Cyber Defense Forensics Analyst
Cyber security analyst job in Topeka, KS
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all.
The exceptional EY experience. It's yours to build.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
**The opportunity**
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
**Your key responsibilities**
+ Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
+ Forensically analyze end user systems and servers found to have possible indicators of compromise
+ Analysis of artifacts collected during a security incident/forensic analysis
+ Identify security incidents through 'Hunting' operations within a SIEM and other relevant tools
+ Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
+ Provide consultation and assessment on perceived security threats
+ Maintain, manage, improve and update security incident process and protocol documentation
+ Regularly provide reporting and metrics on case work
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact based reports
+ Be on-call to deliver global incident response
**Skills and attributes for success**
+ Resolution of security incidents by identifying root cause and solutions
+ Analyze findings in investigative matters, and develop fact-based reports
+ Proven integrity and judgment within a professional environment
+ Ability to appropriately balance work/personal priorities
**To qualify for the role you must have**
+ Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
+ 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
+ Understanding of security threats, vulnerabilities, and incident response;
+ Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
+ Be familiar with legalities surrounding electronic discovery and analysis;
+ Experience with SIEM technologies (i.e. Splunk);
+ Deep understanding of both Windows and Unix/Linux based operating systems;
**Ideally, you'll also have**
+ Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
+ Background in security incident response in Cloud-based environments, such as Azure
+ Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration
**What we look for**
+ Demonstrated integrity in a professional environment
+ Ability to work independently
+ Have a global mind-set for working with different cultures and backgrounds
+ Knowledgeable in business industry standard security incident response process, procedures, and life cycle
+ Excellent teaming skills
+ Excellent social, communication, and writing skills
**What we offer you**
The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
Cyber Security Training
Cyber security analyst job in Kansas City, MO
Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session.
Job Description
Our Training Features:
· You will receive top quality instruction that Kanshe Infotech is famous for Online IT training.
· Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue.
· Training sessions are conducted by real-time instructor with real-time examples.
· Every training session is recorded and posted to the batch after each weekend class.
· We are offering online training on Cyber Security.
.
Provide OPT Stem Ext.:
Guidance and support for applying for the 24-month OPT STEM extension
Help with OPT Employment letter:
Help with drafting and obtaining OPT employment letters that meet USCIS requirements.
· We provide training in technology of your choice.
· Good online training virtual class room environment.
· Highly qualified and experienced trainers.
· Professional environment.
· Special interview training
· Training for skill enhancement.
· Study material and Lab material provided.
· E-Verified company.
If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates.
Thanks
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cyber User Behavior Engineer
Cyber security analyst job in Topeka, KS
*****CANDIDATE MUST BE US Citizen (due to contractual/access requirements)***** **For candidates residing within a 50-mile radius of a Highmark office, a hybrid work schedule of three days per week (Tuesday, Wednesday, and Thursday) in the office is required.**
The Cyber User Behavior Engineer is a pivotal role at Highmark, dedicated to enhancing our organization's security by cultivating a robust "security-first" culture. This individual will lead the design, implementation, and ongoing management of comprehensive security awareness programs. Their primary responsibility will be to educate, train, and inspire all Highmark employees to effectively identify and report security threats, ensuring adherence to Highmark's security policies and industry best practices. This role is crucial in minimizing human-centric security risks and fostering a vigilant and informed workforce.
**ESSENTIAL RESPONSIBILITIES**
+ Develop, implement, and continuously improve a proactive program to identifying internal threats.
+ Establish close relationships with business stakeholders outside of the security discipline, working closely with privacy, physical security, fraud, legal, human resources and senior leadership.
+ Perform predictive analysis of behavior, anomalies, and concerns to identify internal threats.
+ Execute campaigns designed to improve enterprise security posture.
+ Continually enhance insider risk program to increase efficiencies and measure program effectiveness and report accordingly on progress.
+ Utilize change management methodologies to mitigate identified security risks.
+ Provide insider threat support to security operations and incident response teams in advance of and during cyber security incidents.
+ Ensure clear lines of communication including but not limited to; transparency to the business on upcoming security initiatives, identifying impact to the business and to consumers, helping shape remediation, and developing external and internal communications.
+ Ensure the education and awareness program is aligned with the Information Security Program, Policies and Standards.
+ Other duties as assigned or requested.
**EDUCATION**
**Required**
+ Bachelor's Degree in Business Education, Marketing or Information Systems
**Substitutions**
+ Six (6) years relevant, progressive experience
**Preferred**
+ Bachelors in Information Security
**EXPERIENCE**
**Required**
+ 3 years in IT or IT Security Focus
+ 3 years of Insider Threat Program focus
To include:
+ 3 years with Human Intelligence (HUMINT) **OR** as an Open-source Intelligence Analyst
**Preferred**
+ 1-3 years in a Security Awareness or adjacent role
**LICENSES or CERTIFICATIONS**
**Required**
+ None
**Preferred**
+ Security + **OR**
+ GSEC **OR**
+ CISSP **OR**
+ CERT Insider Threat
+ SANS Security Awareness Professional (SSAP) Proofpoint Certified Security Awareness Specialist
**SKILLS**
+ Change Management
+ Presentation Delivery
+ Prioritizing
+ Analytical and Logical Reasoning/Thinking
+ Communication Skills
+ Cyber Security
+ User Behavior
+ Continuous Improvement
**Language (Other than English):**
None
**Travel Requirement:**
0% - 25%
**PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS**
**Position Type**
Office-based
Teaches / trains others regularly
Frequently
Travel regularly from the office to various work sites or from site-to-site
Rarely
Works primarily out-of-the office selling products/services (sales employees)
Never
Physical work site required
Yes
Lifting: up to 10 pounds
Occasionally
Lifting: 10 to 25 pounds
Rarely
Lifting: 25 to 50 pounds
Never
**_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._
**_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._
_As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._
_Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
Req ID: J272819
Engineer, Cyber Security Operations Center
Cyber security analyst job in Overland Park, KS
At T-Mobile, we invest in YOU! Our Total Rewards Package ensures that employees get the same big love we give our customers. All team members receive a competitive base salary and compensation package - this is Total Rewards. Employees enjoy multiple wealth-building opportunities through our annual stock grant, employee stock purchase plan, 401(k), and access to free, year-round money coaches. That's how we're UNSTOPPABLE for our employees!
Are you ready to join the Un-carrier movement? If so, our Cybersecurity team is searching for a CSOC Analyst to join us in taking the next big leap forward with our team.
This Engineer role in T-Mobile's 24x7 Cyber Security Operations Center (CSOC) is vital for ensuring the overall security of systems, services, and information assets. This individual will serve as a line of defense against cyber threats, playing a pivotal role in maintaining the confidentiality, integrity, and availability of T-Mobile's digital infrastructure.
This is a full-time, onsite position working four (4) 10-hour shifts per week and may include 1st, 2nd, or 3rd shift work.
Our team is dynamic where no day is the same, and we are a diverse and inclusive team passionate about growth and innovation! If you're up to the challenge, apply today!
Job Responsibilities
The role of a CSOC Engineer is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures, specifically:
Monitor incoming event queues for potential security incidents per operational procedures
Perform triage, analysis, and response of security alerts to resolve an initiate appropriate courses of action, with critical issues as defined by established procedures
Collect and organize alert, event and triage data to produce reports to provide feedback to existing content, inform new content, and measure relevant KPIs
Provide support for and collaboration with higher-tier support teams to investigate advanced incidents
Assist in the development of new security operations processes as well as the refinement or improvement of existing processes
Monitor CSOC ticket (or email) queue for potential event reporting from outside entities and individual users
Maintain CSOC shift logs with relevant activity from current shift.
Document investigation case notes, ensuring relevant details are passed to CIRT for advanced incident analysis
Update or reference CSOC knowledge management repository as necessary for changes to CSOC processes and procedures and ingest CSOC daily intelligence reports and previous shift pass downs
Conduct security research and intelligence gathering on emerging threats and exploits
Qualifications
Minimum Required
2-4 years of experience working in a large enterprise
2-4 years of experience as a SOC or Incident Response investigator or equivalent work experience
Conversant with cyber security intrusion analysis concepts and techniques
Understanding of security incident investigation and log analysis
Experience investigating security incidents, threats and vulnerabilities
Demonstrable knowledge of networking (TCP/IP, topology, OSI model and network forensics), operating systems (Windows/MacOS/Linux), and web technologies (web applications, database security, web servers)
Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
Knowledge of Scripting tools (Python/Perl/Shell/HTML/PHP)
Ability to read and understand system data, including, but not limited to, security event logs, system logs, and firewall logs
High degree of attention to detail
Presentation skills to large and small audiences
Strong verbal and written communication skills
Desired
Experience supporting Cyber Security Operations in a large enterprise environment
Experience with SIEM & Log Management solutions
Experience with cloud security, telecom security, data protection
Experience with enterprise systems or network administration
CCNA Security, GCIA, GCIH or other related security certifications
Education
Degree in Computer Science, Information Technology, or equivalent work experience
Course work in Cyber Security is strongly preferred
General/Physical Requirements
Shift work in a 24x7 Cyber Security Operations Center
Participation in on-call rotation may be required
At least 18 years of age
Legally authorized to work in the United States
Travel:
Travel Required (Yes/No): No
DOT Regulated:
DOT Regulated Position (Yes/No): No
Safety Sensitive Position (Yes/No): No
Base Pay Range: $79,900 - $144,100Corporate Bonus Target: 15%
The pay range above is the general base pay range for a successful candidate in the role. The successful candidate's actual pay will be based on various factors, such as work location, qualifications, and experience, so the actual starting pay will vary within this range.
At T-Mobile, employees in regular, non-temporary roles are eligible for an annual bonus or periodic sales incentive or bonus, based on their role. Most Corporate employees are eligible for a year-end bonus based on company and/or individual performance and which is set at a percentage of the employee's eligible earnings in the prior year. Certain positions in Customer Care are eligible for monthly bonuses based on individual and/or team performance. To find the pay range for this role based on hiring location, ******************************************** ID=REQ334140¶dox=1
At T-Mobile, our benefits exemplify the spirit of One Team, Together! A big part of how we care for one another is working to ensure our benefits evolve to meet the needs of our team members. Full and part-time employees have access to the same benefits when eligible. We cover all of the bases, offering medical, dental and vision insurance, a flexible spending account, 401(k), employee stock grants, employee stock purchase plan, paid time off and up to 12 paid holidays - which total about 4 weeks for new full-time employees and about 2.5 weeks for new part-time employees annually - paid parental and family leave, family building benefits, back-up care, enhanced family support, childcare subsidy, tuition assistance, college coaching, short- and long-term disability, voluntary AD&D coverage, voluntary accident coverage, voluntary life insurance, voluntary disability insurance, and voluntary long-term care insurance. We don't stop there - eligible employees can also receive mobile service & home internet discounts, pet insurance, and access to commuter and transit programs! To learn about T-Mobile's amazing benefits, check out
************************
.
Never stop growing!
As part of the T-Mobile team, you know the Un-carrier doesn't have a corporate ladder-it's more like a jungle gym of possibilities! We love helping our employees grow in their careers, because it's that shared drive to aim high that drives our business and our culture forward. By applying for this career opportunity, you're living our values while investing in your career growth-and we applaud it. You're unstoppable!
T-Mobile USA, Inc. is an Equal Opportunity Employer. All decisions concerning the employment relationship will be made without regard to age, race, ethnicity, color, religion, creed, sex, sexual orientation, gender identity or expression, national origin, religious affiliation, marital status, citizenship status, veteran status, the presence of any physical or mental disability, or any other status or characteristic protected by federal, state, or local law. Discrimination, retaliation or harassment based upon any of these factors is wholly inconsistent with how we do business and will not be tolerated.
Talent comes in all forms at the Un-carrier. If you are an individual with a disability and need reasonable accommodation at any point in the application or interview process, please let us know by emailing ApplicantAccommodation@t-mobile.com or calling **************. Please note, this contact channel is not a means to apply for or inquire about a position and we are unable to respond to non-accommodation related requests.
Auto-ApplyInformation Security Specialist
Cyber security analyst job in Kansas City, MO
Company Federal Reserve Bank of Kansas City When you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture.
Important Information
* Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency.
* No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc.
* This position requires working on-site with 5 days per month remote work flexibility.
Key Activities
Risk Assessment & Analysis
* Modernize the current approach to cybersecurity risk management and assessments.
* Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization.
* Identify and implement risk quantification and scoring approaches within the organization.
* Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority.
* Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations.
* Conduct business impact analyses to understand how security incidents affect critical business functions.
* Evaluate and quantify risks associated with third-party vendors and supply chain.
* Assess specific risks related to cloud environments and services.
Program Development
* Develop reports and dashboards to illustrate the organization's risk posture.
* Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk.
* Research and identify options to establish a risk register.
* Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options.
* Map cybersecurity risks to relevant regulatory requirements and compliance frameworks.
* Continuously improve risk management processes based on industry trends and organizational needs.
Communication & Collaboration
* Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand.
* Partner with incident response teams to incorporate lessons learned into risk models.
* Translate complex technical risk scenarios into actionable insights for all levels of the organization.
Qualifications
Experience
* Typically requires at least 6 years of relevant cybersecurity risk management experience.
* Experience with risk scoring methods and risk quantification.
* Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume.
* Experience establishing or running an Enterprise cybersecurity risk management program.
* Experience with NIST SP 800-53 security standards.
* Experience presenting risk information to executive leadership.
Education & Certifications
* Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience.
* Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred.
Technical Knowledge
* Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF).
* Strong skills and experience with data analysis.
* Experience with GRC (Governance, Risk, and Compliance) tools.
* Knowledge of business impact analysis methodologies.
* Familiarity with cloud security frameworks (CCSK, CCSP).
Skills & Abilities
* Ability to understand technical details of cybersecurity risk.
* Ability to communicate complicated technical risk scenarios to all levels of the organization.
* Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment.
Additional Information
How We Work (HWW):
* On-site: 5 days per month remote work flexibility
* Location: Kansas City, Denver, Oklahoma City, Omaha
* Remote Eligible: No
Salary:
* $98,600 - $139,000 / Senior Level
* $117,300 - $165,400 / Advanced Level
* Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
* Total Rewards & Benefits
* Who We Are
* What We Do
Follow us on LinkedIn, Instagram, X (formerly Twitter), and YouTube #KCFedIT
Full Time / Part Time
Full time
Regular / Temporary
Regular
Job Exempt (Yes / No)
Yes
Job Category
Information Technology Family Group
Work Shift
First (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Senior Analyst, Security Compliance (SOX IT)
Cyber security analyst job in Topeka, KS
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Cyber Resilience Specialist
Cyber security analyst job in Kansas City, MO
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplyCyber Security Detection Engineer Job Details | Black & Veatch Family of Companies
Cyber security analyst job in Overland Park, KS
**Cyber Security Detection Engineer** Company: Black & Veatch Family of Companies **Together, we own our company, our future, and our shared success.** As an employee-owned company, our people _are_ Black & Veatch. We put them at the center of everything we do and empower them to grow, explore new possibilities and use their diverse talents and perspectives to solve humanity's biggest challenges in an ever-evolving world. With over 100 years of innovation in sustainable infrastructure and our expertise in engineering, procurement, consulting and construction, together we are building a world of difference.
**Company :** Black & Veatch Corporation
**Req Id :** 112100
**Opportunity Type :** Staff
**Relocation eligible :** No
**Full time/Part time :** Full-Time
**Project Only Hire :** No
**Visa Sponsorship Available:** No
**Why Black and Veatch**
Black & Veatch allows you to lend your talent and perspective to humanity's biggest challenges in a flexible environment where you are empowered to grow and explore new possibilities. We offer competitive compensation; 401K match and benefits that start day 1.
Our hybrid environment allows you to balance your work and personal life. At Black & Veatch, you own your career with purpose and meaning. You are empowered to grow and explore new possibilities at every step of your career journey. Bring your big ideas knowing you are safe to be who you are and speak up with concerns or questions and put your diverse talents and perspectives to use.
**The Opportunity**
We are seeking a highly skilled and motivated **Cyber Detection Engineer** to join our cybersecurity team. This role is responsible for designing and implementing advanced threat detection routines, assimilating open-source threat intelligence, generating actionable cyber threat intelligence, and leading incident response and remediation efforts. \#LI-NK1 #LI-Hybrid
**The Team**
**Black & Veatch's Business Enablement** consists of critical groups that help enable the organizations people, projects, and businesses to be as successful as possible. Functions in this group include Digital & Information Technology, Global Finance, Global Human Resources, Legal, Risk Management, and Government Affairs and Real Estate and Building Services.
**Key Responsibilities**
**Threat Detection & Engineering**
+ Develop and maintain detection functions using telemetry from various sources (e.g., endpoint logs, cloud logs, email scanning, sandbox analysis).
+ Create and optimize detection components and functions (e.g., YARA rules, Sigma rules, SIEM hunts) to identify malicious activity
+ Expand telemetry and signal coverage while reducing noise to improve detection fidelity
**Threat Intelligence**
+ Assimilate and operationalize open-source threat intelligence feeds.
+ Generate internal cyber threat intelligence reports and indicators of compromise (IOCs).
+ Integrate threat intelligence into detection platforms to enhance visibility and response
**Threat Hunting**
+ Design and execute proactive threat hunting routines across enterprise environments.
+ Identify anomalous behaviors and potential threats not detected by automated systems.
**Alert Analysis & Incident Response**
+ Analyze security alerts and determine their impact and severity.
+ Lead incident response efforts including containment, eradication, and recovery.
+ Collaborate with SOC analysts and other stakeholders to ensure timely resolution.
**Remediation & Reporting**
+ Develop and implement remediation plans for identified threats and vulnerabilities.
+ Document findings and lessons learned to improve future detection and response capabilities.
+ Contribute to the continuous improvement of security operations and detection engineering processes.
**Management Responsibilities**
Individual Contributor
**Minimum Qualifications**
+ Bachelor's degree in Information Security or Computer Science or related field.
+ Minimum 8-10 years of overall experience in Cyber Security, IT, Risk Assessments, Privacy
+ Experience analyzing threat data, understanding IT systems, security tools, and managing detection content for high fidelity alerting into threat behavior
+ All applicants must be able to complete pre-employment onboarding requirements (if selected) which may include any/all of the following: criminal/civil background check, drug screen, and motor vehicle records search, in compliance with any applicable laws and regulations.
**Preferred Qualifications**
+ 5+ years in cybersecurity, with hands-on experience in detection engineering, threat hunting, and incident response.
**Technical Skills:**
+ Proficiency in scripting languages (e.g., Python, PowerShell).
+ Experience with SIEM platforms, EDR tools, and threat intelligence platforms.
+ Familiarity with detection-as-code frameworks and telemetry analysis.
**Soft Skills:**
+ Strong analytical and problem-solving abilities.
+ Excellent communication and collaboration skills.
+ Ability to work independently and in cross-functional teams.
**Work Environment/Physical Demands**
Hybrid or flexible work options may be offered after the first 90 days of employment based upon manager discretion, job performance and work assignments.
**Salary Plan**
ITS: Information Technology Service
**Job Grade**
017
Black & Veatch endeavors to makeaccessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process because of a disability, please contact the Employee Relations Department at *************** or via our. This contact information is for disability accommodation requests only; you may not use this contact information to inquire about the status of applications. General inquiries about the status of applications will not be returned.
Black & Veatch is committed to being an employer of choice by creating a valuable work experience that keeps our people engaged, productive, safe and healthy.
Our comprehensive benefits portfolio is a key component of this commitment and offers an array of health care benefits including but not limited to medical, dental and vision insurances along with disability and a robust wellness program.
To support a healthy work-life balance, we offer flexible work schedules, paid vacation and holiday time, sick time, and dependent sick time.
A variety of additional benefits are available to our professionals, including a company-matched 401k plan, adoption reimbursement, tuition reimbursement, vendor discounts, an employment referral program, AD&D insurance, pre-taxed accounts, voluntary legal plan and the B&V Credit Union. Professionals may also be eligible for a performance-based bonus program.
We are proud to be a 100 percent ESOP-owned company. As employee-owners, our professionals are empowered to drive not only their personal growth, but the company's long-term achievements - and they share in the financial rewards of the success through stock ownership.
By valuing diverse voices and perspectives, we cultivate an authentically inclusive environment for professionals and are able to provide innovative and effective solutions for clients.
BVH, Inc., its subsidiaries and its affiliated companies, complies with all Equal Employment Opportunity (EEO) laws and regulations. Black & Veatch does not discriminate on the basis of age, race, religion, color, sex, national origin, marital status, genetic information, sexual orientation, gender Identity and expression, disability, veteran status, pregnancy status or other status protected by law.
For our EEO Policy Statement, please click.
**Notice to External Search Firms** : Black & Veatch does not accept unsolicited resumes and will not be obligated to pay a placement fee for unsolicited resumes. Black & Veatch Talent Acquisition engages with search firms directly for hiring needs.
**Job Segment:** Construction, Engineer, Engineering
Information Security Specialist
Cyber security analyst job in Kansas City, MO
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture.
Important Information
Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency.
No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc.
This position requires working on-site with 5 days per month remote work flexibility.
Key Activities
Risk Assessment & Analysis
Modernize the current approach to cybersecurity risk management and assessments.
Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization.
Identify and implement risk quantification and scoring approaches within the organization.
Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority.
Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations.
Conduct business impact analyses to understand how security incidents affect critical business functions.
Evaluate and quantify risks associated with third-party vendors and supply chain.
Assess specific risks related to cloud environments and services.
Program Development
Develop reports and dashboards to illustrate the organization's risk posture.
Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk.
Research and identify options to establish a risk register.
Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options.
Map cybersecurity risks to relevant regulatory requirements and compliance frameworks.
Continuously improve risk management processes based on industry trends and organizational needs.
Communication & Collaboration
Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand.
Partner with incident response teams to incorporate lessons learned into risk models.
Translate complex technical risk scenarios into actionable insights for all levels of the organization.
Qualifications
Experience
Typically requires at least 6 years of relevant cybersecurity risk management experience.
Experience with risk scoring methods and risk quantification.
Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume.
Experience establishing or running an Enterprise cybersecurity risk management program.
Experience with NIST SP 800-53 security standards.
Experience presenting risk information to executive leadership.
Education & Certifications
Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience.
Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred.
Technical Knowledge
Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF).
Strong skills and experience with data analysis.
Experience with GRC (Governance, Risk, and Compliance) tools.
Knowledge of business impact analysis methodologies.
Familiarity with cloud security frameworks (CCSK, CCSP).
Skills & Abilities
Ability to understand technical details of cybersecurity risk.
Ability to communicate complicated technical risk scenarios to all levels of the organization.
Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Location: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Salary:
$98,600 - $139,000 / Senior Level
$117,300 - $165,400 / Advanced Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Auto-ApplyCyber Security Engineer
Cyber security analyst job in Leavenworth, KS
Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
* Maintains the appropriate operational security posture and documentation for MCTSP information systems
* Implementing DoD, Army, ARNG, and MCTSP information security policies
* Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections
* RMF document and artifact management
* Managing and tracking the IAVM system
* Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures.
Requirements
What you'll need to have to join our award-winning team:
* Clearance: Must possess and maintain an active Secret Clearance.
* Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience.
* IAT II Certification
* 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems.
* 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises;
* 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises
Why You'll Love this Job:
* Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission.
* You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge.
* Daily opportunities to develop new skills
* Team environment
What We Can Offer You:
* Compensation
* Health & Wellbeing
* We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
* Personal & Professional Development
* We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
* Diversity, Inclusion & Belonging
* We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
* Benefits
* Healthcare (medical, dental, vision, prescription drugs)
* Pet Insurance
* 401(k) savings plan
* Paid Time Off (PTO)
* Holiday pay opportunities
* Basic life insurance
* AD&D insurance
* Company-paid Short-Term and Long-Term Disability
* Employee Assistance Program
* Tuition Support Options
* Identity Theft Program
Security Analyst
Cyber security analyst job in Kansas City, MO
Forrest T. Jones & Company, Inc., and its affiliates (“FTJ”), provide insurance and insurance related services to clients, corporations, employers and individuals. These services include providing benefits through innovative life and health insurance plans, financial services, and customized insurance products for niche markets.
Position Summary
The Security Analyst develops and manages security for more than one IT functional area.
Assists in the development and implementation of security policies and procedures.
Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses.
Enforces security policies and procedures by administering and monitoring security profiles.
Reviews security violation reports and investigates possible security exceptions.
Updates, maintains and documents security controls.
Responsibilities
Utilizes information security tools to monitor risk levels and security posture.
Supports IT security goals and reduce organizational risk.
Collects and maintain data needed to meet information security reporting.
Conducts monitoring and analysis of information security data sources.
Supports company wide information security training and awareness program.
Prepares, distributes, and maintains plans, instructions, guidance, and standard operating procedures.
Supports compliance activities.
Qualifications
BS in Computer Science, Cybersecurity Management, or at least 2 years in similar position.
Knowledge of the following topics:
Computer networking concepts, protocols, and network security methodologies.
Incident response and handling
Applicable business processes and operations for customer organizations.
Business continuity and disaster recovery planning
Host/Network access control mechanisms.
Intrusion detection methods and techniques.
New and emerging IT and cybersecurity technologies
Server and client operating systems
We offer comprehensive benefits to full-time employees including company-paid medical, STD, LTD and life insurance; voluntary dental, vision, Life/AD&D insurance, 401(k) with company matching, generous paid time off and much more.
We encourage applicants of all ages and experience, as we do not discriminate on the basis of an applicant's age.
ALL OFFERS OF EMPLOYMENT ARE CONTINGENT UPON PASSAGE OF A DRUG SCREEN AND BACKGROUND CHECK.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Engineer, Information Security
Cyber security analyst job in Overland Park, KS
We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision.
If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here.
What You'll Do:
Engineer and operate modern security platforms.
Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies.
Conduct deep-dive security assessments.
Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions.
Strengthen core security operations.
Support and mature processes such as:
Malware response and remediation
Vulnerability management and patch governance
SIEM log analysis, correlation, and monitoring
Incident documentation, reporting, and lifecycle management
Improve systems by design-not by accident.
Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations.
Contribute through data, insights, and experimentation.
Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement.
What Makes This Role Unique:
Technical leadership that “gets it.”
You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves.
Security built on innovation, not stagnation.
Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls.
Access to state-of-the-art platforms.
Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry.
High-rigor environment with real impact.
Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction.
Collaboration with top industry partners.
Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program.
Opportunities for broad domain depth.
Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more.
What You Bring:
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience.
3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus.
Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems.
Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions.
Ability to operate with autonomy, accountability, and comfort in fast-moving environments.
Exceptional communication and collaboration skills with the ability to influence across teams.
Analytical mindset with a high bar for detail, documentation, and operational excellence.
Why Join Us
We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance.
We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building.
Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits.
#LI-JS1
#LI-REMOTE
EOE/M-F/D/V
Auto-ApplySenior Information Assurance Specialist
Cyber security analyst job in Leavenworth, KS
Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is to transform the way our customers approach constantly changing and complex problem sets by bringing to bear the latest in technology and the highest caliber of talent.
Headquartered in Washington, DC's historic Dupont Circle neighborhood, Barbaricum also has a corporate presence in Tampa, FL, Bedford, IN, and Dayton, OH, with team members across the United States and around the world. As a leader in our space, we partner with firms in the private sector, academic institutions, and industry associations with a goal of continually building our expertise and capabilities for the benefit of our employees and the customers we support. Through all of this, we have built a vibrant corporate culture diverse in expertise and perspectives with a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team.
Barbaricum is seeking a Senior Information Assurance Specialist to lead cybersecurity efforts for TRADOC G2 operations at Fort Eustis, VA, ensuring compliance with DoD Risk Management Framework (RMF), DISA STIGs, and cybersecurity policies. This role requires expertise in system accreditation, vulnerability assessments, and incident response, managing complex IT infrastructures within SCIF and open storage environments to protect critical mission data against cyber threats.
Responsibilities
Develop and enforce information assurance policies and procedures.
Perform risk assessments and vulnerability analyses for IT systems.
Manage system accreditation processes, including RMF compliance.
Oversee security audits and incident response activities.
Provide guidance and mentorship to junior information assurance personnel.
Qualifications
Active DoD Top Secret/SCI clearance required.
Bachelor's degree in cybersecurity, IT, or related field preferred.
8-13 years' experience
CISSP, CISM, or equivalent certification required.
Extensive experience with DoD cybersecurity frameworks and RMF.
EEO Commitment
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law.
Auto-ApplySecurity Analyst
Cyber security analyst job in Overland Park, KS
Job Description
About the Role
As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite.
Responsibilities:
Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time.
Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision.
Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients.
Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events.
Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports.
Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture.
Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks.
Qualifications:
Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies.
SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events.
Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes.
Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences.
Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals.
Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats.
Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
Security Engineer - Data Protection
Cyber security analyst job in Kansas City, MO
Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure.
Key Responsibilities:
* Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal.
* Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery.
* Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications.
* Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration.
* Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls.
* Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails.
* Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response.
* Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership.
* Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform.
* Actively coach and mentor other security and technology team members on data protection best practices.
* Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
Senior Security Engineer
Cyber security analyst job in Kansas City, MO
**Best People + Right Culture. These are the driving forces behind JE Dunn's success.** **By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years.**
**Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection.**
**Role Summary**
The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn.
+ Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
+ Career Path: Security Architect
**Key Role Responsibilities - Core**
KEY ROLE RESPONSIBILITIES
_SECURITY ENGINEER FAMILY - CORE_
+ Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices.
+ Mentors team members on technical and security methodology characteristics.
+ Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness.
+ Acts as primary technical resource for design and implementation projects.
+ Drafts and recommends operating procedures and changes to information security practices and solutions.
+ Trains and engages operations and support personnel on security solutions.
+ Advise on trends, threats, and emerging security risks, relevant to the organization.
+ Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements.
+ May be a subject matter expert for a variety of security related systems or applications.
+ Communicates with operational groups for collaboration of security program management.
+ Advocates secure culture and provides education throughout the appropriate client group.
+ Improves maturity capability of processes, procedures, and operations of the security program.
+ Communicates intelligence and program effectiveness reports to supervision.
**Key Role Responsibilities - Additional Core**
_SENIOR SECURITY ENGINEER_
In addition, this position will be responsible for the following:
+ Designs and implements security solutions for various platforms
+ Conducts comprehensive security assessments and audits to determine the effectiveness of security controls
+ Assists operations as needed in incident response and contribute to post-incident analysis
+ Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements
+ Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level
+ Implements and maintains access control system for any type of new enhancement opportunities
+ Collaborates with development teams to ensure secure software development practices
+ Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working
+ Designs and implements robust security ensuring alignment with industry best practices and organization configurations
+ Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration
+ May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks
+ Builds security automation scripts and tools to streamline security operations and improve efficiency
+ Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle
+ Plays an active role in contributing ideas for security innovations
+ Assists in the design and execution of incident response as it pertains to security engineering
+ Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program
+ Implements security technologies with full understanding on accountability and ownership for full deployment
**Knowledge, Skills & Abilities**
+ Ability to perform work accurately and completely, and in a timely manner
+ Communication skills, verbal and written - Intermediate
+ Ability to lead technical projects once assigned
+ Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX
+ Ability to solve technical issues - Advanced
+ Demonstrated expert knowledge of information security practices
+ Substantial knowledge of Python and Powershell scripting languages
+ Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers
+ Proficient with multiple cloud platforms
+ Technical writing and documentation skills
+ Organizational skills
+ Ability to quickly and effectively solve complex problems
+ Ability to deliver quality through attention to detail
+ Ability to work in team and independently
+ Ability to work a flexible schedule - might be on call in the evenings and weekends
+ Ability to build relationships and collaborate within a team, internally and externally
**Education**
+ Bachelor's degree in information security or related field (Preferred)
+ In lieu of the above requirements, equivalent relevant experience will be considered
**Experience**
+ 5+ Years information security experience (Preferred)
**Working Environment**
+ Must be able to lift up to 25 pounds
+ May require periods of overnight travel
+ Normal office environment
+ Frequent activity: Sitting, Viewing Computer Screen
+ Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
**Benefits Information**
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details. (************************************************************************************
This role is expected to accept applications for at least three business days and may continue to be posted until a qualified applicant is selected or the position has been cancelled.
_JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace._
**_JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to_** **_accommodations@jedunn.com_**
_JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails._
**Why People Work Here**
At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them
**Building on our rich history,** our employee **owners are shaping the future** of JE Dunn. In our team-focused environment **we do life together** and are generously **rewarded for our efforts**
**About JE Dunn**
For more information on who we are, clickhere. (***********************************
**EEO NOTICES**
Know Your Rights: Workplace Discrimination is Illegal (***********************************************************************************************
California Privacy Policy
**E-Verify**
JE Dunn participates in the Electronic Employment Eligibility Verification Program.
E-Verify Participation (English and Spanish) (********************************************************************************************
Right to Work (English)
Right to Work (Spanish) (*****************************************************************************************************************************
**Nearest Major Market:** Kansas City
Security Engineer II
Cyber security analyst job in Topeka, KS
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Security Engineer
Cyber security analyst job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************