Post job

Security Architect jobs at Alcoa - 40 jobs

  • Identity Security Architect

    Constellation Brands 4.7company rating

    Canandaigua, NY jobs

    We're the producers, creators and marketers of beer, wine and spirits brands that people love. At Constellation Brands, we're driven to push boundaries and think beyond today to deliver products and experiences that resonate now, tomorrow and well into the future. With operations in the U.S., Mexico, New Zealand and Italy, our premium portfolio of iconic brands includes Modelo Especial, Corona Extra, Modelo Cheladas, Pacifico, Victoria, The Prisoner Wine Company, Robert Mondavi Winery, Kim Crawford, Schrader Cellars, Lingua Franca, Casa Noble Tequila, and High West Whiskey. But we're just getting started. Our ability to stay on the forefront of consumer trends has fueled our success since our founding in 1945 and will guide us in creating the next generation of products and experiences Worth Reaching For. Position Summary: The Identity Security Architect is a security-minded, hands-on individual with security engineering experience to support our converged security capabilities, focused on identity management (IDM) at Constellation Brands, Inc. The candidate must have strong operational knowledge of the security tool landscape and have a record of accomplishment optimizing and automating processes to achieve measurable efficiency and accuracy gains. This role is integral to the information security program, and works directly alongside the security architecture / engineering, security operations, operational technology (OT) / industrial control system (ICS), governance, risk, and compliance (GRC), technology infrastructure and network teams. Responsibilities: * Be a thought leader and hands-on expert in the company for a significant technical capability related to security identity management (IDM). * Collaborate with senior security leaders on building IDM strategy and milestones and communication with executives. * Lead IDM security engineering projects, tool evaluations, deployments, user experience improvements and mentor other engineers. * Design and implement security processes to support security architecture and engineering using best-in-class security engineering principles; experience with ISO/IEC, NIST, MITRE etc. standards are a plus. * Security tool operations - running, maintaining, optimizing, and configuring rules for various tools across IDM. * Lead secure design and architecture reviews with an understanding of threat modeling. * Create and implement identity security metrics and measurements and process automation - understand how to measure monitoring / incident response processes and how to improve them based on historical data. * Partner with Security Operations (SecOps), Operational Technology (OT) / Industrial Control System (ICS) Engineers to identify and evaluate best in class security solutions and plan production deployments and help document runbooks accordingly. * Candidate must be available 24/7/365. Minimum qualifications: * Bachelors in one of the following disciplines: Cybersecurity, Information Assurance, Computer Engineering, Electrical Engineering, Systems Engineering, Management Information Systems, or similar technical field and minimum of 8+ years related experience with a CISSP or equivalent. * Strong understanding of identity security architecture and engineering concepts at the enterprise level. * Demonstrated past contributor and "plugged-in" to the threat intelligence community and various industry sources. * Understand what it means to "think like a hacker" and take the attacker viewpoint. * Hands-on experience improving the overall IDM user experience. * Authentication space knowledge: * Multi-factor authentication (MFA). * Identity Federation & Single Sign-On (SSO). * Implementing SAML, OIDC, and OAuth. * Security knowledge of various technology & protocols - FIDO, PKI, Mobile MFA, OTP, FIDO key, Biometric authentication, behavior & risk-based authentication. * Implementation experience with web, device (laptop, etc.), infrastructure, and API authentication use cases. * Access Management space knowledge: * Privileged Access Management for admin and privileged accounts. * Access control solution for Linux, Windows servers, Kubernetes/docker, databases, Clouds, and other PAM use cases. * Integration with cloud systems including AWS, Azure, GCP, etc. * Active Directory integration experience. * Identity Governance space knowledge: * Experience with onboarding applications into an IDM solution. * Experience with creating and managing user access campaigns. * Experience with automating IDM critical workflows. * Familiarity with financial audit, Sarbanes-Oxley (SOX), and regulatory compliance processes. * Collaborate with internal and external auditors as required. * Hands-on experience performing incident response duties. * Ability to communicate effectively with various levels of technical expertise or non-expertise (written, verbal, presentation skills). * Organized and detail-oriented, able to work well under deadlines in a changing environment and complete multiple projects effectively and concurrently. Preferred qualifications: * Security operations and threat intelligence experience. * Strong communicator who can partner internationally with senior security and enterprise team members. * Self-starter who takes initiative with strong conviction. ADA Physical/Mental/Workplace Requirements * Occasional lifting up to 25 lbs. * Sitting, working at desk/personal computer for extended periods of time * Primary work environment is professional corporate office * Ability to travel commercially and internationally Location Rochester, New York Additional Locations Canandaigua, New York, Chicago, Illinois, San Antonio, Texas Job Type Full time Job Area Information Technology The salary range for this role is: $114,300.00 - $207,800.00 This is the lowest to highest salary we in good faith believe we would pay for this role at the time of this posting. Our compensation is based on cost of labor. For remote locations or positions open to multiple locations, the pay range may reflect several US geographic markets, including the lowest geographic market minimum to the highest geographic market maximum. We may ultimately pay more or less than the posted range, and the range may be modified in the future. An employee's pay position within the salary range will be based on several factors including, but not limited to, the prevailing minimum wage for the location, relevant education, qualifications, certifications, experience, skills, seniority, geographic location, performance, shift, travel requirements, sales or revenue-based metrics, any collective bargaining agreements, and business or organizational needs. At Constellation Brands, it is not typical for an individual to be hired at the high end of the range for their role, and compensation decisions are dependent upon the facts and circumstances of each position and candidate. We offer comprehensive package of benefits including paid time off, medical/dental/vision insurance, 401(k), and any other benefits to eligible employees. Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, or any other form of compensation that are allocable to a particular employee remains in the Company's sole discretion unless and until paid and may be modified at the Company's sole discretion, consistent with the law. Equal Opportunity Constellation Brands is committed to a continuing program of equal employment opportunity. All persons have equal employment opportunities with Constellation Brands, regardless of their sex, race, color, age, religion, creed, sexual orientation, national origin or citizenship, ancestry, physical or mental disability, medical condition (cancer or genetic characteristics), marital status, gender (including gender identity or gender expression), familial status, military or veteran status, genetic information, pregnancy, childbirth, breastfeeding, or related conditions (or any other group or category within the framework of the applicable discrimination laws and regulations).
    $114.3k-207.8k yearly Auto-Apply 30d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Identity Security Architect

    Constellation Brands 4.7company rating

    Rochester, NY jobs

    We're the producers, creators and marketers of beer, wine and spirits brands that people love. At Constellation Brands, we're driven to push boundaries and think beyond today to deliver products and experiences that resonate now, tomorrow and well into the future. With operations in the U.S., Mexico, New Zealand and Italy, our premium portfolio of iconic brands includes Modelo Especial, Corona Extra, Modelo Cheladas, Pacifico, Victoria, The Prisoner Wine Company, Robert Mondavi Winery, Kim Crawford, Schrader Cellars, Lingua Franca, Casa Noble Tequila, and High West Whiskey. But we're just getting started. Our ability to stay on the forefront of consumer trends has fueled our success since our founding in 1945 and will guide us in creating the next generation of products and experiences Worth Reaching For. Position Summary: The Identity Security Architect is a security-minded, hands-on individual with security engineering experience to support our converged security capabilities, focused on identity management (IDM) at Constellation Brands, Inc. The candidate must have strong operational knowledge of the security tool landscape and have a record of accomplishment optimizing and automating processes to achieve measurable efficiency and accuracy gains. This role is integral to the information security program, and works directly alongside the security architecture / engineering, security operations, operational technology (OT) / industrial control system (ICS), governance, risk, and compliance (GRC), technology infrastructure and network teams. Responsibilities: * Be a thought leader and hands-on expert in the company for a significant technical capability related to security identity management (IDM). * Collaborate with senior security leaders on building IDM strategy and milestones and communication with executives. * Lead IDM security engineering projects, tool evaluations, deployments, user experience improvements and mentor other engineers. * Design and implement security processes to support security architecture and engineering using best-in-class security engineering principles; experience with ISO/IEC, NIST, MITRE etc. standards are a plus. * Security tool operations - running, maintaining, optimizing, and configuring rules for various tools across IDM. * Lead secure design and architecture reviews with an understanding of threat modeling. * Create and implement identity security metrics and measurements and process automation - understand how to measure monitoring / incident response processes and how to improve them based on historical data. * Partner with Security Operations (SecOps), Operational Technology (OT) / Industrial Control System (ICS) Engineers to identify and evaluate best in class security solutions and plan production deployments and help document runbooks accordingly. * Candidate must be available 24/7/365. Minimum qualifications: * Bachelors in one of the following disciplines: Cybersecurity, Information Assurance, Computer Engineering, Electrical Engineering, Systems Engineering, Management Information Systems, or similar technical field and minimum of 8+ years related experience with a CISSP or equivalent. * Strong understanding of identity security architecture and engineering concepts at the enterprise level. * Demonstrated past contributor and "plugged-in" to the threat intelligence community and various industry sources. * Understand what it means to "think like a hacker" and take the attacker viewpoint. * Hands-on experience improving the overall IDM user experience. * Authentication space knowledge: * Multi-factor authentication (MFA). * Identity Federation & Single Sign-On (SSO). * Implementing SAML, OIDC, and OAuth. * Security knowledge of various technology & protocols - FIDO, PKI, Mobile MFA, OTP, FIDO key, Biometric authentication, behavior & risk-based authentication. * Implementation experience with web, device (laptop, etc.), infrastructure, and API authentication use cases. * Access Management space knowledge: * Privileged Access Management for admin and privileged accounts. * Access control solution for Linux, Windows servers, Kubernetes/docker, databases, Clouds, and other PAM use cases. * Integration with cloud systems including AWS, Azure, GCP, etc. * Active Directory integration experience. * Identity Governance space knowledge: * Experience with onboarding applications into an IDM solution. * Experience with creating and managing user access campaigns. * Experience with automating IDM critical workflows. * Familiarity with financial audit, Sarbanes-Oxley (SOX), and regulatory compliance processes. * Collaborate with internal and external auditors as required. * Hands-on experience performing incident response duties. * Ability to communicate effectively with various levels of technical expertise or non-expertise (written, verbal, presentation skills). * Organized and detail-oriented, able to work well under deadlines in a changing environment and complete multiple projects effectively and concurrently. Preferred qualifications: * Security operations and threat intelligence experience. * Strong communicator who can partner internationally with senior security and enterprise team members. * Self-starter who takes initiative with strong conviction. ADA Physical/Mental/Workplace Requirements * Occasional lifting up to 25 lbs. * Sitting, working at desk/personal computer for extended periods of time * Primary work environment is professional corporate office * Ability to travel commercially and internationally Location Rochester, New York Additional Locations Canandaigua, New York, Chicago, Illinois, San Antonio, Texas Job Type Full time Job Area Information Technology The salary range for this role is: $114,300.00 - $207,800.00 This is the lowest to highest salary we in good faith believe we would pay for this role at the time of this posting. Our compensation is based on cost of labor. For remote locations or positions open to multiple locations, the pay range may reflect several US geographic markets, including the lowest geographic market minimum to the highest geographic market maximum. We may ultimately pay more or less than the posted range, and the range may be modified in the future. An employee's pay position within the salary range will be based on several factors including, but not limited to, the prevailing minimum wage for the location, relevant education, qualifications, certifications, experience, skills, seniority, geographic location, performance, shift, travel requirements, sales or revenue-based metrics, any collective bargaining agreements, and business or organizational needs. At Constellation Brands, it is not typical for an individual to be hired at the high end of the range for their role, and compensation decisions are dependent upon the facts and circumstances of each position and candidate. We offer comprehensive package of benefits including paid time off, medical/dental/vision insurance, 401(k), and any other benefits to eligible employees. Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, or any other form of compensation that are allocable to a particular employee remains in the Company's sole discretion unless and until paid and may be modified at the Company's sole discretion, consistent with the law. Equal Opportunity Constellation Brands is committed to a continuing program of equal employment opportunity. All persons have equal employment opportunities with Constellation Brands, regardless of their sex, race, color, age, religion, creed, sexual orientation, national origin or citizenship, ancestry, physical or mental disability, medical condition (cancer or genetic characteristics), marital status, gender (including gender identity or gender expression), familial status, military or veteran status, genetic information, pregnancy, childbirth, breastfeeding, or related conditions (or any other group or category within the framework of the applicable discrimination laws and regulations).
    $114.3k-207.8k yearly Auto-Apply 30d ago
  • SAP Basis Security Analyst

    Protective Industrial Products 3.6company rating

    New York jobs

    The SAP Basis & Security Analyst role requires experience in SAP Basis and Security with expertise in SAP Basis, Security and GRC (Governance, Risk, and Compliance) to join our team. The ideal candidate will be responsible for managing and maintaining SAP landscapes, ensuring system security, and implementing GRC solutions to support compliance and risk management, troubleshoot and resolve SAP issues, proactively enhance and maintain system stability, integrity, and performance. This individual must be able to collaborate easily and cross functionally across PIP. *Please refer below to role requirements. This position requires experience in SAP Basis. JOB RESPONSIBILITIES SAP Basis Administration: Perform SAP system installations, upgrades, migrations, and patching; Monitor system performance, troubleshoot issues, and optimize system resources; Manage system backups, disaster recovery, and high availability configurations; Coordinate with infrastructure teams for database, OS, and network-related support. SAP Security: Design, implement, and maintain SAP security roles and authorizations; Conduct user access reviews and manage role-based access control (RBAC); Troubleshoot authorization issues and ensure compliance with security policies; Work closely with business and functional teams to define security requirements. SAP GRC (Governance, Risk, and Compliance): Implement and support SAP GRC Access Control, Risk Analysis, and User Provisioning. Perform Segregation of Duties (SoD) analysis and remediation. Manage workflows for user access requests and role assignments; Monitor security logs and ensure adherence to audit and compliance standards; Provide recommendations for security best practices and risk mitigation. CORE SKILLS/COMPETENCY REQUIREMENTS Bachelor's degree in Computer Science, Information Technology, or a related field; 5+ years of experience in SAP Basis administration and SAP Security; Strong hands-on experience with SAP GRC Access Control (ARA, ARM, EAM, BRM); Knowledge of SAP ECC, S/4HANA, SAP NetWeaver, Solution Manager and cloud-based SAP solutions; Experience in security audits, compliance frameworks (SOX, GDPR, etc.), and risk management. Proficiency in SAP system monitoring tools and troubleshooting techniques; In-depth knowledge of Identity and Access Management (IAM) and integration with SAP; Excellent communication skills and ability to work in a team-oriented environment. Good understanding of network, OS, and database security (e.g., DB2, Oracle, MS SQL Server). Strong analytical and problem-solving skills for assessment of complex production support issues and ability to recommend and implement effective solutions SAP Basis or SAP Security certifications preferred Protective Industrial Products (PIP) is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws. This policy applies to all employment practices within our organization, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, compensation, benefits, training, and apprenticeship. PIP makes hiring decisions based solely on qualifications, merit, and business needs at the time. For more information, you may request access to our EEO policy.
    $87k-117k yearly est. Auto-Apply 26d ago
  • Network Security Architect

    The Rockridge Group 3.8company rating

    New York, NY jobs

    Job DescriptionNetwork Security ArchitectPrincipal Responsibilities: Architect and implement network communication and telephony solutions Secure and harden the network, server, data and end user infrastructure Architect and implement end user device solutions and applications (mobile, workstation, etc.) Architect and implement the monitoring and capacity planning platforms of the systems, network, data and end user infrastructure Create/manage technical reference documentation (policy, procedures, knowledgebase, etc.) Provide senior level technical guidance and serve as an escalation point for engineering and development teams Assist with evaluations and proof of concepts Coordinate task deliverables with other project initiatives and teams Provide regular (and ad-hoc) reports to leadership team and the business as needed Qualifications: Typically a BA/BS, MBA or equivalent, with 10+ years of related experience Heavy Microsoft architecture history required (AD, Exchange, Sharepoint, SQL) Thorough virtualization and cloud experience (VMware, OpenStack, Hyper-V, KVM, etc.) Experience with Silver Peak WAN appliances Experience with Azure for Web Hosting Experience with SIM tools Scripting experience with VB script, shell, PowerShell, JavaScript, etc. Thorough and proven knowledge of disaster recovery, backup and data protection concepts Proven history of IT remediation of audit/legal/compliance recommendations Solid understanding of routing and switching concepts Experience with firewall and security appliances Expert level knowledge of infrastructure services (DNS, FTP, IIS, etc.) Advanced knowledge of security patching methodologies Independent, energetic and a yearn to learn Excellent analytical and troubleshooting skills Some project management experience preferred Corporate level communication skills required
    $122k-166k yearly est. 9d ago
  • Cloud Security Engineer

    UL, LLC 4.2company rating

    Melville, NY jobs

    This role is Hybrid, 3 days a week to any local, US based UL Solutions Office. We are seeking a highly skilled Cloud Security Engineer with strong Application Security expertise to join our security architecture team. This role will be responsible for designing, implementing, and maintaining secure cloud environments and applications across multi-cloud platforms, with a focus on Azure. The ideal candidate will have hands-on experience with cloud-native security tools, DevSecOps practices, and compliance frameworks such as NIST 800-53, SOC 2, and CIS Controls. Cloud Security Engineering + Design and implement security controls for cloud infrastructure (Azure, AWS, GCP). + Develop and maintain security architecture patterns (e.g., hub-and-spoke, Zero Trust). + Integrate security tools such as Wiz, Microsoft Defender for Cloud, Silverfort, and Terraform. + Conduct threat modeling and risk assessments for cloud-native services. + Collaborate with IAM, SOC, and GRC teams to align cloud security with enterprise policies. Application Security + Perform secure code reviews, static/dynamic analysis, and vulnerability assessments. + Integrate security into CI/CD pipelines using tools like Snyk, Checkmarx, or Veracode. + Guide development teams on secure coding practices and OWASP Top 10. + Design and implement API security strategies including OAuth2, OpenID Connect, and mTLS. + Support remediation of application vulnerabilities and provide technical guidance. Compliance & Governance + Map cloud and application security controls to compliance frameworks (NIST 800-53, SOC 2, CIS). + Assist in audits and evidence collection for regulatory compliance. + Maintain documentation of security architecture, policies, and procedures. + Bachelor's degree in Computer Science, Cybersecurity, or related field. + 3-4 years of experience in cloud security engineering and application security. + Strong understanding of Azure security services and architecture. + Experience with infrastructure-as-code (Terraform, Bicep). + Familiarity with Snowflake security features and data protection strategies. + Knowledge of identity and access management (Azure AD, Conditional Access, MFA). + Hands-on experience with DevSecOps tools and practices. Preferred Qualifications + Certifications: Azure Security Engineer Associate, CISSP, CCSP, OSCP, or GIAC. + Experience with multi-subscription Azure environments. + Familiarity with Zero Trust architecture and implementation. + Experience with security automation and orchestration. Soft Skills + Strong analytical and problem-solving skills. + Excellent communication and collaboration abilities. + Ability to work independently and in cross-functional teams. + Passion for continuous learning and staying current with security trends. What you'll experience working for ULS UL Solutions has been pioneering change since 1894 and we're still leading the way. From day one, we've blazed a trail protecting the planet and everyone on it. Our teams have influenced billions of products, plus services, software offerings and more. We break things, burn things and blow things up. All in the name of safety science. That's where you come in - because none of it could happen without you. It takes passion to protect people, problem-solving to safeguard personal data and conviction to make the world a more sustainable place. It takes bold ideas and brilliant minds to build a better world for future generations across the globe. This is more than a job. It's a calling. A passion to use our expertise and play our part in creating a more secure, sustainable world today - and tomorrow. As a member of our safety science community, you'll use your ideas, your energy and your ambition to innovate, challenge and ultimately, help create a safer world. Everyone here is unique. But we're also a global community, working together to help create a safer world. Join UL Solutions and you can connect with the brightest minds in the business, all bringing their distinct perspectives and diverse backgrounds together to deliver real change. Empowering our customers to keep the world safe means thinking ahead. It means investing in training and empowering our people to learn and innovate. At UL Solutions, we help build a better future - one where everyone benefits. Join UL Solutions to be at the center of safety. To learn more about us and the work we do, visit UL.com Total Rewards: We understand compensation is an important factor as you consider the next step in your career. The estimated salary range for this position is $95,000 to $120,000 and is based on multiple factors, including job-related knowledge/skills, experience, geographical location, as well as other factors. This position is eligible for annual bonus compensation with a target payout of 10% of the base salary. This position also provides health benefits such as medical, dental and vision; wellness benefits such as mental and financial health; and retirement savings (401K) commensurate with the standard rewards offered in each individual location or country. We also provide full-time employees with paid time off including vacation (15 days), holiday including floating holidays (12 days) and sick time off (72 hours). #LI-SG2 #LI-Hybrid UL LLC has been and will continue to be an equal opportunity employer. To assure full implementation of this equal employment policy, we will take steps to assure that: Persons are recruited, hired, assigned and promoted without regard to race, color, age, sex or gender, sexual orientation, gender identity, gender expression, transgender status, religion, creed, national origin, ethnicity, citizenship, ancestry, disability, genetic information, military or veteran status, pregnancy, marital or familial status, or any other protected category under applicable law.
    $95k-120k yearly 56d ago
  • (602) Information Systems Security Manager III

    Arlo Solutions 3.5company rating

    Philadelphia, PA jobs

    Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value-added solutions. Our solutions are designed and managed to not only reduce costs, but to improve business processes, accelerate response time, improve services to end-users, and give our customers a competitive edge, now and into the future. Position Description: The Information System Security Manager (ISSM) III will support Naval Surface Warfare Center Philadelphia Division (NSWCPD) as a contractor through Arlo Solutions, serving as a key cybersecurity leader for NSWCPD Code 104. This key personnel position is responsible for overseeing and managing information security program implementation within the organization, supporting DoD Information Assessment and Authorization (A&A) process and Risk Management Framework (RMF) services, and ensuring compliance with all NAVSEA, DON, and DoD cybersecurity policies. Location: (Onsite) Philadelphia, PA Clearance: Active Secret Responsibilities and/or Success Factors: Cybersecurity Program Management * Support IT security goals and objectives to reduce overall organizational risk * Communicate the value of IT security throughout all levels of organization stakeholders * Coordinate with various levels of the organization to oversee information security program implementation * Manage cyber strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and other resources * Assist with facilitating communication between all RMF stakeholders throughout the RMF process Security Assessment and Authorization * Assist with the collection of data needed to meet system cybersecurity reporting requirements * Assist with security improvement actions as they are evaluated, validated, and implemented * Participate in information security risk assessments during the Security A&A process * Assist with identifying security requirements specific to IT systems in all phases of the system life cycle * Coordinate with programs to resolve findings identified during internal and external review processes Compliance and Risk Management * Assist with cybersecurity inspections, tests, and reviews for the network environment * Assist with identifying alternative information security strategies to address organizational security objectives * Interpret patterns of noncompliance to determine their impact on risk levels and overall effectiveness of the enterprise's cybersecurity program * Track audit findings and recommendations to ensure appropriate mitigation actions are taken * Monitor systems for upcoming authorization conditions/stipulations, upcoming or past due POA&M items, and SLCM activities Documentation and Reporting • * Develop findings reports and recommended corrective actions for identified deficiencies * Report system compliance in DON Application and Database Management System (DADMS), Department of Defense Information Technology Portfolio Repository - Department of the Navy (DITPR-DON), and Vulnerability Remediation Asset Manager (VRAM) * Assist with Quality Assurance (QA) reviews for RMF package submissions in accordance with NSWCPD and NAVSEA 03 SOP * Ensure successful implementation and functionality of security requirements and appropriate IT policies and procedures consistent with the organization's mission and goals * Track and respond to Cybersecurity data calls per Government guidance Minimum Qualifications Including Certificates: * Must be a U.S. Citizen * Active Secret security clearance * Master's degree in computer science, information technology, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university * Eight (8) years of experience coordinating with various levels of an organization to oversee and manage information security program implementation * Experience managing cyber strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources * Must possess one of the following certifications: CAP, CASP+ CE, CISM, CISSP (or Associate), GSLC, CCISO, or HCISPP * IAM-II certification level * Experience with DoD Information Assessment and Authorization (A&A) process and Risk Management Framework (RMF) Desired Qualifications: * Experience with enterprise security technologies and tools including eMASS and VRAM * Knowledge of NIST Special Publications and DoD cybersecurity instructions * Experience with Navy and DoD organizational structures and policies * Familiarity with NAVSEA cybersecurity requirements and procedures * Experience with vulnerability management and continuous monitoring * Demonstrated leadership abilities and strong communication skills AAP Statement We are proud to be an Affirmative Action and Equal Opportunity Employer and as such, we evaluate qualified candidates in full consideration without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, disability status, protected veteran status, and any other protected status.
    $111k-148k yearly est. Auto-Apply 60d+ ago
  • Information System Security Officer

    ITR 4.2company rating

    Oak Ridge, TN jobs

    Job DescriptionEast Tennessee company is seeking an ISSO to join their growing team. This position requires candidates to currently have or can obtain a federal security clearance so US citizenship is required. This position will be required to work onsite in Oak Ridge Tennessee. Duties and Responsibilities:The ISSO is a primary stakeholder and facilitator of the continuous monitoring efforts that promote RMF compliance throughout the organization. The ISSO provides direction to IT and infrastructure support personnel on the application of security patches and secure configurations. Routine collaboration and consultation with the ISSM regarding the design, development, integration, and analysis of unclassified information systems. Under general supervision, the candidate is responsible for performing a full range of Information Assurance functions in support of the security needs of the ISSM.Primary Responsibilities: Provide assistance to the ISSM and CISO in the certification and accreditation (C&A) of systems/networks and implementation of cybersecurity requirements and procedures across the client site. Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures and as outlined in applicable System Security Plans (SSPs). Perform documented procedures for authorizing users to access information systems. Develop and maintain SSPs for system C&A. Manage Plans of Action and Milestones to closure for information systems under accreditation. Provide guidance on policies and controls to support appropriate levels of risk, facilitate risk tolerance discussions and decisions, and recommend controls based on industry standards and practices. Escalate questions/concerns/issues to more senior-level staff as required. Participate in internal/external compliance audits, reviews, self-assessments, assessments, and data calls. Identify, promote, and make recommendations for process improvements. Assist with annual self-inspections, system certification testing, periodic security testing, and functional testing on systems/networks. Ensure compliance of all network equipment with applicable DOE and ORNL requirements Other duties as assigned for support within the program. Basic Qualifications: Bachelor's degree with 5-7 years of relevant experience (ex. cybersecurity assessments, risk management, cybersecurity policy, and compliance, etc.). An equivalent combination of education and experience may be considered. Ability to obtain and maintain a DOE Q security clearance or equivalent is required. Strong analytical and organizational skills as well as problem solving capabilities to understand Cybersecurity risk and exposure (legal, regulatory violations, etc.) to ORNL. Demonstrated experience implementing compliance frameworks (NIST, etc) Excellent interpersonal, verbal, written, and presentation communication skills. Thorough understanding of industry standards and regulations including NIST 800-53, NIST Risk Management Framework, and NIST Cybersecurity Framework (CSF). Working knowledge of privacy regulations and impacts. Ability to work independently, meet deadlines, and uphold high ethical standards. Preferred Qualifications: Active DOE Q or TS security clearance or equivalent. Master's degree in information assurance or related field with 4-6 years of relevant experience working in an information security, information technology or information risk management related field. Cybersecurity certifications (CISSP, CISA, CISM, CRISC, CCSP, SSCP) and Incident Response Certification Privacy management, cybersecurity, evaluating security controls, identifying control gaps, and mitigating measures along with a strong understanding of business practices and technology concepts. Highly motivated individual with an enthusiasm for governance, risk and compliance who can communicate benefits and drive success. Demonstrated background in governance, risk, and compliance. Experience in obtaining Authority to Operate (ATO) for DOE government systems.
    $63k-83k yearly est. 25d ago
  • Information Systems Security Officer

    ITR 4.2company rating

    Oak Ridge, TN jobs

    Job DescriptionOverview: East Tennessee R&D facility is currently seeking qualified applicants to serve as Junior Information Systems Security Officer (ISSO). The successful candidate should have a basic understanding of all aspects of cybersecurity. The candidate will collaborate with other teams across the lab, to include Information Technology, Physical Security, Classification Office, Cybersecurity, Lab Enterprise Risk, Lab Internal Audit, and others as appropriate. Primary Responsibilities: Provide assistance to the Information Systems Security Manager (ISSM) and Chief Information Security Officer (CISO) in the certification and accreditation (C&A) of systems/networks and implementation of cybersecurity requirements and procedures across the federal facility. Ensure systems are operated, maintained, and disposed of in accordance with DOE security policies and procedures and as outlined in applicable System Security Plans (SSPs). Establish and perform documented procedures for authorizing users to information systems Develop and maintain SSPs for system C&A. Identify, review, and provide analysis and recommendations to meet requirements of applicable laws, regulations, orders, and the contract, translate into policies, procedures, suggested control structures, analysis/white papers, aligning with business objectives Provide guidance on policies and controls to support appropriate levels of risk, facilitate risk tolerance discussions and decisions, and recommend controls based on industry standards and practices Participate in internal/external compliance audits, reviews, self-assessments, assessments, and data calls Identify, promote, and implement process improvements Qualifications Required: Experience in security control assessments, Master Plans, and Cybersecurity program plans Strong analytical and organizational skills as well as problem solving capabilities to understand Cybersecurity risk and exposure (legal, regulatory violations, etc.) Demonstrated experience implementing compliance frameworks (NIST, etc) Facilitation and project management knowledge, skills and abilities; lead program implementations Demonstrated excellent interpersonal, verbal, written and presentation communication skills and demonstrated ability to interact with all levels of internal and external stakeholders Strong customer service, networking, and teamwork skills with all levels of internal and external personnel, demonstrated ability to work with all levels of an organization Ability to work independently and meet deadlines High ethical standards and operates with integrity and professionalism Must be able to obtain and maintain a DOE Q security clearance Preferred Qualifications: Bachelor's degree in IT, Cybersecurity, Information Assurance, or related field and at least 5 years of experience in cybersecurity policy, risk management, governance, and compliance through a combination of education and experience may be considered for exceptional candidates. Minimum five years' experience working in an information security, information technology or information risk management related field Cybersecurity certifications (CISA, CISM, CRISC, CISSP, CCSP, SSCP) Incident Response Certification Privacy management, cybersecurity, evaluating security controls, identifying control gaps, and mitigating measures along with a strong understanding of business practices and technology concepts Thorough understanding of industry standards and regulations including PCI, HIPAA, Privacy Act, NIST 800-53, NIST Risk Management Framework, FAIR Working knowledge of privacy regulations and impacts Highly motivated individual with an enthusiasm for governance, risk and compliance who can communicate benefits and drive success Experience gaining an Authority to Operate (ATO) for a government system Proven track record of prioritizing tasking and meeting established deadlines Active DOE Q or TS clearance Special Requirement:This position requires the ability to obtain and maintain a clearance from the Department of Energy. As such, this position is a Workplace Substance Abuse (WSAP) testing designated position. WSAP positions require passing a pre-placement drug test and participation in an ongoing random drug testing program.
    $63k-83k yearly est. 25d ago
  • (603) Information System Security Officer (ISSO) III

    Arlo Solutions 3.5company rating

    Philadelphia, PA jobs

    Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value-added solutions. Our solutions are designed and managed to not only reduce costs, but to improve business processes, accelerate response time, improve services to end-users, and give our customers a competitive edge, now and into the future. Position Description: The Information System Security Officer (ISSO) III will support Naval Surface Warfare Center Philadelphia Division (NSWCPD) as a contractor through Arlo Solutions, serving as a key cybersecurity professional for NSWCPD Code 104. This key personnel position is responsible for coordinating cybersecurity processes and activities for assigned systems, ensuring compliance with all applicable policies, and managing security controls implementation throughout the Risk Management Framework (RMF) lifecycle. Location: Philadelphia, PA Clearance: Active Secret Responsibilities and/or Success Factors: Cybersecurity Compliance and Policy Implementation Assist the Information System Security Managers (ISSM) in executing their duties and responsibilities Ensure compliance with all NAVSEA, DON, and DoD cybersecurity policies Ensure relevant cybersecurity policy and procedural documentation is current and accessible Coordinate cybersecurity processes and activities for assigned systems Report changes in system security posture to the ISSM Security Assessment and Authorization (A&A) Management Maintain and report Assess Only (AO) and Assessment and Authorization (A&A) status to Program Managers, Information System Owners, and ISSMs Provide oversight of Security Plans for assigned systems throughout their lifecycle Manage and maintain Plan of Actions and Milestones (POA&M), tracking vulnerabilities through remediation Assist with identification of security control baselines and applicable overlays Coordinate the validation of security controls with Navy Qualified Validators (NQV) Perform Risk Management Framework (RMF) Standard Operating Procedure (SOP) reviews Adjudicate findings from Package Submitting Officer (PSO) System Security Management Register and maintain systems in Enterprise Mission Assurance Support Service (eMASS) Plan and coordinate security control testing during Risk Assessments and Annual Security Reviews Maintain vulnerability data in Vulnerability Remediation Asset Manager (VRAM) Participate in change control and configuration management processes Ensure execution of Continuous Monitoring requirements as defined in system strategies Review all data produced by Continuous Monitoring activities and update eMASS records as necessary Correlate findings from non-RMF vulnerability assessments to RMF controls for holistic risk assessment Cybersecurity Analysis and Reporting Perform analysis of logs, events, and reporting from various data collection tools Assess impacts from observed risks and report via the Cybersecurity Program chain of command Present data to management in a comprehensive and cohesive manner Develop reports and produce procedural documentation as required Evaluate system administrator, security engineer, and/or system owner proposed corrections Minimum Qualifications Including Certificates: Must be a U.S. Citizen Active Secret security clearance Bachelor's degree in computer science, information technology, communications systems management, or equivalent STEM degree from an accredited college or university Minimum 6 years of experience coordinating and implementing security changes, ensuring compliance with published policies, conducting cybersecurity vulnerability and threat analysis, and supporting cyber incident response Current IAM-II certification (CAP, CASP+ CE, CISM, CISSP, GSLC, CCISO, or HCISPP) Desired Qualifications: Experience with the DoD Information Assessment and Authorization (A&A) process Familiarity with Risk Management Framework (RMF) implementation Proficiency with eMASS, VRAM, and other DoD cybersecurity systems Experience with NIST Special Publications and DoD/Navy cybersecurity directives Experience with vulnerability management tools (ACAS, HBSS, etc.) Knowledge of Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) AAP Statement We are proud to be an Affirmative Action and Equal Opportunity Employer and as such, we evaluate qualified candidates in full consideration without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, disability status, protected veteran status, and any other protected status.
    $69k-92k yearly est. Auto-Apply 60d+ ago
  • (545) Information System Security Officer (ISSO)

    Arlo Solutions 3.5company rating

    Mechanicsburg, PA jobs

    Arlo Solutions (Arlo) is an information technology consulting services company that specializes in delivering technology solutions. Our reputation reflects the high quality of the talented Arlo Solutions team and the consultants working in partnership with our customers. Our mission is to understand and meet the needs of both our customers and consultants by delivering quality, value-added solutions. Our solutions are designed and managed to not only reduce costs, but to improve business processes, accelerate response time, improve services to end-users, and give our customers a competitive edge, now and into the future. Position Overview The Mid Information System Security Officer (ISSO) (IAM 2) will support the Defense Security Cooperation Agency (DSCA) Cybersecurity (CYBR) team by providing expertise in Risk Management Framework (RMF) activities, security control assessments, controls validation, and continuous monitoring. The role involves ensuring compliance with RMF, IT, and Federal Information System Controls Audit Manual (FISCAM) guidelines, and supporting the cybersecurity responsibilities detailed in the DSCA CYBR Service Catalog. Work Location: Hybrid (Strongly preferred to live near Washington, DC / Mechanicsburg, PA is also an option) 3 days a week Remote, 2 days a week in Office. Clearance: Active Secret Clearance Job Responsibilities and/or Success Factors * Produce all required DOD compliance documentation for RMF, Audit Response and Remediation, Cyber Task Orders, Required Scorecards, Privacy documentation, and other compliance requirements as detailed in the DSCA CYBR Service Catalog. * Draft and coordinate cybersecurity-related documentation to meet required standards, controls, and metrics. * Support all steps of the RMF process (Steps 0-6) required to gain and maintain DOD Information Network (DODIN) and agency commercial network authority to operate. * Assist in categorization, control selection, implementation, and tailoring support, as well as support of assessments from the ISSO role. * Prepare and validate controls in eMASS packages for assessment and review. * Ensure that control requirements are well-defined and that necessary documentation and evidence are gathered for validation and assessment. * Work in the DOD GRC tool Enterprise Mission Assurance Support Service (eMASS) to support control validation. * Conduct continuous monitoring of information systems to detect vulnerabilities, threats, and security incidents. * Utilize security tools and technologies to perform regular scans, assessments, and analysis of system vulnerabilities. * Maintain and update continuous monitoring processes and procedures to ensure they are effective and aligned with organizational requirements. * Assist in the configuration and maintenance of security tools and technologies provided by the CSSP. * Assist in the detection, analysis, and response to cybersecurity incidents. * Participate in incident response activities, including triage, containment, eradication, and recovery. * Document and report on incident response activities, providing detailed analysis and recommendations for improvement. * Provide support to the Watch Officer in monitoring and managing cybersecurity events and incidents. * Maintain situational awareness of the organization's security posture and emerging threats. * Assist with the performance of daily and ad hoc/on-demand vulnerability scans, monthly audit scans, and monthly discovery scans. * Provide weekly vulnerability compliance reporting to ISSMs. * Review and adjust assets, subnets, credentials, and policies to properly manage C5ISR provided Assured Compliance Assessment Solution (ACAS) solutions. * Track and ensure configuration compliance of Enterprise Security Services (ESS) Suite with RMF, ATO, and Inspection requirements. * Assist with the maintenance of completed security waiver forms in coordination with EADSD and ISSM (PMO). * Work with TSD to implement effective scanning, COAMS System Registration, and Continuous Monitoring Scoring (CMRS) Tagging. * Maintain and update Ports, Protocols, and Services Management (PPSM) records, including emergency and exception requests. * Support the maintenance and accuracy of DoD Allow List entries. * Maintain accurate and up-to-date documentation of all RMF, IT, and FISCAM controls validation activities. * Prepare and submit regular reports on the status of security controls, RMF activities, and DevSecOps pipeline security. * Provide detailed documentation and evidence to support security assessments and audits. * Support the maintenance and configuration needed to maintain accurate ingestion of logs from all assets. * Provide summaries of events/incidents, including time of event/incident, anomalous activity identified, asset names and IPs, affected users, and POC for outreach/additional actions. * Complete Cybersecurity Incident Reporting Forms and assist with the detection and analysis of cybersecurity events and incidents. * Support accurate IR POC list, accurate hardware/software and IP inventory, and accurate summary of event/incident. * Document efforts involved in mitigating cybersecurity-related events/incidents that occur within the enterprise. * Support the generation of performance monitoring reports to monitor asset availability. * Support the generation of system health and security posture reports for system owners and ISSMs. * Support accurate hardware and software inventory, accurate ingestion of logs from all assets, and accurate system performance and security posture baselines. * Conduct specified areas of focus/detail for trend analysis. * Support migration information provided by affected system ISSM and report vulnerabilities to appropriate system ISSMs/POCs. * Assist with the reporting to outside agencies, including JFHQ, battle stations, external leadership, and other DOD Agencies. * Support the correlated agency-level POA&Ms with the coordination of POA&Ms from DSCA to outside entities. * Help complete the Cybersecurity Incident Reporting Form, including additional inputs such as personnel logs, system logs, event logs, and accurate software and hardware inventory list. Education and Minimum Qualifications * Must be a US Citizen * Active Secret Clearance * Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field is required OR additional four (4) years of experience * Strong understanding of Risk Management Framework (RMF) processes and security control assessments, including experience with categorization, control selection, implementation, and assessment. * Minimum of two (2) years of relevant experience in cybersecurity, information assurance, or a related field. * Experience in IT controls validation and familiarity with Federal Information System Controls Audit Manual (FISCAM) guidelines. * Experience in incident response, continuous monitoring, and vulnerability management. * Proficiency in using security assessment tools and platforms such as eMASS (Enterprise Mission Assurance Support Service). * Familiarity with continuous monitoring processes and tools. * Experience with incident response processes and tools. * Knowledge of cybersecurity frameworks and standards, such as NIST, ISO 27001, and CIS Controls. Desired Qualifications: * Certifications such as CSSP, CISM, CISA, CAP, Security+, or equivalent is highly desirable. * Experience with OKTA * Experience as an ISSO or otherwise prior experience with IT Risk Management Framework Support. AAP Statement We are proud to be an Affirmative Action and Equal Opportunity Employer and as such, we evaluate qualified candidates in full consideration without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, disability status, protected veteran status, and any other protected status.
    $68k-92k yearly est. Auto-Apply 17d ago
  • Fabrication Engineer - Integrated Security Services

    Johnson Controls Holding Company, Inc. 4.4company rating

    Horsham, PA jobs

    What you will do The Fabrication Engineer is an office-based electrical/mechanical assembler resource who supports the implementation of small to large complex jobs. They will work closely with local resources, either internal or subcontracted, to ensure a professional product assembly. As a Fabrication Engineer you will be responsible for completing jobs on a timely basis and attention to detail. It will be important to develop awareness of the technical competencies within the markets they support and recognize when delivery challenges may arise. This position requires good working skills in the area of low voltage electrical fabrication. How will you do it Participating in the fabrication of large/complex jobs within the fabrication group. Participating in internal and external (customer) meetings as needed to review delivery plans. Tracking parts inventories for Specialty Products production, especially custom parts with long lead times. Ordering parts when quantities are low. Ability to transfer internal parts and assemblies. Hands on fabrication of electrical assemblies, including wiring configuration, wire terminations (24 to 14 gauge) and metal parts assembly. Communicating proactively with Sales Teams and Centers of Excellence (COE) regarding in-house orders. Tracking productive time (activity categories & categories) to capacity and financial performance models. Provide monthly updates for each project. Provide accurate documentation for the billing cycle for each project. What we look for Required Must have Electrical and Mechanical assembly & wiring skills. Must be able to follow wiring diagrams, blueprints. Relevant experience in electrical systems integration. Ensure that accurate documentation of SOW and performance is maintained. Excellent organizational skills with the ability to work independently while paying close attention to detail. Ability to balance and communicate options. Knowledge & experience with Outlook, Word & Excel. Preferred Working knowledge of JCI platforms (Oracle Fusion) is a plus. Knowledgeable in security access control architectures. Experience or Proficiency in AutoCAD. HIRING HOURLY RANGE: $26-$36 (Hourly rate to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at ***************************************** #HiringTech Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
    $26-36 hourly Auto-Apply 14d ago
  • SAP Architect

    Bluestone 4.1company rating

    Indianapolis, IN jobs

    Responsible for planning, delivery, quality assurance and oversight for technical and integration related tasks associated with SAP projects, enhancements, and maintenance. Leading the effort to define and execute a plan that ensures alignment of technical aspects across all SAP related deliver and sets a foundation for the long-term health of the SAP application environments. •Ensure appropriate design and architecture for process, functional, and technical integration points •Execute the project tasks and/or oversee the completion of deliverables, help in reducing risks and defining mitigation plans, and assist in resolving issues •Govern the planning and coordination of Releases to production SAP applications and ensure they are executed without incident or conflict •Coordinate and oversee the completion of technical development in support of SAP projects, enhancements, maintenance, and break-fix activities •Oversight to unit, integration, user acceptance, and performance testing to ensure technical aspects of testing are properly accounted for •Provide architectural direction for interfaces connecting SAP applications to other SAP or non-SAP applications •Provide direction for middleware needs supporting SAP applications Qualifications Minimum of 8 years SAP software experience Multiple SAP full life cycle implementations Additional Information PREFERRED EXPERIENCE/QUALIFICATIONS: •SAP HANA experience •SAP BI/BW experience •SAP ABAP, Webdynpro experience •SAP Workflow experience
    $62k-100k yearly est. 13h ago
  • SAP Architect

    Bluestone 4.1company rating

    Indianapolis, IN jobs

    Responsible for planning, delivery, quality assurance and oversight for technical and integration related tasks associated with SAP projects, enhancements, and maintenance. Leading the effort to define and execute a plan that ensures alignment of technical aspects across all SAP related deliver and sets a foundation for the long-term health of the SAP application environments. •Ensure appropriate design and architecture for process, functional, and technical integration points •Execute the project tasks and/or oversee the completion of deliverables, help in reducing risks and defining mitigation plans, and assist in resolving issues •Govern the planning and coordination of Releases to production SAP applications and ensure they are executed without incident or conflict •Coordinate and oversee the completion of technical development in support of SAP projects, enhancements, maintenance, and break-fix activities •Oversight to unit, integration, user acceptance, and performance testing to ensure technical aspects of testing are properly accounted for •Provide architectural direction for interfaces connecting SAP applications to other SAP or non-SAP applications •Provide direction for middleware needs supporting SAP applications •SAP HANA experience •SAP BI/BW experience •SAP ABAP, Webdynpro experience •SAP Workflow experience Qualifications Minimum of 8 years SAP software experience Multiple SAP full life cycle implementations Additional Information Work with blue Stone recruiting to find your next ERP role. You can find us at ******************************* We look forward to speaking with you.
    $62k-100k yearly est. 13h ago
  • SAP Architect

    Bluestone 4.1company rating

    Indianapolis, IN jobs

    blue Stone Executive Search is a national search firm with a focus of placing top IT talent from the senior to executive level with prestigious organizations nationwide Job Description Responsible for planning, delivery, quality assurance and oversight for technical and integration related tasks associated with SAP projects, enhancements, and maintenance. Leading the effort to define and execute a plan that ensures alignment of technical aspects across all SAP related deliver and sets a foundation for the long-term health of the SAP application environments. •Ensure appropriate design and architecture for process, functional, and technical integration points •Execute the project tasks and/or oversee the completion of deliverables, help in reducing risks and defining mitigation plans, and assist in resolving issues •Govern the planning and coordination of Releases to production SAP applications and ensure they are executed without incident or conflict •Coordinate and oversee the completion of technical development in support of SAP projects, enhancements, maintenance, and break-fix activities •Oversight to unit, integration, user acceptance, and performance testing to ensure technical aspects of testing are properly accounted for •Provide architectural direction for interfaces connecting SAP applications to other SAP or non-SAP applications •Provide direction for middleware needs supporting SAP applications Qualifications Minimum of 8 years SAP software experience Multiple SAP full life cycle implementations Additional InformationPREFERRED EXPERIENCE/QUALIFICATIONS: •SAP HANA experience •SAP BI/BW experience •SAP ABAP, Webdynpro experience •SAP Workflow experience
    $62k-100k yearly est. 60d+ ago
  • SAP Architect

    Bluestone 4.1company rating

    Indianapolis, IN jobs

    blue Stone Executive Search is a national search firm with a focus of placing top IT talent from the senior to executive level with prestigious organizations nationwide Job Description Responsible for planning, delivery, quality assurance and oversight for technical and integration related tasks associated with SAP projects, enhancements, and maintenance. Leading the effort to define and execute a plan that ensures alignment of technical aspects across all SAP related deliver and sets a foundation for the long-term health of the SAP application environments. •Ensure appropriate design and architecture for process, functional, and technical integration points •Execute the project tasks and/or oversee the completion of deliverables, help in reducing risks and defining mitigation plans, and assist in resolving issues •Govern the planning and coordination of Releases to production SAP applications and ensure they are executed without incident or conflict •Coordinate and oversee the completion of technical development in support of SAP projects, enhancements, maintenance, and break-fix activities •Oversight to unit, integration, user acceptance, and performance testing to ensure technical aspects of testing are properly accounted for •Provide architectural direction for interfaces connecting SAP applications to other SAP or non-SAP applications •Provide direction for middleware needs supporting SAP applications •SAP HANA experience •SAP BI/BW experience •SAP ABAP, Webdynpro experience •SAP Workflow experience Qualifications Minimum of 8 years SAP software experience Multiple SAP full life cycle implementations Additional InformationWork with blue Stone recruiting to find your next ERP role. You can find us at ******************************* We look forward to speaking with you.
    $62k-100k yearly est. 60d+ ago
  • Security Engineer

    Arch 4.5company rating

    New York, NY jobs

    Job DescriptionOur Company Arch is a Series B financial technology company that automates the management of private investments, improving access, understanding, and the human experience of investing across asset classes. Private investments such as venture capital, hedge funds, and private equity, make up roughly 25% of the investment universe. Traditionally, investors, advisors, banks, families, and managers track hundreds of investments in complicated spreadsheets, file folders, and busy inboxes. Not only is this tedious and time-consuming, but it is rife with opportunity for manual data entry errors, inconsistent reporting, and lost information. Enter, Arch. Arch delivers standardized data, documents, and insights in a single platform, avoiding the need to chase information across dozens or hundreds of ‘portals'. Our purpose is to save investors' time while empowering them to make more informed investment decisions, leading to better financial outcomes. We are a fast-growing, dynamic team of 120+, serving over 400 clients, including several of America's largest banks, families, and financial institutions. We've over doubled the size of the company every year since inception and we are looking to hire in all departments as we scale. The role: As a Security Engineer on the Security team, they will focus on safeguarding Arch's enterprise infrastructure, managing identity security, implementing zero trust models, hardening critical services and endpoint systems, and ensuring the secure integration and operation of our extended workforce and third-party SaaS applications. Key responsibilities: Design, implement, and maintain enterprise-wide identity and authentication solutions, ensuring security and compliance. Develop and deploy Zero Trust frameworks to strengthen access control and reduce risk. Evaluate and manage third-party SaaS applications for compliance with Arch's security standards. Collaborate with IT, engineering, and compliance to secure endpoints and manage access for extended workforce and contractors. Identify, assess, and mitigate security risks across enterprise applications and third-party integrations. Promote security awareness by educating employees on best practices and data protection. Support Security and IT Operations in diagnosing and resolving enterprise security issues. Foster secure productivity in a dynamic, fast-paced environment. Talk to us about your experience with: Infrastructure - IAM (Okta), AWS, Google Workspace. Security Fundamentals - OWASP, NIST, CIS Benchmarks, ISO 27001, SOC 2 Authentication & Access - SSO, MFA, SCIM, LDAP, Zero Trust, least privilege Automation & Scripting - Python, PowerShell, Bash, automation of identity/security workflows A Note about us: All of our full-time roles are based onsite at our New York City office, where our team thrives on in-person collaboration and dynamic teamwork. Being onsite daily enables us to build strong connections, collaborate effectively to solve challenges, and foster an engaging environment focused on shipping product and delivering exceptional service to our clients. We encourage applicants currently located in or willing to relocate to the NYC area to join us in this exciting, hands-on workspace. Some perks of working for Arch include: Strong Team - You'll be backed by a strong team that consistently exceeds client expectations and ships new products quickly. Your work is high impact - Being part of a small team means you have real responsibility and impact from day one. You'll be involved in discussions that drive the growth and direction of our platform from the very beginning. Product Market Fit - We have strong product market fit, exceptionally low churn, and have grown mostly organically through word of mouth. Team community and camaraderie - We have enormous trust in each other and always do what we can do to support one another. We're always ready to step in to help. Great office - we've invested in a great space for the Arch team to come together, at 18th and Park in Manhattan (the old Buzzfeed / NYT headquarters). Lunch is on Us - Grab lunch on us while you're in the office and take a break to laugh, brainstorm, or just hang out with your teammates over a meal. Compensation Range: $125K - $200K
    $125k-200k yearly 14d ago
  • Senior Security Operations Engineer

    SES 4.2company rating

    Indiana jobs

    SES's Senior Security Operations Engineer focuses on advancing SES's Information Security threat and compliance program by security monitoring, threat & vulnerability management, and delivering professional reports including findings and recommendations. The Senior Security Operations Engineer is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals. PRIMARY RESPONSIBILITIES / KEY RESULT AREAS * Lead incident response in response to security events and incidents. * Correlation and trend analysis of security logs, network traffic, security alerts, events, and incidents. Perform in-depth root cause analysis and diligently gather information prior to escalation for future root cause analysis. Event and incident handling consistent with applicable plans and processes. * Analyzing, triaging, aggregating, escalating, and reporting on security events including investigation of anomalous network activity, and responds to cyber incidents within the network environment. * Continuous & persistent monitoring of security technologies/tool data and network traffic which result in security alerts generated, parsed, triggered, or observed on the in-scope networks, systems, or security technologies. * Rapidly assess network traffic, detect data anomalies, and provide detailed reporting on the same. * Correlation and trend analysis of security logs, network traffic, security alerts, events, and incidents. Perform in-depth root cause analysis and diligently gather information prior to escalation for future root cause analysis. * Event and incident handling consistent with applicable plans and processes. Integration of activities with standard reports, such as security metrics reports. * Lead team/project meetings and technical meetings appropriate for the content. * Ensures assigned tasks and projects are completed on schedule. COMPETENCIES * Strong organizational skills and ability to stay focused while managing multiple tasks concurrently. * Understanding of current attack tools, tactics, procedures, and how to detect and/or mitigate them. * Strong critical thinking/analytical skills, creativity, and a proven drive for quality QUALIFICATIONS & EXPERIENCE * Must Have * Four Year college degree in a technical field of study or equivalent work experience * Technical knowledge and aptitude in the areas of networks, network topologies, remote network access, servers, applicable software and troubleshooting techniques required. * Experience working in a SOC or similar environment. * Experience with reviewing IDS/IPS, EDR, Firewall and other security/audit logs * Experience monitoring and analyzing a Security Information and Event Management (SIEM) to identify security issues for remediation, and rules fine tuning. * Consolidate and conduct comprehensive analysis of threat data obtained from proprietary, and open-source threat intelligence resources for potential and known threats and acting on identified indicators. * Nice to Have * Participates in the planning, design, and implementation of enterprise security architecture. * Experience with threat and vulnerability management, penetration testing, vulnerability assessments, and vulnerability mitigation * One or more of the following security certifications: Security+, CEH, CYSA+, GCIA, GSEC, GCIA, GMON and GCDA * Experience as a shift lead or supervisor role. SES and its Affiliated Companies are committed to providing fair and equal employment opportunities to all. We are an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law. For more information on SES, click here.
    $89k-120k yearly est. 60d+ ago
  • ERP Architect

    SMC Corporation 4.6company rating

    Noblesville, IN jobs

    PURPOSE The SMC Global ERP Technology Architect will serve as the senior platform lead responsible for providing an overall view of the technological strategy, focus, and ongoing technological development for the global ERP solution. This individual will work with multiple IT teams across the globe to understand their requirements, identify current processes, and develop effective solutions. ESSENTIAL DUTIES * Owns and drives the implementation of technological strategies * Participate in workshops and provide input on non-functional requirements for infrastructure * Anticipates future technical direction for the company * Develop and review the scope of technological work * Provide leadership and guidance to the technical resource team * Provide input to data management activities (data maturity assessment and data migration strategy on the existing technical architecture * Lead technical testing (Unit testing, integration testing, Performance testing) * To identify technical defects/issues before going live and work with the vendor to resolve them * Act as the primary point of contact for the ERP vendor's technical team. * Participate in the technical trainings and deployment activities for proper transition, ensuring a clear understanding of the ERP's architecture and functionalities * Serve as the ongoing technical support lead post go-live. * Collaborate with the team for end-to-end integration design * Coordinate technical resources, facilitating design conversations and reviews with integrating parties * Responsible for providing an enterprise view of the current state of interfaces and middleware layers design, and how it supports the end-to-end process * Extensive ERP knowledge and implementation experience. * Responsible for data governance, data cleansing, and data extract routines * Other duties as assigned. PHYSICAL DEMANDS / WORK ENVIRONMENT * Off-hour meetings and work to accommodate global time zones * Carry a mobile phone during work and off-hours * Collaborative team environment in a shared workspace. * General office, computer room, warehouse, and factory areas * Infrequent off-hours work and local/international travel as required * Able to sit for extended periods * Minimum lifting requirements of 15 pounds MINIMUM REQUIREMENTS * 10+ years of experience in managing or driving transformation in Enterprise IT operations and delivery support * Strong understanding of business processes and ERP implementation methodologies * Excellent problem-solving and analytical skills with a strong attention to detail * Knowledge of various enterprise applications such as ERP, office platforms, etc. * Experience with overseeing implementations of various enterprise-level applications * Experience in risk assessment, control design, and reporting * Ability to effectively communicate with all associates * Ability to travel abroad For internal use only: IT001
    $65k-104k yearly est. 46d ago
  • Security Engineer

    Arch 4.5company rating

    New York, NY jobs

    Our Company Arch is a Series B financial technology company that automates the management of private investments, improving access, understanding, and the human experience of investing across asset classes. Private investments such as venture capital, hedge funds, and private equity, make up roughly 25% of the investment universe. Traditionally, investors, advisors, banks, families, and managers track hundreds of investments in complicated spreadsheets, file folders, and busy inboxes. Not only is this tedious and time-consuming, but it is rife with opportunity for manual data entry errors, inconsistent reporting, and lost information. Enter, Arch. Arch delivers standardized data, documents, and insights in a single platform, avoiding the need to chase information across dozens or hundreds of ‘portals'. Our purpose is to save investors' time while empowering them to make more informed investment decisions, leading to better financial outcomes. We are a fast-growing, dynamic team of 120+, serving over 400 clients, including several of America's largest banks, families, and financial institutions. We've over doubled the size of the company every year since inception and we are looking to hire in all departments as we scale. The role: As a Security Engineer on the Security team, they will focus on safeguarding Arch's enterprise infrastructure, managing identity security, implementing zero trust models, hardening critical services and endpoint systems, and ensuring the secure integration and operation of our extended workforce and third-party SaaS applications. Key responsibilities: Design, implement, and maintain enterprise-wide identity and authentication solutions, ensuring security and compliance. Develop and deploy Zero Trust frameworks to strengthen access control and reduce risk. Evaluate and manage third-party SaaS applications for compliance with Arch's security standards. Collaborate with IT, engineering, and compliance to secure endpoints and manage access for extended workforce and contractors. Identify, assess, and mitigate security risks across enterprise applications and third-party integrations. Promote security awareness by educating employees on best practices and data protection. Support Security and IT Operations in diagnosing and resolving enterprise security issues. Foster secure productivity in a dynamic, fast-paced environment. Talk to us about your experience with: Infrastructure - IAM (Okta), AWS, Google Workspace. Security Fundamentals - OWASP, NIST, CIS Benchmarks, ISO 27001, SOC 2 Authentication & Access - SSO, MFA, SCIM, LDAP, Zero Trust, least privilege Automation & Scripting - Python, PowerShell, Bash, automation of identity/security workflows A Note about us: All of our full-time roles are based onsite at our New York City office, where our team thrives on in-person collaboration and dynamic teamwork. Being onsite daily enables us to build strong connections, collaborate effectively to solve challenges, and foster an engaging environment focused on shipping product and delivering exceptional service to our clients. We encourage applicants currently located in or willing to relocate to the NYC area to join us in this exciting, hands-on workspace. Some perks of working for Arch include: Strong Team - You'll be backed by a strong team that consistently exceeds client expectations and ships new products quickly. Your work is high impact - Being part of a small team means you have real responsibility and impact from day one. You'll be involved in discussions that drive the growth and direction of our platform from the very beginning. Product Market Fit - We have strong product market fit, exceptionally low churn, and have grown mostly organically through word of mouth. Team community and camaraderie - We have enormous trust in each other and always do what we can do to support one another. We're always ready to step in to help. Great office - we've invested in a great space for the Arch team to come together, at 18th and Park in Manhattan (the old Buzzfeed / NYT headquarters). Lunch is on Us - Grab lunch on us while you're in the office and take a break to laugh, brainstorm, or just hang out with your teammates over a meal.
    $104k-147k yearly est. Auto-Apply 47d ago
  • Security Engineer

    Arch 4.5company rating

    New York, NY jobs

    Our Company Arch is a Series B financial technology company that automates the management of private investments, improving access, understanding, and the human experience of investing across asset classes. Private investments such as venture capital, hedge funds, and private equity, make up roughly 25% of the investment universe. Traditionally, investors, advisors, banks, families, and managers track hundreds of investments in complicated spreadsheets, file folders, and busy inboxes. Not only is this tedious and time-consuming, but it is rife with opportunity for manual data entry errors, inconsistent reporting, and lost information. Enter, Arch. Arch delivers standardized data, documents, and insights in a single platform, avoiding the need to chase information across dozens or hundreds of 'portals'. Our purpose is to save investors' time while empowering them to make more informed investment decisions, leading to better financial outcomes. We are a fast-growing, dynamic team of 120+, serving over 400 clients, including several of America's largest banks, families, and financial institutions. We've over doubled the size of the company every year since inception and we are looking to hire in all departments as we scale. The role: As a Security Engineer on the Security team, they will focus on safeguarding Arch's enterprise infrastructure, managing identity security, implementing zero trust models, hardening critical services and endpoint systems, and ensuring the secure integration and operation of our extended workforce and third-party SaaS applications. Key responsibilities: * Design, implement, and maintain enterprise-wide identity and authentication solutions, ensuring security and compliance. * Develop and deploy Zero Trust frameworks to strengthen access control and reduce risk. * Evaluate and manage third-party SaaS applications for compliance with Arch's security standards. * Collaborate with IT, engineering, and compliance to secure endpoints and manage access for extended workforce and contractors. * Identify, assess, and mitigate security risks across enterprise applications and third-party integrations. * Promote security awareness by educating employees on best practices and data protection. * Support Security and IT Operations in diagnosing and resolving enterprise security issues. * Foster secure productivity in a dynamic, fast-paced environment. Talk to us about your experience with: * Infrastructure - IAM (Okta), AWS, Google Workspace. * Security Fundamentals - OWASP, NIST, CIS Benchmarks, ISO 27001, SOC 2 * Authentication & Access - SSO, MFA, SCIM, LDAP, Zero Trust, least privilege * Automation & Scripting - Python, PowerShell, Bash, automation of identity/security workflows A Note about us: All of our full-time roles are based onsite at our New York City office, where our team thrives on in-person collaboration and dynamic teamwork. Being onsite daily enables us to build strong connections, collaborate effectively to solve challenges, and foster an engaging environment focused on shipping product and delivering exceptional service to our clients. We encourage applicants currently located in or willing to relocate to the NYC area to join us in this exciting, hands-on workspace. Some perks of working for Arch include: * Strong Team - You'll be backed by a strong team that consistently exceeds client expectations and ships new products quickly. * Your work is high impact - Being part of a small team means you have real responsibility and impact from day one. You'll be involved in discussions that drive the growth and direction of our platform from the very beginning. * Product Market Fit - We have strong product market fit, exceptionally low churn, and have grown mostly organically through word of mouth. * Team community and camaraderie - We have enormous trust in each other and always do what we can do to support one another. We're always ready to step in to help. * Great office - we've invested in a great space for the Arch team to come together, at 18th and Park in Manhattan (the old Buzzfeed / NYT headquarters). * Lunch is on Us - Grab lunch on us while you're in the office and take a break to laugh, brainstorm, or just hang out with your teammates over a meal.
    $104k-147k yearly est. 48d ago

Learn more about Alcoa jobs