[Close] 

IT Manager- Security and Risk Management Job

Company Name:
J&J Family of Companies
IT Manager- Security and Risk Management-0962140729
Description
Johnson & Johnson is actively recruiting for an IT Manager- Security and Risk Management. This position will be part of a global organization in charge of deploying and supporting SAP solutions globally. This position may be based in Raritan NJ or Piscataway NJ. Business travel (domestic and International) is required for about 30% of the time.
Caring for the world, one person at a time has inspired and united the people of Johnson & Johnson for over 125 years. We embrace research and science -- bringing innovative ideas, products and services to advance the health and well-being of people. Employees of the Johnson & Johnson Family of Companies work with partners in health care to touch the lives of over a billion people every day, throughout the world.
With $71.3 billion in 2013 sales, Johnson & Johnson is the world's most comprehensive and broadly based manufacturer of health care products, as well as a provider of related services, for the consumer, pharmaceutical, and medical devices and diagnostics markets. The more than 250 Johnson & Johnson operating companies employ approximately 127,000 people in 60 countries throughout the world.
Thriving on a diverse company culture, celebrating the uniqueness of our employees and committed to inclusion. Proud to be an equal opportunity employer.
Within the global organization, this position has regional responsibilities. The primary responsibility is for managing and supporting security deliverables of ERP projects across North and Latin America. This also includes managing and representing security processes and procedures in ongoing internal security audits as well as continuously exploring opportunities to improve quality, drive standardization and deploy optimized processes, which drive ongoing cost reductions. This role also has a critical responsibility for managing a team of resources that includes other internal JNJ resources as well as onshore / offshore contractors. The services to be managed by the qualified candidate include the following: Provisioning of user access, Change management of security changes, and deployment and management of detective and preventive controls to ensure adherence to IAPP (Information Asset Protection Policies) and SOX compliance.
The position is also the key interface with functional IT Application Services process teams across several platforms, which is intended to help drive the collection of business requirements and translate that into security solutions. This position is also a key interface across business security as well as IT Quality and Compliance (Q&C;) groups within IT shared services organization.
The individual must maintain superior knowledge in all areas of SAP security, SOD Analysis, SOX Compliance, etc. This individual must drive and deliver solutions to the business, while pursuing to optimize existing services, promoting utilization and leverage of enterprise SAP security architecture, methodology, and tools.
RESPONSIBILITIES/PRINCIPAL DUTIES (Essential Functions): Responsible for ensuring good quality and compliance across one or more ERP platforms within region, as it pertains to assuring delivery to defined standards within the security and authorizations space. Provide subject matter expertise in areas of strategy and design for Security and authorizations management with specialization in one or more functional business process areas across all ERP platforms within the region. Coach, oversee and ensure quality of deliverables of on-shore and off-shore contractors.
Individual will be responsible for all aspects of Roles design, creation and association with transaction codes in the functional areas of specialization and all aspects of systems Security monitoring. For example: systems Logs, security Logs, user access, and BASIS user groups, monitoring SAP AIS profiles. Definition and creation of Enterprise Portal roles. Association of Enterprise Portal iViews with Portal roles. Ensure all security procedures (auditing/monitoring activities) follow CSV guidelines and SOX compliance. All aspect of the SAP infrastructure/landscape/application security, client properties, and SAP license administration. All areas of Central User Administration, and LDAP management. Partner with Functional teams on all Service Delivery and Service Management Security deliverables. Partner with J&J; Quality and Compliance on all compliance related deliverables. L1/L2/L3 SAP Security responsibility for all Supply Chain platforms. Provide guidance to peers, junior team members, external consultants, and co-ops. Accountable for all metrics as it pertains to SAP Security and Risk Management. Accountable for SOD analysis reporting for all Supply Chain platforms. Responsible for creating an environment where knowledge and ideas are shared among team members and other J&J; organizations. Ensure that security is considered and emphasized in all IM designs and development.
Qualifications
A Bachelors degree is required and a Masters degree is preferred. SAP security certification is preferred. A minimum of 10 years of IT experience is required. A minimum of 7+ years of SAP Security including hands-on experience of security role build, trouble shooting, remediation analysis and technical support and being able to provide technical coaching and guidance to others is required. Experience providing work effort estimates as well as conducting project planning activities for new potential projects involving security deliverables is required. Experience managing multiple projects or rollouts simultaneously is required.
Strong analytical skills to proactively recommend system improvements are required. Excellent communication skills both verbally and written is required. Proven ability to influence/collaborate to get results is required. Good interpersonal and negotiating skills are desired. Must be a change agent with a high tolerance for ambiguity. Awareness of GxP and SOX regulatory frameworks is strongly preferred. Proven ability to assess functional requirements and translating into technical solutions is required. SAP GRC skills are preferred.
Strong analytical and reasoning skills required for solving complex problems is required. Strong leadership, collaboration and influencing skills with evidence of their effectiveness working in large, complex organizations and projects are required. Previous experience managing/leading people is required. Strong project manager skills are required. The ability to work independently with no or minimal supervision demonstrating sound judgment and prudent risk-taking is required. Big picture orientation with attention to details is required. The ability to work in two worlds simultaneously - team growth and cost control is required.
BE VITAL in your Career; be seen for the talent you bring to your work. Explore opportunities within the Johnson & Johnson Family of Companies.
J2W:LI NA
J2W:DICE
Primary Location: North America-United States-New Jersey-Raritan
Organization: Johnson & Johnson Services Inc. (6090)
Job Function: Information Security
Certain sites within the Johnson & Johnson Family of Companies participate in E-Verify as appropriate in accordance with Company guidelines and federal or state law. To learn more about the government sponsored program and to see a list of the sites that are currently enrolled, please click here.
Johnson and Johnson Family of Companies are equal opportunity employers, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status, or any other characteristic protected by law.
EEO is the Law
EEO is the Law GINA Supplement
Req ID: 0962140729
Date: Wed, 06 08 2014 00:00:00 GMT
Country: US
State: NJ
City: Raritan
Postal Code: 08869
Locale: en_US

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.