Principal Security Engineer - Hardware Security
Cyber security analyst job in San Juan, PR
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges.
We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtual infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer's business critical applications. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services.
The OCI Hardware Security group conducts Security assessments of the production hardware that runs our cloud, and develops the requirements for future Networking, Storage, Compute components. We work closely across Oracle, with third party vendors, and with standards organization to influence the next generation of hardware platform security. In addition to defining the best hardware, OCI HW Security knows that platform security also depends on how that hardware is used. To that end, HW Security also works closely with OCI's operations and engineering teams, constantly striving to improve Oracle Cloud's overall operational security posture by defining the supply chain and operational requirements to establish best practices for managing security for every device in our data centers.
A security-focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. Overall, the OCI Security Architecture team performs a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration.
The biggest challenges for the team are the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution.
**Responsibilities**
Career Level - IC4
+ Develop and communicate requirements for new vendors and hardware (compute, storage, networking)
+ Perform architectural reviews, penetration testing, vulnerability analysis of compute infrastructure hardware such as
o Servers (Intel, AMD and ARM)
o Baseboard Management Controllers such as Oracle's ILOM
o UEFI and platform firmware
o Smart NICS
o Storage devices
o Network controllers and other peripherals
Network hardware/firmware, topology, and security expertise
+ Provide consulting on security risk associated with compute hardware and firmware in the context of cloud usage.
+ Provide consulting and review of device sanitization as per NIST-800-88 R1 standards.
+ Provide standard operating procedures for safe use of compute hardware through its lifecycle i.e., provisioning, operations and reuse/decommission.
Skills
+ Engage with Oracle Hardware Division and third-party vendors to understand their roadmaps.
+ Create planning roadmaps to drive multi-year security improvements across the OCI Infrastructure
+ Review or assess engineering changes, or revisions of, an existing component. E.g.: new firmware for a device, vendor revision of an existing device Identify and participate in external standards groups to drive improvements across the industry
+ Consult development teams and third-party vendors in design and architecture of secure systems.
+ Champion and consult on secure development life cycle practices.
+ Communicate and educate Senior Management on key Security topics and directions.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Engineer, Information Security and Risk
Cyber security analyst job in San Juan, PR
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Field Chief Information Security Officer
Cyber security analyst job in San Juan, PR
**About Us** **Since 1989, SHI International Corp. has helped organizations change the world through technology. We've grown every year since, and today we're proud to be a $16 billion global provider of IT solutions and services.** **Over 17,000 organizations worldwide rely on SHI's concierge approach to help them solve what's next. But the heartbeat of SHI is our employees - all 7,000 of them. If you join our team, you'll enjoy:**
+ **Our commitment to diversity, as the largest minority- and woman-owned enterprise in the U.S.**
+ **Continuous professional growth and leadership opportunities.**
+ **Health, wellness, and financial benefits to offer peace of mind to you and your family.**
+ **World-class facilities and the technology you need to thrive - in our offices or yours.**
**Job Summary**
The Chief Information Security Officer will develop and implement a comprehensive information security strategy that aligns with the organization's goals, ensuring the protection of information assets through effective policy enforcement and risk management. This role involves managing incident response, ensuring regulatory compliance, and overseeing security audits and technology investments to enhance the organization's security posture. The CISO will collaborate with various departments, conduct security awareness training, and provide regular updates to senior management and the board on security status, risks, and initiatives.
**Role Description**
+ Develop and implement an information security strategy that aligns with the organization's goals and objectives to ensure comprehensive protection of information assets.
+ Oversee the development and enforcement of security policies to ensure that all security policies, procedures, and protocols are up-to-date and effectively implemented across the organization.
+ Lead risk management efforts by identifying, assessing, and mitigating information security risks to protect the organization from potential threats and vulnerabilities.
+ Manage incident response and recovery by developing and overseeing the execution of incident response plans to address security breaches and ensure timely recovery.
+ Ensure compliance with regulatory requirements by monitoring and enforcing compliance with relevant laws, regulations, and industry standards related to information security.
+ Collaborate with other departments such as IT, legal, HR, and others to integrate security measures into all aspects of the organization's operations.
+ Conduct security awareness training to educate employees on security best practices and promote a culture of security awareness throughout the organization.
+ Oversee security audits and assessments by regularly conducting internal and external audits to evaluate the effectiveness of security measures and identify areas for improvement.
+ Manage security technology investments by evaluating, selecting, and implementing security technologies and tools to enhance the organization's security posture.
+ Report to senior management and the board of directors by providing regular updates on the organization's security status, risks, and initiatives to ensure informed decision-making at the highest levels.
**Behaviors and Competencies**
+ Technical Expertise: Can create new applications for technical knowledge and skills and can lead the development of technical standards and procedures.
+ Strategic Thinking: Can analyze complex situations, drive organizational transformation, and adapt strategies to changing market conditions.
+ Risk-Taking: Can inspire and encourage others to take calculated risks, fostering a culture of innovation and adaptability.
+ Decision-Making: Can lead organizational decision-making, mentor others in developing decision-making skills, and create frameworks that enhance the decision-making capabilities of the team.
+ Leadership: Can lead strategic team initiatives, inspire others to take leadership roles, and foster a culture of shared responsibility and continuous improvement.
+ Analytical Thinking: Can lead and innovate in the application of analytical thinking, solve complex problems, influence others, and contribute to best practices.
+ Communication: Can lead and model exceptional communication at all levels of the organization, develop and implement communication strategies, and coach others to improve their communication skills.
+ Adaptability: Can drive strategic transformations, inspire others to embrace change, and foster a culture of continuous adaptation.
+ Collaboration: Can lead complex team projects, inspire others to collaborate effectively, and foster a culture of mutual respect and shared purpose.
+ Ethics: Can lead strategic initiatives, inspire others to uphold ethical standards, and foster a culture of integrity and ethical conduct.
**Skill Level Requirements**
+ Deep understanding of the security industry, best practices, emerging technologies, and leading solutions - Expert
+ Experience supporting various compliance and regulatory frameworks - Expert
+ Change Management, ability to manage, drive, and adapt to organizational change while maintaining team morale and productivity. - Expert
+ Continuous Improvement, identifying areas for improvement, implementing changes, and measuring results to enhance processes and performance. - Expert
+ Financial Awareness and understanding of financial concepts, budgeting, with the ability to make informed decisions based on financial data. - Expert
+ Forward Thinking, anticipating future trends and needs, and making decisions that position oneself or one's organization for success. - Expert
+ Innovation to generate, develop, and implement new and original ideas, challenging the status quo to improve processes and solutions. - Expert
+ Resilient, has the ability to recover quickly from difficulties and adapt in the face of challenging circumstances. - Expert
+ Influence, ability to persuade, lead, and influence others to achieve desired outcomes. - Expert
+ Willing to Learn, open to new ideas, and has a desire to continuously learn to stay current with the latest trends, threats, and technology. - Expert
+ Documentation involves creating, maintaining, and managing detailed and accurate records and documentation to support organizational processes and decisions. - Expert
**Other Requirements**
+ Completed Bachelor's degree in computer science, information technology, cybersecurity, or a related field. Master's degree preferred.
+ 10+ years' experience in an enterprise information security role
+ 10+ years' experience in a leadership role
+ Advanced Certifications: CISSP, CRISC, GCEIT, CISM, GIAC
The estimated annual pay range for this position is $275,000 - $350,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Security Architect - Secure Technology, Architecture and Safety
Cyber security analyst job in San Juan, PR
**About the role** You will design and govern security reference architectures, standards, and controls for cloud primitives (compute, network, storage), identity and access, data protection, container/Kubernetes platforms, AI/ML systems, and developer platforms. You will lead high-impact design reviews, threat modeling, and cryptographic strategy; guide zero-trust adoption; and drive detection, response, and resilience patterns at scale.
You will collaborate with senior leaders and product teams, mentor engineers, and influence roadmaps through clear writing, principled prioritization, and metrics.
Ideal candidates bring deep experience "building clouds," large-scale distributed systems, and security-by-design, with a track record of shipping secure platforms. You are practical, inclusive, and customer-obsessed, balancing rigor with velocity. If you thrive at the intersection of architecture, hands-on engineering, and incident leadership-and want to make a broad impact across Oracle's cloud-this role is for you.
**About the business**
Oracle's Secure Technology, Architecture and Safety (STAS) group sets the strategic technical direction for security across Oracle, shaping the future of secure cloud computing while partnering deeply with engineering and operations. We are seeking a Security Architect (Architect/Distinguished Engineer caliber) to define end-to-end security architecture for hyperscale cloud platforms and services, raise the security bar across the software lifecycle, and lead response to complex security incidents.
**What you'll do**
+ Set strategy: Define multi-year security architecture strategy and roadmaps for cloud foundations, identity, data protection, platform security, AI/ML safety, and secure supply chain.
+ Authoritative design: Publish security reference architectures, control baselines, patterns, and design blueprints; lead cross-org design reviews and bar-raising architecture councils.
+ Build the cloud securely: Advise and co-design core cloud services (compute, networking, storage, virtualization, container/ orchestration, service mesh) with secure-by-default configurations.
+ Identity and zero trust: Advance strong identity, least privilege, policy-as-code, workload identity, and continuous verification aligned to zero-trust principles.
+ Cryptography and data protection: Drive KMS/HSM strategy, key lifecycle, envelope encryption, tokenization, privacy-enhancing technologies, and data governance at scale.
+ Secure SDLC: Embed threat modeling, secure coding, SAST/DAST/IAST, fuzzing, software provenance/SBOMs, signing, and deployment gates into developer platforms and CI/CD.
+ Detection and response: Partner with SOC and service teams on high-signal detection, telemetry standards, adversary emulation, incident response playbooks, and chaos/resilience testing.
+ Risk, compliance, and safety: Translate regulatory and customer requirements into engineering-ready controls and evidence; integrate safety-by-design for emerging technologies.
+ Incident leadership: Lead or advise on significant incidents; perform post-incident reviews, drive systemic fixes, and establish preventative guardrails and metrics.
+ Influence at scale: Produce clear design docs and RFCs; mentor senior engineers; run architecture reviews; build communities of practice; create learning pathways and reusable assets.
**Responsibilities**
**What you'll bring**
+ 12+ years in security architecture/engineering for large-scale distributed systems; significant experience "building clouds" (IaaS/PaaS) or platform engineering.
+ Expertise in at least three: identity and access management; network and micro segmentation; container/Kubernetes security; virtualization/compute; data protection/crypto; detection/response; supply chain security.
+ Hands-on depth with one or more: OCI, AWS, Azure, GCP; Kubernetes; service mesh; Terraform/Policy-as-Code; CI/CD; Linux hardening; observability stacks.
+ Demonstrated ability to lead cross-org initiatives, influence without authority, and deliver secure-by-default solutions at scale.
+ Strong written and verbal communication; ability to produce clear design docs, threat models, and executive narratives.
+ Commitment to inclusive collaboration and mentoring.
**Preferred Qualifications:**
+ Experience designing KMS/HSM services, workload identity, confidential computing/TEE, or privacy-enhancing technologies.
+ Proven leadership in major incident response and post-incident systemic improvements.
+ Track record of published standards, OSS contributions, or patents in cloud security.
+ Advanced degree in Computer Science, Engineering, or related field (or equivalent experience).
**Leadership competencies**
+ Performance, drive, and execution You'll deliver value and shape a performance-driven culture while ensuring accountability and communicating expectations.
+ Collaboration You understand and promote the value of collaboration and inclusivity and can align strategic aims with organizational goals.
+ Communicating for impact You inspire confidence by championing a clear understanding and support of organizational strategy and objectives.
+ Inspirational leadership You build a reputation for strategy by inspiring and empowering others while showing leadership internally and externally.
+ Competitive edge You anticipate changes in customer needs and seize opportunities to build value, encourage innovation, and meet objectives.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $136,600 to $338,500 per annum. May be eligible for bonus, equity, and compensation deferral.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC6
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Engineer, Information Security and Risk
Cyber security analyst job in San Juan, PR
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Principal Security Architect
Cyber security analyst job in San Juan, PR
**About Us** **Since 1989, SHI International Corp. has helped organizations change the world through technology. We've grown every year since, and today we're proud to be a $16 billion global provider of IT solutions and services.** **Over 17,000 organizations worldwide rely on SHI's concierge approach to help them solve what's next. But the heartbeat of SHI is our employees - all 7,000 of them. If you join our team, you'll enjoy:**
+ **Our commitment to diversity, as the largest minority- and woman-owned enterprise in the U.S.**
+ **Continuous professional growth and leadership opportunities.**
+ **Health, wellness, and financial benefits to offer peace of mind to you and your family.**
+ **World-class facilities and the technology you need to thrive - in our offices or yours.**
**Job Summary**
The Principal Security Consultant for Security Architecture is a client-facing leader within SHI Services Cybersecurity Business Unit. This role partners with Client Advisors, Cybersecurity Advisors, other Principal Security Consultants, and subject matter experts to design and deliver service-centric solutions that address client security needs.
You will engage with enterprise clients to uncover, develop, and win security services opportunities-both project-based professional services and managed services-by building strong relationships at technical, architectural, and executive levels. Acting as a trusted advisor, you will consult with stakeholders on security products and services to enable business objectives and mitigate risk.
**Role Description**
+ Lead client engagements with autonomy, driving pre-sales activities including scope definition, deliverables, timelines, and level-of-effort estimates.
+ Develop Statements of Work (SOWs), create templates, and align client needs with existing offerings while tailoring solutions as required.
+ Define best practices, strategies, and methodologies for new cybersecurity service offerings; collaborate with delivery teams to ensure seamless execution.
+ Build intellectual property for SHI Services through new evaluation capabilities, prescriptive approaches, automation frameworks, and strategic initiatives.
+ Drive gross margin through professional services and product sales, contributing to business unit goals.
+ Own client engagement for new opportunities-discover, defend, and acquire business through proactive relationship building.
+ Collaborate with sales teams to develop and execute strategies for top prospects and expand existing accounts.
+ Engage with multiple organizational levels, including CISO, CIO, CTO, IT Directors, and Architects.
+ Deliver product and service education through demos, training, and solution deep dives.
+ Mentor consultants, analysts, and engineers to elevate delivery quality and team expertise.
+ Maintain ongoing learning of SHI Services security offerings and industry trends.
**Behaviors and Competencies**
+ Initiative: Can lead strategic and complex initiatives, inspire others to take initiative, and foster a culture of continuous improvement.
+ Communication: Can lead and model exceptional communication at all levels of the organization, develop and implement communication strategies, and coach others to improve their communication skills.
+ Customer Service: Can lead strategic customer service initiatives, inspire others to prioritize customer service, and foster a culture of continuous customer service improvement.
+ Research: Can lead strategic research initiatives, inspire others to prioritize effective research, and foster a culture of continuous learning and knowledge expansion.
+ Organization: Can design and implement efficient organizational structures and processes, mentor others in organizational skills, and lead by example in maintaining high standards of organization.
+ Self-Motivation: Can lead strategic self-improvement initiatives, inspire others to be self-motivated, and foster a culture of continuous self-improvement.
+ Adaptability: Can drive strategic transformations, inspire others to embrace change, and foster a culture of continuous adaptation.
+ Time Management: Can consistently achieve goals ahead of schedule, lead team efforts in time management, and strategize the best ways to use time for various tasks.
+ Detail-Oriented: Can foster a culture of detail orientation, inspiring others to maintain high standards of accuracy and completeness in their work.
+ Analytical Thinking: Can lead and innovate in the application of analytical thinking, solve complex problems, influence others, and contribute to best practices.
**Skill Level Requirements**
+ The ability to understand customer needs, provide tailored solutions, and build strong, long-term customer relationships through a consultative approach. - Expert
+ The skill of securely handling sensitive data, ensuring privacy and compliance with data protection regulations. - Expert
+ The ability to effectively utilize applications like Word, Excel, PowerPoint, and Outlook to enhance productivity and perform various tasks efficiently. - Expert
+ Comprehension of the inner workings of a company, including its market positioning, competitive dynamics, and operational processes, to inform decision-making and drive sustainable growth. - Expert
+ Ability to oversee and direct projects to completion, ensuring goals are met, resources are utilized efficiently, and stakeholders are satisfied. - Expert
+ Strong passion for technology and cybersecurity.
+ Exceptional written and verbal communication skills; ability to build trust with clients and partners.
+ Proven ability to lead complex technical sales cycles and influence stakeholders at all levels.
+ Expertise in security solutions such as:
+ **Network & Endpoint Security:** Firewalls, EDR/EPP, NAC, MDM
+ **Cloud & Container Security**
+ **Identity & Access Management:** IAM, MFA, SSO, CASB, PAM
+ **Security Analytics & Automation:** SIEM, SOAR, Zero Trust
+ **Specialized Domains:** IoT/ICS/OT Security
+ Familiarity with security service engagements, including:
+ Maturity assessments, SASE assessments, firewall reviews
+ Red/Blue/Purple team exercises, policy development
+ Security tool rationalization and implementation services
+ Entrepreneurial mindset with strong problem-solving and negotiation skills.
+ Ability to simplify complex concepts for diverse audiences, including C-Suite executives.
+ Excellent presentation skills and confidence in leading client discussions.
**Other Requirements**
+ Completed Bachelor's Degree or relevant work experience required
+ 10+ years of experience in a similar role
+ Advanced certification in a relevant technical area required
+ Ability to travel 10%
The estimated annual pay range for this position is $210,000 - $300,000, which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
\#LI-FF1
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Lead Adversarial Security Engineer
Cyber security analyst job in San Juan, PR
**_Job Title:_** Lead Adversarial Security Engineer **About** **Trellix:** **Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work.** Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at ************************ .
**_Role Overview:_**
Trellix is seeking an Adversarial Security Engineer to lead the evolution of its cybersecurity posture. This is a senior, hands-on, remote-first role for a red/blue/purple expert who possesses a valuable blend of offensive tradecraft and defensive-engineering skills.
**Role Overview:**
As a lead member of the security operations team, and reporting to the Deputy CISO the mission of this role is to bridge the gap between "what if" and "what is" to continuously test the organization's defenses, find gaps, and personally lead the engineering effort to close them. By collaborating with the Security Operations Center (SOC), Threat Intelligence, and infrastructure teams, this expert will act as a force multiplier, mentoring junior security operations staff and providing the technical leadership to measurably improve the ability to detect and respond to advanced threats.
**About the role:**
+ Plan and execute sophisticated, end-to-end red team engagements against our on-premise and cloud infrastructure.
+ Develop and validate new detection logic, transforming the results of your own attacks into high-fidelity alerts.
+ Lead continuous purple team exercises, acting as the primary bridge between the SOC, Threat Intelligence, and Detection Engineering teams.
+ Leverage Attack Surface Management (ASM) data to find "Shadow IT" and prioritize your offensive operations based on the most likely and impactful attack vectors.
+ Act as a senior technical leader, mentoring SOC analysts and junior engineers on advanced attack chains, detection theory, and defensive best practices.
+ Communicate complex findings and remediation strategies to a wide range of stakeholders, from highly technical engineers to executive leadership.
**About you:**
+ You have a blended career path of 7+ years, demonstrating experience in both offensive security (like Red Teaming) and defensive operations (like Detection Engineering or Threat Hunting).
+ You possess exceptional communication skills, with an ability to create reports and presentations for both highly technical and executive audiences.
+ You are a U.S. citizen.
+ Your technical expertise is built on a deep, practical understanding of frameworks like MITRE ATT&CK and the Diamond Model.
+ You have proficiency in modern offensive tools and C2 frameworks (e.g., Cobalt Strike, Metasploit) and/or experience developing custom attack methods to evade EDR and network controls.
+ You are proficient in writing, tuning, and validating detection logic in SIEM and EDR platforms.
+ Your knowledge of automation is clear from your proficiency in any scripting languages such as Python or PowerShell.
+ You have practical experience assessing and defending modern cloud environments.
+ You may hold advanced offensive (e.g., OSCP, OSEP, GXPN) or defensive (e.g., GCIH, GDAT) certifications.
+ You may contribute to the community through public-facing research, conference talks, or open-source tools.
**_Company Benefits and Perks:_**
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
+ Retirement Plans
+ Medical, Dental and Vision Coverage
+ Paid Time Off
+ Paid Parental Leave
+ Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Software Security Architect
Cyber security analyst job in Aguadilla, PR
This role has been designed as 'Hybrid' with an expectation that you will work on average 2 days per week from an HPE office. Who We Are: Hewlett Packard Enterprise is the global edge-to-cloud company advancing the way people live and work. We help companies connect, protect, analyze, and act on their data and applications wherever they live, from edge to cloud, so they can turn insights into outcomes at the speed required to thrive in today's complex world. Our culture thrives on finding new and better ways to accelerate what's next. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good. If you are looking to stretch and grow your career our culture will embrace you. Open up opportunities with HPE.
Job Description:
Job Family Definition:
Designs and develops security programs for software enhancements and new products. Develops solutions for security of software including operating systems, compilers, routers, networks, utilities, databases and Internet-related tools. Determines hardware compatibility and/or influences security hardware design.
Management Level Definition:
Contributions have visible technical impact on a product or major subcomponent. Applies in-depth professional knowledge and innovative ideas to solve complex security problems. Visible contributions improve security posture, time-to-market, , or satisfy current and future unmet customer security needs. Recognized internal authority on key technology area applying innovative principles and ideas. Provides technical security leadership for significant project/program work. Leads or participates in cross-functional initiatives and contributes to mentorship and knowledge sharing across the organization.
Responsibilities:
* Play a critical role in identifying and mitigating potential security risks, collaborating with cross-functional teams and other stakeholders, and maintaining compliance with industry standards and regulations.
* Develops organization-wide security architectures and methodologies for software systems development across multiple platforms in the organization.
* Conduct threat modeling, secure design and risk assessments to proactively identify potential security threats and develop strategies to mitigate them.
* Collaborates with all stakeholders like product management and engineering teams to integrate security into all stages of design and development for complex products and platforms, including solution design, analysis, coding, testing, and integration.
* Create and evolve security architectural patterns, threat modeling frameworks, and secure coding guidelines.
* Provide guidance and support to product development teams in implementing secure coding practices and security best practices.
* Educating and communicating security information and best practices to other stakeholders at HPE.
* Translate emerging threats into actionable guidance for engineering and product teams.
* Represent HPE at industry events and conferences as a product security subject matter expert.
* Provides guidance and mentoring to less- experienced staff members.
Education and Experience Required:
* Bachelor's or Master's degree in Computer Science, Information Systems, or equivalent.
* Typically 10+ years experience in a security role .
Knowledge and Skills:
* Experience designing and developing secure software systems design tools and languages.
* Excellent analytical and problem-solving skills.
* Experience in overall architecture of software systems for products and solutions.
* Experience in cloud security technologies.
* Experience in common security vulnerability classes and taxonomies.
* Experience in security constructs in programming languages like python, java, go, and C.
* Excellent written and verbal communication skills; mastery in English and local language. Ability to effectively communicate product architectures, design proposals and negotiate options at senior management levels.
* History of innovation with multiple patents or deployed solutions in the field of software design.
* Excellent written and verbal communication skills; mastery in English and local language.
* Ability to effectively communicate product architectures, design proposals and negotiate options at business unit and executive levels.
Additional Skills:
Cloud Architectures, Cross Domain Knowledge, Design Thinking, Development Fundamentals, DevOps, Distributed Computing, Microservices Fluency, Full Stack Development, Security-First Mindset, Solutions Design, Testing & Automation, User Experience (UX)
What We Can Offer You:
Health & Wellbeing
We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
Personal & Professional Development
We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
Unconditional Inclusion
We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know varied backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
Let's Stay Connected:
Follow @HPECareers on Instagram to see the latest on people, culture and tech at HPE.
#puertorico
#networking
Job:
Engineering
Job Level:
TCP_05
HPE is an Equal Employment Opportunity/ Veterans/Disabled/LGBT employer. We do not discriminate on the basis of race, gender, or any other protected category, and all decisions we make are made on the basis of qualifications, merit, and business need. Our goal is to be one global team that is representative of our customers, in an inclusive environment where we can continue to innovate and grow together. Please click here: Equal Employment Opportunity.
Hewlett Packard Enterprise is EEO Protected Veteran/ Individual with Disabilities.
HPE will comply with all applicable laws related to employer use of arrest and conviction records, including laws requiring employers to consider for employment qualified applicants with criminal histories.
Auto-ApplyEngineer, Information Security and Risk
Cyber security analyst job in San Juan, PR
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Sr. Security Consultant - Penetration Testing
Cyber security analyst job in San Juan, PR
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Senior Security Consultant - Penetration Testing is a critical role within Stratascale's Adversarial Operations team who will assist in leading and supporting the development and delivery of a diverse range of continuous threat and exposure management consulting, penetration testing, and operational service programs to a portfolio of our clients.
This position is remote with a Home Office setup as determined by Stratascale management.
**Role Description**
+ Perform penetration testing against complex environments covering both external, internal, web application, and other forms of offensive security engagements.
+ Consult and document attack surface, threats, and vulnerability improvements based on team's overall assessment of client's environment.
+ Perform full assessment and threat modeling against industry best practices to identify control weaknesses and assess the effectiveness of existing controls.
+ Perform root cause analysis on identified vulnerabilities and attack surface weaknesses to determine technical solutions to be presented to client along with recommendations for remediations.
+ Collaborate with client's security teams to understand mitigation or resolutions for findings discovered by analysts.
+ Review threat intelligence for specific threat vectors that align with client's industry or potentially impacted by to utilize in attack path modeling.
+ Assist in defining, measuring, and quantifying business risk and vulnerability impacts to clients their stakeholders.
+ Provide subject matter expertise and technical support on remediation, cloud security, governance, compliance, and core infrastructure systems.
+ Assist customers with strategies, use of platforms, technical and compliance analysis, and implementing automation.
+ Develop and deliver governance models, security frameworks, compliance reporting, and security assessments.
+ Collaborate with internal sales and technical teams to support the solution sales cycle, qualify opportunities, and ensure successful solution delivery.
+ Identify customer needs and requirements, recommend appropriate solutions, and proactively identify areas for improvement.
+ Execute consulting projects by creating and completing deliverables, ensuring client needs and practice obligations are met.
+ Develop and deliver training content, curricula, and workforce development programs, including in-person and remote sessions.
+ Participate in customer and internal meetings, providing technical guidance and facilitating discussions.
+ Stay educated on new product technologies, industry trends, and emerging capabilities within the practice.
+ Develop and optimize cross practice capabilities, collaborate with peer practice leaders, and mentor other consultants.
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Expertise in planning, executing, and leading penetration tests across networks, web and mobile applications, APIs, wireless, and cloud environments, including scoping, rules of engagement, and debriefs. - Intermediate
+ Proficiency with offensive security methodologies and frameworks such as PTES, OWASP (WSTG/MASVS/ASVS), MITRE ATT&CK, and threat modeling to drive risk-based testing. - Intermediate
+ Deep hands-on experience with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation, post-exploitation, lateral movement, and data exfiltration, along with strong operational security practices. - Intermediate
+ Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific remediation guidance. - Intermediate
+ Strong web application testing skills including auth flows, access control, injection, deserialization, SSRF, XXE, business logic abuse, and modern app architectures (SPAs, microservices, GraphQL, WebSockets). - Intermediate
+ Working knowledge of Active Directory and Azure AD attack paths (Kerberoasting, constrained/unconstrained delegation, ACL abuses, LAPS/MAPS, certificate services), and the ability to simulate realistic enterprise attack chains. - Intermediate
+ Proficiency with social engineering and phishing engagements, including payload development, infrastructure setup, pretexting, and measurement aligned to customer policies and legal constraints. - Intermediate
+ Competence in scripting and automation to accelerate testing and proof-of-concept development using Python, PowerShell, Bash, and basic Go or JavaScript as needed. - Intermediate
+ Ability to develop clear exploit proofs-of-concept, reproduce vulnerabilities reliably, and validate fixes; familiarity with exploit development fundamentals is a plus. - Intermediate
+ Strong reporting and communication skills, including writing executive summaries and technical reports with reproducible steps, risk ratings, and actionable remediation, and presenting findings to both technical and non-technical stakeholders. - Intermediate
+ Experience collaborating in red/purple team exercises, working with blue teams, and translating findings into detection and hardening recommendations (e.g., SIEM detections, EDR tuning, hardening baselines). - Intermediate
+ Familiarity with vulnerability management workflows, responsible disclosure practices, and integration of pen test results into remediation programs and retesting cycles. - Intermediate
+ Proficiency with productivity and documentation tools such as Word, Excel, PowerPoint, and Outlook to efficiently produce statements of work, test plans, and final reports. - Intermediate
**Other Requirements**
+ Completed Bachelor's Degree in a related field or relevant work experience required
+ 5-7 years of hands-on penetration testing/red team experience delivering engagements for mid-to-large enterprises, including leading complex assessments.
+ Ability to travel to SHI, Partner, Customer events, and on-site testing engagements as needed.
+ Advanced industry certifications preferred (e.g., OSCP, OSEP, OSWE, GXPN, GPEN, CRTO, CRTP, PNPT; CISSP or CSSLP a plus).
+ Demonstrated understanding of legal/ethical considerations, testing authorization, and safe handling of client data
The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Consulting Security Engineer
Cyber security analyst job in San Juan, PR
As a key member of Oracle Cloud Infrastructure's (OCI) Security Organization, you will play a critical role in safeguarding the cloud and broader enterprise from adversaries and insider threats. As our team continues to grow and expand into ambitious new initiatives, we seek a **Consulting Security Engineer** to lead and contribute to critical security engineering imperatives.
In this highly visible role within the OCI and Infrastructure Security, you will research, innovate on, and design engineering/ process solutions. You will tackle broad security initiatives across cloud, product, and infrastructure security topics such as AI, Hardware, Network, Cryptography. You will partner closely with Cloud Security leadership and collaborate across OCI and broader Oracle business operations and leadership teams to drive security excellence.
Success in this role requires a results-driven, self-starter with a strong sense of ownership, accountability, and the ability to influence and engage with senior security and technology leaders and their engineering teams. The ideal candidate brings deep expertise in security engineering, networking, and cloud computing. Strong executive communication, stakeholder engagement, attention to detail, and problem-solving capabilities are essential to thrive in this role. This is a high-impact, strategic position that offers the opportunity to shape the future of OCI and make a lasting impact across the cloud security ecosystem.
**Responsibilities**
Key Responsibilities:
+ **Security Deep Dive** : Investigate the security posture, controls, and risks associated with complex architectures and lifecycle management.
+ **Security Innovation** : Drive security innovation across legacy and nascent product and cloud services.
+ **Data-Driven Decision Making** : Analyze and interpret complex datasets using scripts, Python, or other analytics tools to identify trends, generate insights, and provide actionable recommendations to leadership.
+ **Global Stakeholder Collaboration** : Establish strong relationships with cross-functional partners and senior leadership to align cybersecurity initiatives with business objectives.
+ **Cross-Functional Communication** : Facilitate clear, concise communication across teams, ensuring alignment on key priorities and enabling effective decision-making at all levels.
+ **Executive Reporting & Presentations** : Develop high-impact reports, dashboards, and presentations tailored for senior leadership, ensuring clarity, professionalism, and strategic insight.
+ **Strategic Planning & Execution** : Define project requirements, establish roadmaps, and manage execution for complex cybersecurity programs, balancing long-term strategy with immediate business needs.
+ **Issue & Risk Management** : Identify, assess, and mitigate program risks and blockers, ensuring continued progress toward cybersecurity and operational goals.
+ **Security Program Oversight** : Oversee multiple security initiatives, ensuring alignment with organizational security objectives and compliance requirements.
+ **Problem Solving & Critical Thinking** : Leverage data-driven methodologies to solve complex business and technical challenges, optimizing cybersecurity operations for effectiveness and efficiency.
+ **AI Enablement** : Help innovate and drive AI capabilities to streamline security operations and create security insights.
+ **Security Tooling:** Collaborate with cross-functional teams to enhance security tooling, CI/CD pipelines and tools, ensuring alignment with OCI's cloud strategy and compliance requirements.
+ **Industry Policies:** Partner with stakeholders to define and implement policies that align with industry best practices and compliance standards.
+ **Security by Default:** Implement closed-loop mechanisms to continuously improve security by default. Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate security policies and procedures.
+ **Emerging Security Trends:** Stay informed about emerging technologies and industry trends, integrating new software solutions to strengthen risk reduction strategies.
+ **Security Mentoring:** Guide and mentor junior security team members.
Additionally:
Responsible for expert planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures.
Evaluates existing and proposed technical architectures for security risk, provides expert technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling.
Provides expert technical advice and direction to support the design and development of secure architectures.
Maintain expert proficiency in emerging trends in information security.
Determine the best practices for the large-scale Big Data infrastructure used by some Oracle LOBs, including tooling, data architecture, and content.
May lead incident management teams and provide expert level incident management expertise. Coordinates incidents with other business units and may act as incident commander of multiple serious incidents. Leads development of new methods, playbooks and provide thought-leadership related to incident management throughout Oracle.
May provide leadership in an incident management team, bringing expert-level skills to respond to security events in line with Oracle incident response playbooks. Investigates purported intrusions and breaches, and oversees root cause analysis. Coordinates incidents with other business units and may act as Incident Commander on multiple serious incidents. Leads development of new methods, and playbooks, as well as highly sophisticated scripts, applications, and tools. Trains and mentors other staff, and may supervise incident management teams.
Brings expert-level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required, but no computer programming/scripting knowledge is required. Leads development of highly sophisticated scripts, applications, and tools, and trains others in their use.
Focus on operational and strategic level tasks, and provide counsel and guidance to the junior level security operations engineers in the department.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $120,100 to $251,600 per annum. May be eligible for bonus, equity, and compensation deferral.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC5
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Principal Security Architect
Cyber security analyst job in San Juan, PR
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Principal Security Consultant for Security Architecture is a client-facing leader within SHI Services Cybersecurity Business Unit. This role partners with Client Advisors, Cybersecurity Advisors, other Principal Security Consultants, and subject matter experts to design and deliver service-centric solutions that address client security needs.
You will engage with enterprise clients to uncover, develop, and win security services opportunities-both project-based professional services and managed services-by building strong relationships at technical, architectural, and executive levels. Acting as a trusted advisor, you will consult with stakeholders on security products and services to enable business objectives and mitigate risk.
**Role Description**
+ Lead client engagements with autonomy, driving pre-sales activities including scope definition, deliverables, timelines, and level-of-effort estimates.
+ Develop Statements of Work (SOWs), create templates, and align client needs with existing offerings while tailoring solutions as required.
+ Define best practices, strategies, and methodologies for new cybersecurity service offerings; collaborate with delivery teams to ensure seamless execution.
+ Build intellectual property for SHI Services through new evaluation capabilities, prescriptive approaches, automation frameworks, and strategic initiatives.
+ Drive gross margin through professional services and product sales, contributing to business unit goals.
+ Own client engagement for new opportunities-discover, defend, and acquire business through proactive relationship building.
+ Collaborate with sales teams to develop and execute strategies for top prospects and expand existing accounts.
+ Engage with multiple organizational levels, including CISO, CIO, CTO, IT Directors, and Architects.
+ Deliver product and service education through demos, training, and solution deep dives.
+ Mentor consultants, analysts, and engineers to elevate delivery quality and team expertise.
+ Maintain ongoing learning of SHI Services security offerings and industry trends.
**Behaviors and Competencies**
+ Initiative: Can lead strategic and complex initiatives, inspire others to take initiative, and foster a culture of continuous improvement.
+ Communication: Can lead and model exceptional communication at all levels of the organization, develop and implement communication strategies, and coach others to improve their communication skills.
+ Customer Service: Can lead strategic customer service initiatives, inspire others to prioritize customer service, and foster a culture of continuous customer service improvement.
+ Research: Can lead strategic research initiatives, inspire others to prioritize effective research, and foster a culture of continuous learning and knowledge expansion.
+ Organization: Can design and implement efficient organizational structures and processes, mentor others in organizational skills, and lead by example in maintaining high standards of organization.
+ Self-Motivation: Can lead strategic self-improvement initiatives, inspire others to be self-motivated, and foster a culture of continuous self-improvement.
+ Adaptability: Can drive strategic transformations, inspire others to embrace change, and foster a culture of continuous adaptation.
+ Time Management: Can consistently achieve goals ahead of schedule, lead team efforts in time management, and strategize the best ways to use time for various tasks.
+ Detail-Oriented: Can foster a culture of detail orientation, inspiring others to maintain high standards of accuracy and completeness in their work.
+ Analytical Thinking: Can lead and innovate in the application of analytical thinking, solve complex problems, influence others, and contribute to best practices.
**Skill Level Requirements**
+ The ability to understand customer needs, provide tailored solutions, and build strong, long-term customer relationships through a consultative approach. - Expert
+ The skill of securely handling sensitive data, ensuring privacy and compliance with data protection regulations. - Expert
+ The ability to effectively utilize applications like Word, Excel, PowerPoint, and Outlook to enhance productivity and perform various tasks efficiently. - Expert
+ Comprehension of the inner workings of a company, including its market positioning, competitive dynamics, and operational processes, to inform decision-making and drive sustainable growth. - Expert
+ Ability to oversee and direct projects to completion, ensuring goals are met, resources are utilized efficiently, and stakeholders are satisfied. - Expert
+ Strong passion for technology and cybersecurity.
+ Exceptional written and verbal communication skills; ability to build trust with clients and partners.
+ Proven ability to lead complex technical sales cycles and influence stakeholders at all levels.
+ Expertise in security solutions such as:
+ **Network & Endpoint Security:** Firewalls, EDR/EPP, NAC, MDM
+ **Cloud & Container Security**
+ **Identity & Access Management:** IAM, MFA, SSO, CASB, PAM
+ **Security Analytics & Automation:** SIEM, SOAR, Zero Trust
+ **Specialized Domains:** IoT/ICS/OT Security
+ Familiarity with security service engagements, including:
+ Maturity assessments, SASE assessments, firewall reviews
+ Red/Blue/Purple team exercises, policy development
+ Security tool rationalization and implementation services
+ Entrepreneurial mindset with strong problem-solving and negotiation skills.
+ Ability to simplify complex concepts for diverse audiences, including C-Suite executives.
+ Excellent presentation skills and confidence in leading client discussions.
**Other Requirements**
+ Completed Bachelor's Degree or relevant work experience required
+ 10+ years of experience in a similar role
+ Advanced certification in a relevant technical area required
+ Ability to travel 10%
The estimated annual pay range for this position is $210,000 - $300,000, which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
\#LI-FF1
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status