Cyber security analyst jobs in Edmond, OK - 44 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Engineer
Information Security Analyst
Senior Information Security Analyst
Information Systems Security Officer
Senior Security Analyst
Securities Analyst
Defense Analyst
Cyber Security Specialist
Information Security Specialist
Federal Reserve Bank of Kansas City 4.7
Cyber security analyst job in Oklahoma City, OK
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
Important Information
Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen.
No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered.
This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility.
This position is not eligible to be remote and relocation assistance is not available.
We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies.
This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization.
Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal.
Key Activities
Interpret and evaluate policies in order to mature and implement the DevSecOps program.
Assess maturity of development teams' DevSecOps practices against an existing framework.
Proactively advocate for and drive enhancements into the program.
Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC).
Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process.
Monitors information security policy compliance using security tooling.
Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives.
Provide technical expertise and support to internal teams on security-related matters.
Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure.
Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture.
Support leadership decision making through timely analysis and written communications.
Qualifications
Typically requires 3-6 years of relevant experience.
Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience.
Strong competence in cloud technologies such as AWS, Azure, and other platforms.
Expert understanding of DevSecOps practices, frameworks, and tools.
Expertise with tool integration for the DevOps pipeline such as Git.
Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules.
Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work.
Conveys complex and technical issues to diverse audiences.
Demonstrated competencies with artificial intelligence are beneficial.
Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others.
Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java
Technical expertise in security tools and knowledge of security practices and procedures.
A learning mindset, proactiveness, collaboration, and strong attention to detail.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Locations: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Relocation Assistance: No
Salary:
$79,100 - $111,500 / Experienced Level
$98,600 - $139,000 / Senior Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels.
Privacy Notice
$98.6k-139k yearly 5d ago
Looking for a job?
Let Zippia find it for you.
Cyber Defense Forensics Analyst
EY 4.7
Cyber security analyst job in Oklahoma City, OK
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
$105.2k-186.4k yearly 60d+ ago
Cyber Threat Analyst
Fortiphi
Cyber security analyst job in Oklahoma City, OK
**Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)**
Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
$65k-88k yearly est. 60d+ ago
Industrial Security Analyst
Northrop Grumman 4.7
Cyber security analyst job in Oklahoma City, OK
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Aeronautics Systems (NGAS) is currently seeking an Industrial SecurityAnalyst to join our team as the **Northrop Grumman Security Representative for Weapon System Support Center (WSSC)** based out of Tinker Air Force Base, Oklahoma.
**Roles and Responsibilities:**
Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Your essential job functions will include but may not be limited to:
+ Maintain accountability of classified material or classified media as required by contract(s).
+ Implement policies and procedures for introducing classified material or classified media into a SCIF.
+ Ensure the development, documentation, and presentation of classified security education, awareness, and training activities.
+ Analyze, investigate, and resolve classified security issues while providing leadership and guidance to employees, supervisors, managers on actions(s) to be taken to ensure compliance with the classified security program.
+ Maintain liaison with government agencies, external customers, contractors, employees, and managers.
**Basic Qualifications:**
+ 2 years of Industrial Security experience with Bachelors; 0 years with Masters or an additional 4yrs of security experience will be considered in lieu of a degree
+ Must be a US Citizen
+ **Must have Active Top-Secret Clearance and the ability to obtain and maintain Special Program Access**
+ Must have the ability to work 1st Shift and 9/80 schedule.
+ Ability to collaborate in a team environment
+ Ability to work independently and follow projects through to completion.
**Preferred Qualifications:**
+ Experience with DISS, NISS, SIMS, JADE, or similar data bases.
+ Working knowledge of DoD, SAP, and SCI programs to provide procedural and policy guidance.
+ Additional consideration for CDSE SAP Orientation course or CDSE SAP Mid-Level course.
+ Excellent customer service and communication skills.
+ Ability to work independently and follow projects through to completion.
+ Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
+ Strong knowledge of data entry and inventory control.
+ Willing to work in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
+ Classification review experience.
Primary Level Salary Range: $62,100.00 - $93,100.00
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.
The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
$62.1k-93.1k yearly 5d ago
Product Security Engineer, AI
Meta 4.8
Cyber security analyst job in Oklahoma City, OK
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Specialist Director, Cyber TSA
KPMG 4.8
Cyber security analyst job in Oklahoma City, OK
KPMG Advisory practice is currently our fastest growing practice. We are seeing tremendous client demand, and looking forward we do not anticipate that slowing down. In this ever-changing market environment, our professionals must be adaptable and thrive in a collaborative, team-driven culture. At KPMG, our people are our number one priority. With a wealth of learning and career development opportunities, a world-class training facility and leading market tools, we make sure our people continue to grow both professionally and personally. If you're looking for a firm with a strong team connection where you can be your whole self, have an impact, advance your skills, deepen your experiences, and have the flexibility and access to constantly find new areas of inspiration and expand your capabilities, then consider a career in Advisory.
KPMG is currently seeking a Specialist Director, MAST Application Penetration Testing Lead to join our Managed Services practice.
Responsibilities:
* Lead the strategic delivery of Managed Application Security Testing (MAST) services, ensuring alignment with client objectives and industry best practices
* Execute go-to-market (GTM) strategies for MAST offerings, collaborating with cross-functional teams to drive market penetration and revenue growth
* Oversee the design and implementation of scalable security testing frameworks across diverse application environments, including cloud-native and hybrid architectures
* Provide subject matter expertise in application security, guiding clients through risk assessments, remediation planning, and secure development lifecycle integration
* Build and maintain strong client relationships, serving as a trusted advisor and ensuring high levels of satisfaction and retention
* Mentor and lead a team of security professionals, fostering a culture of innovation, accountability, and continuous improvement
* Act with integrity, professionalism, and personal responsibility to uphold KPMG's respectful and courteous work environment
Qualifications:
* Minimum eight years of recent experience in application security, penetration testing, or related cybersecurity domains, with at least three years in a leadership or director-level role
* Master's degree from an accredited college or university in cybersecurity, computer science, or related field is preferred; Bachelor's degree from an accredited college or university is required
* Deep understanding of application security testing methodologies, tools (for example, DAST, SAST, IAST), and secure SDLC practices
* Proven experience developing and executing GTM strategies for security services or technology solutions
* Strong client-facing skills with the ability to communicate complex technical concepts to non-technical stakeholders
* Excellent verbal/written communication, presentation, and analytical skills
* Ability to travel as required
* Applicants must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future; KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa)
KPMG LLP and its affiliates and subsidiaries ("KPMG") complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, KPMG is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year KPMG publishes a calendar of holidays to be observed during the year and provides eligible employees two breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at Benefits & How We Work.
Follow this link to obtain salary ranges by city outside of CA:
**********************************************************************
California Salary Range: $153700 - $319000
KPMG offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding KPMG's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please.
KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them.
Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
$73k-95k yearly est. 60d+ ago
Sr. Security Analyst
Maximus 4.3
Cyber security analyst job in Oklahoma City, OK
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$83k-111k yearly est. Easy Apply 6d ago
Senior/Information Security Analyst
Western Farmers Electric Cooperative 3.8
Cyber security analyst job in Oklahoma City, OK
Job Description: Applications will be accepted until January 20, 2026 - Apply on-line at www. wfec. com *At the option of the hiring official, a candidate will be placed in one of the following levels based on education, experience, knowledge, skills, and behaviors required.
SUMMARY - Senior Information SecurityAnalyst: Under the general supervision of the Supervisor, IT Infrastructure, the Senior Information SecurityAnalyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring.
The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems.
In addition, the incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.
The incumbent participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.
Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations.
The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
SUMMARY - Information SecurityAnalyst: Under the general supervision of the Supervisor, IT Infrastructure, the Information SecurityAnalyst performs troubleshooting, installation and maintenance on equipment and software related to electronic access control and monitoring.
The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems.
In addition, the incumbent participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required.
The incumbent also participates in exercises that test policies, procedures and skills which are required by business and critical operations.
The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
ESSENTIAL DUTIES AND RESPONSIBILITIES - Senior Information SecurityAnalyst include the following; other duties may be assigned.
Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems, and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments.
Performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security.
Installs, troubleshoots, and maintains hardware and software systems related to electronic access control and monitoring systems.
Reviews logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy/procedure.
Responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
Tests and implements IDS/IPS rule sets and signatures.
Conducts security controls testing after significant changes to cyber assets to ensure proper security posture to meet regulatory guidelines.
Monitors cyber assets and critical infrastructure to ensure system up-time.
Engages in change/configuration management activities for cyber assets.
Performs network traffic analysis when anomalous traffic needs to be investigated.
Assists in conducting incident response and forensic investigations.
Conducts vulnerability testing, analysis, and mitigation for cyber assets.
Analyzes network infrastructure rule sets manually and uses software tools to ensure proper security posture for compliance.
Writes reports and briefings related to specific information security issues.
Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group.
Conducts research on network products, services, protocols, and standards to remain abreast of developments in the information security industry.
Participates in exercises that test policies, procedures, and skills which are required by business and critical operations.
Participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.
ESSENTIAL DUTIES AND RESPONSIBILITIES - Information SecurityAnalyst include the following; other duties may be assigned.
Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments.
Installs, troubleshoots and maintains hardware and software systems related to electronic access control and monitoring systems.
Reviews logs, configurations, rule sets, user accounts, account groups and network traffic for adherence to policy/procedure.
Responds to anomalous events that will require analysis and synthesizes and correlates complex events to ensure operational security.
Monitors cyber assets and critical infrastructure to ensure system up-time.
Engages in change/configuration management activities for cyber assets.
Performs network traffic analysis when anomalous traffic needs to be investigated.
Writes reports and briefings related to specific information security issues related to WFEC systems and critical cyber assets.
Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group.
Conducts research on network products, services, protocols and standards to remain abreast of developments in the information security industry.
Participates in exercises that test policies, procedures and skills which are required by business and critical operations.
Participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required.
COMPETENCIES: To perform the job successfully, an individual should demonstrate the following competencies: Analysis/Design: Synthesizes complex or diverse information; collects and researches data; uses experience to complement data; designs workflows and procedures; generates creative solutions; translates concepts and information into images; uses feedback to modify designs; applies design principles; demonstrates attention to detail.
Problem Solving: Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Develops alternative solutions; Works well in group problem solving situations; Uses reason even when dealing with emotional topics.
Professional Knowledge: Generates creative solutions; translates concepts and information into applications; uses feedback to modify recommendations; pursues training and development opportunities; strives to continuously build knowledge and skills; shares expertise with others.
Oral and Written Communication: Speaks clearly and persuasively in positive or negative situations; listens and gets clarification; responds well to questions; demonstrates group presentation skills; participates in meetings; writes clearly and informatively; varies writing style to meet needs; presents numerical data effectively; able to read and interpret written information.
Teamwork: Balances team and individual responsibilities; exhibits objectivity and openness to others' views; gives and welcomes feedback; able to build morale and group commitments to goals and objectives; supports everyone's efforts to succeed.
Planning/Organizing: Prioritizes and plans work activities; uses time efficiently; sets goals and objectives; develops realistic action plans.
Project Management: Develops project plans; coordinates projects effectively; communicates changes and progress; completes projects on time and budget; manages project team activities.
Adaptability: Adapts to changes in the work environment; manages competing demands; changes approach or method to best fit the situation; able to deal with frequent change, delays or unexpected outcomes.
Customer Service: Manages difficult or emotional customer situations; responds promptly to customer needs; solicits customer feedback to improve service; responds to requests for service and assistance; meets commitments to customers.
Cost Consciousness: Works within approved budget; develops and implements cost saving measures; conserves organizational resources.
QUALIFICATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
The requirements listed below are representative of the education, experience, knowledge, skills, abilities, and behaviors required.
Education and Experience: Sr.
Information SecurityAnalyst - ($98,946 - $155,088): A Bachelor's degree in a related field and five (5) years of directly related experience in information security, digital networking, computing, telecommunications or SCADA/EMS operations is required.
Extensive knowledge of TCP/IP and Cisco routing and switching, as well as proven experience with Cisco ASA firewall and VPN appliances, is preferred.
Industry specific certifications may be substituted for experience at the rate of one (1) year experience for each certification.
Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
Information SecurityAnalyst - ($89,710 - $139,142): A Bachelor's degree in Computer Science, Information Management, or a related field and two (2) years of directly related experience in information security, digital networking, computing, telecommunications or SCADA/EMS operations is required.
An Associate's degree in Computer Science, Information Management, or a related field and six (6) years of direct work experience may be considered as a substitute for a degree.
Extensive knowledge of TCP/IP, Cisco routing and switching and proven experience with Cisco ASA firewall and VPN appliances is preferred.
Industry specific certifications may be substituted for experience at the rate of one (1) year of experience for each certification.
Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
Language Skills: Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations.
Ability to write reports, business correspondence and procedure manuals.
Ability to effectively present information and respond to questions from groups of employees, managers, clients or customers.
Mathematical Skills: Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry, trigonometry, calculus and differential equations.
Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations.
Reasoning Ability: Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists.
Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
Computer Skills: In addition to the qualifications listed above, knowledge and experience using Microsoft Office products is required.
CERTIFICATES, LICENSES, REGISTRATIONS: Requires a current driver's license.
CCNA, CCNP, Comptia Network +, Comptia Security +, CISSP, GIAC, CEH or Engineer-level Operating System certifications is desirable.
Must be able to attain CISSP or similar within twelve (12) months of hire.
WORK SCHEDULE REQUIREMENTS: Normally works a weekday schedule, but may be required to work evenings, holidays or weekends.
May be required to travel on short notice.
May be required to work differentiated 8-hour work schedule between 8:00 am to 7:00 pm.
On-call nights and weekends will be required for response to anomalous issues.
PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit and talk or hear.
The employee is frequently required to use hands to finger, handle, or feel and reach with hands and arms.
The employee is occasionally required to stand and walk.
The employee must occasionally lift and/or move up to 50 pounds.
Specific vision abilities required by this job include close vision, distance vision and color vision.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job.
Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee will be subject to moderate outdoor weather conditions.
The noise level in the work environment is usually quiet.
In accordance with WFEC Administrative Procedure 805-Alcohol and Drug-Free Workplace this position is classified as "safety sensitive".
MUST MEET ALL PHYSICAL AND ENVIRONMENTAL REQUIREMENTS WFEC IS AN EQUAL OPPORTUNITY PROVIDER AND EMPLOYER AND TAKES AFFIRMATIVE ACTION WITH RESPECT TO INDIVIDUALS WITH DISABILITIES AND PROTECTED VETERANSJob Posted by ApplicantPro
$98.9k-155.1k yearly 12d ago
Information Systems Security Officer - 201810
Delaware Nation Industries
Cyber security analyst job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
An active security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
$71k-97k yearly est. 30d ago
IT Engineer IV - Cloud Platform Security Solutions
Bok Financial Corp 4.6
Cyber security analyst job in Oklahoma City, OK
Areas of Interest: Information Technology; Information Security; Infrastructure Pay Transparency Salary Range: Not Available Application Deadline: 01/30/2026 BOK Financial Corporation Group includes BOKF, NA; BOK Financial Securities, Inc. and BOK Financial Private Wealth, Inc. BOKF, NA operates TransFund and Cavanal Hill Investment Management, Inc. BOKF, NA operates banking divisions: Bank of Albuquerque; Bank of Oklahoma; Bank of Texas and BOK Financial.
Bonus Type
Summary
We're building a culture at BOK Financial where amazing people (like you) can bring their best, be their best and work for the best. You've come to the right place to grow your career.
Job Description
The IT Engineer IV - Cloud Platform Solutions is responsible for building secure, scalable, and automated cloud infrastructure. This role brings a security-first mindset to infrastructure-as-code practices and works across engineering, security, and application teams to implement secure policies, automate cloud governance, and support compliant migrations in Azure and AWS. They will be responsible for working collaboratively with multiple teams to implement highly available and secure cloud technologies. This role is also responsible for continuous monitoring and optimization of the cloud implementation for efficiencies and continuous support of, and collaboration with, other teams and projects, particularly DevOps, platform and automation teams. The person in this role must be a highly collaborative, creative and intellectually curious individual who is passionate about forming and implementing cutting-edge cloud computing capabilities. Extensive engineering experience is required as this role provides tier 3 support for technology teams in the organization.
Team Culture
Our mission is to empower our company, teammates and customers through the delivery of resilient and customer-centric technology. We achieve this by leveraging our expertise in technology and deep understanding of our business units.
How You'll Spend Your Time
* You will design and deploy secure and compliant cloud solutions using in AWS and Azure using Terraform, GitLab, and CI/CD pipelines.
* You will design and implement Hashicorp Sentinel policies and policy sets in Terraform Cloud.
* You will develop policy-as-code frameworks (e.g., Azure Policy, AWS SCPs) to enforce governance and compliance.
* You will collaborate with security and application teams to implement secure architectures and mitigate risks.
* You will proactively manage and mitigating the risks associated with cloud environments.
* You will be implementing and validating robust IAM and network policies.
* You will integrate automated testing and security controls into CI/CD workflows (SAST, DAST, code scanning).
* You will contribute to secure cloud migrations, threat modeling, and incident response planning.
* You will design and develop Rego Syntax OPA policy as code to enforce & govern Kubernetes environments.
* You will design and enforce Kubernetes and cloud network security policies to enforce zero-trust security model.
* You will provide Tier 3 support and serve as subject matter expert on cloud platform and automation.
* You will strategize, consult, and prototype alongside other engineers to implement best practices and solutions for applications utilizing CI/CD and cloud.
* You will cultivate a strong knowledge of Identity Management including AWS Managed AD, Azure AD, Azure Resource roles and access reviews
* You will cultivate a strong understanding of Cloud Policies and how to create custom policies.
* You will collaborate with development team members to troubleshoot, and resolve problems that may exist in cloud-hosted environments.
* You will ensure that cybersecurity controls are met or exceeded.
* You will have efficient communication with application stakeholders about application availability & platform updates including any application outages, issues, failures, availability delays etc.
* You will work within established configuration and change management policies to ensure awareness, approval and success of changes made to the infrastructure.
Education & Experience Requirements
This level of knowledge is normally acquired through the completion of a bachelor's degree in a technology field and/or 4+ years of related experience.
* 4+ years of experience in cloud platform engineering, with a focus on AWS and/or Azure.
* Strong hands-on experience with Terraform, YAML, pipelines, scripting (PowerShell, Bash), and Git.
* Strong understanding of IAM, cloud networking, secrets management, and encryption.
* Familiarity with security tools such as SonarQube, Checkmarx, Wiz and container security scanners.
* Experience with Python development and AI Agent tools such as Amazon Bedrock Agent or Microsoft CoPilot.
* Experience with Kubernetes and container security best practices.
* Ability to work cross-functionally with application, security, and DevOps teams.
* Strong communication, documentation, and troubleshooting skills.
BOK Financial Corporation Group is a stable and financially strong organization that provides excellent training and development to support building the long term careers of employees. With passion, skill and partnership you can make an impact on the success of the bank, customers and your own career!
Apply today and take the first step towards your next career opportunity!
The companies in BOK Financial Corporation Group are equal opportunity employers. We are committed to providing equal employment opportunities for training, compensation, transfer, promotion and other aspects of employment for all qualified applicants and employees without regard to sex, race, color, religion, national origin, age, disability, pregnancy status, sexual orientation, genetic information or veteran status.
Please contact recruiting_********************* with any questions.
$83k-100k yearly est. Easy Apply 34d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Information Security Risk & Compliance Analyst
Midfirst Bank 4.8
Cyber security analyst job in Oklahoma City, OK
The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise.
The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment.
Key Result Areas:
Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including:
Develop and maintain enterprise security policies and procedures
Assist in the coordination and completion of information security risk assessments and documentation
Work with information security management to develop strategies and plans to enforce security requirements and address identified risks
Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance
Work with IT department and members of the information security team to identify, select and implement technical controls
Provide direct support to the business and IT staff for security related
Maintain an awareness of security and control issues in emerging technologies
Perform other duties as assigned
Knowledge, skills, and experience required:
Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience
Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.)
Strong analytical and problem-solving skills to enable effective security incident and problem resolution
Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously
Ability to work well under minimal supervision
Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel
Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting
Strong customer/client focus with the ability to manage expectations appropriately
General understanding of risk management
Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC
Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas)
Preferred Qualifications:
Understanding of enterprise risk management systems and automation platforms
Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions
*This position is on-site located in Oklahoma City, must reside within the area to be considered.
*Position requires a minimum of 3 years of relevant US based experience.
#LI-Onsite
#LI-DNI
$77k-104k yearly est. 54d ago
Offensive Security Engineer, Assessments (Web3)
Coinbase 4.2
Cyber security analyst job in Oklahoma City, OK
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$152.4k-179.3k yearly 60d+ ago
Cloud Security Engineer
Ford Motor Company 4.7
Cyber security analyst job in Oklahoma City, OK
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
The Enterprise CyberSecurity Cloud Security team is responsible for working with other security and cloud services teams to ensure alignment and collaboration in securing Ford's public cloud infrastructure. The teams work closely together to identify security gaps in the cloud environments and address them.
The Cloud Security team is responsible for identifying, evaluating, and recommending cloud security tools and functions to enhance security around Ford's public cloud. The team is also responsible for developing and managing the following Security Services in Ford's public cloud environments:
- Cloud Security Automation Development
- GCP/Azure Security Compliance
- GCP VPC Service Control
- GCP Cloud Armor/ Azure WAF
**What you'll do...**
+ Partner with other Cloud Security team members to identify and develop automation for security related workflows and audits (VPC SC, DLP, Exceptions, Org Policy, etc..).
+ Lead evaluation and develop an understanding of tools needed to address security gaps.
+ Lead/Collaborate with EPEO Services teams on security gap remediation.
**You'll have...**
+ Bachelor's degree in Computer Science, Information Technology or related OR a combination of education and experience
+ 5+ years of scripting and automation experience
+ Proven experience in developing and implementing automation using scripting languages such as
+ Python, PowerShell, or Go, particularly for API integrations, security tool orchestration, and custom audit scripts.
+ Solid understanding and practical experience with Git and GitHub for version control, collaborative development, and security automation pipeline management.
+ Familiarity with CI/CD pipelines and automated deployment tools (e.g., Jenkins, Azure DevOps, GitHub Actions) to integrate security automation into the software development lifecycle.
+ Knowledge of Infrastructure-as-Code (IaC) principles and tools like Terraform.
+ Strong knowledge of security best practices and guidelines (at the enterprise-level) related to GCP and Azure Cloud deployments as well as common web application frameworks
+ Understand the functionality and secure usage of various GCP services: VPCs, IAM, security groups, compute engine, cloud storage, Security Command Center, VPC Service Control, Cloud DLP and Cloud Armor
+ Customer focused and strong team orientation
+ Self-starter and fast-learner
+ Strong communication and interpersonal skills
+ Strong problem solving and Analytical/Reasoning skills
+ Strong drive for results and ability to work independently
+ Demonstrated commitment to quality and project timing
+ Familiarity with the agile project planning process and use of Rally.
+ Document processes & procedures and developing other documentation.
**Even better, you may have...**
+ Understand the functionality and secure usage of various Azure services: Virtual Machines, Virtual Networks, Azure Active Directory, App Services, Azure SQL Databases, Storage Accounts, Kubernetes, Containers, Key vaults.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder...or all of the above? No matter what you choose, we offer a work life that works for you, including:
- Immediate medical, dental, vision and prescription drug coverage
- Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
- Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
- Vehicle discount program for employees and family members and management leases
- Tuition assistance
- Established and active employee resource groups
- Paid time off for individual and team community service
- A generous schedule of paid holidays, including the week between Christmas and New Year's Day
- Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
SOUTHEAST MI RESIDENTS: This role is posted as remote unless you reside within 50 miles of Dearborn, MI-in which case we request on-site presence up to 4 days a week.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
\#LI-Remote
**Requisition ID** : 54783
$72k-100k yearly est. 6d ago
Security Solution Engineer - Email Security
Proofpoint 4.7
Cyber security analyst job in Oklahoma City, OK
**About Us:** Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people.
**How We Work:**
At Proofpoint you'll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values:
**Bold** in how we dream and innovate
**Responsive** to feedback, challenges and opportunities
**Accountable** for results and best in class outcomes
**Visionary** in future focused problem-solving
**Exceptional** in execution and impact
**POSITION SUMMARY**
The Security Solutions Engineer is an information security expert responsible for assessing and improving the security posture of customer environments.
The Security Solutions Engineer manages the technical aspects of customer systems and is primarily responsible for solution uptime, availability, policy development and problem troubleshooting. Security Solutions Engineers are also responsible for the technical development of various clients' security solutions such as: Proofpoint Protection Server, TAP, TRAP, and other Proofpoint products.
Platform Engineers serve as an escalation point and mentor for other members of the team. Platform Engineers also help develop internal process, procedure, and drive collaboration across business units to help streamline service delivery.
He or she must ensure that all tasks performed adhere to the firm's ISO 27001 Information Security Management System (ISMS). This includes participation in annual information and network security training and acceptance of spot checks on an ad hoc basis to guarantee that Proofpoint is constantly improving upon the organization's ISMS. Each member of our team must understand the importance of the ISMS and the corresponding handling of customer data.
**DUTIES & ESSENTIAL JOB FUNCTIONS:**
+ Serve as an escalation point for other engineers on the team
+ Optimize security policies to protect against emerging threats and adhere to industry best practices
+ Create and develop custom solutions for managed security systems
+ Maximize system uptime, availability, and performance
+ Utilize internal CRM for problem tracking and project development
+ Assist the team in meeting all customer SLAs
+ Unsurpassed attention to detail, analytical problem-solving skills, and ability to diagnose and troubleshoot technical issues
+ Maintain awareness of industry trends, security news, and best practices
+ Take on-call rotation after hours and on weekends, serving as a point of escalation as necessary
+ Provide flexibility with schedule to cover job requirements
+ Ability to quickly and efficiently resolve client issues while maintaining high levels of client satisfaction
+ Lead technical discussions with customers and partnering organizations
+ Research and analyze industry trends and security vulnerabilities, in order to effectively communicate to customers any risk to their
+ environments and implement solutions to mitigate the risk
+ Administer and support lab environment to include change request review and approval, maintenance, and design
**QUALIFICATIONS:**
+ Bachelor's Degree in Computer Science, Information Technology, or related discipline. Experience may be considered in lieu of a degree
+ Experience with Email Security
+ Corporate computer networking, technical support, system administration, Windows, Unix/Linux Operating System administration and/or
+ network security experience
+ Experience and proficiency in Proofpoint email security products, to include certification and training
+ Experience and proficiency designing and implementing Proofpoint solutions
+ High Level of critical thinking and proven ability to manage customer expectations high pressure situations
+ Proficiency in technical writing, diagraming, and communications.
+ Combine patience, determination, and persistence to troubleshoot client issues
+ Ability to work effectively with team members and clients
+ Desire to mentor junior engineers
+ Self-motivated, with ability to manage and follow up on multiple tasks simultaneously
+ Strong analytical capabilities, problem solving skills, providing solutions in a systematic and clear manner, and easily understood by
+ colleagues and customers
+ Strong time-management skills
**PREFERRED**
+ Experience with Proofpoint email security products - PoD/TAP/TRAP
+ Expert in information security or network security
+ SQL or Oracle database experience
+ Regular expression experience
+ Scripting knowledge of Perl, Python, Java, or Bash
+ Proofpoint product certifications
+ Industry certifications such as CISSP, Network+, Security+, etc.
+ Experience working in Managed Services.
\#LI-Remote
**Why Proofpoint?**
At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us:
+ Competitive compensation
+ Comprehensive benefits
+ Career success on your terms
+ Flexible work environment
+ Annual wellness and community outreach days
+ Always on recognition for your contributions
+ Global collaboration and networking opportunities
**Our Culture:**
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone.
We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com .
**How to Apply**
Interested? Submit your application along with any supporting information- we can't wait to hear from you!
Consistent with Proofpoint values and applicable law, we provide the following information to promote pay transparency and equity. Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets as set out below. Pay within these ranges varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate. The range provided may represent a candidate range and may not reflect the full range for an individual tenured employee. This role may be eligible for variable compensation and/or equity. We offer a competitive benefits package, including flexible time off, a comprehensive well-being program with two paid Wellbeing Days and two paid Volunteer Days per year, plus a three-week Work from Anywhere option.
**Base Pay Ranges:**
SF Bay Area, New York City Metro Area:
Base Pay Range: 98,900.00 - 155,430.00 USD
California (excludes SF Bay Area), Colorado, Connecticut, Illinois, Washington DC Metro, Maryland, Massachusetts, New Jersey, Texas, Washington, Virginia, and Alaska:
Base Pay Range: 78,800.00 - 123,805.00 USD
All other cities and states excluding those listed above:
Base Pay Range: 70,400.00 - 110,605.00 USD
Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams.
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
Our BRAVE Values:
At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow.
We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact.
We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together.
This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one.
Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
$85k-110k yearly est. 7d ago
Security Engineer II
Trustmark 4.6
Cyber security analyst job in Oklahoma City, OK
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled CyberSecurity Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cybersecurity designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
$73k-94k yearly est. 60d+ ago
Information Security Specialist
Federal Reserve Bank 4.7
Cyber security analyst job in Oklahoma City, OK
Company Federal Reserve Bank of Kansas City When you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
Important Information
* Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen.
* No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered.
* This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility.
* This position is not eligible to be remote and relocation assistance is not available.
We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies.
This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization.
Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal.
Key Activities
* Interpret and evaluate policies in order to mature and implement the DevSecOps program.
* Assess maturity of development teams' DevSecOps practices against an existing framework.
* Proactively advocate for and drive enhancements into the program.
* Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC).
* Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process.
* Monitors information security policy compliance using security tooling.
* Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives.
* Provide technical expertise and support to internal teams on security-related matters.
* Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure.
* Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture.
* Support leadership decision making through timely analysis and written communications.
Qualifications
* Typically requires 3-6 years of relevant experience.
* Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience.
* Strong competence in cloud technologies such as AWS, Azure, and other platforms.
* Expert understanding of DevSecOps practices, frameworks, and tools.
* Expertise with tool integration for the DevOps pipeline such as Git.
* Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules.
* Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work.
* Conveys complex and technical issues to diverse audiences.
* Demonstrated competencies with artificial intelligence are beneficial.
* Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others.
* Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java
* Technical expertise in security tools and knowledge of security practices and procedures.
* A learning mindset, proactiveness, collaboration, and strong attention to detail.
Additional Information
How We Work (HWW):
* On-site: 5 days per month remote work flexibility
* Locations: Kansas City, Denver, Oklahoma City, Omaha
* Remote Eligible: No
* Relocation Assistance: No
Salary:
* $79,100 - $111,500 / Experienced Level
* $98,600 - $139,000 / Senior Level
* Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
* Total Rewards & Benefits
* Who We Are
* What We Do
Follow us on LinkedIn, Instagram, X (formerly Twitter), and YouTube #KCFedIT
Full Time / Part Time
Full time
Regular / Temporary
Regular
Job Exempt (Yes / No)
Yes
Job Category
Information Technology Family Group
Work Shift
First (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
$98.6k-139k yearly 10d ago
Product Security Engineer, Instagram
Meta 4.8
Cyber security analyst job in Oklahoma City, OK
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Information Systems Security Officer - 201810
Delaware Nation Industries
Cyber security analyst job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
An active security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
$71k-97k yearly est. Auto-Apply 58d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Cyber security analyst job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
How much does a cyber security analyst earn in Edmond, OK?
The average cyber security analyst in Edmond, OK earns between $57,000 and $101,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Edmond, OK