Cyber Security Analyst CyberArk @ PSEG | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Cyber Security Analyst CyberArk jobs in Newark, NJ
78 applicants
company-logo

PSEG · 1 week ago

Cyber Security Analyst CyberArk

Wonder how qualified you are to the job?

EnergyEnergy Efficiency

Insider Connection @PSEG

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Leads and manages PAM technologies
Provides technical expertise in threat/risk assessments related to privileged access
Defines, designs, and implements strategies to protect against emerging threats using PAM tools
Responds to security incidents as needed
Performs security reviews on new PAM technologies and changes to existing technologies
Manages information privileged access management technologies

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

IAMPAMCybersecurityRisk assessmentInformation securityProcess designSecurity automationIAM architecture designTechnical experienceNetwork securitySystems developmentSecurity softwareSIEMFirewallsIntrusion detectionVulnerability assessmentEncryptionIdentity access controlAnti-malwareSecurity event analysisFinancial managementInformation security principlesProblem-solvingHard-workingLeadershipTeamworkInterpersonal communicationTeachingCISSPPython

Required

Bachelor's degree in Computer Science, Information Systems, Cyber Security, Math or Engineering and a minimum of 4 years of experience in Information Security; In lieu of a degree, 8 years of experience in Information Security.
Experience providing technical PAM expertise IT management and staff in cybersecurity threat risk assessments, development, testing and the implementation and operation of appropriate information security plans, procedures, and control techniques designed to prevent, minimize or quickly recover from cyber-attacks or other serious events.
Must have strong Identity and Access Management (IAM) and PAM experience.
Must be proficient in defining processes and procedures for PAM.
Ability to follow cyber security news and alerts, understands complex attack vectors and risks, and identifies and evaluates emergent cyber security threats and vulnerabilities.
Demonstrated ability to recommend appropriate corrective actions for information security incidents and provides risk mitigation recommendations to management and team.
Experience with designing process flows to be implemented in security automation tools to automatically respond to threats quickly and effectively.
Experience with reviewing complex IAM architecture design diagrams and documents for new technologies and changes to existing technologies to determine risks and provide recommendations and mitigations.
Must be able to work independently with little or no supervision.
Must demonstrate strong verbal and written communication skills.
Must demonstrate strong leadership, technical teamwork, and interpersonal skills.
Ability and willingness to work in strong team environment, constantly teaching and learning from other team members.
Ability to foster working relationships with the team, IT Management and Client departments.
Ability to explain technical concepts to the business users in the context of business requirements.
Must demonstrate technical experience including: information / data / network / computer security design, administration and/or assessment.
Must demonstrate broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware and operating systems.
Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis.
Must demonstrate strong organizational, managerial, and financial management skills.
Must demonstrate the ability to communicate effectively with both technical and non-technical individuals.
Must have strong planning skills and be results oriented.
Must demonstrate a solid working knowledge of Information Security principles and practices.

Preferred

ISC2 Certified Information Systems Security Professional (CISSP) or equivalent
Programming Experience in Python
None Noted

Benefits

Medical
Vision
Dental
Well-being and Behavioral Health Programs
401(k) with Company Match
Company Paid Life Insurance
Tuition Reimbursement
Minimum of 18 Days of Paid Time Off per Year

Company

“Public service” is not just in our name. It’s who we are. It’s what we do. We keep the lights on.

Funding

Current Stage
Public Company
Total Funding
$1.25B
2024-04-05Post Ipo Debt· $1.25B
1978-01-13IPO· nyse:PEG

Leadership Team

leader-logo
Tamara L. Linde
Executive Vice President and General Counsel
linkedin
leader-logo
David Johnson
Chief Customer Officer
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot