Application Security Analyst
Listed on 2026-01-12
-
IT/Tech
Cybersecurity, IT Consultant, Information Security, Data Security
Practice - CIS - Cloud, Infrastructure, and Security Services
About Cloud Infrastructure & Security Services:
Cognizant’s Cloud, Infrastructure, and Security Services Practice (CIS), is all about embracing digital transformation by driving core modernization holistically across layers. We help customers transform infrastructure and workplace to meet the rapidly evolving needs of the digital era. Our holistic approach delivers key results for our customers by achieving cloud driven modernization and workplace and operational transformation to run the business in a secure environment.
We are seeking an Information Security and Compliance consultant with experience in providing security applications controls and assessments for pharmaceutical Manufacturers located in Raritan, NJ. This resource will work within the Information Security and risk Management department, joining the team responsible for security consulting initiatives of Supply Chain Advanced Therapies IT Platforms related application support. In this role, this resource will be responsible for security & controls throughout global projects related to Supply Chain applications including Car‑t Cloud-based software controls, and continuous collaboration and follow‑ups with the business partners.
Please note, this role is not able to offer visa transfer or sponsorship now or in the future.
In this role, you will:- Responsible for advancing cybersecurity of Pharma systems, applications, and integrations across product lines and regions by identifying key risks and controls through security assessments
- Orchestrate and deliver cybersecurity risk assessments of Supply Chain projects, applications, and the technologies that run them while maintaining awareness of the changing threat landscape
- Understand and promote risk management activities associated with external regulations and internal policies such as IAPP, GxP, and GDPR
- Bridge the gap between traditional Information Technology (IT) and business functions by relating cyber threats and vulnerabilities to business imperatives and communicating them to key business leaders
- Actively advise, assess, and lead Business and IT stakeholders in the development of secure information systems and solutions in line with the organization's cybersecurity architecture, IAPP policies, and regulatory requirements
- We maintain connections across peer groups to continuously understand emerging security solutions that are ground‑breaking enablers for mitigating supply chain risk
- We constantly strive to shape the administrative controls for cybersecurity through advisory and assurance services
- Support compliance assessments on regulatory (ie GxP or SOX)
- Make recommendations for application security including change, incident management, process enhancements, access management, and change management
- Consulting stakeholders about data classification and privacy, including data encryption and protection
- Ensures appropriate controls are implemented for Car‑t Applications and coordinates alignment with Internal Audit and IT Compliance
- Provide metrics and reports on a weekly basis tracking the entire portfolio, application assessment status, and Risk Acceptance status
- Experience in providing security applications controls and assessments for Supply Chain Pharmaceutical/Innovative Medicine
- Performing security consulting to ensure that the Minimum Viable Security (MVS) is built into new supply chain Advanced Therapies systems
- Responsible for performing security risk assessments of existing Advanced Therapies systems applications providing security/risk-related updates and meaningful metrics and answering all questions related to security/risk-related subjects
- Performing risk calculators to identify high risk applications/projects; for those identified, performing application security questionnaires/assessments, identifying security gaps and appropriate remediation actions
- Performing Incident trending to ensure security root causes are identified and remediated
- Evaluating static & dynamic vulnerabilities to identify TLM/ALM & other security issues along with the appropriate remediation actions
- Large experience in SOX, IAPP,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).