Post job

Cyber security analyst jobs in Kansas

- 55 jobs
  • Cyber Security Risk & Compliance Analyst

    Kansas State University 3.9company rating

    Cyber security analyst job in Manhattan, KS

    The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p... * 520805 * Manhattan, Kansas, United States * Division of Info Tech * Staff Full Time (Unclassified - Regular) * Closing on: Jan 31 2026 * On-site Add to favorites Favorited View favorites About This Role The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture. About Us The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution. Worksite Description This position is On-site. What You'll Need to Succeed Minimum Qualifications: * Requires a bachelor's degree and two years of relevant experience Preferred Qualifications: * 3-5 years of experience in compliance, audit, or risk management * Strong knowledge of regulatory frameworks and standards * Experience with GRC platforms * Understanding of risk assessment methodologies * Excellent written and verbal communication skills * Experience with audit processes and evidence collection * Knowledge of cybersecurity frameworks (NIST, ISO 27001) * Compliance or risk management certifications (CISA, CRISC, CISM) * Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc) * Knowledge of business process mapping and documentation * Experience with policy management systems * Understanding of legal and regulatory research Additional Role Information: * Occasional after-hours work for incident response or change management work in designated maintenance windows * Participation in on-call rotation (applicable positions) * Occasional travel required for training, conferences, or other events Sponsorship eligibility: Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship How to Apply Please submit the following documents: * Resume * Cover Letter * Three Professional References Application Window Applications close on: January 31, 2026 Anticipated Hiring Pay Range $61,591-$70,000 frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_2dca1e396ec8ae7afb704142b6b8ab6b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/2dca1e396ec8ae7afb704142b6b8ab6b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_c0d64716b16e90313d8327ce9bb0af04" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/c0d64716b16e90313d8327ce9bb0af04?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_7d751c6b5967126ac4d8c55b815f613b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/7d751c6b5967126ac4d8c55b815f613b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5"> You may also be interested in Assistant Professor, Swine Nutrition Manhattan Animal Sciences & Industry Assistant/Associate Professor, Swine Manhattan Animal Sciences & Industry Infrastructure Security Engineer Manhattan Division of Info Tech Why Join Us: Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page. Work Authorization: Applicants must be currently authorized to work in the United States at the time of employment. Equal Employment Opportunity: Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran. Remote and Hybrid work options: Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho. Background Screening Statement: Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy. Interview Preferences: Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview. The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas. * Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university. To learn more about interview preferences at K-State, please visit our interview preferences page. frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_b63d88fbc8447ba82fcff7e6eacf09b0" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/b63d88fbc8447ba82fcff7e6eacf09b0?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
    $61.6k-70k yearly 3d ago
  • Product Security Engineer, Instagram

    Meta 4.8company rating

    Cyber security analyst job in Topeka, KS

    The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform. **Required Skills:** Product Security Engineer, Instagram Responsibilities: 1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products 2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code 3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities 4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage 5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers 6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world **Minimum Qualifications:** Minimum Qualifications: 7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience 8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP) 9. Extensive, proven experience in threat modeling and secure systems design 10. Experience with exploiting common security vulnerabilities **Preferred Qualifications:** Preferred Qualifications: 11. Product software engineering or product management experience 12. Experience in security consulting or other leadership-facing security advisory roles 13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response 14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.) **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 49d ago
  • Senior Analyst, Security Compliance (SOX IT)

    Coinbase 4.2company rating

    Cyber security analyst job in Topeka, KS

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program. *What you'll be doing (ie. job duties):* * Lead Security and IT initiatives to support the SOX roadmap and advance program maturity * Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit * Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion * Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders * Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management * Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities * Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership * Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates * Work closely with internal and external auditors to educate them about a complex technology control environment * Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members * Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry * Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation *What we look for in you (ie. job requirements):* * Minimum of 5+ years of security/IT compliance or equivalent experience * Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance * Prior experience at a big 4 accounting firm * Experience leading compliance initiatives from start to finish * Proven understanding and audit experience of cloud technologies, AWS preferred * Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision * Strong oral and written communication skills * Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment * Ability to communicate with technical / non-technical stakeholders to align on shared outcomes * Experience in Financial services, Big Tech, or FinTech *Nice to haves:* * BA or BS in a technical field or equivalent experience * Security certifications e.g. CISA, CISSP, CISM or other relevant certifications * Experience auditing in Crypto space Position ID: P73675 \#LI-Remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $167,280-$196,800 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $167.3k-196.8k yearly 43d ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Cyber security analyst job in Wichita, KS

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 47d ago
  • Network Security Analyst

    Sa Technologies Inc. 4.6company rating

    Cyber security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 18h ago
  • Engineer, Information Security

    Mariner High School 4.2company rating

    Cyber security analyst job in Overland Park, KS

    We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant. If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you. What You'll Do Implement, operate, and maintain enterprise-level information security tools and controls across the organization. Conduct security assessments and control testing to evaluate system performance and operational effectiveness. Support and mature core security processes, including: Malware response and remediation Vulnerability management and patch governance Security log analysis and monitoring Incident tracking, reporting, and documentation Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations. Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives. Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input What You Bring Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience. 3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus. Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Proven ability to operate with independence and accountability in a dynamic environment. Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority. Analytical mindset with strong attention to detail, organization, and documentation discipline. Why Join Us We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients. We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance. EOE/M/F/D/V
    $61k-76k yearly est. Auto-Apply 27d ago
  • Principal Security Engineer

    Empower Retirement 4.3company rating

    Cyber security analyst job in Kansas

    Our vision for the future is based on the idea that transforming financial lives starts by giving our people the freedom to transform their own. We have a flexible work environment, and fluid career paths. We not only encourage but celebrate internal mobility. We also recognize the importance of purpose, well-being, and work-life balance. Within Empower and our communities, we work hard to create a welcoming and inclusive environment, and our associates dedicate thousands of hours to volunteering for causes that matter most to them. Chart your own path and grow your career while helping more customers achieve financial freedom. Empower Yourself. ***Applicants must be authorized to work for any employer in the U.S. We are unable to sponsor or take over sponsorship of an employment visa at this time, including CPT/OPT.*** The Information Security Principal Engineer is responsible for contributing to, and strengthening, the corporate Information Security program. This is a technical position that requires knowledge of security industry standards, the ability to establish and audit security operational functions, and the ability to provide technical security recommendations and/or solutions. This position develops, updates, documents, and maintains security standards and policies for the organization. This position assists in ensuring that secure computing practices are established and communicated throughout the organization, and that the business is conducted in accordance with established guidelines and regulatory requirements. This position also contributes to security due diligence assessments on current and prospective vendors and products What you will do: Lead major cybersecurity incidents from detection through containment, eradication, recovery, and post-incident review; including participating in on-call rotation. Serve as the top escalation point for complex, high-severity incidents, ensuring rapid and effective resolution. Develop, maintain, and optimize incident response playbooks, runbooks, and escalation procedures. Oversee enterprise-wide monitoring of networks, cloud, and endpoints for threats, vulnerabilities, and anomalous activity. Advance detection capabilities using EDR, SIEM, and behavioral analytics aligned with MITRE ATT&CK. Act as subject matter expert on EDR and SIEM. Design and implement automation frameworks (Python, PowerShell, AWS Lambda) to streamline response workflows and reduce manual effort. Integrate AI/ML models into security monitoring and response processes for enhanced detection accuracy and prioritization. Conduct forensic investigations and threat hunting to identify root causes and emerging threat patterns. Collaborate cross-functionally with infrastructure, application, and network teams to enforce secure configurations and compliance. Mentor and guide incident response analysts, fostering technical growth and operational excellence. Communicate effectively with executives and technical teams during and after incidents, producing clear reports and recommendations. Drive continuous improvement in detection, response, and prevention strategies to strengthen enterprise security posture. What you will bring: Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field Must have CISSP Certification (Current and active) 6+ years of experience in the realms of enterprise cybersecurity at scale 5+ years of experience with EDR, SIEM, email and network security 3+ years of experience with cloud environment security, scripting/coding Extensive knowledge of the incident response process and lifecycle, ability to contribute to policy and procedure. Ability to respond to security alerts/incidents and drive the process start to finish Ability to use generative AI in day-to-day operations as a force multiplier Strong technical written and verbal communication skills, ability to document and present details on incidents Strong analytic skills, able to analyze security incidents for root cause, resolution, lessons learned, and improvements Excellent communication and leadership skills, with the ability to influence across technical and executive teams What will set you apart: Additional certifications (SANS, GIAC, CCSP, AWS, CEH, OSCP, etc) Experience in a DevSecOps environment (Infrastructure as code, Terraform, Git) Experience developing automation frameworks leveraging scripting languages (Python, PowerShell, Bash) and serverless technologies (e.g., AWS Lambda) to accelerate response workflows and reduce manual effort. Experience automating repetitive tasks such as enrichment, correlation, containment. Ability to integrate AI and machine learning models into security monitoring and response workflows to improve detection accuracy, reduce false positives, and prioritize threats. Ability to create AI-driven anomaly detection, behavioral analysis, and natural language processing for log analysis, phishing detection, and threat intelligence enrichment. Strong Linux, Windows, Network, Database skills Experience with technical leadership Experience as a security specialist in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI This is not intended to be an exhaustive list of all duties, responsibilities and qualifications of the job. The employer has the right to revise this at any time. You will be evaluated in part based on your performance of the responsibilities and/or tasks listed in this . You may be required perform other duties that are not included on this . The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason. What we offer you We offer an array of diverse and inclusive benefits regardless of where you are in your career. We believe that providing our employees with the means to lead healthy balanced lives results in the best possible work performance. Medical, dental, vision and life insurance Retirement savings - 401(k) plan with generous company matching contributions (up to 6%), financial advisory services, potential company discretionary contribution, and a broad investment lineup Tuition reimbursement up to $5,250/year Business-casual environment that includes the option to wear jeans Generous paid time off upon hire - including a paid time off program plus ten paid company holidays and three floating holidays each calendar year Paid volunteer time - 16 hours per calendar year Leave of absence programs - including paid parental leave, paid short- and long-term disability, and Family and Medical Leave (FMLA) Business Resource Groups (BRGs) - BRGs facilitate inclusion and collaboration across our business internally and throughout the communities where we live, work and play. BRGs are open to all. Base Salary Range $135,300.00 - $196,125.00 The salary range above shows the typical minimum to maximum base salary range for this position in the location listed. Non-sales positions have the opportunity to participate in a bonus program. Sales positions are eligible for sales incentives, and in some instances a bonus plan, whereby total compensation may far exceed base salary depending on individual performance. Actual compensation offered may vary from posted hiring range based upon geographic location, work experience, education, licensure requirements and/or skill level and will be finalized at the time of offer. Equal opportunity employer • Drug-free workplace We are an equal opportunity employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to age (40 and over), race, color, national origin, ancestry, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, religion, physical or mental disability, military or veteran status, genetic information, or any other status protected by applicable state or local law. ***For remote and hybrid positions you will be required to provide reliable high-speed internet with a wired connection as well as a place in your home to work with limited disruption. You must have reliable connectivity from an internet service provider that is fiber, cable or DSL internet. Other necessary computer equipment, will be provided. You may be required to work in the office if you do not have an adequate home work environment and the required internet connection.*** Job Posting End Date at 12:01 am on: 12-13-2025 Want the latest money news and views shaping how we live, work and play? Sign up for Empower's free newsletter and check out The Currency.
    $135.3k-196.1k yearly Auto-Apply 8d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 13d ago
  • Cyber Security Engineer

    CSA Global LLC 4.3company rating

    Cyber security analyst job in Beverly, KS

    Job DescriptionDescription: Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions. How Role will make an impact: Maintains the appropriate operational security posture and documentation for MCTSP information systems Implementing DoD, Army, ARNG, and MCTSP information security policies Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections RMF document and artifact management Managing and tracking the IAVM system Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures. Requirements: What you'll need to have to join our award-winning team: Clearance: Must possess and maintain an active Secret Clearance. Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience. IAT II Certification 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems. 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises; 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises Why You'll Love this Job: Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission. You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge. Daily opportunities to develop new skills Team environment What We Can Offer You: Compensation Health & Wellbeing We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing. Personal & Professional Development We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division. Diversity, Inclusion & Belonging We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. Benefits Healthcare (medical, dental, vision, prescription drugs) Pet Insurance 401(k) savings plan Paid Time Off (PTO) Holiday pay opportunities Basic life insurance AD&D insurance Company-paid Short-Term and Long-Term Disability Employee Assistance Program Tuition Support Options Identity Theft Program
    $77k-105k yearly est. 18d ago
  • Information Security Engineer - Black Lotus Labs Threat Researcher (APT)

    Lumen 3.4company rating

    Cyber security analyst job in Topeka, KS

    Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. **The Role** Black Lotus Labs is seeking a Principal Security Engineer on the Research & Analysis team. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape. **The Main Responsibilities** + Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact. + Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection. + Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers. + Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges. + Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders. + Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings. **What We Look For in a Candidate** + Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting nation-state and cybercriminal threat actors. + Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets. + Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages). + Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations. + 5+ years of experience in the IC, DoD or similar tracking and defending against nation state threat activity. + Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders. + Experience presenting at industry conferences and in the media. + Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment. + Proven ability to lead and manage complex technical projects, effectively driving them to successful completion. + Active TS/SCI clearance with poly **Well-experienced candidates may also have the following skills: ** + Proficiency in malware reverse engineering and incident response. + 5+ years of experience leading teams of technical threat discovery professionals. + Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges: $149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process. Learn more about Lumen's: + Benefits (**************************************************** + Bonus Structure **What to Expect Next** \#LI-JS1 Requisition #: 339093 **Background Screening** If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. **Equal Employment Opportunities** We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. **Disclaimer** The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions. In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information. Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name. **Application Deadline** 12/09/2025
    $62k-79k yearly est. 60d+ ago
  • Security Analyst

    Foresite 4.3company rating

    Cyber security analyst job in Overland Park, KS

    Job Description About the Role As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite. Responsibilities: Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time. Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision. Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients. Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events. Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports. Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture. Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks. Qualifications: Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies. SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events. Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes. Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences. Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals. Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats. Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
    $61k-87k yearly est. 12d ago
  • IT Security Engineer

    State of Kansas

    Cyber security analyst job in Shawnee, KS

    Job Posting Important Recruitment Information for this vacancy Kansas Bureau of Investigation The Kansas Bureau of Investigation is the premier criminal investigative agency in the state of Kansas. The KBI is committed to its critical mission of preventing crime and enhancing public safety in Kansas. We employ individuals who exemplify the highest standards of integrity, service, and dedication. Come feel like you're part of something bigger at the KBI. E-Verify: The Kansas Bureau of Investigation (KBI) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here. Kansas Bureau of Investigation About the Position: * Who can apply: Anyone (External) * Classified/Unclassified Service: Unclassified * Full/Part-time: Full-Time * Regular/Temporary: Regular * Work Schedule: M-F 8am-5pm * Eligible to Receive Benefits: Yes * Veterans' Preference Eligible: Yes * Search Keywords: KBI, Topeka, IT Security Compensation: * Hourly Pay Range: $43.87-$54.84 Note: Salary can vary depending upon education, experience, or qualifications. Employment Benefits: * Comprehensive medical, mental, dental, vision, and additional coverage * Sick & Vacation leave * Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave * Paid State Holidays * Fitness Centers in select locations * Employee discounts with the STAR Program * Retirement and deferred compensation programs Visit the Employee Benefits page for more information… Position Summary & Responsibilities: Position Summary: The KBI is accepting applications to fill an IT Security Engineer position. This position supports both the KBI and the Kansas Criminal Justice Information System (KCJIS). The IT Security Engineer plays a pivotal role in developing, implementing, and maintaining the organization's information security and networking systems. Collaborating closely with the IT Security Architect and other cross-functional teams, the ITSE ensures the confidentiality, integrity, and availability of KBI and KCJIS assets through the deployment and maintenance of security and network technologies. The regular work schedule for this position is Monday thru Friday - 8:00 AM to 5:00 PM. However, this position may be required to work hours outside of the regular working schedule and be on a rotational on-call schedule as necessary. Job Responsibilities may include but are not limited to the following: * Implement and maintain information security and networking solutions for the KBI and KCJIS. * Assist in the implementation and maintenance of information security and networking standards, procedures, and guidelines. * Collaborate with other departments and units to integrate security and network controls into systems and processes. * Ensure compliance with applicable policies and governance requirements (ex. SoK ITEC, KCJIS). * Monitor security controls, systems, and networks for potential security incidents and take appropriate action to respond to and mitigate threats. Analyze log files to identify possible threats to organizational information systems. * Support the implementation and management of security and network technologies, including firewalls, intrusion detection/prevention systems, endpoint protection, encryption, logging, identity and access management solutions, switches, routers, and wireless networks. * Stay current with emerging threats, vulnerabilities, security, and networking technologies through continuous learning. * Contribute to the development and maintenance of security documentation and procedures. * Provide technical support and guidance to internal and external stakeholders on security-related matters. * Perform other duties as assigned. Qualifications: Minimum Qualifications * Associate's or Bachelor's degree from an accredited college or university, (preferably in computer science, information security, or related field). * A minimum 5 years of information security work experience and at least one industry advanced cybersecurity certification in good standing (e.g., CISSP or CISM). * Relevant experience should include all of the following: * At least 3 years of Check Point and/or Palo Alto firewall administration. * Security log/event analysis and incident response (preferably Splunk). * Systems security and administration of Windows and/or Linux server operating systems. * Configuring, tuning, and managing security systems and controls, such as: VPNs, IDS/IPS, endpoint security, content filters, email security, vulnerability management systems, and mobile device management systems. * Configuring, tuning, and managing network systems and controls, such as: routers, switches, and wireless LANs. * Extensive computer, network, and security troubleshooting experience. * Mastery of core security concepts. * Strong communication, teamwork, leadership, and problem-solving skills. * Ability to research, interpret, and understand advanced technical information. * Basic understanding of project management concepts and principles. Preferred Qualifications * Additional industry standard certifications such as: Network+, Security+, SSCP, CCNA, CCNP, CCSA/CCSE/CCSM, or similar. * Experience with cloud security (e.g., Azure or AWS). * Experience with implementing or administering Microsoft 365. * Experience with VMware virtual infrastructure (ESXi, vSphere/vCenter). * Experience with federated authentication technologies, such as SAML and OAuth/OIDC. * Experience with penetration testing. Post-Offer, Pre-employment Requirements * As a condition of employment, you will be subject to a pre-employment process to include a polygraph examination, fingerprint based records check, and comprehensive background investigation, including reference check of past and present employers. The pre-employment process will be waived for current KBI personnel who have previously completed the screening requirements Recruiter Contact Information: * Name: Luci Zieman * Email: ************************* * Phone: ************ * Mailing Address: 1620 SW Tyler; Topeka, KS 66612 Required documents for this application to be complete: * On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed. * Tax Clearance Certificate, valid * Transcripts * DD214 (if you are claiming Veteran's Preference) * Inside your Job Application upload these documents: * Resume (or choose existing if you have one) * Cover Letter Kansas Tax Clearance Certificate Required: Each applicant (even non-residents) applying for a State of Kansas job vacancy must obtain a valid Kansas Certificate of Tax Clearance by accessing the Kansas Department of Revenue's website. A Tax Clearance is a comprehensive tax account review to determine and ensure that an individual's account is compliant with all primary Kansas Tax Laws. A Tax Clearance expires every 90 days. All applicants, including current state employees, are responsible for submitting a valid certificate with all other application materials to the hiring agency. This is in accordance with Executive Order 2004-03. If you need assistance with the tax clearance, please contact ************. Visit the Tax Clearance site for more information and where to obtain this Kansas Department of Revenue document. Job Application Process * Sign in to your existing account or Register for a new one to apply. * Complete or review your contact information on the My Contact Information page. * Upload documents listed in the Required Documents section of the job posting to the appropriate location. * Check your email and My Job Notifications for written communications from the Recruiter. * Email - sent to the preferred email listed on the My Contact Information page * Notifications - view the Careers - My Job Notifications page To assist in completing your application, please see helpful links below: * Instructions: * Job Search * Registration & User Account * Application * Frequently Asked Questions How to Claim Veterans Preference * Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager. Learn more about claiming Veteran's Preference How to Claim Disability Hiring Preference Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager. Learn more about claiming Disability Hiring Preference PLEASE NOTE: The documentation verifying a person's eligibility for use of this preference should not be sent along with other application materials to the hiring agency but should be sent directly to OPS. These documents should be sent either by fax to *************, or scanned and emailed to *************************, or can be mailed/delivered in person to: ATTN: Disability Hiring Preference Coordinator Office of Personnel Services Landon State Office Building 900 SW Jackson, Rm 401 Topeka, KS 66612 Equal Employment Opportunity The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability or any other factor unrelated to the essential functions of the job. If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the recruiter.
    $43.9-54.8 hourly 14d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Cyber security analyst job in Overland Park, KS

    We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant. If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you. What You'll Do Implement, operate, and maintain enterprise-level information security tools and controls across the organization. Conduct security assessments and control testing to evaluate system performance and operational effectiveness. Support and mature core security processes, including: Malware response and remediation Vulnerability management and patch governance Security log analysis and monitoring Incident tracking, reporting, and documentation Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations. Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives. Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input What You Bring Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience. 3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus. Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Proven ability to operate with independence and accountability in a dynamic environment. Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority. Analytical mindset with strong attention to detail, organization, and documentation discipline. Why Join Us We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients. We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance. EOE/M/F/D/V
    $66k-91k yearly est. Auto-Apply 27d ago
  • Security Engineer II

    Trustmark 4.6company rating

    Cyber security analyst job in Topeka, KS

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $76k-98k yearly est. 60d+ ago
  • Security Engineer

    Quest Analytics

    Cyber security analyst job in Overland Park, KS

    Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will: Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives. Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards. Provides security support during vendor risk assessments. Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements. Owns, maintains and matures information security review processes and documentation. Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation. Partners with technology and business partners to ensure compliance with policies and standards. Determines security requirements for internal and external projects via interpretation of policies and standards. Evaluates new technologies, processes, standards, and frameworks on an ongoing basis. Ensures capability readiness for security controls (people, process, and technology). Evaluates gaps in existing technologies and processes. Assists with the implementation, configuration, and operations of various security tools as required. Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.). What we are looking for: Bachelor's Degree in Information Systems, Computer Science or related field preferred. Experience working in a security role for a SaaS organization is a must. Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development. 3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence. Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices. Experience working with application security vulnerabilities and technologies is required. Three or more years' participating in vendor and internal security assessments is required. Two or more years' experience working in a security operations role is desired. Certifications: CISSP, CISM, CEH or equivalent preferred. Has strong focus on business outcomes. Comfortable with collaboration, open communication and reaching across functional borders. Self-motivated and able to work in a fast-paced, deadline-oriented environment . Excellent troubleshooting, listening, and problem-solving skills. Proven ability to solve complex issues. Customer focused. Works well in a team environment. We are not currently engaging with outside agencies on this role. What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time. Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming. Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment. Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence ********************* NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $75k-101k yearly est. Auto-Apply 55d ago
  • Information Security Analyst

    Mid American Credit Union 3.5company rating

    Cyber security analyst job in Wichita, KS

    Job DescriptionSalary: $24 About Us Credit Unions are not-for-profit organizations that exist to serve their members rather than to maximize profits. As a member-owned institution, our focus is on providing a safe place to save and borrow at reasonable rates! That is why our mission at Mid American Credit Union is to be the best choice for quality financial services, above and beyond all other alternatives. Who Should Apply Mid American Credit Union is looking for individuals that like to be challenged, rewarded and inspired! This job is perfect for self-motivated, quick thinkers with unmatched problem-solving skills. Are you ready to be a part of a team that provides outstanding service each and every day? What You'll Do As part of the IS team, the Information Security Analyst is responsible for assisting in on going reviews of IS systems and hardware to assure that regulatory requirements are met, and that all internal policies and procedures conform to regulatory levels. The Information Security Analyst is also responsible for assisting in the detection and remediation to third party audits, testing, and real time security vulnerabilities. The Information Security Analyst will also assist other members of the IS team and third-partyvendors in maintaining technology infrastructure and processing cycles in a manner that adheres to IS Compliance, IS Security, and IS performance standards. Operations IS Compliance and Cybersecurity Lead the completion of Mid American Credit Unions ongoing review of IS systems and procedures. Assist management to ensure information security policies and procedures conform to the appropriate regulatory level. Assist management by monitoring and advising on status of emerging trends in the industry and research potential security enhancements as directed by management. Third Party Audits and Testing Schedule and review periodic vulnerability and penetration test reports to track vulnerability and patch remediation efforts. Work with 3rd party vendors and IS staff to identify the appropriate mitigation action and remedies to reduce the risk to Mid American Credit Union information assets with minimal negative impact on the associated business processes. Investigate and report security violations of Mid American Credit Union Information Security policies and procedures Assist in Mid American Credit Unions annual Disaster Recovery testing and complete internal audits which include, but are not limited to, active directory reviews, internet logs, internal privileges, system access, media access, etc. Network Performance and Hardware Review hardware, software, and firmware technologies for possible security vulnerabilities that could impact the security of Mid American Credit Union assets. Provide trouble shooting and problem resolution for functional security and resolve security issues. User Support Respond to user requests for assistance in a timely, accurate and professional manner. Log all users requests in the Help Desk ticketing systems. Assist other team members with open tickets as needed. Perform any other duties as needed. Third Party Vendor, Training and Documentation Establish and maintain relationships that adhere to the credit union service standards with other Mid American Credit Union employees and third party vendors. Assist in the daily coordination and collaboration with third party vendors. Assist in IS security awareness and training efforts throughout the credit union. Assist in updating existing IS policies and procedures. Maintain all required documentation which includes, but not limited to; the ACET workbook, exam documentation, daily monitoring, vulnerabilities and remediation, audit test findings and remediation, incident response, change management, etc. Cultural Responsibilities Committed to being part of the Mid American team! Show commitment to learning and growth. Consistently demonstrate a positive attitude and strong people skills during interactions with co-workers and members. Be able to work individually as well as with a team. Embrace change and be able to think of new ideas to assist our members. Demonstrate financial responsibility and professionalism. What You Need to Get the Job Done Must be team oriented and possess a positive attitude while working well with others. Customer service experience including the ability to effectively perform the skills necessary to deliver exceptional service, such as communication, empathy, patience and organization. Education A 2-year college degree or completion of a specialized course of study at a business or trade school preferred. Experience 6 months to 2 years of similar or related experience, including time spent in preparatory positions. Working knowledge of front and back office financial institution processes is a plus. Understanding of networks and cyber security. Working knowledge relating to Microsoft server, exchange, and active directory preferred. A significant level of trust and diplomacy is required to be an effective subject matter expert in the position. In-depth dialogues, conversations and explanations with customers, direct and indirect reports and outside vendors of a sensitive and/or high confidential nature is a normal part of the day-to-day experience. Communications can involve motivating, influencing, educating and/or advising others on matters of significance. Must be able to work extended hours and/or travel off site when requested by management. 24x7 on call is required with on-site Saturday rotation duties. Must be able to perform job functions independently or with limited supervision and work effectively on own or as part of a team. Must be able to read and carry out various written instructions and follow oral instructions. Strong verbal and written communication skills. Strong organizational skills Ability to demonstrate a high degree of integrity, trust-worthiness, and maintain confidentiality of information and job-related data. Ability to prioritize multiple tasks and adjust to changing priorities, as well as, meet hard deadlines. What You'll Love About Us A Company that Cares.We are more than a financial institution; we give back to our community. We teach financial literacy and donate to and support local organizations. Work that Stays at Work.Genuine work/life balance served here! Rest and Relaxation. Paid vacation time, personal leave and paid holidays An Equal Opportunity Employer Mid American Credit Union is an Equal Opportunity Employers whose policy is not to discriminate unlawfully against any qualified employee or applicant for employment on the basis of protected military or veteran status, disability, race, color, religion, sex, age, national origin, pregnancy, genetic information, sexual orientation, gender identity, or any other classification protected by applicable local, state or federal law. Because our team members are trusted to handle sensitive information, we require all candidates who receive and accept employment offers to complete a background check before being hired. This Company Participates in E-Verify The Right to Work Este Empleador Participa en E-Verify El Derecho a Trabajar
    $24 hourly 3d ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Cyber security analyst job in Topeka, KS

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Network Security Analyst

    Sa Technologies 4.6company rating

    Cyber security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 13d ago
  • Security Engineer

    Foresite 4.3company rating

    Cyber security analyst job in Overland Park, KS

    Job Description Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply! What You'll Do: As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include: Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services. General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively. Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments. Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments. Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives. Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams. Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends. Who You Are: Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats. Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies. Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to: Google Cloud Security Command Center (SCC) Google Security Operations Google Threat Intelligence Cloud Logging and Monitoring for security Google Cloud Identity and Access Management (IAM) Google Cloud Armor Certifications: Possess one or more security certifications such as: CompTIA Security+ (ISC)² SSCP or CISSP (Associate of (ISC)²) Google Cloud Professional Cloud Security Engineer (highly preferred) Other relevant cloud security certifications Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences. Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail. Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment. Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
    $81k-110k yearly est. 5d ago

Learn more about cyber security analyst jobs

Do you work as a cyber security analyst?

What are the top employers for cyber security analyst in KS?

Top 1 Cyber Security Analyst companies in KS

  1. Kansas State University

Job type you want
Full Time
Part Time
Internship
Temporary

Browse cyber security analyst jobs in kansas by city

All cyber security analyst jobs

Jobs in Kansas