terraform, Bicep and ARM
7+ years of experience in cloud architecture and security with 3+ years focused on Azure in financial services
Deep coding and scripting experience in Python, SQL, KQL and Powershell
Strong knowledge in building and securing CI/CD pipelines for cloud infrastructure and digital platforms
Experience in software development lifecycle (SDLC) is preferred
Deep knowledge of Azure security services including Azure Firewalls, Bastion, Key Vault, Log Analytics, Route Tables, Network Security Groups, Security Center, Sentinel and Azure Policies
Previous experience in deploying and maintaining enterprise grade of Azure virtual desktops (AVD) is preferred
Strong understanding of financial compliance standards (e.g., SOX, GLBA, PCI-DSS, FFIEC)
Experience with network security, IAM, encryption and secure data architecture
Certifications such as AZ-500, CISSP, CCSP OR CISM are preferred
Familiarity with hybrid cloud and multi-cloud environments preferred
Experience with container security (AKS, Kubernetes) preferred
Background in incident response and digital forensics preferred
Knowledge of data loss prevention (DLP) and endpoint protection in cloud environments preferred
If you want to work in a friendly environment and with an organization that is looking to expand its footprint, please consider applying for this opportunity.
Auto-ApplyAzure Cloud Security Architect - ONSITE Branchburg, NJ
Security architect job in Branchburg, NJ
Financial Resources FCU has been designated one of the Best Places to Work in NJ since 2022! At FRFCU, we are "putting people first" and that starts with our employees! Come see why our team members have voted us for Best Places to Work in NJ for 4 consecutive years!
Financial Resources is a not-for-profit federal credit union with locations in Somerset, Hunterdon, Middlesex, Hudson and Union Counties. With a history of serving our members for more than 100 years, we have grown to more than $650 million in assets serving more than 29,000 members with 6 public access branches and a team of 100 employees. We are available Nationwide!
Financial Resources Federal Credit Union (FRFCU) is looking for an Azure Cloud Security Architect to join our Information Technology team in making a difference in peoples' lives and helping us achieve our digital transformation goals! THIS POSITION IS LOCATED ON SITE IN BRANCHBURG, NJ.
The Azure Cloud Security Architect will lead the design and implementation of secured cloud solutions and data lakes across our financial services cloud infrastructure. This person is critical in deploying solutions on the cloud with ensuring the confidentiality, integrity and availability of sensitive data while maintaining compliance with industry regulations such as FFIEC, PCI-DSS and GLBA.
We are looking for someone who exemplifies the following traits:
Caring
Initiative
Ethics
Job Knowledge
Self-Development
Teamwork
Results Driven
Problem Solving
Communication
Leadership
Some of your essential duties will include, but are not limited to:
Design and deploy secure Azure cloud architectures for financial applications and data platforms.
Develop and enforce security policies, standards, and procedures aligned with financial regulatory frameworks.
Lead risk assessments, threat modeling, and vulnerability management across cloud environments.
Integrate Zero Trust principles, identity and access management (IAM), and encryption strategies.
Collaborate with IT, network, risk and audit teams to ensure regulatory alignment and compliance.
Implement and manage SIEM, SOAR, and cloud-native security tools (e.g., Microsoft Defender for Cloud, Sentinel).
Collaborate with IT team to deploy and maintain Azure virtual desktops.
Provide oversight for DevSecOps practices, embedding security into CI/CD pipelines.
Respond to and investigate security incidents, ensuring rapid containment and remediation.
Conduct security awareness training and provide guidance to engineering and operations teams.
Collaborate with the credit union's network and IT teams during build out of resources on the cloud
Collaborate with the credit union's Data Operations and Automation team to build data resources and pipelines on the cloud
What we offer to our team members:
Work Life Balance Programs that includes a 4 Day Work Week and Hybrid work environment after satisfactory completion of your training period
A competitive salary
Generous paid time off
Health, dental and vision plans for employees and their families
Health Savings and Flex Spending Accounts
Paid Parental Leave Programs
Short and Long-Term Disability Programs
Company provided life insurance and low-cost supplemental insurance plans
401K with 100% employer match, up to 6%, after one year and potential for additional profit-sharing contributions
Paid volunteer days
Opportunities for career advancement with continuous learning and development
Tuition reimbursement
We ask that you have:
Bachelor's Degree in Cybersecurity, Computer Science, Engineering, related field. MS degree will be a plus, but not required
Minimum 4+ years of experience in infrastructure as code (IaC) - such as Terraform, Bicep and ARM
7+ years of experience in cloud architecture and security with 3+ years focused on Azure in financial services
Deep coding and scripting experience in Python, SQL, KQL and Powershell
Strong knowledge in building and securing CI/CD pipelines for cloud infrastructure and digital platforms
Experience in software development lifecycle (SDLC) is preferred
Deep knowledge of Azure security services including Azure Firewalls, Bastion, Key Vault, Log Analytics, Route Tables, Network Security Groups, Security Center, Sentinel and Azure Policies
Previous experience in deploying and maintaining enterprise grade of Azure virtual desktops (AVD) is preferred
Strong understanding of financial compliance standards (e.g., SOX, GLBA, PCI-DSS, FFIEC)
Experience with network security, IAM, encryption and secure data architecture
Certifications such as AZ-500, CISSP, CCSP OR CISM are preferred
Familiarity with hybrid cloud and multi-cloud environments preferred
Experience with container security (AKS, Kubernetes) preferred
Background in incident response and digital forensics preferred
Knowledge of data loss prevention (DLP) and endpoint protection in cloud environments preferred
If you want to work in a friendly environment and with an organization that is looking to expand its footprint, please consider applying for this opportunity.
Auto-ApplyChief Information Security Officer
Security architect job in Camden, NJ
Since 1869, we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Cape Cod, Chunky, Goldfish, Kettle Brand, Lance, Late July, Pacific Foods, Pepperidge Farm, Prego, Pace, Rao's Homemade, Snack Factory, Snyder's of Hanover. Swanson, and V8.
Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us.
Why Campbell's…
* Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners).
* Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting.
* Campbell's offers unlimited sick time along with paid time off and holiday pay.
* If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store.
* Giving back to the communities where our employees work and live is very important to Campbell's. Our "Campbell's Cares" program matches employee donations and/or volunteer activity up to $1,500 annually.
* Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
Chief Information Security Officer
How you will make history here…
The Chief Information Security Officer (CISO) reports to the Chief Digital & Technology Officer and is responsible for enhancing and maintaining the information security program to ensure that information assets and associated technology, applications, systems, infrastructure and processes are adequately protected in the digital ecosystem in which we operate. The CISO is responsible for identifying, evaluating and reporting on legal and regulatory, IT, and cybersecurity risk to information assets, while supporting and advancing business objectives.
The CISO position requires a visionary leader with sound knowledge of business management and a working knowledge of cybersecurity technologies covering the corporate network as well as the broader digital ecosystem. The CISO will proactively work with business segments, corporate functions and ecosystem partners to implement practices that meet agreed-on policies and standards for information security. He or she should deeply understand IT and must oversee a variety of cybersecurity and risk management activities related to IT to ensure the achievement of business outcomes where the business process is dependent on technology. The CISO will be responsible for implementing and running the enterprise information security program.
The CISO should understand and articulate the impact of cybersecurity on (digital) business, and be able to communicate this to the board of directors and other senior stakeholders. He or she serves as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by the business in compliance with regulatory requirements. The CISO understands that securing information assets and associated technology, applications, systems and processes in the wider ecosystem in which the organization operates is as important as protecting information within the organization's perimeter. A key element of the CISO's role is working with executive management to determine acceptable levels of risk for the organization.
The CISO must be knowledgeable about both internal and external business environments, and ensure that information systems are maintained in a fully functional and secure mode and are compliant with legal, regulatory and contractual obligations. The ideal candidate is a thought leader, a builder of consensus and of bridges between business and technology. He or she is an integrator of people, process and technology. While the CISO is the leader of the information security program, he or she must also be able to coordinate disparate drivers, constraints and personalities, while maintaining objectivity and a strong understanding that cybersecurity is foundational for the organization to deliver on its business goals and objectives. Ultimately, the CISO is a business leader, and should have a track record of competency in the field of information security and/or risk management, with 15 years of relevant experience, including five years in a significant leadership role.
What you will do…
Responsibilities
* Facilitate an information security governance structure through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
* Provide regular reporting on the current status of the information security program to the CIO, enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program, thus supporting business outcomes.
* Work with the vendor management office to ensure that information security requirements are included in contracts by liaising with vendor management and procurement organizations.
* Create and manage a targeted information security awareness training program for all employees, contractors and approved system users, and establish metrics to measure the effectiveness of this security training program for the different audiences.
* Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including privacy, risk management, compliance and business continuity management.
* Provide clear risk mitigating directives for projects with components in IT, including the mandatory application of controls.
* Lead the security champion program to mobilize employees in all locations.
* Lead the information security function across the company to ensure consistent and high-quality information security management in support of the business goals.
* Determine the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of nondigital risk areas.
* Manage the budget for the information security function, monitoring and reporting discrepancies.
* Manage the cost-efficient information security organization, consisting of direct reports and dotted line reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
* Develop an information security vision and strategy that is aligned to organizational priorities and enables and facilitates the organization's business objectives, and ensure senior stakeholder buy-in and mandate.
* Develop, implement and monitor a strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy and recovery of information assets owned, controlled or/and processed by the organization.
* Assist with the identification of non-IT managed IT services in use ("shadow IT") and facilitate a corporate IT onboarding program to bring these services into the scope of the IT function, and apply standard controls and rigor to these services; where this is not possible, ensure that risk is reduced to the appropriate levels and ownership of this information security risk is clear.
* Work effectively with business units to facilitate information security risk assessment and risk management processes, and empower them to own and accept the level of risk they deem appropriate for their specific risk appetite.
* Develop and enhance an up-to-date information security management framework based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
* Create and manage a unified and flexible control framework to integrate and normalize the wide variety and ever-changing requirements resulting from global laws, standards and regulations.
* Develop and maintain a document framework of continuously up-to-date information security policies, standards and guidelines. Oversee the approval and publication of these information security policies and practices.
* Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection of information assets.
* Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the information security, and review it with stakeholders at the executive and board levels.
* Provide input for the IT section of the company's code of conduct.
* Create the necessary internal networks among the information security team and line-of-business executives, corporate compliance, audit, physical security, legal and HR management teams to ensure alignment as required.
* Build and nurture external networks consisting of industry peers, ecosystem partners, vendors and other relevant parties to address common trends, findings, incidents and cybersecurity risks.
* Liaise with external agencies, such as law enforcement and other advisory bodies, as necessary, to ensure that the organization maintains a strong security posture and is kept well-abreast of the relevant threats identified by these agencies.
* Liaise with the enterprise architecture team to build alignment between the security and enterprise (reference) architectures, thus ensuring that information security requirements are implicit in these architectures and security is built in by design.
* Create a risk-based process for the assessment and mitigation of any information security risk in your ecosystem consisting of supply chain partners, vendors, consumers and any other third parties.
* Work with the compliance staff to ensure that all information owned, collected or controlled by or on behalf of the company is processed and stored in accordance with applicable laws and other global regulatory requirements, such as data privacy.
* Collaborate and liaise with the data privacy officer to ensure that data privacy requirements are included where applicable.
* Define and facilitate the processes for information security risk and for legal and regulatory assessments, including the reporting and oversight of treatment efforts to address negative findings.
* Ensure that security is embedded in the project delivery process by providing the appropriate information security policies, practices and guidelines.
* Oversee technology dependencies outside of direct organizational control. This includes reviewing contracts and the creation of alternatives for managing risk.
* Manage and contain information security incidents and events to protect corporate IT assets, intellectual property, regulated data and the company's reputation.
* Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action.
* Develop and oversee effective disaster recovery policies and standards to align with the enterprise business continuity management (BCM) program goals, with the realization that components supporting primary business processes may be outside the corporate perimeter.
* Coordinate the development of implementation of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event; provide direction, support and in-house consulting in these areas.
* Facilitate and support the development of asset inventories, including information assets in cloud services and in other parties in the organization's ecosystem.
Who you will work with…
* Report to the Chief Digital & Technology Officer
* 4 Direct Reports & Team size of 30
* External Vendor Management
What you bring to the table… (Must Have)
Skills and Knowledge
* Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as applied experience on NIST, including 800-53 and Cybersecurity Framework
* Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate information security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists
* Strategic leader and builder of both vision and bridges, and able to energize the appropriate teams in the organization
* Sound knowledge of business management and a working knowledge of information security risk management and cybersecurity technologies
* Up-to-date knowledge of methodologies and trends in both business and IT
* Poise and ability to act calmly and competently in high-pressure, high-stress situations
* Must be a critical thinker, with strong problem-solving skills
* Excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
* Project management skills: financial/budget management, scheduling and resource management
* Ability to lead and motivate the information security team to achieve tactical and strategic goals, even when only "dotted line" reporting lines exist
* A master of influencing entities and decisions in situations where no formal reporting structures exist, but achieving the desirable outcome is vital
* Experience with contract and vendor negotiations
* Excellent stakeholder management skills
* High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
* High degree of initiative, dependability and ability to work with little supervision while being resilient to change
Experience
* Degree in information technology-related field and a minimum of 15 years of experience in a combination of risk management, information security and IT or OT jobs (at least five must be in a senior leadership role)
* Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic business environment
* Professional security management certification is required, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials
Compensation and Benefits:
The target base salary range for this full-time, salaried position is between
$259,000-$372,300
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplyChief Information Security Officer
Security architect job in Camden, NJ
Since 1869, we've connected people through food they love. We're proud to be stewards of amazing brands that people trust. Our portfolio includes the iconic Campbell's brand, as well as Cape Cod, Chunky, Goldfish, Kettle Brand, Lance, Late July, Pacific Foods, Pepperidge Farm, Prego, Pace, Rao's Homemade, Snack Factory, Snyder's of Hanover. Swanson, and V8.
Here, you will make a difference every day. You will be supported to build a rewarding career with opportunities to grow, innovate and inspire. Make history with us.
Why Campbell's…
Benefits begin on day one and include medical, dental, short and long-term disability, AD&D, and life insurance (for individual, families, and domestic partners).
Employees are eligible for our matching 401(k) plan and can enroll on the first day of employment with immediate vesting.
Campbell's offers unlimited sick time along with paid time off and holiday pay.
If in WHQ - free access to the fitness center. Access to on-site day care (operated by Bright Horizons) and company store.
Giving back to the communities where our employees work and live is very important to Campbell's. Our “Campbell's Cares” program matches employee donations and/or volunteer activity up to $1,500 annually.
Campbell's has a variety of Employee Resource Groups (ERGs) to support employees.
Chief Information Security Officer
How you will make history here…
The Chief Information Security Officer (CISO) reports to the Chief Digital & Technology Officer and is responsible for enhancing and maintaining the information security program to ensure that information assets and associated technology, applications, systems, infrastructure and processes are adequately protected in the digital ecosystem in which we operate. The CISO is responsible for identifying, evaluating and reporting on legal and regulatory, IT, and cybersecurity risk to information assets, while supporting and advancing business objectives.
The CISO position requires a visionary leader with sound knowledge of business management and a working knowledge of cybersecurity technologies covering the corporate network as well as the broader digital ecosystem. The CISO will proactively work with business segments, corporate functions and ecosystem partners to implement practices that meet agreed-on policies and standards for information security. He or she should deeply understand IT and must oversee a variety of cybersecurity and risk management activities related to IT to ensure the achievement of business outcomes where the business process is dependent on technology. The CISO will be responsible for implementing and running the enterprise information security program.
The CISO should understand and articulate the impact of cybersecurity on (digital) business, and be able to communicate this to the board of directors and other senior stakeholders. He or she serves as the process owner of the appropriate second-line assurance activities not only related to confidentiality, integrity and availability, but also to the safety, privacy and recovery of information owned or processed by the business in compliance with regulatory requirements. The CISO understands that securing information assets and associated technology, applications, systems and processes in the wider ecosystem in which the organization operates is as important as protecting information within the organization's perimeter. A key element of the CISO's role is working with executive management to determine acceptable levels of risk for the organization.
The CISO must be knowledgeable about both internal and external business environments, and ensure that information systems are maintained in a fully functional and secure mode and are compliant with legal, regulatory and contractual obligations. The ideal candidate is a thought leader, a builder of consensus and of bridges between business and technology. He or she is an integrator of people, process and technology. While the CISO is the leader of the information security program, he or she must also be able to coordinate disparate drivers, constraints and personalities, while maintaining objectivity and a strong understanding that cybersecurity is foundational for the organization to deliver on its business goals and objectives. Ultimately, the CISO is a business leader, and should have a track record of competency in the field of information security and/or risk management, with 15 years of relevant experience, including five years in a significant leadership role.
What you will do…
Responsibilities
• Facilitate an information security governance structure through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
• Provide regular reporting on the current status of the information security program to the CIO, enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program, thus supporting business outcomes.
• Work with the vendor management office to ensure that information security requirements are included in contracts by liaising with vendor management and procurement organizations.
• Create and manage a targeted information security awareness training program for all employees, contractors and approved system users, and establish metrics to measure the effectiveness of this security training program for the different audiences.
• Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including privacy, risk management, compliance and business continuity management.
• Provide clear risk mitigating directives for projects with components in IT, including the mandatory application of controls.
• Lead the security champion program to mobilize employees in all locations.
• Lead the information security function across the company to ensure consistent and high-quality information security management in support of the business goals.
• Determine the information security approach and operating model in consultation with stakeholders and aligned with the risk management approach and compliance monitoring of nondigital risk areas.
• Manage the budget for the information security function, monitoring and reporting discrepancies.
• Manage the cost-efficient information security organization, consisting of direct reports and dotted line reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
• Develop an information security vision and strategy that is aligned to organizational priorities and enables and facilitates the organization's business objectives, and ensure senior stakeholder buy-in and mandate.
• Develop, implement and monitor a strategic, comprehensive information security program to ensure appropriate levels of confidentiality, integrity, availability, safety, privacy and recovery of information assets owned, controlled or/and processed by the organization.
• Assist with the identification of non-IT managed IT services in use ("shadow IT") and facilitate a corporate IT onboarding program to bring these services into the scope of the IT function, and apply standard controls and rigor to these services; where this is not possible, ensure that risk is reduced to the appropriate levels and ownership of this information security risk is clear.
• Work effectively with business units to facilitate information security risk assessment and risk management processes, and empower them to own and accept the level of risk they deem appropriate for their specific risk appetite.
• Develop and enhance an up-to-date information security management framework based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
• Create and manage a unified and flexible control framework to integrate and normalize the wide variety and ever-changing requirements resulting from global laws, standards and regulations.
• Develop and maintain a document framework of continuously up-to-date information security policies, standards and guidelines. Oversee the approval and publication of these information security policies and practices.
• Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection of information assets.
• Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the information security, and review it with stakeholders at the executive and board levels.
• Provide input for the IT section of the company's code of conduct.
• Create the necessary internal networks among the information security team and line-of-business executives, corporate compliance, audit, physical security, legal and HR management teams to ensure alignment as required.
• Build and nurture external networks consisting of industry peers, ecosystem partners, vendors and other relevant parties to address common trends, findings, incidents and cybersecurity risks.
• Liaise with external agencies, such as law enforcement and other advisory bodies, as necessary, to ensure that the organization maintains a strong security posture and is kept well-abreast of the relevant threats identified by these agencies.
• Liaise with the enterprise architecture team to build alignment between the security and enterprise (reference) architectures, thus ensuring that information security requirements are implicit in these architectures and security is built in by design.
• Create a risk-based process for the assessment and mitigation of any information security risk in your ecosystem consisting of supply chain partners, vendors, consumers and any other third parties.
• Work with the compliance staff to ensure that all information owned, collected or controlled by or on behalf of the company is processed and stored in accordance with applicable laws and other global regulatory requirements, such as data privacy.
• Collaborate and liaise with the data privacy officer to ensure that data privacy requirements are included where applicable.
• Define and facilitate the processes for information security risk and for legal and regulatory assessments, including the reporting and oversight of treatment efforts to address negative findings.
• Ensure that security is embedded in the project delivery process by providing the appropriate information security policies, practices and guidelines.
• Oversee technology dependencies outside of direct organizational control. This includes reviewing contracts and the creation of alternatives for managing risk.
• Manage and contain information security incidents and events to protect corporate IT assets, intellectual property, regulated data and the company's reputation.
• Monitor the external threat environment for emerging threats, and advise relevant stakeholders on the appropriate courses of action.
• Develop and oversee effective disaster recovery policies and standards to align with the enterprise business continuity management (BCM) program goals, with the realization that components supporting primary business processes may be outside the corporate perimeter.
• Coordinate the development of implementation of incident response plans and procedures to ensure that business-critical services are recovered in the event of a security event; provide direction, support and in-house consulting in these areas.
• Facilitate and support the development of asset inventories, including information assets in cloud services and in other parties in the organization's ecosystem.
Who you will work with…
Report to the Chief Digital & Technology Officer
4 Direct Reports & Team size of 30
External Vendor Management
What you bring to the table… (Must Have)
Skills and Knowledge
• Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as applied experience on NIST, including 800-53 and Cybersecurity Framework
• Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate information security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists
• Strategic leader and builder of both vision and bridges, and able to energize the appropriate teams in the organization
• Sound knowledge of business management and a working knowledge of information security risk management and cybersecurity technologies
• Up-to-date knowledge of methodologies and trends in both business and IT
• Poise and ability to act calmly and competently in high-pressure, high-stress situations
• Must be a critical thinker, with strong problem-solving skills
• Excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
• Project management skills: financial/budget management, scheduling and resource management
• Ability to lead and motivate the information security team to achieve tactical and strategic goals, even when only "dotted line" reporting lines exist
• A master of influencing entities and decisions in situations where no formal reporting structures exist, but achieving the desirable outcome is vital
• Experience with contract and vendor negotiations
• Excellent stakeholder management skills
• High level of personal integrity, as well as the ability to professionally handle confidential matters and show an appropriate level of judgment and maturity
• High degree of initiative, dependability and ability to work with little supervision while being resilient to change
Experience
• Degree in information technology-related field and a minimum of 15 years of experience in a combination of risk management, information security and IT or OT jobs (at least five must be in a senior leadership role)
• Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic business environment
• Professional security management certification is required, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials
Compensation and Benefits:
The target base salary range for this full-time, salaried position is between
$259,000-$372,300
Individual base pay depends on work location and additional factors such as experience, job-related skills, and relevant education or training. Total pay may include other forms of compensation. In addition, we offer competitive health, dental, 401k and wellness benefits beginning on the first day of employment. Please ask your Talent Acquisition Partner for more information about our total rewards package.
The Company is committed to providing equal opportunity for employees and qualified applicants in all aspects of the employment relationship, including consideration for employment, without regard to race, color, sex, sexual orientation, gender identity, national origin, citizenship, marital status, protected veteran status, disability, age, religion, or any other classification protected by law.
Auto-ApplySenior Manager, Information Security Office Consultant
Security architect job in Philadelphia, PA
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
SAP BO Admin
Security architect job in Princeton, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Preferred
• At least 1 year of experience in software development life cycle.
• At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
• At least 1 year of experience in writing Nested and Complex queries.
• At least 1 year of experience in creating reports using drill down, prompts and variables.
• At least 1year of experience 0n Query Tuning mechanisms.
• Good understanding of Data Warehouse concepts.
• Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
• Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
• Good Analytical Skills
• High impact communication
• Ability to ramp up in new technologies
• Ability to work in team environment with diverse/multiple stakeholders.
• Experience and desire to work in a Global delivery environment.
Qualifications
Qualifications
Basic
• Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Full-Time Permanent
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Information System Security Officer (ISSO) III
Security architect job in Philadelphia, PA
Full-time Description
Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family.
Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104.
Duties to include:
Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation.
Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies.
Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules.
Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM.
Conduct and document security incident response actions and report to the ISSM.
Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership.
Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management.
Requirements
Clearance: Top Secret, US Citizen only
Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP)
Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include:
Developing and maintaining RMF lifecycle documentation.
Assessing and validating implementation of security controls.
Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation.
Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes.
Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools.
Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues.
Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required.
The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally.
Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic.
We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you.
Salary Description $130,000 - 170,000
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id *********************** and contact no is **************.
Easy ApplyDirector, Business Information Security Officer
Security architect job in Princeton, NJ
The Director, Business Information Security Officer is responsible for providing leadership and operational oversight in safeguarding enterprise information assets. This role is pivotal in delivering the services for information security assurance across third-party suppliers, business applications, cloud platforms and other core technologies, as well as the development and delivery of solutions for the protection of information assets.
As a senior member of the information security team reporting to the CISO, this role leads a team that serves as the key interface between the business, IT, and information security - driving the identification, evaluation and prioritization of information security risks and measuring the progress of the overall information security program through benchmarking and metrics. The position also acts as a trusted representative of the CISO in the delivery of security training & awareness to the organization and contributes to the evolution of the enterprise-wide information security program.
****
The Director, Business Information Security Officer leads a team in identifying and managing information security risks through assessments and cybersecurity risk management processes and owns services for both security awareness & training and information protection. The Director works with and coordinates across business functions, compliance teams, IT, and shared services groups. The Business Information Security Officer's core responsibilities include:
+ Lead cross-functional initiatives to establish and mature cybersecurity risk management processes in collaboration with business and IT colleagues.
+ Deliver security assurance services for third-party suppliers, cloud services, and business technologies.
+ Manage and mentor a specialized team focused on cybersecurity risk management, cybersecurity assurance, awareness & training/phishing awareness, and information protection.
+ Support the CISO in development of an information protection strategy to protect sensitive data from loss, leakage, or unauthorized exfiltration.
+ Execute against the information protection strategy through implementation and management of services for information protection, leveraging data loss prevention (DLP) and data security posture management technologies in partnership with business, information security, and IT colleagues.
+ Conduct periodic assessments of information handling practices and work with colleagues to classify and identify vital information and apply controls that mitigate risks.
+ Monitor emerging threats and regulatory changes related to information/data protection.
+ Support the CISO in establishing and reporting on metrics for key risk indicators (KRIs) and key performance indicators (KPIs) that measure the effectiveness of the information security program.
+ Conduct periodic benchmarking to assess information security maturity and recommend enhancements.
+ Develop and communicate training and awareness on security best practices throughout the organization.
+ Manage the ongoing delivery of phishing campaigns and responses to phishing alerts in coordination with the cybersecurity operations team.
+ Remain current on information security frameworks, guidance, best practices, and regulatory requirements impacting the pharmaceutical industry.
+ Collaborate deeply with peers in Security Operations and Information Security Architecture, taking an integrated approach to managing and reducing cyber risk across the organization.
**Qualifications/ Required**
Knowledge/ Experience and Skills:
+ 10+ years of experience within information security or IT GRC organizations; experience in the pharmaceutical/life sciences industry is desirable.
+ 5+ years of experience in development and management of information security risk assessment processes for applications and third parties.
+ 5+ years of experience in assessment of systems hosted in company or third-party cloud environments (e.g., AWS, Oracle, Azure).
+ Extensive knowledge of solutions and best practices for information protection / data loss protection, including Microsoft Purview and other solutions.
+ Expert understanding of risk management, compliance, and governance frameworks related to cybersecurity.
+ Ability to think strategically, lead initiatives, and provide leadership in the definition of solutions for risk mitigation.
+ Demonstrated ability to influence through leadership and collaboration - fostering a community of knowledge-sharing, collaboration, and forward-thinking.
+ The capacity to actively learn and apply security domain knowledge, knowledge, and best practices to guide the definition of security requirements in support of business initiatives.
+ Strong skills for critical thinking, analyzing, and assessing problems and implications, identifying patterns, making connections of underlying issues, understanding risks, and developing mitigation strategies, and taking ownership of the outcome.
+ Proven record as a strong communicator both in written and oral presentations; capable of rapidly creating detailed, yet concise written reports.
+ Ability to communicate technical ideas and concepts clearly, verbally and written, to technical and non-technical audiences, especially in articulating technical vision to executive levels.
Educational Qualifications
+ Bachelor's degree in computer science, Information Security, or a related field. A master's degree is desirable.
+ Certifications such as CISSP, CISM, CISA, or similar are highly desirable.
**Competencies**
**Accountability for Results -** Stay focused on key strategic objectives, be accountable for high standards of performance, and take an active role in leading change.
**Strategic Thinking & Problem Solving -** Make decisions considering the long-term impact to customers, patients, employees, and the business.
**Patient & Customer Centricity -** Maintain an ongoing focus on the needs of our customers and/or key stakeholders.
**Impactful Communication -** Communicate with logic, clarity, and respect. Influence at all levels to achieve the best results for Otsuka.
**Respectful Collaboration -** Seek and value others' perspectives and strive for diverse partnerships to enhance work toward common goals.
**Empowered Development -** Play an active role in professional development as a business imperative.
Minimum $164,530.00 - Maximum $245,985.00, plus incentive opportunity: The range shown represents a typical pay range or starting pay for individuals who are hired in the role to perform in the United States. Other elements may be used to determine actual pay such as the candidate's job experience, specific skills, and comparison to internal incumbents currently in role. Typically, actual pay will be positioned within the established range, rather than at its minimum or maximum. This information is provided to applicants in accordance with states and local laws.
**Application Deadline** : This will be posted for a minimum of 5 business days.
**Company benefits:** Comprehensive medical, dental, vision, prescription drug coverage, company provided basic life, accidental death & dismemberment, short-term and long-term disability insurance, tuition reimbursement, student loan assistance, a generous 401(k) match, flexible time off, paid holidays, and paid leave programs as well as other company provided benefits.
Come discover more about Otsuka and our benefit offerings; ********************************************* .
**Disclaimer:**
This job description is intended to describe the general nature and level of the work being performed by the people assigned to this position. It is not intended to include every job duty and responsibility specific to the position. Otsuka reserves the right to amend and change responsibilities to meet business and organizational needs as necessary.
Otsuka is an equal opportunity employer. All qualified applicants are encouraged to apply and will be given consideration for employment without regard to race, color, sex, gender identity or gender expression, sexual orientation, age, disability, religion, national origin, veteran status, marital status, or any other legally protected characteristic.
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation, if you are unable or limited in your ability to apply to this job opening as a result of your disability. You can request reasonable accommodations by contacting Accommodation Request (EEAccommodations@otsuka-us.com) .
**Statement Regarding Job Recruiting Fraud Scams**
At Otsuka we take security and protection of your personal information very seriously. Please be aware individuals may approach you and falsely present themselves as our employees or representatives. They may use this false pretense to try to gain access to your personal information or acquire money from you by offering fictitious employment opportunities purportedly on our behalf.
Please understand, Otsuka will **never** ask for financial information of any kind or for payment of money during the job application process. We do not require any financial, credit card or bank account information and/or any payment of any kind to be considered for employment. We will also not offer you money to buy equipment, software, or for any other purpose during the job application process. If you are being asked to pay or offered money for equipment fees or some other application processing fee, even if claimed you will be reimbursed, this is not Otsuka. These claims are fraudulent and you are strongly advised to exercise caution when you receive such an offer of employment.
Otsuka will also never ask you to download a third-party application in order to communicate about a legitimate job opportunity. Scammers may also send offers or claims from a fake email address or from Yahoo, Gmail, Hotmail, etc, and not from an official Otsuka email address. Please take extra caution while examining such an email address, as the scammers may misspell an official Otsuka email address and use a slightly modified version duplicating letters.
To ensure that you are communicating about a legitimate job opportunity at Otsuka, please only deal directly with Otsuka through its official Otsuka Career website ******************************************************* .
Otsuka will not be held liable or responsible for any claims, losses, damages or expenses resulting from job recruiting scams. If you suspect a position is fraudulent, please contact Otsuka's call center at: ************. If you believe you are the victim of fraud resulting from a job recruiting scam, please contact the FBI through the Internet Crime Complaint Center at: ******************* , or your local authorities.
Otsuka America Pharmaceutical Inc., Otsuka Pharmaceutical Development & Commercialization, Inc., and Otsuka Precision Health, Inc. ("Otsuka") does not accept unsolicited assistance from search firms for employment opportunities. All CVs/resumes submitted by search firms to any Otsuka employee directly or through Otsuka's application portal without a valid written search agreement in place for the position will be considered Otsuka's sole property. No fee will be paid if a candidate is hired by Otsuka as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
SAP BTP Security
Security architect job in Raritan, NJ
Must Have Technical/Functional Skills * Minimum 10 years of experience in SAP with 5+ years of experience in in SAP BTP implementing end-to-end SAP BTP solutions, integrating with SAP S/4HANA, SAP ECC, SAP Fiori, and third-party applications. * Deep knowledge of BTP security and having the skills below:
* Experience with SAP Cloud Identity Services
* SAP Authorization and Trust Management Service
* SAP Connectivity Service
* SAP Audit Log Service
* Manage application security on BTP including custom developments and extensions.
* Manage technical roles, user authorization, and segregation of duties within SAP Systems.
* Experience in Cloud Foundry or Neo environment.
* Experience with CAP/RAP for application development authorization in BTP.
* Strong knowledge of BTP security aspects (SSO, OAuth, etc).
* Experience in understanding applications with microservices architecture.
* Experience with role design, user and authorization management for SAP systems.
* Have strong expertise in BTP Administration, Compliance and Audit processes.
Roles & Responsibilities
* Ability to listen, understand and facilitate process improvements.
* Must have a focus on customer satisfaction.
* Must be able to work independently with little direction/supervision.
* Must be adaptable and capable of absorbing new concepts and situations rapidly.
* Must be a strong team player.
Generic Managerial Skills, If any
* Ability to listen, understand and facilitate process improvements.
* Excellent communication and relational skills required.
* Must have a focus on customer satisfaction.
* Must be able to work independently with little direction/supervision.
* Must be adaptable and capable of absorbing new concepts and situations rapidly.
* Must be a strong team player.
Salary Range: $110,000 - $135,000 a Year
TCS Employee Benefits Summary:
Discretionary Annual Incentive.
Comprehensive Medical Coverage: Medical & Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans.
Family Support: Maternal & Parental Leaves.
Insurance Options: Auto & Home Insurance, Identity Theft Protection.
Convenience & Professional Growth: Commuter Benefits & Certification & amp; Training Reimbursement.
Time Off: Vacation, Time Off, Sick Leave & Holidays.
Legal & Financial Assistance: Legal Assistance, 401K Plan, Performance Bonus, College Fund, Student Loan Refinancing.
#LI-SP1
SAP Security Analyst
Security architect job in Raritan, NJ
A highly skilled and experienced SAP Security Specialist is needed to join the team. The specialist will focus on the secure and compliant operation of the SAP landscape, specifically across SAP BusinessObjects Data Services BODS, SAP Landscape Transformation Replication Server SLT, SAP Ariba, and SAP Signavio. The specialist will be responsible for designing, implementing, and maintaining robust security solutions that meet business needs and compliance requirements. This role requires a strong understanding of SAP authorization concepts, risk management, and the ability to work collaboratively across various teams.
Responsibilities:
Design, develop, and maintain SAP security roles and authorizations within BODS, SLT, Ariba, and Signavio environments, aligning with security policies, standards, and SoD requirements.
Administer user access, troubleshoot issues, and oversee GRC implementation and user access reviews for the specified SAP applications.
Conduct security assessments, monitor and report on security events, and support audits.
Collaborate with IT and functional teams to define and implement security policies and provide user support.
Lead SAP security tasks in projects, supporting implementations and managing change control processes.
Develop and maintain the SAP Signavio Process Intelligence security model and ensure secure data access control.
Manage SSO, user provisioning, and integrations with IdMGRC if applicable.
Analyze and troubleshoot access issues, ensuring least privilege and SoD compliance.
Maintain audit trails and ensure system compliance with internal and external controls e.g., SOX.
Work closely with SAP Basis and Cloud Identity Services for user lifecycle and identity federation.
Participate in system upgrades, patching, and cutovers by validating security impacts.
Provide documentation and knowledge transfer to support and audit teams.
Qualifications:
Bachelor's degree in a relevant field.
Minimum of 10+ years of SAP Security experience with proven project delivery.
Strong knowledge in:
SAP BODS repository and runtime user security.
SLT rolebased access control and connection configurations.
SAP Ariba user provisioning via Ariba Administration, CIG or BTP, integration with SSO and Active Directory.
Signavio cloud user management and role assignments through SAP BTP cockpit or SCIMbased provisioning.
Expert knowledge of SAP authorization security, implementation methodologies, and SoD concepts.
Experience with SAP GRC Access Control.
Demonstrated ability to design SAP security solutions and experience in endtoend SAP security project lifecycles.
Excellent communication and collaboration skills.
Preferred Qualifications:
SAP Ariba certification.
Experience with EIMSailPoint, SAP Solution ManagerChaRM, and SAP Business Technology Platform BTP.
Bachelor's degree in Computer Science, Information Technology, or related discipline.
SAP Security or GRC certification is a plus.
Experience in multitenant SAP Ariba or Signavio deployment models.
Knowledge of compliance frameworks e.g., ISO, NIST, SOX.
This job description provides an overview of the responsibilities and qualifications required for an SAP Security Specialist role with a focus on BODS, SLT, Ariba, and Signavio. It can be further customized based on specific organizational needs and the seniority level of the position.
Auto-ApplyInformation Security Officer (ISSO) III
Security architect job in Philadelphia, PA
Information Systems Security Officer (ISSO) III Philadelphia, PA Active or Interim Secret Clearance Required
@Orchard is supporting a growing Federal contract with proven capabilities in cybersecurity. We are seeking a skilled ISSO to be proposed as a bid-as-key for a new project supporting the Navy. This role will be based out of Philadelphia, PA and will be responsible for managing all aspects of the IA process. If awarded, this could be a fantastic opportunity to grow your career with a company that has built strong relationships within Defense and Intelligence.
As the Information Systems Security Officer you will:
Assist Information System Security Managers (ISSMs) in executing duties and responsibilities.
Ensure compliance with all NAVSEA, DON, and DoD cybersecurity policies.
Ensure relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals.
Coordinate cybersecurity processes and activities for assigned systems.
Maintain and report Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs.
Provide oversight of Security Plans for assigned systems throughout lifecycle.
Manage and maintain Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and remediated where possible.
Assist with identification of security control baselines and applicable overlays.
Coordinate validation of security controls with Navy Qualified Validators (NQVs).
Perform Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews.
Adjudicate findings from Package Submitting Officer (PSO).
Register and maintain systems in Enterprise Mission Assurance Support Service (eMASS).
Plan and coordinate security control testing during Risk Assessments and Annual Security Reviews.
Report changes in system security posture to ISSM.
Ensure execution of Continuous Monitoring-related requirements as defined in System Level Continuous Monitoring (SLCM) Strategy.
Review all data produced by Continuous Monitoring activities, update eMASS record as necessary, and escalate to leadership for action if required.
Correlate findings from non-RMF vulnerability assessments (e.g., Development Test (DT)/Operational Test (OT), penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking to ensure holistic risk assessment.
Participate in change control and configuration management processes.
Maintain vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Qualifications:
Target Education: Bachelor's degree in computer science, IT, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university.
Target Experience: Six (6) years of experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident-response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Minimum Certs: IAM-II, CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, HCISPP
Must be U.S. citizen and hold active or interim Secret clearance.
Information Security Manager
Security architect job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Chief Information Security Officer
Security architect job in New Brunswick, NJ
SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
5. Develop and manage information security budgets and monitor them for variances.
6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance.
11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.
20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.
21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.
22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management
24. Perform related duties and fulfill responsibilities as required.
Requirements:
1. A Master's degree in Business Administration or a Technology related field.
2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role.
3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.
4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST.
5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations.
6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals.
7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical.
8. Strong problem-solving and analytical skills to identify and mitigate potential security risks.
Salary Range: 133,715.00 - 220,639.00 USD
We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials.
The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status.
Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards.
You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
Information System Security Officer III
Security architect job in Philadelphia, PA
Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization.
**This position is contingent upon award of contract**
Key Responsibilities:
Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards.
Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems.
Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership.
Provide guidance on best practices and recommend improvements to the organization's security posture.
Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats.
Support continuous monitoring of information systems and provide regular status reports on security compliance.
Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices.
Required Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field.
A minimum of 6 years of relevant experience in cybersecurity or information systems security.
Prior experience supporting Navy programs.
Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M.
At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary.
Proficiency in cybersecurity frameworks, risk management processes, and security controls.
Strong analytical and problem-solving skills with attention to detail.
Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team.
Preferred Qualifications:
Experience with DoD security requirements and systems.
Familiarity with NIST, RMF, and other relevant cybersecurity standards.
Ability to work in a potentially remote environment with occasional on-site requirements.
Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment.
About Us:
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information System Security Officer (ISSO III) - US Navy
Security architect job in Philadelphia, PA
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
Information System Security Officer (ISSO III) - US Navy
Security architect job in Philadelphia, PA
The Information System Security Officer (ISSO) III will support the Navy in ensuring that information systems remain secure, compliant, and mission-ready. This role is responsible for implementing cybersecurity controls, monitoring security posture, supporting incident response, and ensuring compliance with Department of Navy, NAVSEA, and DoD cybersecurity requirements.
Responsibilities
Implement and manage information security controls across Navy IT systems.
Ensure compliance with cybersecurity regulations, directives, and published policies.
Conduct vulnerability and threat analyses, document findings, and recommend corrective actions.
Support cybersecurity incident response activities including isolation of affected assets, initial investigation, evidence collection, and status reporting.
Monitor systems for suspicious activity, unauthorized access, and security misconfigurations.
Prepare and maintain system security documentation to support accreditation and assessment processes.
Provide updates, reports, and security briefings to Navy leadership and program managers.
Collaborate with system administrators, engineers, and other cybersecurity personnel to maintain confidentiality, integrity, and availability of Navy information systems.
Requirements
Education:
Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline.
Experience:
Minimum 6 years of experience coordinating and enacting security changes within an organization.
Experience with vulnerability and threat analysis, compliance enforcement, and incident response.
Familiarity with DoD and Navy cybersecurity practices and reporting requirements.
Skills & Knowledge:
Proficiency in identifying, analyzing, and mitigating cybersecurity threats.
Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives.
Excellent communication and reporting skills with the ability to provide clear, actionable recommendations.
Certifications:
Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent).
Security Clearance Requirements
Active Secret clearance
Salary Description 85,000 - 150,000
INFORMATION SYSTEM SECURITY OFFICER (ISSO) III (Req 25 066)
Security architect job in Philadelphia, PA
Responsibilities: Assists the Information System Security Managers (ISSM) in executing their duties and responsibilities. Ensures compliance with all cybersecurity policies. Ensures relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. Coordinates cybersecurity processes and activities for assigned systems. Maintains and reports Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs. Provides oversight of Security Plans for assigned systems throughout their lifecycle. Manages and maintains Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. Assists with the identification of security control baselines and applicable overlays. Coordinates the validation of security controls with Navy Qualified Validators (NQV). Performs Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews. Adjudicates findings from Package Submitting Officer (PSO). Registers and maintains systems in Enterprise Mission Assurance Support Service (eMASS). Plans and coordinates security control testing during Risk Assessments and Annual Security Reviews. Reports changes in system security posture to the ISSM. Ensures the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. Reviews all data produced by Continuous Monitoring activities, updates the eMASS record as necessary, and escalates to leadership for action, if required. Correlates findings from non-RMF vulnerability assessments, penetration testing, Command Cyber Operational Readiness Inspection (CCORI), etc.) to RMF controls for tracking, ensuring a holistic risk assessment. Participates in change control and configuration management processes. Maintains vulnerability data in Vulnerability Remediation Asset Manager (VRAM).
Please go to Openings | Amelex to apply for this position.
Certificates/Security Clearances/Other
An Active Secret Security Clearance is required.
Minimum Certification Requirement: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP is required.
Education: Bachelor's degree in computer science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited institution as recognized by the U.S. Department of Education
Experience: Six (6) years of DoD experience coordinating and enacting required security changes, within various levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and support cyber incident response by isolating potentially effected assets, initial investigation and data collection, through status updates/reporting.
Information Security Systems Engineer-Ss
Security architect job in Philadelphia, PA
McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division.
The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments.
Requirements
Key Responsibilities
Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems.
Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series.
Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP.
Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals.
Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements.
Required Qualifications
Education: BS in Computer Science or relevant field.
Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments.
Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP.
Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial.
Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance.
Equal Employment Opportunity Statement:
McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws.
EEO is the Law:
Applicants and employees are protected under Federal law from discrimination.