Cyber Security Architect
Security architect job in Edison, NJ
The Security Architect main role is to design, implement, and oversee our cybersecurity strategy, ensuring robust protection against evolving threats. The ideal candidate will have 7-10 years of experience in cybersecurity architecture, security operations, and risk management with a strong focus on enterprise security solutions, cloud security, identity & access management (IAM), and security best practices. The Security Architect must have hands-on experience with internet secure gateway, EDR, MDR, ITDR, secure email gateway, firewalls, MFA, scripting, policies, data classification, and cloud security controls. This role requires deep expertise in security frameworks, architecture principles, security automation, and compliance standards (NIST, CIS, ISO 27001, Zero Trust, etc.).
Essential Functions
Develop and maintain a comprehensive security architecture covering on-premises, cloud, and hybrid environments.
Design security solutions that align with business objectives while mitigating risk.
Ensure Zero Trust principles, network segmentation, and security best practices are enforced across the enterprise.
Architect cloud security strategies, leveraging best practices for Azure and GCP.
Lead security investigations, conduct root cause analysis, and document incident response actions.
Provide threat intelligence and recommend proactive security measures to mitigate risk.
Implement and maintain cloud security controls in Azure and GCP.
Optimize cloud security solutions for web and network protection.
Ensure Active Directory (AD) and IAM policies align with best practices.
Support identity governance, access reviews, and privileged access management (PAM).
Oversee the continuous best practice is leveraged for data classification policies and enforce data protection controls.
Conduct security assessments and ensure compliance with industry standards (PCI, NIST, CIS).
Recommend, evaluate, and implement new security technologies based on business needs and threat landscape.
• Work with DevOps and IT teams to integrate security automation, security-as-code, and DevSecOps principles.
Additional Functions
Threat Modeling & Risk Management:
Conduct threat modeling, risk assessments, and security reviews for applications, infrastructure, and networks.
Provide technical leadership in responding to security incidents, forensic analysis, and root cause investigations.
Develop and maintain security policies, standards, and playbooks for security operations.
Collaborate with IT and business units to ensure security compliance with regulatory frameworks (PCI DSS, NIST, ISO 27001, SOC 2).
Identity & Access Management (IAM) & Authentication:
Design and enhance IAM policies, privileged access management (PAM), and role-based access control (RBAC).
Enforce strong authentication and MFA strategies using Okta, Microsoft Authenticator, and AD.
Define identity threat detection and response (ITDR) strategies.
Security Governance & Compliance:
Ensure security controls align with industry frameworks (NIST CSF, ISO 27001, CIS, Zero Trust, MITRE ATT&CK).
Assist with audit, regulatory compliance, and security assessments.
Conduct penetration testing, red/blue teaming exercises, and vulnerability management programs.
Provide security guidance for third-party risk management and vendor security evaluations.
Leadership & Collaboration:
Act as a subject matter expert (SME) in cybersecurity architecture and best practices.
Provide mentorship and training to security engineers and analysts.
Work cross-functionally with IT, DevOps, and executive leadership to align security strategy with business goals.
Develop security roadmaps and strategic initiatives for continuous security improvement.
Maintain and fine-tune security configurations across various security platforms.
Identify security gaps and recommend security enhancements and process improvements.
Develop playbooks and automation scripts to enhance security operations efficiency.
Conduct vulnerability assessments and penetration testing to identify security weaknesses in systems and applications.
Develop and implement security policies, procedures, and standards to ensure compliance with industry's best practices and regulatory requirements.
Investigate security breaches and other security incidents to determine the root cause and implement corrective actions.
Stay up-to-date on the latest security threats and vulnerabilities and recommend appropriate security measures.
Collaborate with other IT teams to ensure that security is integrated into all aspects of the organization's IT infrastructure.
Participate in security audits and assessments to identify and address security gaps.
Develop and maintain incident response plans and procedures.
Evaluate and recommend security technologies and solutions to improve the organization's security posture.
Qualifications
7-10 years of experience in cybersecurity architecture, security operations, or cloud security.
Deep understanding of:
Enterprise security architectures, security frameworks (NIST, CIS, Zero Trust, ISO 27001), and best practices
Email secure gateway (Proofpoint, Mimecast)
Firewalls (Palo Alto, Cisco) and network security principles
Cloud security (Azure, GCP) and security automation
IAM, MFA, AD, Okta, Microsoft Authenticator
Endpoint security, EDR, ITDR, and threat intelligence
Data classification, DLP, and information protection
Experience designing secure architectures for large-scale enterprises and cloud environments.
Strong knowledge of DevSecOps, security automation, and scripting (Python, PowerShell, Terraform).
Excellent communication and leadership skills, capable of influencing security strategies across the organization.
CISSP Certifications (Required): CISM and CCSP is plus
A bachelor's degree in computer science, information systems, or a related experience.
7-10 years of experience in cybersecurity, security operations, or network security.
Hands-on expertise with:
Zscaler, CrowdStrike, Microsoft Defender, Sophos
Proofpoint (Email Security Gateway)
EDR & ITDR solutions
Palo Alto & Cisco Firewalls
Okta, Microsoft Authenticator (MFA), Active Directory (AD), IAM
Cloud Security (Azure and GCP)
Data classification and protection strategies
Strong knowledge of threat intelligence, SIEM, vulnerability management, and incident response.
Experience with security frameworks such as PCI, NIST, ISO 27001, CIS Benchmarks.
Strong analytical, problem-solving, and communication skills.
Ability to work independently and collaboratively in a fast-paced environment.
Excellent communication and interpersonal skills, capable of collaborating effectively with cross-functional teams.
Working Conditions & Physical Demands
This position requires in person office presence at least 4x a week.
Cloud Security Engineer - SRE
Security architect job in Berkeley Heights, NJ
Job Posting Title: Cloud Security Engineer - SRE
Job Profile: Technical Project Management - Advisor II
We are seeking a skilled and motivated Cloud Security Engineer - SRE to join our dynamic team. The ideal candidate will possess a strong technical background in systems administration, cloud computing, and infrastructure as code, with a particular focus on solution engineering/site reliability. This role will involve collaborating with cross-functional teams to enhance our security posture and streamline processes through automation.
Technical Skills
• Programming and Scripting: Strong proficiency in languages like Python, Go, Bash, or Ruby. SREs often need to write automation scripts and build tooling.
• Systems Administration: Deep understanding of operating systems (Linux/Unix), file systems, processes, and system configurations.
• Infrastructure as Code (IaC): Experience with IaC tools like Terraform, Ansible, or Chef to manage infrastructure.
• Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, including services like EC2, S3, Kubernetes, and serverless functions.
• Containers and Orchestration: Expertise in containerization (Docker) and container orchestration (Kubernetes, OpenShift).
• Networking: Understanding of networking concepts, including DNS, firewalls, load balancing, and VPNs.
• Monitoring and Observability: Experience with monitoring and observability tools like Prometheus, Grafana, Datadog, or New Relic. Ability to set up and maintain monitoring dashboards, alerts, and logs.
• Continuous Integration/Continuous Deployment (CI/CD): Familiarity with CI/CD tools like Jenkins, GitLab CI, GitHub Actions, or CircleCI.
• A strong understanding of HashiCorp Vault and Terraform will make you stand out.
2. Problem-Solving and Troubleshooting
• Incident Management: Ability to manage and respond to incidents, perform root cause analysis, and implement post-mortem reviews.
• Automation: Focus on automating repetitive tasks to improve efficiency and reduce human error.
• Performance Tuning: Skills in identifying and resolving performance bottlenecks in systems and applications.
3. Collaboration and Communication
• Teamwork: Ability to work closely with cross-functional teams, including software engineers, product managers, and DevOps teams.
• Documentation: Skill in creating clear and comprehensive documentation for systems, processes, and incident reports.
• Communication: Effective communication skills for interacting with stakeholders and explaining technical concepts to non-technical audiences.
4. Reliability and Scalability
• Service-Level Objectives (SLOs) and Service-Level Agreements (SLAs): Understanding of setting, monitoring, and maintaining SLOs and SLAs for system reliability.
• Scalability: Knowledge of best practices for designing and scaling systems to handle increased loads and demands.
• Redundancy and Resilience: Experience in designing systems with redundancy and fault tolerance to minimize downtime.
5. Security and Compliance
• Security Best Practices: Understanding of security principles, such as access control, data encryption, and secure coding practices.
• Compliance: Familiarity with compliance standards like GDPR, HIPAA, or PCI-DSS, depending on the industry.
Minimum Job Qualifications:
• Bachelor degree in business or equivalent work experience
• 10 years of previous program leadership and/or relevant consulting experience
• Knowledge of and demonstrated experience in program management framework, knowledge groups & life cycle
• 5+ years' experience in driving large scale data center consolidation efforts
• Minimum 5 years' experience with matrix management of cross-functional processes and teams
• Proficient with Project Management tools
Vice President, Application Cyber Security Specialist
Security architect job in Iselin, NJ
Job information:
Functional title - Application Security Specialist
Department - IT Security
Corporate level - Vice President
Report to - Director, Application Security
Expected full-time salary range between $ 140,000- $180,000 + variable compensation + 401(k) match + benefits.
What you will be doing:
Perform Application Security scans (e.g. DAST and SCA) on applications and APIs to identify security vulnerabilities and weaknesses,
Triage security findings and collaborate with development teams to prioritize and remediate identified vulnerabilities.
Drive threat modelling as a standard part of the SDLC, and develop and maintain threat models for critical applications, identifying potential security risks and proposing mitigations.
Drive the Security Champions program, and define and promote secure coding practices, patterns, and standards across development teams.
Conduct security reviews and provide guidance on security requirements for new features and projects.
Assist in the analysis, selection and rollout of new application security tools, processes, and standards.
Stay up to date with the latest security threats, vulnerabilities, and industry best practices.
What we're looking for:
Proven experience in application security with a focus on application security testing and vulnerability management.
Hands-on experience with Application Security tools.
Strong understanding of common application vulnerabilities (e.g., OWASP Top 10) and mitigation techniques.
Experience with threat modelling methodologies and tools.
Proficiency in at least one programming language (e.g., Java, Python, JavaScript).
Excellent communication and collaboration skills, with the ability to work effectively in cross functional teams.
Strong understanding of risk management.
Professional qualifications / certifications
Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent).
Relevant security certifications (e.g. CISSP, CEH, CSSLP) or equivalent is preferred.
Information Security Specialist
Security architect job in Horsham, PA
Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment.
This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission.
This is a fully onsite position located in Horsham, PA.
Key Responsibilities
Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms.
Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks.
Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks.
Champion the company's certification to CMMC Level 2.
Develop, document, and enforce cybersecurity policies, procedures, and incident response plans.
Support Government and customer security audits, preparing evidence and remediation plans as required.
Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions.
Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development.
Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data.
Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense.
Qualifications
Required:
Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience).
5+ years of experience in information security, IT security operations, or cybersecurity.
Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements.
Experience developing, implementing and achieving CMMC compliance.
Experience supporting DoD or government contracts with cybersecurity compliance needs.
Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools.
Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint).
Excellent analytical, documentation, and communication skills.
U.S. Citizenship (required due to defense industry regulations).
Preferred:
Active security clearance (Secret or higher), or ability to obtain one.
Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC.
Experience with RMF (Risk Management Framework) and STIG compliance.
Familiarity with secure software development, DevSecOps practices, or classified system security.
Compensation
Competitive salary
Outstanding benefits package
100% Paid Coverage for Medical, Dental, and Vision
401(k) Employer Match
Employee Stock Ownership Program (company funded)
Life Insurance (company funded)
Short-Term Disability (company funded)
Long-Term Disability (company funded)
Vacation & Sick
Holidays: 11 days
HealthCare FSA
Dependent Care FSA
What We Offer
Opportunities for training, certifications, and career growth.
A mission-driven culture where your work contributes to national security.
Exposure to advanced technologies and programs critical to the aerospace and defense sector.
About Delta Information Systems, Inc.
Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities.
In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
Security Architect - Only for GC and Citizen
Security architect job in Long Hill, NJ
SOAIS is a leading enterprise IT solutions provider which has a passion for customer satisfaction, technology innovation with profound industry and business process expertise. It offers a full spectrum of technology solutions in the arena of Oracle Cloud Applications, PeopleSoft, WorkSoft, Workday and niche technology areas such as mobility
Job Description
Note: This role is only for GC and US Citizens.
Note: This role is only for GC and US Citizens
Note: This role is only for GC and US Citizens
Responsibilities:
Design and implement secure enterprise architecture, aligning with business objectives and regulatory requirements.
Develop and maintain security policies, standards, and guidelines.
Conduct risk assessments, threat modeling, and vulnerability analysis for applications, networks, and cloud environments.
Lead the evaluation, selection, and deployment of security tools and technologies (firewalls, SIEM, IAM, DLP, etc.).
Provide security architecture guidance during application and infrastructure design phases.
Collaborate with DevOps and engineering teams to embed security into CI/CD pipelines (DevSecOps).
Ensure compliance with security frameworks and standards (ISO 27001, NIST, CIS, GDPR, HIPAA, etc.).
Investigate and respond to security incidents, working with SOC and incident response teams.
Qualifications
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or related field (Master's preferred).
8+ years of IT/security experience, with at least 3+ years in a Security Architect role.
Strong knowledge of network security, application security, cloud security, and cryptography.
Proficiency with security technologies: SIEM, IDS/IPS, IAM, PKI, WAF, endpoint protection, etc.
Experience with cloud platforms (AWS, Azure, GCP) and security services.
Familiarity with secure coding practices, penetration testing, and vulnerability management.
Relevant certifications (CISSP, CISM, CCSP, SABSA, TOGAF) strongly preferred.
Excellent problem-solving, analytical, and communication skills.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security Architect - Cloud & Enterprise Security - Edison NJ
Security architect job in Edison, NJ
Senior Network Security Architect
We are seeking a Senior Network Security Architect with deep expertise in Palo Alto firewalls and GlobalProtect VPN to lead the design, architecture, and implementation of our enterprise network security strategy. This role goes beyond operations - it requires strategic oversight, hands-on architecture, and leadership in building secure, scalable, and resilient environments.
Responsibilities:
Design and architect enterprise network security solutions, with a primary focus on Palo Alto firewalls and GlobalProtect VPN.
Define security standards, frameworks, and roadmaps to ensure scalability, compliance, and resilience.
Lead the evaluation, design, and deployment of next-generation firewall architectures, segmentation strategies, and remote access solutions.
Collaborate with IT, security, and business stakeholders to align network security with organizational goals.
Provide expert-level troubleshooting and guidance for complex firewall and VPN issues.
Mentor and provide technical direction to engineering staff and cross-functional teams.
Evaluate new technologies, tools, and methods to continuously improve the security posture.
Ensure solutions align with compliance standards (NIST, ISO, CIS, etc.).
Qualifications:
10+ years of experience in network security architecture and design.
Hands-on expertise with Palo Alto Networks firewalls and GlobalProtect (must-have).
Proven ability to design and implement secure network architectures in enterprise environments.
Strong understanding of VPNs, secure remote access, and advanced firewall policies.
Familiarity with cloud integrations (Azure, AWS, or GCP) and hybrid security models preferred.
Excellent communication skills - ability to explain complex architectures to both executives and technical teams.
Relevant certifications such as Palo Alto PCNSE, CISSP, or CCNP Security strongly preferred.
Why This Role Matters:
This is not a maintenance role - it's an opportunity to own the strategy and design of enterprise-wide security architecture while still applying deep technical expertise in Palo Alto and GlobalProtect. You'll directly shape how our organization protects its data, people, and infrastructure.
Laurie Roth
President/Sr. Consultant
DSN-IT
************
*************
**************
****************************************************
Easy ApplySecurity Architect
Security architect job in Middletown, NJ
Complete Description:
· The Enterprise Architect will also be tasked with preparing security standards, policies and procedures - as well as mentoring team members and executive staff on security matters. CISSP REQUIRED.
· The department is seeking an Enterprise Architect to work in conjunction with the Modernization Team, as well as the DHS Information Security and Privacy Office, to analyze and document the existing information security environment.
· Conducting system security and vulnerability analyses and risk assessments
· Evaluating the systems architecture and identifying integration issues
· Serve as Information Security Subject Matter Expert (SME), while working with a Systems Integrator and software vendors, to develop the approach for implementing an enterprise security infrastructure that ensures compliance to standards, policies and procedures
· Monitor delivery efforts to ensure compliance to standards, policies, and procedures
· Deliver evidence, demonstrating project deliverables meet federal certification requirements
· Improves DHS Incident Response efforts by analyzing existing systems\/processes and recommending future technologies and associated processes
· Participate in the RFI\/RFP process for systems module selection
· Participate in the procurement process to select a Systems Integrator to execute the DDI phase
· CISSP certification REQUIRED
· Extensive experience designing and implementing enterprise security architectures based on NIST Risk Management Framework (NIST 800\-53), state and federal security standards, and security industry best practices
· An extensive understanding of security tools and software products, including Identity Access Management (IAM), Security Incident and Event Management (SIEM), and Cloud Access Security Brokers (CASB)
· In\-depth experience in creating, documenting, and implementing enterprise security policies and standards - including enterprise\-wide communication and training
"}}],"is Mobile":false,"iframe":"true","job Type":"Contract","apply Name":"Apply Now","zsoid":"659070196","FontFamily":"PuviRegular","job OtherDetails":[{"field Label":"Contract Duration","uitype":1,"value":"6 months"},{"field Label":"On\-Site vs Remote","uitype":2,"value":"On\-Site"},{"field Label":"Visa Requirement","uitype":1,"value":"Any"},{"field Label":"Industry","uitype":2,"value":"IT Services"},{"field Label":"City","uitype":1,"value":"Middletown"},{"field Label":"State\/Province","uitype":1,"value":"Iowa"},{"field Label":"Zip\/Postal Code","uitype":1,"value":"52638"}],"header Name":"Security Architect","widget Id":"**********00072311","is JobBoard":"false","user Id":"**********00187003","attach Arr":[],"custom Template":"4","is CandidateLoginEnabled":false,"job Id":"**********04811011","FontSize":"15","google IndexUrl":"https:\/\/palettetechnologies.zohorecruit.com\/recruit\/ViewJob.na?digest=Lh304XeNwlnJptzUT2shAdEFCp5SP0AbABceCROpQO8\-&embedsource=Google","location":"Middletown","embedsource":"CareerSite","indeed CallBackUrl":"https:\/\/recruit.zoho.com\/recruit\/JBApplyAuth.do"}
SAP BO Admin
Security architect job in Princeton, NJ
Sonsoft , Inc. is a USA based corporation duly organized under the laws of the Commonwealth of Georgia. Sonsoft Inc. is growing at a steady pace specializing in the fields of Software Development, Software Consultancy and Information Technology Enabled Services.
Job Description
Preferred
• At least 1 year of experience in software development life cycle.
• At least 1 year of experience in creating customized and complex reports using Crystal and Business Objects.
• At least 1 year of experience in writing Nested and Complex queries.
• At least 1 year of experience in creating reports using drill down, prompts and variables.
• At least 1year of experience 0n Query Tuning mechanisms.
• Good understanding of Data Warehouse concepts.
• Must be able to provide Solutions or Enhancements to fix the data issues quickly when reported by the clients or users.
• Flexibility to Self-learn and understand the system, further assist with query tuning and application performance
• Good Analytical Skills
• High impact communication
• Ability to ramp up in new technologies
• Ability to work in team environment with diverse/multiple stakeholders.
• Experience and desire to work in a Global delivery environment.
Qualifications
Qualifications
Basic
• Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education.
• At least 1 year experience with SAP BO Administration
Additional Information
**
U.S. citizens and those authorized to work in the U.S. are encouraged to apply
.
We are unable to sponsor at this time.
Note:-
This is a
Full-Time Permanent
job opportunity for you.
Only US Citizen, Green Card Holder, TN Visa, GC-EAD
,
H4-EAD & L2-EAD can apply.
No OPT-EAD & H1B Consultants please.
Please mention your
Visa Status
in your
email
or
resume
.
Mgr Information Security - Pen Testing
Security architect job in Mount Laurel, NJ
Hours:
40
Pay Details:
$87,000 - $151,000 USD
TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
:
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
Job Description:
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
Responsibilities:
Vendor Management: Manage and coordinate penetration testing engagements with vendors.
People Management: Manage a team of Junior level penetration testers and their development.
DAST: Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
Facilitate Penetration Tests: Perform thorough and methodical penetration testing.
Evaluate and Assign: penetration tests to appropriate resources.
Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
Develop Test Procedures: Design and execute detailed test requirements.
Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
Incidents: Act as a testing SME on incident calls; support testers on the calls.
Depth & Scope:
Advanced knowledge of Bank, technology standards and managing people / projects
Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
Education & Experience:
Bachelor's degree preferred
Information security certification / accreditation an asset
7+ years of relevant experience
Preferred Qualifications :
Technical Skills:
Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
Penetration testing, DAST, Manual Code Review knowledge.
Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
Organizational Skills: Manage documents and procedures for testing team.
Multi-tasking: This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
Familiarity with security standards and frameworks.
Previous experience managing and developing teams.
Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
#TDCyberSecurity #Hybrid
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
Domestic Travel - Occasional
International Travel - Never
Performing sedentary work - Continuous
Performing multiple tasks - Continuous
Operating standard office equipment - Continuous
Responding quickly to sounds - Occasional
Sitting - Continuous
Standing - Occasional
Walking - Occasional
Moving safely in confined spaces - Occasional
Lifting/Carrying (under 25 lbs.) - Occasional
Lifting/Carrying (over 25 lbs.) - Never
Squatting - Occasional
Bending - Occasional
Kneeling - Never
Crawling - Never
Climbing - Never
Reaching overhead - Never
Reaching forward - Occasional
Pushing - Never
Pulling - Never
Twisting - Never
Concentrating for long periods of time - Continuous
Applying common sense to deal with problems involving standardized situations - Continuous
Reading, writing and comprehending instructions - Continuous
Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-ApplySAP Security Analyst
Security architect job in Raritan, NJ
A highly skilled and experienced SAP Security Specialist is needed to join the team. The specialist will focus on the secure and compliant operation of the SAP landscape, specifically across SAP BusinessObjects Data Services BODS, SAP Landscape Transformation Replication Server SLT, SAP Ariba, and SAP Signavio. The specialist will be responsible for designing, implementing, and maintaining robust security solutions that meet business needs and compliance requirements. This role requires a strong understanding of SAP authorization concepts, risk management, and the ability to work collaboratively across various teams.
Responsibilities:
Design, develop, and maintain SAP security roles and authorizations within BODS, SLT, Ariba, and Signavio environments, aligning with security policies, standards, and SoD requirements.
Administer user access, troubleshoot issues, and oversee GRC implementation and user access reviews for the specified SAP applications.
Conduct security assessments, monitor and report on security events, and support audits.
Collaborate with IT and functional teams to define and implement security policies and provide user support.
Lead SAP security tasks in projects, supporting implementations and managing change control processes.
Develop and maintain the SAP Signavio Process Intelligence security model and ensure secure data access control.
Manage SSO, user provisioning, and integrations with IdMGRC if applicable.
Analyze and troubleshoot access issues, ensuring least privilege and SoD compliance.
Maintain audit trails and ensure system compliance with internal and external controls e.g., SOX.
Work closely with SAP Basis and Cloud Identity Services for user lifecycle and identity federation.
Participate in system upgrades, patching, and cutovers by validating security impacts.
Provide documentation and knowledge transfer to support and audit teams.
Qualifications:
Bachelor's degree in a relevant field.
Minimum of 10+ years of SAP Security experience with proven project delivery.
Strong knowledge in:
SAP BODS repository and runtime user security.
SLT rolebased access control and connection configurations.
SAP Ariba user provisioning via Ariba Administration, CIG or BTP, integration with SSO and Active Directory.
Signavio cloud user management and role assignments through SAP BTP cockpit or SCIMbased provisioning.
Expert knowledge of SAP authorization security, implementation methodologies, and SoD concepts.
Experience with SAP GRC Access Control.
Demonstrated ability to design SAP security solutions and experience in endtoend SAP security project lifecycles.
Excellent communication and collaboration skills.
Preferred Qualifications:
SAP Ariba certification.
Experience with EIMSailPoint, SAP Solution ManagerChaRM, and SAP Business Technology Platform BTP.
Bachelor's degree in Computer Science, Information Technology, or related discipline.
SAP Security or GRC certification is a plus.
Experience in multitenant SAP Ariba or Signavio deployment models.
Knowledge of compliance frameworks e.g., ISO, NIST, SOX.
This job description provides an overview of the responsibilities and qualifications required for an SAP Security Specialist role with a focus on BODS, SLT, Ariba, and Signavio. It can be further customized based on specific organizational needs and the seniority level of the position.
Auto-ApplyInformation Security Manager
Security architect job in East Brunswick, NJ
Job DescriptionSalary:
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
Please click on the link below to apply for this position:
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organizations cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelors degree in Cybersecurity, Information Technology, Computer Science, or related field
710+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Senior Network Security Architect
Security architect job in Princeton, NJ
We Have been providing IT Staffing and software development services for several years and has earned invaluable experiences in handling clients with varied needs and requirements. Exposure to wide variety of clients has made us realize the importance of customization and flexibility and this has made it stand out against its competitors.
GM Infotech is a company that works in a flexible environment for software development process, adjusting as per our clients' requirements. Quality work is a prerequisite for every task we undertake at Epsilon Soft Software Solutions Ltd as we consider that “every day counts”. And why not; we know that good jobs always bring new clients
Job Role: Senior Network Security Architect
Location: Princeton, NJ
Duration: Full Time (Permanent Position)
Salary Range: 175-225K
REPORTS TO: Chief Information Security Officer
PRIMARY JOB DESCRIPTION:
The Senior Network Security Architect is responsible for assuming a lead role in securing enterprise information by determining security requirements; planning, implementing and testing security systems; preparing security standards, policies and run-book procedures as well as mentoring team members.
Qualifications
Active involvement in day-to-day infrastructure change management Successful candidates will have the following qualifications:
Technical Capabilities Engineering Mindset the ability to participate and lead in-depth technical discussions with network engineers, Linux and windows administrators and application developers. Strong understanding of network security, network hardware configuration, network protocols and networking standards
Critical Thinking ability to determine network security architecture requirements in context to industry best practices and various security standards such as NIST ability to determine network security architecture requirements in context to the unique risks associated with the MIAX businesses o ability to account for the unique challenges and constraints of the various technical and business domains when designing and implementing security products and procedures o ability to establish formal testing methodologies and operational readiness assessments of new security products
Team Player the ability to analyze potential solutions from various view-points and critically evaluate pros/cons of each approach 2
Technology ability to be highly collaborative with all stakeholders and take a leadership role in driving toward solutions
Communication Skills possess a passion for technology and security safeguarding with a desire to over-deliver
Flexible and Adaptable possess excellent verbal and written communication skills with the ability to communicate to all stakeholder levels
Decision Making capable of changing direction where required and demonstrating the flexibility to meet new demands
Multi-Tasking capable of making decisions that are well informed and timely
Minimum of a Bachelor ability to manage several concurrent projects, prioritize demands, satisfy date commitments and clearly communicate status Education: 's degree (Computer Science, Engineering or other related field)
Additional Information
If my requirement matches your resume, then please do reply on my email id *********************** and contact no is **************.
Easy ApplyDirector, Business Information Security Officer
Security architect job in Princeton, NJ
The Director, Business Information Security Officer is responsible for providing leadership and operational oversight in safeguarding enterprise information assets. This role is pivotal in delivering the services for information security assurance across third-party suppliers, business applications, cloud platforms and other core technologies, as well as the development and delivery of solutions for the protection of information assets.
As a senior member of the information security team reporting to the CISO, this role leads a team that serves as the key interface between the business, IT, and information security - driving the identification, evaluation and prioritization of information security risks and measuring the progress of the overall information security program through benchmarking and metrics. The position also acts as a trusted representative of the CISO in the delivery of security training & awareness to the organization and contributes to the evolution of the enterprise-wide information security program.
****
The Director, Business Information Security Officer leads a team in identifying and managing information security risks through assessments and cybersecurity risk management processes and owns services for both security awareness & training and information protection. The Director works with and coordinates across business functions, compliance teams, IT, and shared services groups. The Business Information Security Officer's core responsibilities include:
+ Lead cross-functional initiatives to establish and mature cybersecurity risk management processes in collaboration with business and IT colleagues.
+ Deliver security assurance services for third-party suppliers, cloud services, and business technologies.
+ Manage and mentor a specialized team focused on cybersecurity risk management, cybersecurity assurance, awareness & training/phishing awareness, and information protection.
+ Support the CISO in development of an information protection strategy to protect sensitive data from loss, leakage, or unauthorized exfiltration.
+ Execute against the information protection strategy through implementation and management of services for information protection, leveraging data loss prevention (DLP) and data security posture management technologies in partnership with business, information security, and IT colleagues.
+ Conduct periodic assessments of information handling practices and work with colleagues to classify and identify vital information and apply controls that mitigate risks.
+ Monitor emerging threats and regulatory changes related to information/data protection.
+ Support the CISO in establishing and reporting on metrics for key risk indicators (KRIs) and key performance indicators (KPIs) that measure the effectiveness of the information security program.
+ Conduct periodic benchmarking to assess information security maturity and recommend enhancements.
+ Develop and communicate training and awareness on security best practices throughout the organization.
+ Manage the ongoing delivery of phishing campaigns and responses to phishing alerts in coordination with the cybersecurity operations team.
+ Remain current on information security frameworks, guidance, best practices, and regulatory requirements impacting the pharmaceutical industry.
+ Collaborate deeply with peers in Security Operations and Information Security Architecture, taking an integrated approach to managing and reducing cyber risk across the organization.
**Qualifications/ Required**
Knowledge/ Experience and Skills:
+ 10+ years of experience within information security or IT GRC organizations; experience in the pharmaceutical/life sciences industry is desirable.
+ 5+ years of experience in development and management of information security risk assessment processes for applications and third parties.
+ 5+ years of experience in assessment of systems hosted in company or third-party cloud environments (e.g., AWS, Oracle, Azure).
+ Extensive knowledge of solutions and best practices for information protection / data loss protection, including Microsoft Purview and other solutions.
+ Expert understanding of risk management, compliance, and governance frameworks related to cybersecurity.
+ Ability to think strategically, lead initiatives, and provide leadership in the definition of solutions for risk mitigation.
+ Demonstrated ability to influence through leadership and collaboration - fostering a community of knowledge-sharing, collaboration, and forward-thinking.
+ The capacity to actively learn and apply security domain knowledge, knowledge, and best practices to guide the definition of security requirements in support of business initiatives.
+ Strong skills for critical thinking, analyzing, and assessing problems and implications, identifying patterns, making connections of underlying issues, understanding risks, and developing mitigation strategies, and taking ownership of the outcome.
+ Proven record as a strong communicator both in written and oral presentations; capable of rapidly creating detailed, yet concise written reports.
+ Ability to communicate technical ideas and concepts clearly, verbally and written, to technical and non-technical audiences, especially in articulating technical vision to executive levels.
Educational Qualifications
+ Bachelor's degree in computer science, Information Security, or a related field. A master's degree is desirable.
+ Certifications such as CISSP, CISM, CISA, or similar are highly desirable.
**Competencies**
**Accountability for Results -** Stay focused on key strategic objectives, be accountable for high standards of performance, and take an active role in leading change.
**Strategic Thinking & Problem Solving -** Make decisions considering the long-term impact to customers, patients, employees, and the business.
**Patient & Customer Centricity -** Maintain an ongoing focus on the needs of our customers and/or key stakeholders.
**Impactful Communication -** Communicate with logic, clarity, and respect. Influence at all levels to achieve the best results for Otsuka.
**Respectful Collaboration -** Seek and value others' perspectives and strive for diverse partnerships to enhance work toward common goals.
**Empowered Development -** Play an active role in professional development as a business imperative.
Minimum $164,530.00 - Maximum $245,985.00, plus incentive opportunity: The range shown represents a typical pay range or starting pay for individuals who are hired in the role to perform in the United States. Other elements may be used to determine actual pay such as the candidate's job experience, specific skills, and comparison to internal incumbents currently in role. Typically, actual pay will be positioned within the established range, rather than at its minimum or maximum. This information is provided to applicants in accordance with states and local laws.
**Application Deadline** : This will be posted for a minimum of 5 business days.
**Company benefits:** Comprehensive medical, dental, vision, prescription drug coverage, company provided basic life, accidental death & dismemberment, short-term and long-term disability insurance, tuition reimbursement, student loan assistance, a generous 401(k) match, flexible time off, paid holidays, and paid leave programs as well as other company provided benefits.
Come discover more about Otsuka and our benefit offerings; ********************************************* .
**Disclaimer:**
This job description is intended to describe the general nature and level of the work being performed by the people assigned to this position. It is not intended to include every job duty and responsibility specific to the position. Otsuka reserves the right to amend and change responsibilities to meet business and organizational needs as necessary.
Otsuka is an equal opportunity employer. All qualified applicants are encouraged to apply and will be given consideration for employment without regard to race, color, sex, gender identity or gender expression, sexual orientation, age, disability, religion, national origin, veteran status, marital status, or any other legally protected characteristic.
If you are a qualified individual with a disability or a disabled veteran, you may request a reasonable accommodation, if you are unable or limited in your ability to apply to this job opening as a result of your disability. You can request reasonable accommodations by contacting Accommodation Request (EEAccommodations@otsuka-us.com) .
**Statement Regarding Job Recruiting Fraud Scams**
At Otsuka we take security and protection of your personal information very seriously. Please be aware individuals may approach you and falsely present themselves as our employees or representatives. They may use this false pretense to try to gain access to your personal information or acquire money from you by offering fictitious employment opportunities purportedly on our behalf.
Please understand, Otsuka will **never** ask for financial information of any kind or for payment of money during the job application process. We do not require any financial, credit card or bank account information and/or any payment of any kind to be considered for employment. We will also not offer you money to buy equipment, software, or for any other purpose during the job application process. If you are being asked to pay or offered money for equipment fees or some other application processing fee, even if claimed you will be reimbursed, this is not Otsuka. These claims are fraudulent and you are strongly advised to exercise caution when you receive such an offer of employment.
Otsuka will also never ask you to download a third-party application in order to communicate about a legitimate job opportunity. Scammers may also send offers or claims from a fake email address or from Yahoo, Gmail, Hotmail, etc, and not from an official Otsuka email address. Please take extra caution while examining such an email address, as the scammers may misspell an official Otsuka email address and use a slightly modified version duplicating letters.
To ensure that you are communicating about a legitimate job opportunity at Otsuka, please only deal directly with Otsuka through its official Otsuka Career website ******************************************************* .
Otsuka will not be held liable or responsible for any claims, losses, damages or expenses resulting from job recruiting scams. If you suspect a position is fraudulent, please contact Otsuka's call center at: ************. If you believe you are the victim of fraud resulting from a job recruiting scam, please contact the FBI through the Internet Crime Complaint Center at: ******************* , or your local authorities.
Otsuka America Pharmaceutical Inc., Otsuka Pharmaceutical Development & Commercialization, Inc., and Otsuka Precision Health, Inc. ("Otsuka") does not accept unsolicited assistance from search firms for employment opportunities. All CVs/resumes submitted by search firms to any Otsuka employee directly or through Otsuka's application portal without a valid written search agreement in place for the position will be considered Otsuka's sole property. No fee will be paid if a candidate is hired by Otsuka as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
Engineer, Information Security and Risk
Security architect job in Trenton, NJ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Chief Information Security Officer (CISO)
Security architect job in Iselin, NJ
Job Description
1Kosmos is a growing startup revolutionizing identity and authentication solutions. We're seeking a hands-on security leader who thrives in a technical, fast-paced environment and is ready to build and scale our security operations from the ground up.
About the Role
We're looking for a hands-on security leader to serve as CISO. The candidate must be a highly technical, operationally focused security leader who can roll up their sleeves and directly implement security solutions while building our security posture. This role is ideal for a senior security operations professional ready to transition into strategic leadership while maintaining a deep technical involvement.
Key Responsibilities
Security Operations Leadership (Primary Focus)
Design, implement, and manage a comprehensive security operations infrastructure
Personally configure and deploy security tools, including endpoint protection, SIEM, and cloud security solutions
Build and optimize security monitoring, incident response, and threat detection capabilities
Drive automation initiatives to eliminate manual inefficiencies in security processes
Compliance and Risk Management
Lead compliance initiatives including FedRAMP, SOC 2, and other regulatory frameworks
Partner with business analysts to navigate regulatory requirements and audits
Develop and maintain security policies, procedures, and documentation
Manage security risk assessments and remediation programs
Technical Security Architecture
Secure cloud infrastructure across AWS, Google Cloud, and other platforms
Integrate security into CI/CD pipelines, working closely with DevOps teams
Implement and manage security tools (CrowdStrike, etc.) across the organization
Conduct hands-on security reviews of architecture and code
Cross-functional Collaboration
Partner directly with development and engineering teams on secure software development
Oversee internal IT security (smaller component of role)
Communicate security initiatives and status to leadership and stakeholders
Coordinate with global teams to ensure consistent security practices
Requirements
Required Qualifications
Technical Expertise
Minimum 7+ years in security operations with demonstrated hands-on experience
Deep expertise in cloud security (AWS, Google Cloud, Azure)
Proven ability to personally deploy and configure enterprise security tools
Strong understanding of modern DevOps practices and CI/CD security integration
Experience with security automation and orchestration
Compliance and Governance
Hands-on experience with FedRAMP certification processes
Track record of achieving and maintaining SOC 2, ISO 27001, or similar certifications
Understanding of regulatory compliance requirements and audit processes
Leadership and Communication
Experience leading security initiatives in fast-growing organizations
Strong communication skills for collaborating with global, distributed teams
Ability to translate technical security concepts for various stakeholders
Comfortable working in a startup environment with evolving requirements
Preferred Qualifications
Currently in a similar-sized company CISO role, or a Deputy CISO, Director of Security Operations, or similar "CISO minus one" role at a larger organization
Experience in identity management or authentication technologies
Background in both security operations and security engineering
Previous startup or scale-up experience
Located in or willing to work EST hours (strong preference for NY/NJ area)
Public-facing CISO experience (client communications) is a plus but not required
What We're NOT Looking For
Pure policy/governance executives without hands-on technical skills
Traditional "big company" CISOs focused only on strategy and presentations
Candidates who expect to delegate all technical work from day one
Security leaders who haven't maintained current technical skills
Benefits
What We Offer
Opportunity to build and shape security at a growing startup
Direct impact on product and company security posture
Collaborative environment with talented engineering teams
Competitive compensation and equity package
Flexible work arrangements with preference for hybrid in NY/NJ area
Chief Information Security Officer
Security architect job in New Brunswick, NJ
SPHS-Info Tech-General The Chief Information Security Officer will: 1. Develop, implement and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization. Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in business continuity and IT operations). This includes hiring, training, staff development, performance management and annual performance reviews.
2. Facilitate information security governance through the implementation of a hierarchical governance program, including the formation of an information security steering committee or advisory board.
3. Develop, maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
4. Create, communicate and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers.
5. Develop and manage information security budgets and monitor them for variances.
6. Create and manage information security and risk management awareness training programs for all employees, contractors and approved system users.
7. Work directly with the business units to facilitate IT risk assessment and risk management processes, and work with stakeholders throughout the enterprise on identifying acceptable levels of residual risk.
8. Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program.
9. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection.
10. Develop and enhance an information security management program based on the NIST Cybersecurity Framework and PCI-DSS Compliance.
11. Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
12. Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
13. Coordinate information security and risk management projects with resources from the IT organization and business unit teams.
14. Ensure that security programs are in compliance with relevant laws, regulations and policies to minimize or eliminate risk and audit findings.
15. Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
16. Define and facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address negative findings.
17. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data and the company's reputation.
18. Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
19. Liaise with external agencies, such as law enforcement and other advisory bodies as necessary, to ensure that the organization maintains a strong security posture.
20. Coordinate the use of external resources involved in the information security program, including, but not limited to, interviewing, negotiating contracts and fees, and managing external resources.
21. Develop and oversee effective disaster recovery policies and standards to align with enterprise business continuity management program goals. Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event. Provide direction, support and in-house consulting in these areas.
22. Facilitate a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation, and increase the maturity of the security.
23. Understand and interact with related disciplines through committees to ensure the consistent application of policies and standards across all technology projects, systems and services, including, but not limited to, privacy, risk management, compliance and business continuity management
24. Perform related duties and fulfill responsibilities as required.
Requirements:
1. A Master's degree in Business Administration or a Technology related field.
2. Six (6) to Ten (10) years of experience in a hospital setting in a combination of risk management, information security, and IT roles, with at least four (4) years of those in a senior leadership role.
3. Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry/Data Security Standard.
4. Knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and NIST.
5. Experience developing information security policies and procedures, successfully executing programs, and experience with contract/vendor negotiations.
6. Excellent leadership and team management skills, with the ability to manage and direct a team of IT security professionals.
7. Excellent communication and interpersonal skills to effectively communication security policies and procedures to various stakeholders, both technical and non-technical.
8. Strong problem-solving and analytical skills to identify and mitigate potential security risks.
Salary Range: 133,715.00 - 220,639.00 USD
We offer competitive base rates that are determined by many factors, including job-related work experience, internal equity, and industry-specific market data. In addition to base salary, some positions may be eligible for clinical certification pay and shift differentials.
The salary range listed for exempt positions reflects full-time compensation and will be prorated based on employment status.
Saint Peter's offers a robust benefits program to eligible employees that will support you and your family in working toward achieving and maintaining secure, healthy lives now and into the future. Benefits include medical, dental, and vision insurance; savings accounts, voluntary benefits, wellness programs and discounts, paid life insurance, generous 401(k) match, adoption assistance, back-up daycare, free onsite parking, and recognition rewards.
You can take your career to the next level by participating in either a fully paid tuition program or our generous tuition assistance program. Learn more about our benefits by visiting our site at Saint Peter's.
Mgr Information Security - Pen Testing
Security architect job in Mount Laurel, NJ
Mount Laurel, New Jersey, United States of America **Hours:** 40 **Pay Details:** $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
**Line of Business:**
Technology Solutions
**:**
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
**Job Description:**
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
**Responsibilities:**
+ **Vendor Management:** Manage and coordinate penetration testing engagements with vendors.
+ **People Management:** Manage a team of Junior level penetration testers and their development.
+ **DAST:** Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
+ **Facilitate Penetration Tests:** Perform thorough and methodical penetration testing.
+ **Evaluate and Assign:** penetration tests to appropriate resources.
+ **Vulnerability Assessment:** Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
+ **Report Findings:** Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
+ **Develop Test Procedures:** Design and execute detailed test requirements.
+ **Stay Current:** Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
+ **Collaborate with Teams:** Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
+ **Perform Risk Assessments:** Evaluate and assess potential security risks related to new and existing systems and technologies.
+ **Compliance:** Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
+ **Incidents:** Act as a testing SME on incident calls; support testers on the calls.
**Depth & Scope:**
+ Advanced knowledge of Bank, technology standards and managing people / projects
+ Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
+ Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
**Education & Experience:**
+ Bachelor's degree preferred
+ Information security certification / accreditation an asset
+ 7+ years of relevant experience
**Preferred Qualifications :**
+ **Technical Skills:**
+ Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
+ Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
+ Penetration testing, DAST, Manual Code Review knowledge.
+ **Analytical Skills:** Strong analytical and problem-solving abilities with attention to detail.
+ **Organizational Skills:** Manage documents and procedures for testing team.
+ **Multi-tasking** : This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
+ **Communication:** Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
+ **Ethical Standards:** Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
+ Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
+ Familiarity with security standards and frameworks.
+ Previous experience managing and developing teams.
+ **Certifications:** Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
+ Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
+ Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
\#TDCyberSecurity #Hybrid
**Physical Requirements:**
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
+ Domestic Travel - Occasional
+ International Travel - Never
+ Performing sedentary work - Continuous
+ Performing multiple tasks - Continuous
+ Operating standard office equipment - Continuous
+ Responding quickly to sounds - Occasional
+ Sitting - Continuous
+ Standing - Occasional
+ Walking - Occasional
+ Moving safely in confined spaces - Occasional
+ Lifting/Carrying (under 25 lbs.) - Occasional
+ Lifting/Carrying (over 25 lbs.) - Never
+ Squatting - Occasional
+ Bending - Occasional
+ Kneeling - Never
+ Crawling - Never
+ Climbing - Never
+ Reaching overhead - Never
+ Reaching forward - Occasional
+ Pushing - Never
+ Pulling - Never
+ Twisting - Never
+ Concentrating for long periods of time - Continuous
+ Applying common sense to deal with problems involving standardized situations - Continuous
+ Reading, writing and comprehending instructions - Continuous
+ Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
**Who We Are:**
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
**Our Total Rewards Package**
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more (***************************************
**Additional Information:**
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
**Colleague Development**
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
**Training & Onboarding**
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
**Interview Process**
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
**Accommodation**
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at *************** . Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Federal law prohibits job discrimination based on race, color, sex, sexual orientation, gender identity, national origin, religion, age, equal pay, disability and genetic information.
Security System Engineer
Security architect job in Summit, NJ
Job Description
Security | Access Control + Video + Networking
About the Team You will be joining a tight group that takes pride in clean execution and follow through. They care about communication, ownership, and doing what you say you will do. The culture is steady, supportive, and built on people who solve problems. Leadership is hands-on and gives you room to work without micromanagement.
What You Get To Do
You are the one who makes the system work.
Configure and commission IP cameras, access control panels, and video intercoms
Prepare Windows servers for deployment
(RAID setup, NIC configuration, software installs, roles)
Validate and troubleshoot network pathing on Cisco and HP switches
(VLANs, routing, firewall ports, device communication)
Work on point to point wireless and WLAN connectivity when needed
Identify and correct video performance issues
Resolve access control and video software issues
Document configurations and device changes using Visio and Excel
Meet with customers onsite to complete configurations and final commissioning
Month to month you are roughly:
60 percent at home or office behind the keyboard
40 percent onsite with customers making the system live
Technicians handle the physical installation.
You step in when it is time to bring it online and prove it works.
What You've Already Done
Programmed access control or video surveillance systems
(Example: Omnicast, Synergis, Identicard, Keri, or equivalent)
Worked in networking at a practical level
(Cisco or HP switches, VLANs, routing, firewalls)
Supported Windows environments
(group policy, imaging, local security, hardware troubleshooting)
Used Wireshark or similar tools to troubleshoot TCP/IP traffic
Communicated directly with customers and closed out technical issues
You do not need to be a CCNP expert.
A CCNA level skill set or equivalent experience is the goal.
Keys To Winning Here
Strong follow up and completion
Consistency
Positive attitude
Curiosity to learn and get better
Time management
Attention to detail
This is a role for someone who enjoys being the person that others rely on when it has to work.
If that sounds like where you want to be, let's talk.
Information Security Manager
Security architect job in East Brunswick, NJ
About Us:
Atlas Systems Inc. is a Software Solutions company headquartered in East Brunswick, NJ. Incorporated in 2003, Atlas provides comprehensive range of solutions in the area of GRC, Technology, Procurement, Healthcare Provider and Oracle to customers across the globe. Combining our unparalleled experience of over a decade in the software industry and global reach, we have grown with extensive capabilities across industry verticals.
For more information, please visit our website
*****************************
**************************************
Position Summary:
We are seeking an experienced Information Security Manager to lead the organization's cybersecurity strategy, operations, and compliance programs. This role ensures the confidentiality, integrity, and availability of information systems while driving continuous improvement in security posture and risk management.
Key Responsibilities:
Develop, implement, and maintain information security strategy, policies, and standards.
Align security programs with regulatory requirements and frameworks (NIST CSF, ISO 27001, HIPAA, SOC 2).
Oversee daily security operations including monitoring, incident detection, response, and remediation.
Manage vulnerability assessments, penetration testing, patching, and threat intelligence.
Lead cloud and infrastructure security initiatives across Microsoft Azure, Microsoft 365, and hybrid environments.
Implement and manage identity and access controls, endpoint protection, and data loss prevention.
Oversee SIEM, SOAR, and security monitoring platforms (Azure Sentinel, Defender, etc.).
Conduct third-party/vendor risk assessments and application security reviews.
Ensure compliance through internal audits, client assessments, and timely remediation.
Deliver enterprise-wide security awareness and training programs.
Collaborate with IT, DevOps, Legal, and business teams to embed security in projects and solutions.
Lead, mentor, and develop security team members while fostering a culture of security awareness.
Act as the escalation point for critical incidents and client-facing security discussions.
Qualifications:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field
7-10+ years of progressive experience in information security with at least 3 years in a leadership role.
Hands-on expertise in Microsoft Azure security ecosystem (Azure AD, Conditional Access, Sentinel, Defender, Key Vault).
Strong knowledge of SIEM, SOAR, endpoint security, and vulnerability management tools.
Proven track record managing incident response and SOC operations.
Excellent leadership, stakeholder management, and communication skills.
Preferred Certifications:
CISSP (Certified Information Systems Security Professional)
CISM (Certified Information Security Manager)
Microsoft Certified: Azure Security Engineer Associate (AZ-500)
Microsoft Certified: Cybersecurity Architect Expert (SC-100)
Mgr Information Security - Pen Testing
Security architect job in Mount Laurel, NJ
Hours: 40 Pay Details: $87,000 - $151,000 USD TD is committed to providing fair and equitable compensation opportunities to all colleagues. Growth opportunities and skill development are defining features of the colleague experience at TD. Our compensation policies and practices have been designed to allow colleagues to progress through the salary range over time as they progress in their role. The base pay actually offered may vary based upon the candidate's skills and experience, job-related knowledge, geographic location, and other specific business and organizational needs.
As a candidate, you are encouraged to ask compensation related questions and have an open dialogue with your recruiter who can provide you more specific details for this role.
Line of Business:
Technology Solutions
:
The Manager Information Security manages / leads a team of Technology Controls / Information Security experts in the development and/ or management of relevant strategies, programs, tools, frameworks and policies and provides specialized oversight / control / governance activities for a key business line/segment or transformational (change the bank) strategic initiative / program, liaising across the organization and primarily interfacing with executive and/or functional stakeholders to minimize overall technology risks to the Bank for own area.
Job Description:
This position manages junior level penetration testers, vendor coordination for multiple testing services, processes, procedures and scheduling for penetration, dynamic scanning, and manual code review testing services.
Responsibilities:
* Vendor Management: Manage and coordinate penetration testing engagements with vendors.
* People Management: Manage a team of Junior level penetration testers and their development.
* DAST: Manage the DAST program and tooling. Familiarity with current industry tooling and technologies and those being introduced.
* Facilitate Penetration Tests: Perform thorough and methodical penetration testing.
* Evaluate and Assign: penetration tests to appropriate resources.
* Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
* Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
* Develop Test Procedures: Design and execute detailed test requirements.
* Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
* Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements; work closely with advisory and SDLC pipeline teams to ensure compliance; work closely with PCS team to manage PCI testing requirements. This position will collaborate with many application security teams.
* Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
* Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
* Incidents: Act as a testing SME on incident calls; support testers on the calls.
Depth & Scope:
* Advanced knowledge of Bank, technology standards and managing people / projects
* Leads a small team of IT professionals; coaches/ educates, monitors and manages team members
* Strong communication, negotiation and organizational skills specifically including the ability to present options in business terms to both IT and business staff including executives
Education & Experience:
* Bachelor's degree preferred
* Information security certification / accreditation an asset
* 7+ years of relevant experience
Preferred Qualifications :
* Technical Skills:
* Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
* Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
* Penetration testing, DAST, Manual Code Review knowledge.
* Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
* Organizational Skills: Manage documents and procedures for testing team.
* Multi-tasking: This job requires exceptional ability to multi-task with multiple workstreams to manage daily.
* Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
* Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
* Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
* Familiarity with security standards and frameworks.
* Previous experience managing and developing teams.
* Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
* Provide support and consulting in preparation for Audits and in composing management responses and appropriate remediation activities
* Participate in computer security incident responses relevant to business (or enterprise wide) and represent respective function and Enterprise position to the business, and business needs to incident response team
#TDCyberSecurity #Hybrid
Physical Requirements:
Never: 0%; Occasional: 1-33%; Frequent: 34-66%; Continuous: 67-100%
* Domestic Travel - Occasional
* International Travel - Never
* Performing sedentary work - Continuous
* Performing multiple tasks - Continuous
* Operating standard office equipment - Continuous
* Responding quickly to sounds - Occasional
* Sitting - Continuous
* Standing - Occasional
* Walking - Occasional
* Moving safely in confined spaces - Occasional
* Lifting/Carrying (under 25 lbs.) - Occasional
* Lifting/Carrying (over 25 lbs.) - Never
* Squatting - Occasional
* Bending - Occasional
* Kneeling - Never
* Crawling - Never
* Climbing - Never
* Reaching overhead - Never
* Reaching forward - Occasional
* Pushing - Never
* Pulling - Never
* Twisting - Never
* Concentrating for long periods of time - Continuous
* Applying common sense to deal with problems involving standardized situations - Continuous
* Reading, writing and comprehending instructions - Continuous
* Adding, subtracting, multiplying and dividing - Continuous
The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required. The listed or specified responsibilities & duties are considered essential functions for ADA purposes.
Who We Are:
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing - and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investments we make in our colleagues to help them and their families achieve their financial, physical and mental well-being goals. Total Rewards at TD includes base salary and variable compensation/incentive awards (e.g., eligibility for cash and/or equity incentive awards, generally through participation in an incentive plan) and several other key plans such as health and well-being benefits, savings and retirement programs, paid time off (including Vacation PTO, Flex PTO, and Holiday PTO), banking benefits and discounts, career development, and reward and recognition. Learn more
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD - and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
TD Bank is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, status as a protected veteran or any other characteristic protected under applicable federal, state, or local law.
If you are an applicant with a disability and need accommodations to complete the application process, please email TD Bank US Workplace Accommodations Program at ***************. Include your full name, best way to reach you and the accommodation needed to assist you with the applicant process.
Auto-Apply