Cyber Security Architect
Security architect job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Cloud Security Engineer - SRE
Security architect job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Vice President, Application Cyber Security Specialist
Security architect job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Principal Information Security Architect
Security architect job in Trenton, NJ
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Security Architect - Only for GC and Citizen
Security architect job in Long Hill, NJ
SOAIS is a leading enterprise IT solutions provider which has a passion for customer satisfaction, technology innovation with profound industry and business process expertise. It offers a full spectrum of technology solutions in the arena of Oracle Cloud Applications, PeopleSoft, WorkSoft, Workday and niche technology areas such as mobility
Job Description
Note: This role is only for GC and US Citizens.
Note: This role is only for GC and US Citizens
Note: This role is only for GC and US Citizens
Responsibilities:
Design and implement secure enterprise architecture, aligning with business objectives and regulatory requirements.
Develop and maintain security policies, standards, and guidelines.
Conduct risk assessments, threat modeling, and vulnerability analysis for applications, networks, and cloud environments.
Lead the evaluation, selection, and deployment of security tools and technologies (firewalls, SIEM, IAM, DLP, etc.).
Provide security architecture guidance during application and infrastructure design phases.
Collaborate with DevOps and engineering teams to embed security into CI/CD pipelines (DevSecOps).
Ensure compliance with security frameworks and standards (ISO 27001, NIST, CIS, GDPR, HIPAA, etc.).
Investigate and respond to security incidents, working with SOC and incident response teams.
Qualifications
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or related field (Master's preferred).
8+ years of IT/security experience, with at least 3+ years in a Security Architect role.
Strong knowledge of network security, application security, cloud security, and cryptography.
Proficiency with security technologies: SIEM, IDS/IPS, IAM, PKI, WAF, endpoint protection, etc.
Experience with cloud platforms (AWS, Azure, GCP) and security services.
Familiarity with secure coding practices, penetration testing, and vulnerability management.
Relevant certifications (CISSP, CISM, CCSP, SABSA, TOGAF) strongly preferred.
Excellent problem-solving, analytical, and communication skills.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Enterprise Information Security Architect
Security architect job in Newark, NJ
Hi,
Hope you are doing well,
I am sending you below job open with one of my direct client, if you are available in market,
Send me your most updated copy of your resume in word document ASAP.
Position: Enterprise Information Security Architect
Duration: Full-Time
Location: Penn Plaza, Newark NJ
The position can be located in Wall, Trenton, Ewing or Newark, NJ, however, for those other locations, the person must expect to be in Newark at least a couple of days/week.
:
• Provide technical guidance and renders decisions regarding Security Technology designs and engineering.
• Act as an advisor to management and technology stakeholders on advanced Security research studies and applications.
• Maintain standards for system documentation.
• Develop Enterprise-wide and cross-functional Security Solutions.
• Research and recommend new industry IT Security models, management strategies and effective resource utilization models.
• Monitor, benchmark and report progress and performance of Security systems management and service levels.
• Conduct security technology reviews and audits that ensure computer systems are built to security architecture principles, follow Enterprise standards and are optimized to maximum efficiency.
• Interface with external business partners, vendors and subcontractors on issues of interoperability.
• Promote security technology.
Job Description
Basic Qualifications:
• Bachelor's degree in Information Technology or related discipline from an accredited college or university, advanced degree or other professional certification in Management Information Systems is preferred
• 10+ years of professional business experience in Security Architecture, including security with Applications, Infrastructure, external internet security, or Access and Identity Management
• Must have prior hands on experience reviewing code designs from a security standpoint
• Prior experience with Internal and External Applications Security Assessment
• Demonstrated experience with Secure Development Lifecycle
• Demonstrated experience with defending OWASP Top Ten Attack types
• Must have prior experience with SSL, and can articulate what it can/cannot cover and why it's important
• Experience with C, Python, Ruby, C++ or other relevant languages
• Demonstrated experience with Vulnerability assessments, penetration testing and experience fixing vulnerabilities.
• Experience with information privacy and security laws (covering such items as data breaches, records management and structured/unstructured data)
• Prior Data Encryption solutions experience
• Prior ITCAM/SOA experience
Additional Qualifications/Knowledge:
• 5+ years of management experience
• Experience working in controlled regulatory environment is preferred
Skills and Abilities:
• Strong understanding of application security principles
• Ability to articulate the 3 components of AAA (AuthN, AuthZ and Audit)
• Strong understanding of TOGAF and can articulate it's importance and relevance
• Strong project management and leadership skills
• Good vendor relationship management and negotiation skills
• Excellent presentation skills and able to speak in front of senior Executives
• Good interpersonal skills with the ability to interact with all levels of management and staff
• Good written communication skills
Additional Information
Regards,
Nagesh
Sr.Technical Recruiter
Integrated Resources, Inc.
IT Life Sciences Allied Healthcare CRO
Certified MBE |GSA - Schedule 66 I GSA - Schedule 621I
(BOARD) # 732-549-2030 - Ext - 219
Gold Seal JCAHO Certified ™ for Health Care Staffing
“INC 5000's FASTEST GROWING, PRIVATELY HELD COMPANIES” (8th Year in a Row)
Security Architect - Cloud & Enterprise Security - Edison NJ
Security architect job in Edison, NJ
Senior Network Security Architect
We are seeking a Senior Network Security Architect with deep expertise in Palo Alto firewalls and GlobalProtect VPN to lead the design, architecture, and implementation of our enterprise network security strategy. This role goes beyond operations - it requires strategic oversight, hands-on architecture, and leadership in building secure, scalable, and resilient environments.
Responsibilities:
Design and architect enterprise network security solutions, with a primary focus on Palo Alto firewalls and GlobalProtect VPN.
Define security standards, frameworks, and roadmaps to ensure scalability, compliance, and resilience.
Lead the evaluation, design, and deployment of next-generation firewall architectures, segmentation strategies, and remote access solutions.
Collaborate with IT, security, and business stakeholders to align network security with organizational goals.
Provide expert-level troubleshooting and guidance for complex firewall and VPN issues.
Mentor and provide technical direction to engineering staff and cross-functional teams.
Evaluate new technologies, tools, and methods to continuously improve the security posture.
Ensure solutions align with compliance standards (NIST, ISO, CIS, etc.).
Qualifications:
10+ years of experience in network security architecture and design.
Hands-on expertise with Palo Alto Networks firewalls and GlobalProtect (must-have).
Proven ability to design and implement secure network architectures in enterprise environments.
Strong understanding of VPNs, secure remote access, and advanced firewall policies.
Familiarity with cloud integrations (Azure, AWS, or GCP) and hybrid security models preferred.
Excellent communication skills - ability to explain complex architectures to both executives and technical teams.
Relevant certifications such as Palo Alto PCNSE, CISSP, or CCNP Security strongly preferred.
Why This Role Matters:
This is not a maintenance role - it's an opportunity to own the strategy and design of enterprise-wide security architecture while still applying deep technical expertise in Palo Alto and GlobalProtect. You'll directly shape how our organization protects its data, people, and infrastructure.
Laurie Roth
President/Sr. Consultant
DSN-IT
************
*************
**************
****************************************************
Easy ApplySecurity Architect
Security architect job in Middletown, NJ
Complete Description:
· The Enterprise Architect will also be tasked with preparing security standards, policies and procedures - as well as mentoring team members and executive staff on security matters. CISSP REQUIRED.
· The department is seeking an Enterprise Architect to work in conjunction with the Modernization Team, as well as the DHS Information Security and Privacy Office, to analyze and document the existing information security environment.
· Conducting system security and vulnerability analyses and risk assessments
· Evaluating the systems architecture and identifying integration issues
· Serve as Information Security Subject Matter Expert (SME), while working with a Systems Integrator and software vendors, to develop the approach for implementing an enterprise security infrastructure that ensures compliance to standards, policies and procedures
· Monitor delivery efforts to ensure compliance to standards, policies, and procedures
· Deliver evidence, demonstrating project deliverables meet federal certification requirements
· Improves DHS Incident Response efforts by analyzing existing systems\/processes and recommending future technologies and associated processes
· Participate in the RFI\/RFP process for systems module selection
· Participate in the procurement process to select a Systems Integrator to execute the DDI phase
· CISSP certification REQUIRED
· Extensive experience designing and implementing enterprise security architectures based on NIST Risk Management Framework (NIST 800\-53), state and federal security standards, and security industry best practices
· An extensive understanding of security tools and software products, including Identity Access Management (IAM), Security Incident and Event Management (SIEM), and Cloud Access Security Brokers (CASB)
· In\-depth experience in creating, documenting, and implementing enterprise security policies and standards - including enterprise\-wide communication and training
"}}],"is Mobile":false,"iframe":"true","job Type":"Contract","apply Name":"Apply Now","zsoid":"659070196","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Contract Duration","uitype":1,"value":"6 months"},{"field Label":"On\-Site vs Remote","uitype":2,"value":"On\-Site"},{"field Label":"Visa Requirement","uitype":1,"value":"Any"},{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"City","uitype":1,"value":"Middletown"},{"field Label":"State\/Province","uitype":1,"value":"Iowa"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"52638"}],"header Name":"Security Architect","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00187003","attach Arr":[],"custom Template":"4","is CandidateLoginEnabled":false,"job Id":"**********04811011","FontSize":"15","google IndexUrl":"https:\/\/palettetechnologies.zohorecruit.com\/recruit\/ViewJob.na?digest=Lh304XeNwlnJptzUT2shAdEFCp5SP0AbABceCROpQO8\-&embedsource=Google","location":"Middletown","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
Senior Manager, Information Security Office Consultant
Security architect job in Newark, NJ
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
SAP BO Admin
Security architect job in Princeton, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Preferred
• At least 1 year of experience in software development life cycle.
• At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
• At least 1 year of experience in writing Nested and Complex queries.
• At least 1 year of experience in creating reports using drill down, prompts and variables.
• At least 1year of experience 0n Query Tuning mechanisms.
• Good understanding of Data Warehouse concepts.
• Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
• Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
• Good Analytical Skills
• High impact communication
• Ability to ramp up in new technologies
• Ability to work in team environment with diverse/multiple stakeholders.
• Experience and desire to work in a Global delivery environment.
Qualifications
Qualifications
Basic
• Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Full-Time Permanent
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id
***********************
and contact no is
**************.
Easy ApplyDirector, Business Information Security Officer
Security architect job in Princeton, NJ
The Director, Business Information Security Officer is responsible for providing leadership and operational oversight in safeguarding enterprise information assets. This role is pivotal in delivering the services for information security assurance across third-party suppliers, business applications, cloud platforms and other core technologies, as well as the development and delivery of solutions for the protection of information assets.
As a senior member of the information security team reporting to the CISO, this role leads a team that serves as the key interface between the business, IT, and information security - driving the identification, evaluation and prioritization of information security risks and measuring the progress of the overall information security program through benchmarking and metrics. The position also acts as a trusted representative of the CISO in the delivery of security training & awareness to the organization and contributes to the evolution of the enterprise-wide information security program.
****
The Director, Business Information Security Officer leads a team in identifying and managing information security risks through assessments and cybersecurity risk management processes and owns services for both security awareness & training and information protection. The Director works with and coordinates across business functions, compliance teams, IT, and shared services groups. The Business Information Security Officer's core responsibilities include:
+ Lead cross-functional initiatives to establish and mature cybersecurity risk management processes in collaboration with business and IT colleagues.
+ Deliver security assurance services for third-party suppliers, cloud services, and business technologies.
+ Manage and mentor a specialized team focused on cybersecurity risk management, cybersecurity assurance, awareness & training/phishing awareness, and information protection.
+ Support the CISO in development of an information protection strategy to protect sensitive data from loss, leakage, or unauthorized exfiltration.
+ Execute against the information protection strategy through implementation and management of services for information protection, leveraging data loss prevention (DLP) and data security posture management technologies in partnership with business, information security, and IT colleagues.
+ Conduct periodic assessments of information handling practices and work with colleagues to classify and identify vital information and apply controls that mitigate risks.
+ Monitor emerging threats and regulatory changes related to information/data protection.
+ Support the CISO in establishing and reporting on metrics for key risk indicators (KRIs) and key performance indicators (KPIs) that measure the effectiveness of the information security program.
+ Conduct periodic benchmarking to assess information security maturity and recommend enhancements.
+ Develop and communicate training and awareness on security best practices throughout the organization.
+ Manage the ongoing delivery of phishing campaigns and responses to phishing alerts in coordination with the cybersecurity operations team.
+ Remain current on information security frameworks, guidance, best practices, and regulatory requirements impacting the pharmaceutical industry.
+ Collaborate deeply with peers in Security Operations and Information Security Architecture, taking an integrated approach to managing and reducing cyber risk across the organization.
**Qualifications/ Required**
Knowledge/ Experience and Skills:
+ 10+ years of experience within information security or IT GRC organizations; experience in the pharmaceutical/life sciences industry is desirable.
+ 5+ years of experience in development and management of information security risk assessment processes for applications and third parties.
+ 5+ years of experience in assessment of systems hosted in company or third-party cloud environments (e.g., AWS, Oracle, Azure).
+ Extensive knowledge of solutions and best practices for information protection / data loss protection, including Microsoft Purview and other solutions.
+ Expert understanding of risk management, compliance, and governance frameworks related to cybersecurity.
+ Ability to think strategically, lead initiatives, and provide leadership in the definition of solutions for risk mitigation.
+ Demonstrated ability to influence through leadership and collaboration - fostering a community of knowledge-sharing, collaboration, and forward-thinking.
+ The capacity to actively learn and apply security domain knowledge, knowledge, and best practices to guide the definition of security requirements in support of business initiatives.
+ Strong skills for critical thinking, analyzing, and assessing problems and implications, identifying patterns, making connections of underlying issues, understanding risks, and developing mitigation strategies, and taking ownership of the outcome.
+ Proven record as a strong communicator both in written and oral presentations; capable of rapidly creating detailed, yet concise written reports.
+ Ability to communicate technical ideas and concepts clearly, verbally and written, to technical and non-technical audiences, especially in articulating technical vision to executive levels.
Educational Qualifications
+ Bachelor's degree in computer science, Information Security, or a related field. A master's degree is desirable.
+ Certifications such as CISSP, CISM, CISA, or similar are highly desirable.
**Competencies**
**Accountability for Results -** Stay focused on key strategic objectives, be accountable for high standards of performance, and take an active role in leading change.
**Strategic Thinking & Problem Solving -** Make decisions considering the long-term impact to customers, patients, employees, and the business.
**Patient & Customer Centricity -** Maintain an ongoing focus on the needs of our customers and/or key stakeholders.
**Impactful Communication -** Communicate with logic, clarity, and respect. Influence at all levels to achieve the best results for Otsuka.
**Respectful Collaboration -** Seek and value others' perspectives and strive for diverse partnerships to enhance work toward common goals.
**Empowered Development -** Play an active role in professional development as a business imperative.
Minimum $164,530.00 - Maximum $245,985.00, plus incentive opportunity: The range shown represents a typical pay range or starting pay for individuals who are hired in the role to perform in the United States. Other elements may be used to determine actual pay such as the candidate's job experience, specific skills, and comparison to internal incumbents currently in role. Typically, actual pay will be positioned within the established range, rather than at its minimum or maximum. This information is provided to applicants in accordance with states and local laws.
**Application Deadline** : This will be posted for a minimum of 5 business days.
**Company benefits:** Comprehensive medical, dental, vision, prescription drug coverage, company provided basic life, accidental death & dismemberment, short-term and long-term disability insurance, tuition reimbursement, student loan assistance, a generous 401(k) match, flexible time off, paid holidays, and paid leave programs as well as other company provided benefits.
Come discover more about Otsuka and our benefit offerings; ********************************************* .
**Disclaimer:**
This job description is intended to describe the general nature and level of the work being performed by the people assigned to this position. It is not intended to include every job duty and responsibility specific to the position. Otsuka reserves the right to amend and change responsibilities to meet business and organizational needs as necessary.
Otsuka is an equal opportunity employer. All qualified applicants are encouraged to apply and will be given consideration for employment without regard to race, color, sex, gender identity or gender expression, sexual orientation, age, disability, religion, national origin, veteran status, marital status, or any other legally protected characteristic.
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation, if you are unable or limited in your ability to apply to this job opening as a result of your disability. You can request reasonable accommodations by contacting Accommodation Request (EEAccommodations@otsuka-us.com) .
**Statement Regarding Job Recruiting Fraud Scams**
At Otsuka we take security and protection of your personal information very seriously. Please be aware individuals may approach you and falsely present themselves as our employees or representatives. They may use this false pretense to try to gain access to your personal information or acquire money from you by offering fictitious employment opportunities purportedly on our behalf.
Please understand, Otsuka will **never** ask for financial information of any kind or for payment of money during the job application process. We do not require any financial, credit card or bank account information and/or any payment of any kind to be considered for employment. We will also not offer you money to buy equipment, software, or for any other purpose during the job application process. If you are being asked to pay or offered money for equipment fees or some other application processing fee, even if claimed you will be reimbursed, this is not Otsuka. These claims are fraudulent and you are strongly advised to exercise caution when you receive such an offer of employment.
Otsuka will also never ask you to download a third-party application in order to communicate about a legitimate job opportunity. Scammers may also send offers or claims from a fake email address or from Yahoo, Gmail, Hotmail, etc, and not from an official Otsuka email address. Please take extra caution while examining such an email address, as the scammers may misspell an official Otsuka email address and use a slightly modified version duplicating letters.
To ensure that you are communicating about a legitimate job opportunity at Otsuka, please only deal directly with Otsuka through its official Otsuka Career website ******************************************************* .
Otsuka will not be held liable or responsible for any claims, losses, damages or expenses resulting from job recruiting scams. If you suspect a position is fraudulent, please contact Otsuka's call center at: ************. If you believe you are the victim of fraud resulting from a job recruiting scam, please contact the FBI through the Internet Crime Complaint Center at: ******************* , or your local authorities.
Otsuka America Pharmaceutical Inc., Otsuka Pharmaceutical Development & Commercialization, Inc., and Otsuka Precision Health, Inc. ("Otsuka") does not accept unsolicited assistance from search firms for employment opportunities. All CVs/resumes submitted by search firms to any Otsuka employee directly or through Otsuka's application portal without a valid written search agreement in place for the position will be considered Otsuka's sole property. No fee will be paid if a candidate is hired by Otsuka as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
Information Security Manager
Security architect job in East Brunswick, NJ
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
7-10+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
SAP Security Analyst
Security architect job in Raritan, NJ
A highly skilled and experienced SAP Security Specialist is needed to join the team. The specialist will focus on the secure and compliant operation of the SAP landscape, specifically across SAP BusinessObjects Data Services BODS, SAP Landscape Transformation Replication Server SLT, SAP Ariba, and SAP Signavio. The specialist will be responsible for designing, implementing, and maintaining robust security solutions that meet business needs and compliance requirements. This role requires a strong understanding of SAP authorization concepts, risk management, and the ability to work collaboratively across various teams.
Responsibilities:
Design, develop, and maintain SAP security roles and authorizations within BODS, SLT, Ariba, and Signavio environments, aligning with security policies, standards, and SoD requirements.
Administer user access, troubleshoot issues, and oversee GRC implementation and user access reviews for the specified SAP applications.
Conduct security assessments, monitor and report on security events, and support audits.
Collaborate with IT and functional teams to define and implement security policies and provide user support.
Lead SAP security tasks in projects, supporting implementations and managing change control processes.
Develop and maintain the SAP Signavio Process Intelligence security model and ensure secure data access control.
Manage SSO, user provisioning, and integrations with IdMGRC if applicable.
Analyze and troubleshoot access issues, ensuring least privilege and SoD compliance.
Maintain audit trails and ensure system compliance with internal and external controls e.g., SOX.
Work closely with SAP Basis and Cloud Identity Services for user lifecycle and identity federation.
Participate in system upgrades, patching, and cutovers by validating security impacts.
Provide documentation and knowledge transfer to support and audit teams.
Qualifications:
Bachelor's degree in a relevant field.
Minimum of 10+ years of SAP Security experience with proven project delivery.
Strong knowledge in:
SAP BODS repository and runtime user security.
SLT rolebased access control and connection configurations.
SAP Ariba user provisioning via Ariba Administration, CIG or BTP, integration with SSO and Active Directory.
Signavio cloud user management and role assignments through SAP BTP cockpit or SCIMbased provisioning.
Expert knowledge of SAP authorization security, implementation methodologies, and SoD concepts.
Experience with SAP GRC Access Control.
Demonstrated ability to design SAP security solutions and experience in endtoend SAP security project lifecycles.
Excellent communication and collaboration skills.
Preferred Qualifications:
SAP Ariba certification.
Experience with EIMSailPoint, SAP Solution ManagerChaRM, and SAP Business Technology Platform BTP.
Bachelor's degree in Computer Science, Information Technology, or related discipline.
SAP Security or GRC certification is a plus.
Experience in multitenant SAP Ariba or Signavio deployment models.
Knowledge of compliance frameworks e.g., ISO, NIST, SOX.
This job description provides an overview of the responsibilities and qualifications required for an SAP Security Specialist role with a focus on BODS, SLT, Ariba, and Signavio. It can be further customized based on specific organizational needs and the seniority level of the position.
Auto-ApplyEngineer, Information Security and Risk
Security architect job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Chief Information Security Officer (CISO)
Security architect job in Iselin, NJ
1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up.
About the Role
We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement.
Key Responsibilities
Security Operations Leadership (Primary Focus)
Design, implement, and manage a comprehensive security operations infrastructure
Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions
Build and optimize security monitoring, incident response, and threat detection capabilities
Drive automation initiatives to eliminate manual inefficiencies in security processes
Compliance and Risk Management
Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks
Partner with business analysts to navigate regulatory requirements and audits
Develop and maintain security policies, procedures, and documentation
Manage security risk assessments and remediation programs
Technical Security Architecture
Secure cloud infrastructure across AWS, Google Cloud, and other platforms
Integrate security into CI/CD pipelines, working closely with DevOps teams
Implement and manage security tools (CrowdStrike, etc.) across the organization
Conduct hands-on security reviews of architecture and code
Cross-functional Collaboration
Partner directly with development and engineering teams on secure software development
Oversee internal IT security (smaller component of role)
Communicate security initiatives and status to leadership and stakeholders
Coordinate with global teams to ensure consistent security practices
Requirements
Required Qualifications
Technical Expertise
Minimum 7+ years in security operations with demonstrated hands-on experience
Deep expertise in cloud security (AWS, Google Cloud, Azure)
Proven ability to personally deploy and configure enterprise security tools
Strong understanding of modern DevOps practices and CI/CD security integration
Experience with security automation and orchestration
Compliance and Governance
Hands-on experience with FedRAMP certification processes
Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications
Understanding of regulatory compliance requirements and audit processes
Leadership and Communication
Experience leading security initiatives in fast-growing organizations
Strong communication skills for collaborating with global, distributed teams
Ability to translate technical security concepts for various stakeholders
Comfortable working in a startup environment with evolving requirements
Preferred Qualifications
Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization
Experience in identity management or authentication technologies
Background in both security operations and security engineering
Previous startup or scale-up experience
Located in or willing to work EST hours (strong preference for NY/NJ area)
Public-facing CISO experience (client communications) is a plus but not required
What We're NOT Looking For
Pure policy/governance executives without hands-on technical skills
Traditional "big company" CISOs focused only on strategy and presentations
Candidates who expect to delegate all technical work from day one
Security leaders who haven't maintained current technical skills
Benefits
What We Offer
Opportunity to build and shape security at a growing startup
Direct impact on product and company security posture
Collaborative environment with talented engineering teams
Competitive compensation and equity package
Flexible work arrangements with preference for hybrid in NY/NJ area
Auto-ApplyChief Information Security Officer
Security architect job in New Brunswick, NJ
SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
5. Develop and manage information security budgets and monitor them for variances.
6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance.
11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.
20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.
21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.
22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management
24. Perform related duties and fulfill responsibilities as required.
Requirements:
1. A Master's degree in Business Administration or a Technology related field.
2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role.
3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.
4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST.
5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations.
6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals.
7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical.
8. Strong problem-solving and analytical skills to identify and mitigate potential security risks.
Salary Range: 133,715.00 - 220,639.00 USD
We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials.
The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status.
Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards.
You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
Security System Engineer
Security architect job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id *********************** and contact no is **************.
Easy ApplyInformation Security Manager
Security architect job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)