Product Security Engineer, AI
Cyber security analyst job in Des Moines, IA
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Information Security Compliance Analyst
Cyber security analyst job in West Des Moines, IA
The Information Security Compliance Analyst plays a pivotal role in safeguarding the organization's information assets by leading compliance initiatives, managing vendor and client security assessments, and supporting incident response efforts. This position ensures alignment with industry standards such as ISO27001, SOC 2, PCI DSS, and GDPR, while maintaining robust governance frameworks and security policies. The analyst collaborates cross-functionally to enhance security operations, drive continuous improvement, and uphold regulatory compliance across ITA Group's systems and third-party relationships.
ACCOUNTABILITIES & PERFORMANCE EXPECTATIONS
Security Operations & Compliance
* Lead client and vendor security assessments, including third-party reviews, risk assessments, and questionnaire responses.
* Build and manage workflows for vendor assessments and due diligence.
* Oversee compliance audits (SOC2, PCI, ISO27001, TruSight), including evidence collection and process optimization.
* Support the Information Systems Incident Response Team (ISIRT) during security events.
* Assist in developing requirements for security tools and operational procedures.
* Evaluate and recommend emerging security technologies and products.
* Provide off-hours support on a rotating and as-needed basis.
* Coordinate with external suppliers to resolve security incidents.
Systems & Tools Management
* Administer and monitor various security tools to ensure optimal performance and coverage.
Audit & Incident Management
* Conduct quarterly audits of systems in scope for compliance.
* Maintain incident logs and ensure readiness for ISO27001 certification.
* Investigate and remediate Microsoft Security alerts.
Compliance Certifications
* Collaborate with Legal to support privacy regulations and ensure compliance with GDPR and other frameworks.
Governance Management
* Develop and implement Data Loss Prevention (DLP) rules for sensitive document handling.
* Enhance Insider Threat Protection capabilities.
* Maintain and update InfoSec policies and procedures.
* Provide organization-wide coaching and mentorship on security policies.
* Ensure regulatory and compliance requirements are consistently met.
* Establish and maintain a security framework and auditing process.
* Manage security questionnaires and third-party data security risk assessments.
* Analyze and investigate security anomalies using platform reports, logs, and alerts.
POSITION REQUIREMENTS
* Bachelor's degree in computer science, information technology, or equivalent experience.
* Eight or more years' experience in information technology support with at least five years of experience in system administration and system design.
* Security certification such as CISSP, CISA, or CISM are required. Technical certifications in Cisco and Microsoft products is preferred.
* Excellent communication and documentation skills.
* Strong experience with ISO27001, SOC 2, PCI DSS 4.x, GDPR, and other regulatory frameworks and privacy regulations.
* Ability to demonstrate ownership of systems and drive the technology forward to the goals of the company. Direct involvement in the annual planning and budgeting process for Information Technology.
* Strong communication skills and the ability to interact with other systems personnel in a team environment.
* Ability to maintain confidentiality pertaining to nonpublic business, financial, personnel, salary, and technological information, plans or data.
* Ability to think analytically to solve technical problems individually and in a team environment.
* Ability to effectively plan, schedule and coordinate projects and meet deadlines, managing multiple project concurrently.
* Ability to analyze and communicate technology performance results. Specific experience working with our current primary technology and software preferred.
* Ability to listen, understand and respond to external and internal customers' needs in a timely manner; customer service experience in a service-related industry preferred.
* Ability to work the time necessary to complete projects and/or meet deadlines.
Security Analyst - IT
Cyber security analyst job in Ankeny, IA
Job Description
PURPOSE
The Security Analyst - IT is responsible for designing, implementing and maintaining the security systems that safeguard the organization's data. This role plays a critical role in protecting the company from cyber threats by monitoring security environments, identifying vulnerabilities, responding to incidents and ensuring compliance with established security standards and best practices. Performs related work as required.
ESSENTIAL FUNCTIONS AND RESPONSIBILITIES
The following duties are typical for this job. These are not to be constructed as exclusive or all inclusive. Other duties may be required and assigned.
Defend Baker Group systems against unauthorized access, modification and/or destruction
Perform vulnerability/networking scanning assessments and monitor network traffic for unusual activity
Configure/support security tools (firewalls, anti-malware software, patch management systems, etc.)
Implement and maintain network security policies, application security, access control and corporate data safeguards
Analyze, establish and maintain security requirements for Baker Group networks
Train team members on security awareness and procedures
Conduct both internal and external security audits and make policy recommendations
Provide technical security advice
Analyzing security breaches to identify the root cause
Continuously update Baker Group's incident response and disaster recovery plans
Verify third-party vendor security and collaborate with them to meet security requirements
Assist with tier 2 and 3 level support tickets as needed
MINIMUM EDUCATION & EXPERIENCE REQUIRED TO PERFORM ESSENTIAL FUNCTIONS
Bachelor's degree in computer science or related field, or equivalent relevant experience required
Minimum of two years' experience in information security or related field
Experience with computer network penetration testing and techniques
Strong knowledge of firewalls, proxies, SIEM, antivirus, and IDPS concepts
CERTIFICATES, LICENSES, REGISTRATIONS
CompTIA Security+, preferred
CISSP-Certified Information Systems Security Professional, preferred
MENTAL AND PHYSICAL COMPETENCIES REQUIRED TO PERFORM ESSENTIAL FUNCTIONS
Demonstrated ability to identify and mitigate network vulnerabilities, along with the capacity to clearly explain prevention strategies
Skilled in timely patch deployment with a clear understanding of associated business impacts
Excellent verbal and written communication skills
Ability to multi-task while remaining thorough and detail-oriented
Strong problem-solving skills
Passion for technology and strong desire to work with new technologies
ENVIRONMENTAL ADAPTABILITY
Prolonged periods of sitting at a desk and working on a computer
Must be able to lift 10 pounds occasionally
May have occasional visits to a job site which would require periods of standing, walking and/or climbing stairs
EQUIPMENT/TOOLS
Laptop computer
Baker Group
is an Equal Opportunity Employer. In compliance with the Americans with Disabilities Act, Baker Group will consider reasonable accommodations for qualified individuals with disabilities and encourage prospective employees and incumbents to discuss potential accommodations with the Employer.
Application Security Analyst
Cyber security analyst job in Des Moines, IA
FGL Holdings-the F&G family of insurance companies-is committed to helping Americans prepare for and live comfortably in their retirement. Through its subsidiaries, F&G is a leading provider of annuity and life insurance products. For nearly 60 years, we have offered annuity and life insurance products to those who are seeking safety, protection and income solutions to meet their needs.
At F&G, we believe our culture is what makes our company great. In 2019, we received a Top Workplace award, which we credit to our employees' shared cultural values: Collaborative, Authentic, Dynamic and Empowered. We believe that by embracing these values, we will continue to build and strengthen the company, while being a great place to work. We recruit talented and committed individuals to join our team, and we provide opportunities for personal and professional growth.
This is for a position as an Application Security Analyst on the IT Security and Risk team.
Organization
The Application Security Analyst helps improve and maintain the application security program by providing guidance pertaining to secure web development design and testing. The resource will partner with Business Systems, Solutions Delivery, Engineering, and Operations teams to educate, evangelize, and validate secure development practices.
Duties and Responsibilities
Primarily responsible for application security assessments and code review as part of the software development lifecycle (SDLC)
Develop, educate, promote, and monitor the use of secure software development practices
Work with developers to implement and refine security checkpoints in the SDLC
Obtain and review all required artifacts as part of go, no go analyses at security checkpoint phases in the development cycle
Continue to drive security evaluation earlier in the cycles through iterative security testing
Develop secure coding standards that are based on industry-accepted best practices such as OWASP Guide, SANS CWE Top 25, or CERT Secure Coding to address common coding vulnerabilities
Provide regular status reports on the security of the software within the organization
Manage the application security scanning process, including analysis, communication and remediation verification
Implement and Govern automated secure coding tools and processes (SAST, DAST) to review code as it is written, promoted through the development lifecycle, and into production
Provide advisory services in secure coding practices to application development teams
Perform security activities, including security design reviews, threat modeling, code auditing on internally& externally developed software
Operate as incident responder for triage pertaining to web-based vulnerabilities
Work with information security analysts to refine web application penetration testing methods and breadth of security services
Assist with periodic security risk assessments, IT security audits, and management reporting
Help Build, maintain, and enforce application security development policies, procedures & standards
Experience and Education Requirements
· Bachelor's degree in Computer Science, Information Systems, Engineering, Mathematics, Business, or 5 years IT experience
· Minimum of 3 years of experience with commonly used programming tools, workflows, and concepts
· Security training or education a plus (Ex: SANS/GIAC, ISC2, ISACA, EC-Council, Offensive Security, etc.)
Preferred Skills and Abilities
· Ability to read and understand code as well as ability to script
· A strong understanding of Unix, Windows and network security skills
· Possess excellent verbal and written communication skills and are able to navigate in an environment with both highly technical and highly nontechnical individuals
· Have passion for technology, security and innovation
· Familiarity with commonly used programming tools, workflows, and concepts
· Ability to work independently and in a team-oriented, collaborative environment
· Ability to conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities
· Ability to remain flexible during times of change and react to project adjustments and alterations promptly, efficiently and positively
· Must be able to learn, understand and apply new technologies
· Ability to effectively prioritize and execute tasks
Physical Demands and Work Environment
Typical office environment
#INDHP
#LI-JS1
Auto-ApplySecurity Analyst
Cyber security analyst job in Des Moines, IA
Arete Technologies, Inc. offers set of innovative Consulting and Outsourcing services, bridging the gap between requirements and outputs of various dexterous and facile companies worldwide. The thrust of providing global deliverables with focus on providing paramount and unsurpassed services combined with cost saving solutions to the clients
We understand the business requirements in the present day corporate scenario and aspire to provide world-class services enabling the organization to burgeon and flourish while keeping the work-life balance intact. The Global delivery mechanism followed at Arete Technologies, Inc. saddles proficient schemas and unconventional channels to provide one-stop solutions for all your workforce needs.
our Team is an exquisite amalgamation of vast experiences of over 30 years in IT Consulting and Staffing industry. Connoisseurs in the field of staff augmentation for IT, we operate on 24 by 7 model with an aim of providing affordable and adept professionals with an assurance of satisfaction for both Consultants and Clients.
We are pre-eminent service providers in the field of staff augmentation, IT Consultancy, Software development, Web Development providing unexcelled services and focusing on both the employers and employees.
Job Description
Description:
The security analyst is responsible for advising IPERS in all policies regarding security.
-Knowledge and understanding of information risk concepts and principles, as a means of relating business, needs to security controls.
-Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
-Proficiency in performing risk, business impact, control and vulnerability assessments.
-Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.
-Technical knowledge of Microsoft Windows and a wide range of security technologies, such as network security appliances, identity, and access mgt tools
Desired skills:
-Good Qualities:
-SafeNet Luna HSM administration
-COOP/COG coordinator
-Windows PKI administration
-Network Forensics
-Log parsing
-Incident Response
-Continuous Monitoring
-
Powershel
l Scripting
-HID Credential Management System administration
-Varonis DatAdvantage, DatAlert, and DataPrivilege administration
-Vormetric DSM administration - file level encryption product
-OSINT - Open Source Intelligence gathering and analysis
-End User security training program administration
-Maldoc analysis
Skill Required / Desired Amount Years of Experience
-Manage vulnerability scans and assist administrators in verification and remediation with Tripwire IP360
-Proxy administration, configuration, and troubleshooting; Forcepoint Triton AP Web
-SIEM configuration, management, and analysis; SolarWinds Log and Event Manager
-Application Whitelisting administration; Carbon Black Enterprise Protection (formerly bit 9)
-Windows Forensics and Investigations
-Internal Policies compliance
-Risk Management
-Familiarity with implementing CIS Critical Security Controls and/or Australian Signals Directorate Essential Eight
Qualifications
Need local candidates
Additional Information
Best Regards,
Paramjot Singh
Engineer, Information Security and Risk
Cyber security analyst job in Des Moines, IA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Engineer - Black Lotus Labs Threat Researcher (APT)
Cyber security analyst job in Des Moines, IA
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Principal Security Engineer on the Research & Analysis team. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**The Main Responsibilities**
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting nation-state and cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages).
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ 5+ years of experience in the IC, DoD or similar tracking and defending against nation state threat activity.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
+ Active TS/SCI clearance with poly
**Well-experienced candidates may also have the following skills: **
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
\#LI-JS1
Requisition #: 339093
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
12/09/2025
Data Security Engineer
Cyber security analyst job in Johnston, IA
Insight Global is hiring for our client's Information Security team that is seeking a seasoned professional to advance their Data Loss Prevention (DLP) program. As a Data Security Engineer, you will design, implement, and maintain technical data protection solutions-primarily within Microsoft Purview-to safeguard sensitive information across a large-scale hybrid environment. This role involves close collaboration with IT teams, business stakeholders, and vendors to identify risks, enforce data handling policies, and ensure regulatory alignment.
Key Responsibilities
- Develop, configure, and maintain DLP policies and labeling solutions across endpoints, email, cloud, and network environments using Microsoft Purview.
- Build out new and continuously improve current DLP policies based on customer feedback, business needs, and regulatory requirements.
- Manage configuration, deployment, and ongoing maintenance of DLP and data classification policies.
- Integrate DLP solutions with SIEM, CASB, endpoint protection, and other security platforms.
- Monitor and optimize technical components of the Data Protection program, tuning DLP rules to reduce false positives and manage exceptions.
- Drive change management for DLP and data protection initiatives, ensuring smooth adoption and compliance.
- Collaborate with security, IT, and business teams to understand data flows, integrate Purview capabilities, and align controls with business needs.
- Partner with vendors to ensure alignment with industry best practices for data protection.
- Analyze data protection risks in both persistent and transit layers; design sustainable mitigation strategies.
- Document complex process flows and communicate technical details to both technical and non-technical audiences.
- Stay current with emerging threats, technologies, and regulatory changes; recommend updates to DLP strategy.
- Develop and execute test plans for DLP solutions across multiple environments (development, staging, production) to ensure robust deployment and minimize risk.
Pay rate varies on experience $55/hr - $65/hr
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 5+ years of experience in data loss prevention/data security engineering
- 2+ years of experience in a senior-level engineering role
- Microsoft Purview Information Protection (MIP Labels & MS Data Loss Prevention)
- Enterprise (large organization) Data Loss Prevention (DLP) administration and configuration. - Integration of DLP with SIEM, CASB, and endpoint protection platforms.
- CISSP (Certified Information Systems Security Professional)
- CISM (Certified Information Security Manager)
- Experience with Microsoft Azure and Microsoft O365
Information Security Engineer / Analyst
Cyber security analyst job in Johnston, IA
Mindlance is a national recruiting company which partners with many of the leading employers in IT, financial services, engineering, semiconductor, clinical and pharmaceutical domains. You can learn more about us at *****************
.
Job Description
·
3-7 years of experience in Information Security focusing on security solution design, engineering, implementation and assurance.
·
3-5 years of experience defining and managing the implementation of controls to address access security and IT control requirements.
·
3-5 years of experience working with Information Security and IT general controls, including experience defining and documenting controls using COBIT 4.1 or 5.0, the NIST Cybersecurity Framework, the ISO 27k framework, the SANS 20 critical controls or similar experience.
·
Deep understanding of Information Security technologies including firewalls, IDS/IPS, Password Vaults, CASBs, SIEM, IT GRC, DLP, etc.
·
Understanding of the regulatory environment and experience with regulators.
·
Comfort delivering tasks and assignments in an evolving and a maturing environment.
·
Application security experience and corresponding technologies (e.g. Jenkins).
·
Experience with the FFIEC Cyber Security Assessment Tool.
·
Applicable certifications (e.g. CISSP, CISA, CISM, CGEIT, CRISC).
Additional Information
All your information will be kept confidential according to EEO guidelines.
Senior Technology Security Engineer (IAM)
Cyber security analyst job in Des Moines, IA
About the job
Our client is all about working together to make an impact. As part of our team, you'll have the opportunity to grow, contribute, and gain experience that matters. We strive to be caring leaders, close partners, and responsive experts-always supporting each other to do our best work. Join us, and let's improve lives together.
The Senior Technology Security Engineer will be responsible for the design, build, deploy and support of our clients Privileged Access Management (PAM) platform implemented in CyberArk Cloud, including infrastructure, servers, services and privileged accounts that are part of the overall IT ecosystem.
The Senior Technology Security Engineer will collaborate with various teams to ensure the seamless integration and effective use of CyberArk for managing privileged access, monitoring, and securing sensitive accounts.
Serves as an information security subject matter expert on highly complex enterprise projects, software, and hardware enhancements. Assesses information security risks, recommends risk treatment, coordinates risk acceptance and remediation, and ensures appropriate remediation occurs. Serves as PAM subject matter expert, collaborates with stakeholders, offers guidance, and serves as main security point of contact during project planning and implementation and maintains the vendor relationship. Collects and provides documentation for internal and external audits and assessments. Oversees assigned security tools/services and vendor life cycle management.
Essential Functions
Serves as an information security subject matter expert on highly complex enterprise projects, software, and hardware enhancements.
Identifies information security risks, provides recommendations, builds, and configures solutions, and troubleshoots issues.
Collaborates with IT and security teams on project plans and meets with stakeholders to assess impacts and dependencies.
Leads project activities to ensure timely deliverables and supports the establishment of a roadmap by evaluating and recommending new tools
Leads highly complex information security projects across all security teams.
Designs, builds, deploys, and maintains information security systems, including identity governance and access management solutions.
Ensures the efficient operation of information security systems and resolves intricate security problems.
Researches, evaluates, and proposes new information security solutions. Aligns information security systems with architectural requirements and strategies.
Provides implementation and cost estimates for new solutions, including training requirements and system administration processes
Collaborates with stakeholders to ensure the efficient operation of information security systems in alignment with architectural requirements and strategies
Identifies and documents of highly complex information technology risks, assesses risk levels, recommends risk treatment, coordinates risk acceptance and remediation, and ensures appropriate remediation occurs
Serves as the primary contact on assigned internal and third-party IT processes, risk assessments, and audits.
Provides advice to key stakeholders on the security-relevant impact of findings
Serves as security subject matter expert, collaborates with stakeholders, offers guidance, and serves as main security point of contact during project planning and implementation
Leads troubleshooting sessions and knowledge transfers to resolve security issues including identity governance and access management
Recommends solutions for aligning technology areas with future needs
Collects and provides documentation for internal and external audits and assessments
Documents information security systems policies, procedures, standards, needed improvements, and guidelines
Maintains the document life cycle, including periodic reviews, updates, and approval cycles
Oversees assigned security tools/services and vendor life cycle management
Schedules vendor meetings to review products, services, and vendor/tool roadmaps
Drives renewals and new purchases through the our clients vendor management and purchase process
Education & Experience
Bachelor's degree, preferably in information security, information technology, or a related field, or equivalent relevant experience
Eight years of experience in information security, identity and access management, or related roles, including at least four years of experience in information security
Master's degree, preferably in information security, information technology, or a related field or equivalent related experience and six years of experience in information security, identity and access management, or related roles, including at least four years of experience in information security
Information security certifications (CISSP, CCSP, CCSK, AWS, Azure, Security+, CEH, GSEC) preferred
Prior experience in the insurance industry preferred
Knowledge, Skills, & Abilities
Advanced knowledge of information security and privacy standards, concepts, principles, technologies, and audit practices
Advanced knowledge of information technology including network, servers, cloud, and PKI/cryptography and identity and access management technologies
Excellent knowledge of identity and access management concepts, principles, technologies
Excellent ability to assess and report on information technology risks
Strong knowledge of Linux and Windows operating systems
Strong knowledge of secure cloud solutions within AWS, Google, and/or Azure cloud platforms
Strong ability to perform and create automation tasks with tools (i.e., PowerShell, Python) preferred
Experience in designing, building, and maintaining information security systems
Excellent analytical and problem-solving abilities
Strong verbal and written communication skills
Excellent ability to work effectively with others at varying levels
Excellent documentation skills
Ability to lead moderate to highly complex technology projects
Desired Skills
SailPoint File Access Manager
CyberArk Privileged Cloud
Atlassian BitBucket
Atlassian Confluence
AWS EC2, Lambda
SharePoint
Auto-ApplyLead Information Security Engineer - Palo Alto Firewalls
Cyber security analyst job in West Des Moines, IA
About this role: Wells Fargo is seeking a Lead Information Security Engineer - Palo Alto Firewalls to join our Chief Technology Office (CTO). Learn more about the career areas and business divisions at wellsfargojobs.com. We are looking for a skilled and driven Lead Information Security Engineer - Palo Alto Firewalls to join our team and contribute to the design, deployment, and ongoing support of secure, scalable network infrastructures. This role is ideal for professionals with a strong foundation in enterprise firewall technologies, particularly Palo Alto Networks and Fortinet, along with working knowledge of Cisco infrastructure products.
You will be responsible for implementing and maintaining advanced security solutions, leading firewall migrations, and ensuring the integrity and performance of network security systems. A key part of this role involves using industry-standard migration tools to transition legacy systems to modern platforms with minimal disruption.
The ideal candidate brings a proactive approach to problem-solving, a deep understanding of network security principles, and the ability to work across teams to align security strategies with business goals. Experience in multi-vendor environments and a willingness to adapt to evolving technologies will be highly valued.
Key Responsibilities:
* Design, implement, and maintain secure network infrastructures using Palo Alto Networks, Fortinet, and Cisco routing and switching products.
* Lead and support firewall migration projects, including policy analysis, configuration translation, and deployment using tools such as Expedition, FortiConverter, SmartMove, and other vendor utilities.
* Build and deploy new network security infrastructures, including greenfield implementations and expansion of existing environments.
* Perform security policy reviews, rulebase optimization, and threat prevention tuning to align with best practices and compliance requirements.
* Troubleshoot and resolve complex network security issues across multi-vendor environments, ensuring minimal downtime and optimal performance.
* Collaborate with cross-functional teams (network, cloud, infrastructure, and application teams) to integrate security controls into enterprise architecture.
* Maintain accurate and up-to-date documentation, including network diagrams, configuration standards, and operational procedures.
* Monitor and respond to security events, alerts, and incidents, escalating as necessary and contributing to root cause analysis and remediation.
* Participate in a rotational on-call schedule to provide after-hours support for critical network security incidents and maintenance activities.
* Stay current with emerging threats, vulnerabilities, and technologies to continuously improve the organization's security posture.
Required Qualifications:
* 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
* 4+ years of hands-on experience in network security engineering, with a strong focus on enterprise-grade firewall platforms and secure network architecture.
* 4+ years of experience configuring, managing, and troubleshooting firewalls and security management systems across Palo Alto Networks
* 4+ years of experience in security policy design, rulebase optimization, and hardening of multi-vendor firewall environments to meet organizational and compliance standards.
* 2+ years of experience in Panorama - template stacks, device groups, policy hierarchy, logging, reporting, custom dashboards, role-based control
Desired Qualifications:
* Industry certifications such as Palo Alto Networks Certified Network Security Administrator (PCNSA), Palo Alto Networks Certified Network Security Engineer (PCNSE), Fortinet Network Security Expert 4 or 5 (NSE4/5
* 2+ years of practical experience using firewall migration tools such as Expedition, FortiConverter, SmartMove
* Proficiency in troubleshooting complex network and security issues across multi-vendor environments, including deep packet inspection, log analysis, and root cause identification
* Strong understanding of network protocols, routing and switching, VPN technologies, NAT, and intrusion prevention systems
* Familiarity with incident response, log analysis, and security monitoring tools
* Familiarity with automation and scripting for network security tasks using tools like Python, Ansible, or Terraform
* Familiarity with cloud security architectures and controls in AWS, Azure, or Google Cloud Platform
* Exposure to SIEM platforms, log management, and threat intelligence tools
* Ability to manage and prioritize multiple projects in a fast-paced, dynamic environment
* Strong interpersonal skills and the ability to communicate technical concepts to non-technical stakeholders.
* Ability to participate in a rotational on-call schedule and respond to after-hours incidents or maintenance tasks
* Strong documentation skills and attention to detail
Job Expectations:
* This position offers a hybrid work schedule
* This position is not eligible for Visa sponsorship
* Relocation assistance is not available for this position
* Flexibility to work in a 24/7 on-call environment
Pay Range
Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.
$119,000.00 - $224,000.00
Benefits
Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit Benefits - Wells Fargo Jobs for an overview of the following benefit plans and programs offered to employees.
* Health benefits
* 401(k) Plan
* Paid time off
* Disability benefits
* Life insurance, critical illness insurance, and accident insurance
* Parental leave
* Critical caregiving leave
* Discounts and savings
* Commuter benefits
* Tuition reimbursement
* Scholarships for dependent children
* Adoption reimbursement
Posting End Date:
7 Dec 2025
* Job posting may come down early due to volume of applicants.
We Value Equal Opportunity
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Applicants with Disabilities
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo.
Drug and Alcohol Policy
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more.
Wells Fargo Recruitment and Hiring Requirements:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
Security Engineer II
Cyber security analyst job in Des Moines, IA
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Security Engineer
Cyber security analyst job in Des Moines, IA
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.
**Required Skills:**
Security Engineer Responsibilities:
1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices.
2. Build machine attestation and secure certificate storage solutions to enable strong client trust.
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices.
4. Develop, validate, and enforce our client security policies.
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services.
6. Advise and collaborate with other teams.
7. Telecommuting from anywhere in the U.S. allowed.
**Minimum Qualifications:**
Minimum Qualifications:
8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation
9. Requires 12 months of experience involving the following:
10. PHP, Golang, Python, C/C++, Rush, or Ruby
11. Designing and deploying security infrastructure such as PKI, key management, and certificate management
12. Endpoint Security & Management
13. Certificate Lifecycle
14. Devices & OS hardening and security policies
15. Identity & Access Management (Authentication & Authorization, SSO)
16. Network Security and
17. Programming and Code Review
**Public Compensation:**
$178,041/year to $200,200/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Information Security Compliance Analyst
Cyber security analyst job in West Des Moines, IA
Job Description
The Information Security Compliance Analyst plays a pivotal role in safeguarding the organization's information assets by leading compliance initiatives, managing vendor and client security assessments, and supporting incident response efforts. This position ensures alignment with industry standards such as ISO27001, SOC 2, PCI DSS, and GDPR, while maintaining robust governance frameworks and security policies. The analyst collaborates cross-functionally to enhance security operations, drive continuous improvement, and uphold regulatory compliance across ITA Group's systems and third-party relationships.
ACCOUNTABILITIES & PERFORMANCE EXPECTATIONS
Security Operations & Compliance
Lead client and vendor security assessments, including third-party reviews, risk assessments, and questionnaire responses.
Build and manage workflows for vendor assessments and due diligence.
Oversee compliance audits (SOC2, PCI, ISO27001, TruSight), including evidence collection and process optimization.
Support the Information Systems Incident Response Team (ISIRT) during security events.
Assist in developing requirements for security tools and operational procedures.
Evaluate and recommend emerging security technologies and products.
Provide off-hours support on a rotating and as-needed basis.
Coordinate with external suppliers to resolve security incidents.
Systems & Tools Management
Administer and monitor various security tools to ensure optimal performance and coverage.
Audit & Incident Management
Conduct quarterly audits of systems in scope for compliance.
Maintain incident logs and ensure readiness for ISO27001 certification.
Investigate and remediate Microsoft Security alerts.
Compliance Certifications
Collaborate with Legal to support privacy regulations and ensure compliance with GDPR and other frameworks.
Governance Management
Develop and implement Data Loss Prevention (DLP) rules for sensitive document handling.
Enhance Insider Threat Protection capabilities.
Maintain and update InfoSec policies and procedures.
Provide organization-wide coaching and mentorship on security policies.
Ensure regulatory and compliance requirements are consistently met.
Establish and maintain a security framework and auditing process.
Manage security questionnaires and third-party data security risk assessments.
Analyze and investigate security anomalies using platform reports, logs, and alerts.
POSITION REQUIREMENTS
Bachelor's degree in computer science, information technology, or equivalent experience.
Eight or more years' experience in information technology support with at least five years of experience in system administration and system design.
Security certification such as CISSP, CISA, or CISM are required. Technical certifications in Cisco and Microsoft products is preferred.
Excellent communication and documentation skills.
Strong experience with ISO27001, SOC 2, PCI DSS 4.x, GDPR, and other regulatory frameworks and privacy regulations.
Ability to demonstrate ownership of systems and drive the technology forward to the goals of the company. Direct involvement in the annual planning and budgeting process for Information Technology.
Strong communication skills and the ability to interact with other systems personnel in a team environment.
Ability to maintain confidentiality pertaining to nonpublic business, financial, personnel, salary, and technological information, plans or data.
Ability to think analytically to solve technical problems individually and in a team environment.
Ability to effectively plan, schedule and coordinate projects and meet deadlines, managing multiple project concurrently.
Ability to analyze and communicate technology performance results. Specific experience working with our current primary technology and software preferred.
Ability to listen, understand and respond to external and internal customers' needs in a timely manner; customer service experience in a service-related industry preferred.
Ability to work the time necessary to complete projects and/or meet deadlines.
Security Analyst
Cyber security analyst job in Des Moines, IA
Arete Technologies, Inc. offers set of innovative Consulting and Outsourcing services, bridging the gap between requirements and outputs of various dexterous and facile companies worldwide. The thrust of providing global deliverables with focus on providing paramount and unsurpassed services combined with cost saving solutions to the clients
We understand the business requirements in the present day corporate scenario and aspire to provide world-class services enabling the organization to burgeon and flourish while keeping the work-life balance intact. The Global delivery mechanism followed at Arete Technologies, Inc. saddles proficient schemas and unconventional channels to provide one-stop solutions for all your workforce needs.
our Team is an exquisite amalgamation of vast experiences of over 30 years in IT Consulting and Staffing industry. Connoisseurs in the field of staff augmentation for IT, we operate on 24 by 7 model with an aim of providing affordable and adept professionals with an assurance of satisfaction for both Consultants and Clients.
We are pre-eminent service providers in the field of staff augmentation, IT Consultancy, Software development, Web Development providing unexcelled services and focusing on both the employers and employees.
Job Description
·
The security analyst is responsible for advising IPERS in all policies regarding security.
Knowledge and understanding of information risk concepts and principles, as a means of relating business needs to security controls.
Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
Proficiency in performing risk, business impact, control and vulnerability assessments.
Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.
Technical knowledge of Microsoft Windows and a wide range of security technologies, such as network security appliances, identity and access mgt tools
Qualifications
SafeNet Luna HSM administration
COOP/COG coordinator
Windows PKI administration
Network Forensics
Log parsing
Incident Response
Continuous Monitoring
Power shell Scripting
HID Credential Management System administration
Varonis DatAdvantage, DatAlert, and DataPrivilege administration
Vormetric DSM administration - file level encryption product
OSINT - Open Source Intelligence gathering and analysis
End User security training program administration
Maldoc analysis
Additional Information
All your information will be kept confidential according to EEO guidelines.
Engineer, Information Security and Risk
Cyber security analyst job in Des Moines, IA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Lead Information Security Engineer
Cyber security analyst job in West Des Moines, IA
**About this role:** Wells Fargo is seeking a Lead Information Security Engineer in Technology as part of Technology Infrastructure, Secure Access Technologies team supporting Wells Fargo's Remote Access VPN and Secure Connectivity solutions. This role provides strategic leadership and technical expertise in designing, implementing, and managing secure remote access and connectivity solutions, including VPN infrastructure, Zero Trust Network Access, and endpoint posture enforcement. The Lead Engineer will drive innovation, mentor team members, and collaborate across business units to ensure secure, scalable, and resilient access to enterprise resources.
Learn more about the career areas and lines of business at wellsfargojobs.com .
**In this role, you will:**
+ Lead or participate in computer security incident response activities for moderately complex events.
+ Conduct technical investigations and post-incident digital forensics to identify root causes and recommend mitigation strategies.
+ Provide security consulting on enterprise projects to ensure alignment with corporate security policies and standards.
+ Design, document, test, and maintain security solutions across networking, cryptography, cloud, authentication, directory services, email, internet, applications, endpoint security, firewall and remote access.
+ Complete solution and implementation of remote access configuration changes related to endpoint assessments, security policies, authentication, and access route changes.
+ Support and manage GlobalProtect infrastructure, including configuring portals, gateways, and deploying the app across platforms.
+ Administer and monitor Palo Alto Networks firewalls, including configuration changes, access management, and log analysis.
+ Review and correlate security logs to identify vulnerabilities and assess risks.
+ Respond to monitoring alerts and incident escalations within SLA timelines.
+ Troubleshoot VPN and firewall issues, validate Panorama policies, and monitor gateway health.
+ Support scheduled and emergency changes, validate post-change stability, and document outcomes.
+ Maintain accurate documentation in Jira and Confluence, contribute to FAQs and troubleshooting guides.
+ Collaborate with peers, support teams, and leadership to resolve issues and drive continuous improvement.
+ Provide strategic direction and oversight for secure remote access initiatives.
+ Mentor and guide junior engineers and peers across cross-functional teams.
+ Lead enterprise-wide security architecture reviews and risk assessments.
+ Drive continuous improvement in operational processes and security posture.
+ Represent the team in executive-level discussions and planning sessions.
**Required Qualifications:**
+ 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
+ 4+ years of secure remote access technology support experience
+ 4+ years of firewall technology support and management experience
**Desired Qualifications:**
+ 4+ years of experience with Palo Alto Networks technologies, including advanced configuration and troubleshooting
+ 4+ years of experience with GlobalProtect infrastructure and endpoint integration
+ 4+ years of experience in cryptography, PKI, and certificate lifecycle management
+ 4+ years of experience in enterprise threat modeling, risk analysis, and secure architecture design
+ 4+ years of IAM experience, including integration with multiple IDPs and federated identity systems
+ Experience implementing and managing Zero Trust Network Access frameworks
+ Familiarity with DevSecOps practices and automation tools (e.g., Terraform, Ansible, CI/CD pipelines)
+ Proven ability to lead cross-functional teams and mentor junior engineers
+ Experience contributing to enterprise security strategy, governance, and compliance initiatives
+ Strong stakeholder engagement and executive communication skills
**Job Expectations:**
+ Ability to work in office 3 days a week
+ Participate in the Engineering on-call rotation
+ Ability to work off hours and occasional weekends to support change activities
+ This role does not support visa sponsorship or transfers
**Pay Range**
Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.
$119,000.00 - $224,000.00
**Benefits**
Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit Benefits - Wells Fargo Jobs (*************************************************************** for an overview of the following benefit plans and programs offered to employees.
+ Health benefits
+ 401(k) Plan
+ Paid time off
+ Disability benefits
+ Life insurance, critical illness insurance, and accident insurance
+ Parental leave
+ Critical caregiving leave
+ Discounts and savings
+ Commuter benefits
+ Tuition reimbursement
+ Scholarships for dependent children
+ Adoption reimbursement
**Posting End Date:**
1 Dec 2025
***** **_Job posting may come down early due to volume of applicants._**
**We Value Equal Opportunity**
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
**Applicants with Disabilities**
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo (****************************************************************** .
**Drug and Alcohol Policy**
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy (********************************************************************** to learn more.
**Wells Fargo Recruitment and Hiring Requirements:**
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
**Req Number:** R-472919
Security Analyst
Cyber security analyst job in Des Moines, IA
Arete Technologies, Inc. offers set of innovative Consulting and Outsourcing services, bridging the gap between requirements and outputs of various dexterous and facile companies worldwide. The thrust of providing global deliverables with focus on providing paramount and unsurpassed services combined with cost saving solutions to the clients
We understand the business requirements in the present day corporate scenario and aspire to provide world-class services enabling the organization to burgeon and flourish while keeping the work-life balance intact. The Global delivery mechanism followed at Arete Technologies, Inc. saddles proficient schemas and unconventional channels to provide one-stop solutions for all your workforce needs.
our Team is an exquisite amalgamation of vast experiences of over 30 years in IT Consulting and Staffing industry. Connoisseurs in the field of staff augmentation for IT, we operate on 24 by 7 model with an aim of providing affordable and adept professionals with an assurance of satisfaction for both Consultants and Clients.
We are pre-eminent service providers in the field of staff augmentation, IT Consultancy, Software development, Web Development providing unexcelled services and focusing on both the employers and employees.
Job Description
Description:
Knowledge and understanding of information risk concepts and principles, as a means of relating business, needs to security controls.
Knowledge of and experience in developing and documenting security architecture and plans, including strategic, tactical and project plans.
Proficiency in performing risk, business impact, control and vulnerability assessments.
Knowledge of network infrastructure, including routers, switches, firewalls, and the associated network protocols and concepts.
Technical knowledge of Microsoft Windows and a wide range of security technologies, such as network security appliances, identity and access mgt tools
Desired skills:
Good Qualities:
SafeNet Luna HSM administration
COOP/COG coordinator
Windows PKI administration
Network Forensics
Log parsing
Incident Response
Continuous Monitoring
Powershell Scripting
HID Credential Management System administration
Varonis DatAdvantage, DatAlert, and DataPrivilege administration
Vormetric DSM administration - file level encryption product
OSINT - Open Source Intelligence gathering and analysis
End User security training program administration
Maldoc analysis
Qualifications
***Local Candidate Strongly preferred***
Additional Information
Best Regards,
Amrit Lal
Engineer, Information Security and Risk
Cyber security analyst job in Des Moines, IA
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Lead Information Security Engineer - Palo Alto Firewalls
Cyber security analyst job in West Des Moines, IA
**About this role:** Wells Fargo is seeking a Lead Information Security Engineer - Palo Alto Firewalls to join our Chief Technology Office (CTO). Learn more about the career areas and business divisions at wellsfargojobs.com. We are looking for a skilled and driven Lead Information Security Engineer - Palo Alto Firewalls to join our team and contribute to the design, deployment, and ongoing support of secure, scalable network infrastructures. This role is ideal for professionals with a strong foundation in enterprise firewall technologies, particularly Palo Alto Networks and Fortinet, along with working knowledge of Cisco infrastructure products.
You will be responsible for implementing and maintaining advanced security solutions, leading firewall migrations, and ensuring the integrity and performance of network security systems. A key part of this role involves using industry-standard migration tools to transition legacy systems to modern platforms with minimal disruption.
The ideal candidate brings a proactive approach to problem-solving, a deep understanding of network security principles, and the ability to work across teams to align security strategies with business goals. Experience in multi-vendor environments and a willingness to adapt to evolving technologies will be highly valued.
**Key Responsibilities:**
+ Design, implement, and maintain secure network infrastructures using Palo Alto Networks, Fortinet, and Cisco routing and switching products.
+ Lead and support firewall migration projects, including policy analysis, configuration translation, and deployment using tools such as Expedition, FortiConverter, SmartMove, and other vendor utilities.
+ Build and deploy new network security infrastructures, including greenfield implementations and expansion of existing environments.
+ Perform security policy reviews, rulebase optimization, and threat prevention tuning to align with best practices and compliance requirements.
+ Troubleshoot and resolve complex network security issues across multi-vendor environments, ensuring minimal downtime and optimal performance.
+ Collaborate with cross-functional teams (network, cloud, infrastructure, and application teams) to integrate security controls into enterprise architecture.
+ Maintain accurate and up-to-date documentation, including network diagrams, configuration standards, and operational procedures.
+ Monitor and respond to security events, alerts, and incidents, escalating as necessary and contributing to root cause analysis and remediation.
+ Participate in a rotational on-call schedule to provide after-hours support for critical network security incidents and maintenance activities.
+ Stay current with emerging threats, vulnerabilities, and technologies to continuously improve the organization's security posture.
**Required Qualifications:**
+ 5+ years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
+ 4+ years of hands-on experience in network security engineering, with a strong focus on enterprise-grade firewall platforms and secure network architecture.
+ 4+ years of experience configuring, managing, and troubleshooting firewalls and security management systems across Palo Alto Networks
+ 4+ years of experience in security policy design, rulebase optimization, and hardening of multi-vendor firewall environments to meet organizational and compliance standards.
+ 2+ years of experience in Panorama - template stacks, device groups, policy hierarchy, logging, reporting, custom dashboards, role-based control
**Desired Qualifications:**
+ Industry certifications such as Palo Alto Networks Certified Network Security Administrator (PCNSA), Palo Alto Networks Certified Network Security Engineer (PCNSE), Fortinet Network Security Expert 4 or 5 (NSE4/5
+ 2+ years of practical experience using firewall migration tools such as Expedition, FortiConverter, SmartMove
+ Proficiency in troubleshooting complex network and security issues across multi-vendor environments, including deep packet inspection, log analysis, and root cause identification
+ Strong understanding of network protocols, routing and switching, VPN technologies, NAT, and intrusion prevention systems
+ Familiarity with incident response, log analysis, and security monitoring tools
+ Familiarity with automation and scripting for network security tasks using tools like Python, Ansible, or Terraform
+ Familiarity with cloud security architectures and controls in AWS, Azure, or Google Cloud Platform
+ Exposure to SIEM platforms, log management, and threat intelligence tools
+ Ability to manage and prioritize multiple projects in a fast-paced, dynamic environment
+ Strong interpersonal skills and the ability to communicate technical concepts to non-technical stakeholders.
+ Ability to participate in a rotational on-call schedule and respond to after-hours incidents or maintenance tasks
+ Strong documentation skills and attention to detail
**Job Expectations:**
+ This position offers a hybrid work schedule
+ This position is not eligible for Visa sponsorship
+ Relocation assistance is not available for this position
+ Flexibility to work in a 24/7 on-call environment
**Pay Range**
Reflected is the base pay range offered for this position. Pay may vary depending on factors including but not limited to achievements, skills, experience, or work location. The range listed is just one component of the compensation package offered to candidates.
$119,000.00 - $224,000.00
**Benefits**
Wells Fargo provides eligible employees with a comprehensive set of benefits, many of which are listed below. Visit Benefits - Wells Fargo Jobs (*************************************************************** for an overview of the following benefit plans and programs offered to employees.
+ Health benefits
+ 401(k) Plan
+ Paid time off
+ Disability benefits
+ Life insurance, critical illness insurance, and accident insurance
+ Parental leave
+ Critical caregiving leave
+ Discounts and savings
+ Commuter benefits
+ Tuition reimbursement
+ Scholarships for dependent children
+ Adoption reimbursement
**Posting End Date:**
7 Dec 2025
***** **_Job posting may come down early due to volume of applicants._**
**We Value Equal Opportunity**
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
**Applicants with Disabilities**
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo (****************************************************************** .
**Drug and Alcohol Policy**
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy (********************************************************************** to learn more.
**Wells Fargo Recruitment and Hiring Requirements:**
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
**Req Number:** R-494636