• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » IT Sr Security Analyst – NIST CSF

IT Sr Security Analyst – NIST CSF

2020-11-13 by Geo

IT Sr Security Analyst – NIST CSF

Company Name: PSEG

Company Location: Newark, NJ, US

Requisition ID: 64645

Job Function/Category: Information Technology

Employment Type: Exempt Full Time

This is an exciting time to be joining PSEG. Our commitments, which include safety, integrity, customer focus, and diversity & inclusion, are the fabric of our culture and help drive the success of our business. We are fortunate to have an outstanding workforce of diverse and highly skilled talent who move us forward in our operational excellence journey. PSEG has more than 12,000 employees who are dedicated to the communities we serve and embody our vision: People providing Safe, Reliable, Economic and Greener Energy.

See Cyber Security Training

Job Summary

This position is an experienced senior level security analyst responsible for performing assessments of systems, networks, and applications within the organizational environment and identifies where those systems/networks/applications deviate from acceptable security configurations, New Jersey State information security policies and standards, or other statutory, regulatory, or contractual security requirements. Performs cyber security risk assessment of organizations and makes recommendations to mitigate risks. The analyst is the cyber risk subject matter expert providing support to stakeholders; assumes appropriate administrative, project management, team lead, and/or supervisory responsibilities as delegated by superiors; and performs other related duties as assigned. The position requires excellent communication skills and the ability to confidently interact with all levels, from executive and business unit leadership to staff.

See all Cyber Security Jobs

Job Responsibilities

  • Provides technical expertise in threat/risk assessments
  • Maintains cyber policies, regulations, and compliance documents
  • Performs security reviews on new technologies and changes to existing technologies
  • Analyses operational reports and proposes remediation actions
  • Supports audit and penetration testing operations

Required

Job Specific Qualifications

  • Bachelor’s degree in STEM, Computer Science, Information Systems or Cyber Security
  • 6 or more years of experience in Information Security.
  • Ensure that the application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.
  • Manage and/or assist with protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
  • Maintain open lines of communication and provide timely and relevant cybersecurity threat intelligence, situational awareness reports, and strategic, tactical and operational best practice guidance to internal and external partners.
  • Identify and recommend cybersecurity hardening measures and procedures within the organization and across the enterprise in consultation with relevant stakeholders.
  • Participate in industry groups such as EI-ISAC, MS-ISAC, US-CERT, DHS, FBI, NJSP, and other industry peers and partners to gain and understand security threats and intelligence.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Experience with cloud computing and can implement strong security to protect cloud first environment.
  • Works independently with little or no supervision.
  • Excellent oral and written communication skills.
  • Excellent leadership, technical teamwork, and interpersonal skills.
  • Willing to work in strong team environment, constantly teaching and learning from other team members.
  • Ability to foster working relationships with the team, IT Management and Client departments.
  • Ability to explain technical concepts to the business users in the context of business requirements.
  • Technical experience includes: information / data / network / computer security design, administration and/or assessment.
  • Broad knowledge of information systems including Windows security, network security, systems development, communication networks, security software/hardware and operating systems.
  • Experience with key information security technologies such as SIEM, firewalls, intrusion detection/prevention systems, vulnerability assessment, encryption, identity and access control systems, anti-malware, and security event analysis.
  • Leadership, planning and organizing, results orientation, technical/professional knowledge.
  • Excellent interpersonal, organizational, managerial, financial management and leadership skills.
  • Communicates effectively with both technical and non-technical individuals.
  • Maintains a solid working knowledge of Information Security principles and practices
  • Please Note the Following
  • Approximately 5% Travel required
  • NERC CIP position, requires NERC CIP background investigation prior to start

Desired

  • ISC2 Certified Information Systems Security Professional (CISSP), or equivalent
  • At least 5 years’ experience as a Cyber Security Engineer, or comparable role.
  • Certifications in one or more areas or willingness to obtain: CISSP, a GIAC certification (GSEC, GCIH, or other), CEH,ECSA, CompTIA Security+, or comparable.
  • Experience with NIST Cybersecurity Framework

Minimum Years Of Experience

6 years of experience


Need Security Training?

(sponsored)


Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Disclaimer

Certain positions at the Company may require you to have access to Part 810-Controlled Information. Under the law, the Company is limited in who it can share this information with and in certain circumstances it is necessary to obtain specific authorization before the Company can share this information. Accordingly, if the position does require access to this information, you must complete a 10 CFR Part 810 Export Control Compliance Nationality Request Form, a copy of which will be provided to you by Talent Acquisition if an offer is made. If there is a need for specific authorization, due to the time it takes to obtain authorization from the government, we will likely not be able to further proceed with an offer.

As an employee of PSE&G or PSEG Long Island, you should be aware that during storm restoration efforts, you may be required to perform functions outside of your routine duties and on a schedule that may be different from normal operations.

This site () is strictly for candidates who are not currently PSEG employees. PSEG employees must apply for jobs internally through empower which can be accessed through the mypseg homepage by clicking on the employee center tab, then under the empower header, choose careers.

Business needs may cause PSEG to cancel or delay filling position at any time during the selection process.

Certain positions at the Company may require you to have access to Part 810-Controlled Information. Under the law, the Company is limited in who it can share this information with and in certain circumstances it is necessary to obtain specific authorization before the Company can share this information. Accordingly, if the position does require access to this information, you must complete a 10 CFR Part 810 Export Control Compliance Nationality Request Form, a copy of which will be provided to you by Talent Acquisition if an offer is made. If there is a need for specific authorization, due to the time it takes to obtain authorization from the government, we will likely not be able to further proceed with an offer.

Public Service Enterprise Group (PSEG) is an equal opportunity employer, dedicated to a policy of non-discrimination in employment, including the hiring process, based on any legally protected characteristic. Legally protected characteristics included race, color, religion, national origin, sex, age, marital status, sexual orientation, disability, or veteran status or any other characteristic protected by federal, state, or local law in locations where PSEG employs individuals.

Need to request an accommodation?

LinkedIn Apply
Apply on LinkedIn

If you have a disability and need assistance submitting your resume, applying for a position or registering for a test, please call 973-430-3845. Any information provided regarding a disability will be kept strictly confidential and will not be shared with anyone involved in making a hiring decision.

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version