Cybersecurity Systems Project Manager (Contractor)
$102K - $200K/yr(estimated)
Estimated based on industry data, role level, and location. Actual compensation may vary. Required by CO/NYC/CA salary transparency laws.
Is this estimate accurate?Description
<div class="content-intro"><p style="line-height: 1.2;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Legend Biotech is a global biotechnology company dedicated to treating, and one day curing, life-threatening diseases. Headquartered in Somerset, New Jersey, we are developing advanced cell therapies across a diverse array of technology platforms, including autologous and allogenic chimeric antigen receptor T-cell, T-cell receptor (TCR-T), and natural killer (NK) cell-based immunotherapy. From our three R&amp;D sites around the world, we apply these innovative technologies to pursue the discovery of safe, efficacious and cutting-edge therapeutics for patients worldwide.</span></p>
<p style="line-height: 1.2;">&nbsp;</p>
<p style="line-height: 1.2;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Legend Biotech entered into a global collaboration agreement with Janssen, one of the pharmaceutical companies of Johnson &amp; Johnson, to jointly develop and commercialize ciltacabtagene autolecuel (cilta-cel). Our strategic partnership is designed to combine the strengths and expertise of both companies to advance the promise of an immunotherapy in the treatment of multiple myeloma.</span></p>
<p style="line-height: 1.2;">&nbsp;</p></div><p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Legend Biotech is seeking a <strong>Cybersecurity Systems Project Manager (Contractor)</strong> as part of the <strong>IT </strong>team based in <strong>Somerset, NJ.</strong></span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Role Overview</strong></span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">The Cybersecurity Systems Project Manager is responsible for planning, executing, and delivering cybersecurity initiatives that protect organizational systems, networks, and data. This role bridges cybersecurity, IT, and business stakeholders to ensure security projects are delivered on time, within scope, and aligned with regulatory and risk management requirements.</span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Contract Duration: 12 Months</span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Key Responsibilities</strong></span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Project &amp; Program Management</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Lead end-to-end cybersecurity system projects, including planning, execution, monitoring, and closure</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Define project scope, goals, deliverables, timelines, and success criteria</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Manage project budgets, schedules, dependencies, and resource allocation</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Track milestones, risks, issues, and mitigation plans</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Cybersecurity &amp; Technical Coordination</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Oversee implementation of cybersecurity systems such as:</span>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">SIEM, SOAR, EDR/XDR</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Identity and Access Management (IAM)</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Network security, firewalls, and zero trust architecture</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Vulnerability management and security monitoring tools</span></li>
</ul>
</li>
</ul>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Coordinate with security architects, engineers, and vendors to ensure technical requirements are met</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Ensure security solutions align with enterprise architecture and IT standards</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Risk, Compliance &amp; Governance</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Ensure projects comply with cybersecurity frameworks and regulations (e.g., NIST, ISO 27001, CIS, SOC 2, HIPAA, PCI-DSS as applicable)</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Support risk assessments, security controls implementation, and audit readiness</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Maintain project documentation, security artifacts, and reporting</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Stakeholder &amp; Vendor Management</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Serve as the primary liaison between cybersecurity teams, IT operations, business units, and leadership</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Communicate project status, risks, and outcomes to executive and technical audiences</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Continuous Improvement</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Identify opportunities to improve cybersecurity project delivery processes</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Contribute to cybersecurity roadmap planning and prioritization</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>Requirements</strong></span></p>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Bachelor’s degree in Information Technology, Cybersecurity, Computer Science, or related field (or equivalent experience).</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Certifications (Preferred)</span>
<ul>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">PMP, PgMP, or PRINCE2</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">CISSP, CISM, or CISA</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Agile/Scrum certifications (CSM, SAFe, etc.)</span></li>
</ul>
</li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">5+ years of project management experience, including 3+ years in cybersecurity or IT infrastructure projects</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Strong understanding of cybersecurity concepts, tools, and risk management principles</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Proven experience managing cross-functional technical teams</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Strong communication, documentation, and leadership skills</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Experience with Agile, Scrum, or hybrid project delivery models</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">ITIL concepts (incident, problem, change management)</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Ticketing systems (ServiceNow, Jira, etc.)</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Change advisory boards (CAB)</span></li>
<li style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">SLAs and operational handoffs</span></li>
</ul>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">#Li-BG1</span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">#Li-Hybrid</span></p>
<p><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">#Li-Contract</span></p><div class="content-conclusion"><p><span style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"><strong>Please note: These benefits are offered exclusively to permanent full-time employees. Contractors are not eligible for benefits through Legend Biotech.</strong></span></p>
<p>&nbsp;</p>
<p style="line-height: 1.2;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"><strong>EEO Statement</strong></span></p>
<p style="line-height: 1.2;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">It is the policy of Legend Biotech to provide equal employment opportunities without regard to actual or perceived race, color, creed, religion, national origin, ancestry, citizenship status, age, sex or gender (including pregnancy, childbirth, related medical conditions and lactation), gender identity or gender expression (including transgender status), sexual orientation, marital status, military service and veteran status, disability, genetic information, or any other protected characteristic under applicable federal, state or local laws or ordinances.</span></p>
<p style="line-height: 1.2;">&nbsp;</p>
<p style="line-height: 1.2;"><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">Employment is at-will and may be terminated at any time with or without cause or notice by the employee or the company.</span></p>
<div>&nbsp;</div>
<div><span style="font-family: arial, helvetica, sans-serif; font-size: 12pt;">For information related to our privacy notice, please review:&nbsp;<a href="https://legendbiotech.com/privacy-notice/" target="_blank">Legend Biotech Privacy Notice</a>.</span></div></div>
Similar Jobs
Explore related positions you might be interested in
HR Director, Saudi Arabia
AstraZeneca·Central-Riyadh·14h ago
Human ResourcesOncology
Key Account Manager Oncology (Breast Cancer) – Eastern Slovakia
AstraZeneca·Slovakia - Bratislava·14h ago
CommercialOncology
Digital Diagnostics Lead
AstraZeneca·Ireland - Dublin College Park·14h ago
Oncology
Medical Manager - Haematology
AstraZeneca·Australia – New South Wales·14h ago
Medical AffairsOncology
FFE Ops BA
Sanofi·Chengdu·14h ago
CommercialOncology
Senior Programmer I/II (Oncology)
AstraZeneca·Shanghai Jing'An Office; Beijing Yizhuang·14h ago
Oncology
Like this job? Get alerts for similar ones
We'll notify you when matching roles are posted.
OncologyITSomerset, New Jersey, United States
Legend Biotech
BIOTECHNOLOGY
Cell Therapy
LocationNJ - Piscataway
Open Jobs94