Analyst, Information Security

Cross RiverFort Lee, NJ
Hybrid

About The Position

We are looking for an Information Security Analyst to help ensure demonstrable adherence to applicable IT governance requirements across multiple ITSM and information security processes. You will work effectively and efficiently with cybersecurity, engineering, product, and IT operations teams at various levels of the organization. The ideal candidate is self-motivated, solutions-oriented, detail-focused, and an independent thinker. You possess a strong understanding of the software development lifecycle (SDLC), change management, and IT risk management. You can quickly grasp complex technical concepts and can make them easily understandable in discussions, presentations, and high-quality documentation.

Requirements

  • Exceptional written and verbal communication skills, with the ability to present complex information in a clear and concise manner to diverse audiences
  • 3+ years of relevant experience in roles such as cybersecurity analyst, IT auditor, software engineer, IT business analyst, IT systems analyst, IT product owner, technical product manager, or IT project manager
  • Strong understanding of the software development lifecycle (SDLC), change management, and/or IT risk management

Nice To Haves

  • Undergraduate or graduate degree in computer science, cybersecurity, information assurance, business administration, or a closely related field
  • Professional certificates or certifications such as ITIL 4 Foundation, ISO/IEC 27001 Foundation, CompTIA Security+, ISC2 CC, ISC2 CGRC, or ISACA CRISC
  • Familiarity with regulatory guidance, standards, and frameworks such as the FFIEC IT Handbook, SOC 1/2, PCI DSS, COBIT 2019, and ITIL
  • Experience working in a highly regulated environment such as financial services, military, or healthcare

Responsibilities

  • Act as a subject matter expert on information security and ITSM industry best practices, standards, frameworks, and regulatory guidance
  • Collaborate with cross-functional teams to help maintain standards, procedures, and evidence documentation
  • Facilitate the change management process and production deployment evidence reviews
  • Monitor, report, and assess the effectiveness of performance and conformance controls
  • Facilitate information security training and awareness campaigns
  • Coordinate the collection of evidence to support IT audits and examinations
  • Maintain control mappings and perform gap analyses to drive continuous program improvement
  • Identify, propose, and implement process improvement for information security processes

Benefits

  • Equal Opportunity Employer
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service