Cyber Security Operations Analyst
Cyber security analyst job in Tulsa, OK
The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.)
DUTIES AND RESPONSIBILITIES
The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary.
1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action.
2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies.
3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team.
4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking.
5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting.
6. Assists with internal and external audits by collecting necessary documentation and evidence.
7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles.
8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs.
9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance.
10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists.
11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions.
12. Participates in a scheduled on-call rotation for after-hours and weekend security support.
REQUIREMENTS
* Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress).
Knowledge, Skills and Abilities
* Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company.
* Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements.
* Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration.
* Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools.
* Knowledge of TSA security requirements and regulations.
* Knowledge of identity management processes and procedures.
* Skill in project management.
* Ability to manage, track and analyze information.
* Ability to effectively work and cooperate with supervisors, co-workers, and vendors.
* Ability to follow corporate policies and the directions of supervisors.
* Ability to refrain from causing or contributing to the disruption of the workplace.
Cyber Threat Analyst
Cyber security analyst job in Oklahoma City, OK
**Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)**
Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
Defense MRB Approval Analysis
Cyber security analyst job in Wichita, KS
At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.
This role is at Spirit AeroSystems, Inc., a wholly owned subsidiary of The Boeing Company, at Spirit's Defense Business Unit ("Spirit Defense"). Spirit Defense is an independent supplier to the defense and space marketplace. Through innovative engineering and rapid prototyping excellence, Spirit Defense provides the capabilities, technologies and support customers need to succeed in their missions.
Key Accountabilities:
* Performs analysis to identify and evaluate the quality of non conformance notifications and to verify or validate compliance with Quality Management System requirements, applicable company procedures, contract requirements, or government regulations.
* Verify and take actions required to confirm customer contractual requirements are met for dispositioning and reviewing non conformances as a delegated member of the Material Review Board (MRB) such as requirements for corrective action, structurally and functionally
* Use as is dispositions, acceptable rework/repair, and suspected delivered discrepancies.
* Monitor/Audit MRB crib inventory records and ensure actions are taken by crib owners to ensure compliance.
* Monitor and maintain quality notification records to prevent aging.
Required Qualifications:
* Candidates must be able to obtain and maintain a DoD security clearance
* 5 years experience in Quality
* Read/Write Airplane Coordinates
* Understand RCCA
* Production and assembly knowledge
* Can do Attitude
* Industry Experience
* HS Diploma or GED
Preferred Qualifications:
* Successful candidates must be able to secure Program access approval
* Bachelor's Degree
* Auditing Skills
Union:
This is a union-represented position.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary Pay Range: $59,400 - $91,100
Kansas Tax Credit: Join Spirit AeroSystems' Kansas team and you may be eligible for a $5,000 state of Kansas Aviation tax credit for up to five years. Click here for more information on the tax credit.
Export Control Requirements:
Export Control Requirements: This position must meet export control compliance requirements. To meet export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. §120.15 is required. "U.S. Person" includes U.S. Citizen, lawful permanent resident, refugee, or asylee.
Equal Opportunity Employer
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
Read more Shows the full job description for sighted users
Apply Now Save JobRemove Job
Cyber Security Risk & Compliance Analyst
Cyber security analyst job in Manhattan, KS
The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p...
* 520805
* Manhattan, Kansas, United States
* Division of Info Tech
* Staff Full Time (Unclassified - Regular)
* Closing on: Jan 31 2026
* On-site
Add to favorites View favorites
About This Role
The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture.
About Us
The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution.
Worksite Description
This position is On-site.
What You'll Need to Succeed
Minimum Qualifications:
* Requires a bachelor's degree and two years of relevant experience
Preferred Qualifications:
* 3-5 years of experience in compliance, audit, or risk management
* Strong knowledge of regulatory frameworks and standards
* Experience with GRC platforms
* Understanding of risk assessment methodologies
* Excellent written and verbal communication skills
* Experience with audit processes and evidence collection
* Knowledge of cybersecurity frameworks (NIST, ISO 27001)
* Compliance or risk management certifications (CISA, CRISC, CISM)
* Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc)
* Knowledge of business process mapping and documentation
* Experience with policy management systems
* Understanding of legal and regulatory research
Additional Role Information:
* Occasional after-hours work for incident response or change management work in designated maintenance windows
* Participation in on-call rotation (applicable positions)
* Occasional travel required for training, conferences, or other events
Sponsorship eligibility:
Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship
How to Apply
Please submit the following documents:
* Resume
* Cover Letter
* Three Professional References
Application Window
Applications close on: January 31, 2026
Anticipated Hiring Pay Range
$61,591-$70,000
frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_2dca1e396ec8ae7afb704142b6b8ab6b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/2dca1e396ec8ae7afb704142b6b8ab6b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1">
frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_c0d64716b16e90313d8327ce9bb0af04" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/c0d64716b16e90313d8327ce9bb0af04?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3">
frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_7d751c6b5967126ac4d8c55b815f613b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/7d751c6b5967126ac4d8c55b815f613b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5">
You may also be interested in
Grant Specialist
Other Agricultural Experiment Statn
International Student and Scholar Coordinator
Manhattan International Programs
Research Associate
Manhattan Carl Melinda Helwig Dpt BioAgE
Why Join Us:
Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page.
Work Authorization:
Applicants must be currently authorized to work in the United States at the time of employment.
Equal Employment Opportunity:
Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran.
Remote and Hybrid work options:
Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho.
Background Screening Statement:
Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy.
Interview Preferences:
Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview.
The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas.
* Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university.
To learn more about interview preferences at K-State, please visit our interview preferences page.
frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_b63d88fbc8447ba82fcff7e6eacf09b0" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/b63d88fbc8447ba82fcff7e6eacf09b0?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
Network Security Analyst
Cyber security analyst job in Wichita, KS
SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise.
We guarantee you the best rate for your skills and performance.
Job Description
Position: Network Security Analyst( Citizens and Authorised to work in the US only)
Location: Wichita, KS (Locals preferred)
Employment: Contract to hire/Full time
Salary - DOE
Job Functions
Resolve trouble tickets and respond to alerts generated by monitoring systems
Design and implement network and security solutions
Participate in cross-discipline troubleshooting for high visibility or complex issues
Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet
Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks
Job Requirements
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment.
2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention.
Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP
Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements
Must have excellent communication skills.
***NO REMOTE WORK***
Qualifications
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
Additional Information
Shibu
************
Senior Analyst, Security Compliance (SOX IT)
Cyber security analyst job in Topeka, KS
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Cyber Security Engineer
Cyber security analyst job in Leavenworth, KS
Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS. For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
* Maintains the appropriate operational security posture and documentation for MCTSP information systems
* Implementing DoD, Army, ARNG, and MCTSP information security policies
* Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections
* RMF document and artifact management
* Managing and tracking the IAVM system
* Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures.
Requirements
What you'll need to have to join our award-winning team:
* Clearance: Must possess and maintain an active Secret Clearance.
* Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience.
* IAT II Certification
* 3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems.
* 3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises;
* 5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises
Why You'll Love this Job:
* Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission.
* You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge.
* Daily opportunities to develop new skills
* Team environment
What We Can Offer You:
* Compensation
* Health & Wellbeing
* We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
* Personal & Professional Development
* We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
* Diversity, Inclusion & Belonging
* We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
* Benefits
* Healthcare (medical, dental, vision, prescription drugs)
* Pet Insurance
* 401(k) savings plan
* Paid Time Off (PTO)
* Holiday pay opportunities
* Basic life insurance
* AD&D insurance
* Company-paid Short-Term and Long-Term Disability
* Employee Assistance Program
* Tuition Support Options
* Identity Theft Program
Principal Security Engineer
Cyber security analyst job in Kansas
Our vision for the future is based on the idea that transforming financial lives starts by giving our people the freedom to transform their own. We have a flexible work environment, and fluid career paths. We not only encourage but celebrate internal mobility. We also recognize the importance of purpose, well-being, and work-life balance. Within Empower and our communities, we work hard to create a welcoming and inclusive environment, and our associates dedicate thousands of hours to volunteering for causes that matter most to them.
Chart your own path and grow your career while helping more customers achieve financial freedom. Empower Yourself.
***Applicants must be authorized to work for any employer in the U.S. We are unable to sponsor or take over sponsorship of an employment visa at this time, including CPT/OPT.***
The Information Security Principal Engineer is responsible for contributing to, and strengthening, the corporate Information Security program. This is a technical position that requires knowledge of security industry standards, the ability to establish and audit security operational functions, and the ability to provide technical security recommendations and/or solutions. This position develops, updates, documents, and maintains security standards and policies for the organization. This position assists in ensuring that secure computing practices are established and communicated throughout the organization, and that the business is conducted in accordance with established guidelines and regulatory requirements. This position also contributes to security due diligence assessments on current and prospective vendors and products
What you will do:
Lead major cybersecurity incidents from detection through containment, eradication, recovery, and post-incident review; including participating in on-call rotation.
Serve as the top escalation point for complex, high-severity incidents, ensuring rapid and effective resolution.
Develop, maintain, and optimize incident response playbooks, runbooks, and escalation procedures.
Oversee enterprise-wide monitoring of networks, cloud, and endpoints for threats, vulnerabilities, and anomalous activity.
Advance detection capabilities using EDR, SIEM, and behavioral analytics aligned with MITRE ATT&CK. Act as subject matter expert on EDR and SIEM.
Design and implement automation frameworks (Python, PowerShell, AWS Lambda) to streamline response workflows and reduce manual effort.
Integrate AI/ML models into security monitoring and response processes for enhanced detection accuracy and prioritization.
Conduct forensic investigations and threat hunting to identify root causes and emerging threat patterns.
Collaborate cross-functionally with infrastructure, application, and network teams to enforce secure configurations and compliance.
Mentor and guide incident response analysts, fostering technical growth and operational excellence.
Communicate effectively with executives and technical teams during and after incidents, producing clear reports and recommendations.
Drive continuous improvement in detection, response, and prevention strategies to strengthen enterprise security posture.
What you will bring:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field
Must have CISSP Certification (Current and active)
6+ years of experience in the realms of enterprise cybersecurity at scale
5+ years of experience with EDR, SIEM, email and network security
3+ years of experience with cloud environment security, scripting/coding
Extensive knowledge of the incident response process and lifecycle, ability to contribute to policy and procedure.
Ability to respond to security alerts/incidents and drive the process start to finish
Ability to use generative AI in day-to-day operations as a force multiplier
Strong technical written and verbal communication skills, ability to document and present details on incidents
Strong analytic skills, able to analyze security incidents for root cause, resolution, lessons learned, and improvements
Excellent communication and leadership skills, with the ability to influence across technical and executive teams
What will set you apart:
Additional certifications (SANS, GIAC, CCSP, AWS, CEH, OSCP, etc)
Experience in a DevSecOps environment (Infrastructure as code, Terraform, Git)
Experience developing automation frameworks leveraging scripting languages (Python, PowerShell, Bash) and serverless technologies (e.g., AWS Lambda) to accelerate response workflows and reduce manual effort.
Experience automating repetitive tasks such as enrichment, correlation, containment.
Ability to integrate AI and machine learning models into security monitoring and response workflows to improve detection accuracy, reduce false positives, and prioritize threats.
Ability to create AI-driven anomaly detection, behavioral analysis, and natural language processing for log analysis, phishing detection, and threat intelligence enrichment.
Strong Linux, Windows, Network, Database skills
Experience with technical leadership
Experience as a security specialist in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI
This is not intended to be an exhaustive list of all duties, responsibilities and qualifications of the job. The employer has the right to revise this at any time. You will be evaluated in part based on your performance of the responsibilities and/or tasks listed in this . You may be required perform other duties that are not included on this . The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason.
What we offer you
We offer an array of diverse and inclusive benefits regardless of where you are in your career. We believe that providing our employees with the means to lead healthy balanced lives results in the best possible work performance.
Medical, dental, vision and life insurance
Retirement savings - 401(k) plan with generous company matching contributions (up to 6%), financial advisory services, potential company discretionary contribution, and a broad investment lineup
Tuition reimbursement up to $5,250/year
Business-casual environment that includes the option to wear jeans
Generous paid time off upon hire - including a paid time off program plus ten paid company holidays and three floating holidays each calendar year
Paid volunteer time - 16 hours per calendar year
Leave of absence programs - including paid parental leave, paid short- and long-term disability, and Family and Medical Leave (FMLA)
Business Resource Groups (BRGs) - BRGs facilitate inclusion and collaboration across our business internally and throughout the communities where we live, work and play. BRGs are open to all.
Base Salary Range
$138,000.00 - $200,100.00
The salary range above shows the typical minimum to maximum base salary range for this position in the location listed. Non-sales positions have the opportunity to participate in a bonus program. Sales positions are eligible for sales incentives, and in some instances a bonus plan, whereby total compensation may far exceed base salary depending on individual performance. Actual compensation offered may vary from posted hiring range based upon geographic location, work experience, education, licensure requirements and/or skill level and will be finalized at the time of offer.
Equal opportunity employer
•
Drug-free workplace
We are an equal opportunity employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to age (40 and over), race, color, national origin, ancestry, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, religion, physical or mental disability, military or veteran status, genetic information, or any other status protected by applicable state or local law.
***For remote and hybrid positions you will be required to provide reliable high-speed internet with a wired connection as well as a place in your home to work with limited disruption. You must have reliable connectivity from an internet service provider that is fiber, cable or DSL internet. Other necessary computer equipment, will be provided. You may be required to work in the office if you do not have an adequate home work environment and the required internet connection.***
Job Posting End Date at 12:01 am on:
12-20-2025
Want the latest money news and views shaping how we live, work and play? Sign up for Empower's free newsletter and check out The Currency.
Auto-ApplyCyber Security Engineer - Illumio SME
Cyber security analyst job in McConnell Air Force Base, KS
The Cyber Security Engineer - Illumio SME provides technical implementation, support, and training services for Illumio on NIPR and SIPR networks. Plans and implements security measures to protect computer systems, networks, and data from loss and service interruptions. Analyzes and documents security risks, breaches, and other cyber security incidents and the damage they cause. Develops and implements a network disaster recovery plan and oversees the monitoring of the computer networks for security issues. Collaborates with the security team to perform tests and find network weaknesses. Researches and keeps current on the latest IT intelligence technologies, trends, and security standards. Performs work under general supervision. Handles moderately complex issues and problems and refers more complex issues to higher-level staff. Possesses solid working knowledge of subject matter
**Responsibilities**
**Tasks include but are not limited to:**
+ Conduct research, documentation, and testing for architecture/system redesign
+ Support system transitions and integration into new infrastructure
+ Assist throughout the acquisition life cycle
+ Support engineering and design for change initiatives
+ Provide administration, maintenance, and configuration of infrastructure
+ Assist with TCTO development, review, and implementation
+ Support Information Assurance (IA) assessments and remediation
+ Support AFIN Cyber Operational Readiness Assessments (CORA)
+ SMEs may be cross-leveraged across programs as directed by the PMO
+ Status updates must be provided in the Monthly Status Report (MSR)
**Post-Deployment Support**
+ Provide ongoing system administration and maintenance to ensure secure and effective operation of deployed systems to include routine tasks and responsive support, performed locally or remotely as directed.
**Key Support Activities:**
+ User management: Administer user accounts and PINs
+ System installation: Install/reinstall hardware and software per TOs
+ System monitoring: Oversight of alerts, logs, and performance data
+ Troubleshooting & maintenance: Diagnose issues, perform backups, and conduct routine maintenance
**Compliance & reporting:**
+ Ensure systems meet STIG requirements
+ Generate custom/ad-hoc reports and system performance metrics
**Support tasks:**
+ Apply TCTOs/FCOs and support integration/test events
+ Assist with risk/issue identification and provide advisement to users
+ Documentation & configuration:
+ Maintain site-specific system documentation
+ Create/update logical and physical network diagrams
+ Submit baseline change data to the PMO
+ Contractor must travel as directed by the COR
+ Must assist in developing or refining network and security procedures
**Software Installation & Configuration:**
+ Install/reinstall/upgrade the Illumio Policy Compute Engine in a secure, approved configuration
+ Install/reinstall/upgrade Illumio Virtual Enforcement Nodes across AF servers as directed
**Professional Services & Support**
+ Analyze traffic and create security rules for relevant applications
+ Provide project management support and technical advisement to Air Force leadership
+ Deliver in-person, Type 1 "over-the-shoulder" training
+ Trainers guide trainees through real-time hands-on Illumio operations
+ Offer local Tier 3 and Tier 4 support, aligned with IT support level definitions
+ Provide ARC Tier 3 support for Illumio suite
**Virtualization & Lab Support**
+ Build and maintain Open Virtualization Appliances (OVAs)
+ Maintain cyber posture by testing application upgrades/patches in a lab (ITF) environment
+ The ITF should mirror the fielded system to the greatest extent possible
+ Validate system functionality post-patch or upgrade
+ Support TCTO/TO development and validation
**Security Compliance**
+ Maintain Authority to Operate (ATO) status through
+ Applying STIG updates
+ Testing and remediating vulnerabilities
**Qualifications**
+ An active DoD Secret clearance is required for consideration
+ Bachelor's Degree and 4+ years' experience.
+ Microsoft Teams, Microsoft Suite of Tools, Microsoft Office 365
+ 4+ years of hands-on experience in network engineering and firewall management
+ 4+ years of experience with cloud networking and virtualization technologies (e.g. VMware)
+ Subject matter expert on Illumio micro segmentation to provide consulting to customer throughout integration into its service set.
+ Expert skills in required to develop Illumio labeling and policy design
**Certifications:**
+ Illumio Core Expert
+ IAT Level 2 Certification or higher
+ CompTIA Network+ Information Technology Infrastructure Library (ITIL) Foundation certified (v3 or higher)
+ Certified to Information Assurance (IA) Technician (IAT) Level II (DODM 8140)
+ At least one of the following certifications: Network+, A+, Server+, Cloud+, or Linux+ (Network+, Server+, Cloud+ preferred)
**Job ID**
2025-16892
**Work Type**
On-Site
**Company Description**
**Work Where it Matters**
Qivliq Federal Group, an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska.
At Qivliq, the work you do every day makes a difference in the lives of our 15,000 Iñupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States.
**For our shareholders** , Qivliq provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years.
**For our government customers** , Qivliq delivers leading edge IT expertise, ensuring high-performing infrastructure systems in support of complex missions.
**As a Qivliq employee** , you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options.
We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law. If you are an individual with a disability, or have known limitations related to pregnancy, childbirth, or related medical conditions, and would like to request a reasonable accommodation for any part of the employment process, please contact us at ******************** or ************ (information about job applications status is not available at this contact information).
C2ISR Information System Security Officer
Cyber security analyst job in Oklahoma City, OK
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Officer (ISSO) will provide cybersecurity support to Joint Theater Air-to-Ground Simulation Systems (JTAGGS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSO is responsible for ensuring the appropriate operational security posture for information systems and must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include implementation of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. Duties also include physical and environmental protection, personnel security, and incident handling. Coordinate and synchronize security policy guidance with PLEXSYS Facility Security Officer and C2ISR Information System Security Manager (ISSM) and work in close coordination with Partner/Government ISSO/ISSM.
Duties & Responsibilities
Execute on-site information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
May assist in the development and updating of required Authority to Operate (ATO) artifacts
Conduct system audits in accordance with System Security Plan requirements
May be required to conduct maintenance on the networks, systems, and hardware
May be required to perform software upgrades on networks, systems, and hardware
Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 2 years' experience in related field
Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Linux operating systems
Specialized computer training in networking and active directory
Experience with security audits for information systems
Strong communication and problem-solving skill
Ability to work in both a Team environment as well as independently
Must be organized and detail orientated
Current DoD 8570 IAT Level II and IAM Level I or higher certification (i.e. Security + or equivalent certification)
DESIRABLE
Experience with DoD Security Regulations and Policies
Experience with Type 1 and/or Type 2 virtualization platforms
Experience managing system security in an enterprise environment
Strong system documentation skills
Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS)
AUTHORITY
Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership
PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Engineer, Information Security and Risk
Cyber security analyst job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Risk & Compliance Analyst
Cyber security analyst job in Oklahoma City, OK
The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise.
The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment.
Key Result Areas:
Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including:
Develop and maintain enterprise security policies and procedures
Assist in the coordination and completion of information security risk assessments and documentation
Work with information security management to develop strategies and plans to enforce security requirements and address identified risks
Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance
Work with IT department and members of the information security team to identify, select and implement technical controls
Provide direct support to the business and IT staff for security related
Maintain an awareness of security and control issues in emerging technologies
Perform other duties as assigned
Knowledge, skills, and experience required:
Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience
Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.)
Strong analytical and problem-solving skills to enable effective security incident and problem resolution
Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously
Ability to work well under minimal supervision
Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel
Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting
Strong customer/client focus with the ability to manage expectations appropriately
General understanding of risk management
Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC
Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas)
Preferred Qualifications:
Understanding of enterprise risk management systems and automation platforms
Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions
*This position is on-site located in Oklahoma City, must reside within the area to be considered.
*Position requires a minimum of 3 years of relevant US based experience.
#LI-Onsite
#LI-DNI
Engineer, Information Security
Cyber security analyst job in Overland Park, KS
We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision.
If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here.
What You'll Do:
Engineer and operate modern security platforms.
Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies.
Conduct deep-dive security assessments.
Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions.
Strengthen core security operations.
Support and mature processes such as:
Malware response and remediation
Vulnerability management and patch governance
SIEM log analysis, correlation, and monitoring
Incident documentation, reporting, and lifecycle management
Improve systems by design-not by accident.
Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations.
Contribute through data, insights, and experimentation.
Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement.
What Makes This Role Unique:
Technical leadership that “gets it.”
You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves.
Security built on innovation, not stagnation.
Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls.
Access to state-of-the-art platforms.
Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry.
High-rigor environment with real impact.
Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction.
Collaboration with top industry partners.
Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program.
Opportunities for broad domain depth.
Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more.
What You Bring:
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience.
3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus.
Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems.
Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions.
Ability to operate with autonomy, accountability, and comfort in fast-moving environments.
Exceptional communication and collaboration skills with the ability to influence across teams.
Analytical mindset with a high bar for detail, documentation, and operational excellence.
Why Join Us
We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance.
We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building.
Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits.
#LI-JS1
#LI-REMOTE
EOE/M-F/D/V
Auto-ApplySecurity Analyst
Cyber security analyst job in Overland Park, KS
Job Description
About the Role
As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite.
Responsibilities:
Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time.
Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision.
Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients.
Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events.
Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports.
Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture.
Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks.
Qualifications:
Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies.
SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events.
Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes.
Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences.
Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals.
Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats.
Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
Information Security Specialist
Cyber security analyst job in Oklahoma City, OK
At Feed the Children, we recognize the value of outstanding people, and we are looking for compassionate changemakers to join our team. We pride ourselves on cultivating a collaborative workplace where employees experience productive and rewarding employment and feel engaged in our mission to end childhood hunger. Our passionate team shares a deep sense of purpose, and we dream big to solve complex problems and create positive impact in communities around the world.
Feed the Children is recognized by Candid with its Platinum Seal of Transparency and is accredited by the BBB Wise Giving Alliance. The organization has received a 4-star rating from Charity Navigator and is consistently recognized on the Forbes Top 100 Charities list.
We are currently in search of an Information Security Specialist to join our Information Technology team! The Information Security Specialist will investigate, analyze, and learn from cybersecurity researchers, attackers, and incidents to develop durable detective controls across the IT infrastructure. This role will provide support and resolution for scanning, reporting, and vulnerability remediation. This position will collaborate with the Senior Director of Information Security to assist in prioritizing vulnerabilities, planning mitigations, and security control configuration.
NOTE: This is an entry level position working from our corporate office in Oklahoma City, OK.
Salary range: Up to $21.64/hr. based on education and experience.
Job Requirements:
Education
Bachelor's degree in Computer Science, CIS, Engineering, Cybersecurity, or related field preferred. High school diploma or GED required.
Experience
2+ years' experience working with technical and business teams related to information security
Ability to analyze general cyber security-related technical problems and provide basic engineering and technical support in solving these problems.
Familiarity with Azure and Office 365 security suite of tools, to include Microsoft Defender.
Industry-standard knowledge of activities relating to identity and access management, MDR, SIEM, and least privilege access management.
Basic understanding of NIST-specific security assessments.
Aware of the legal, regulatory, and ethical considerations of working with sensitive information
Proactive, self-motivated, well organized, reliable, and detail-oriented team member
Ability to communicate across all levels of the organization with strong organizational skills
Ability to multitask, self-prioritize daily tasks, and experience with task management tools.
Analytical and critical thinking skills, required
Any combination of education, training and experience which provides the required knowledge, skills and abilities to perform the essential functions of this job may be considered.
Essential Functions:
Execute day-to-day threat hunting for targeted attacks against multiple environments.
Work closely with Information Technology's Director of Data Governance and the Sr. Director of Information Security to make sure identified vulnerabilities are patched and remediated.
Maintain an understanding of security-related IT policies to assess the effectiveness of controls.
Facilitate incident remediation including monitoring Data Loss Prevention (DLP) tools and responding to alerts.
Investigate network threats such as computer viruses, exploits, and malicious attacks to determine true threats, false positives, and network system misconfigurations.
Monitor potential compromise, intrusion, deficiency, significant event or threat to the security posture and provide solutions to issues.
Work within the IT department verifying and validating security compliance against corporate standards, regulatory standards, and other industry defined practices.
Assist with security awareness training of employees, as needed.
Champion the NIST 800-53 program, documenting policies and procedures as well as performing audits, risk assessments and implementation reviews.
Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; monitoring information security news for emerging threats; and participating in professional organizations.
Document specific activities, problems solved, and issues resolved.
Protect our organization by keeping information confidential.
Collaborate cross-functionally throughout the organization to safeguard sensitive information from potential insider risks and threat actors.
Develop, update, and maintain policies and other technical documentation
Establish an environment of high performance and continuous improvement that values learning, a commitment to quality, welcomes and encourages collaboration, and fosters both intra and inter-departmental dialogue and respect.
Model the type and level of behavior, professionalism and leadership that is in accordance with the values of the organization.
Perform other related duties as required
About Feed the Children:
As a leading anti-hunger organization, Feed the Children is committed to ending childhood hunger. We provide children and families in the U.S. and around the world with the food and essentials kids need to grow and thrive.
Through our programs and partnerships, we feed children today while helping their families and communities build resilient futures. In addition to food, we distribute household and personal care items across the United States to help parents and caregivers maintain stable, food-secure households. Internationally, we expand access to nutritious meals, safe water, improved hygiene, and training in sustainable living. Responsible stewards of our resources, we are driven to pursue innovative, holistic, and child-focused solutions to the complex challenges of hunger, food insecurity, and poverty.
For children everywhere, we believe that having enough to eat is a fundamental right.
Our Values:
We are driven by a shared sense of PURPOSE
At Feed the Children, our commitment to the mission is at the heart of what we do and fuels our collective impact in the communities where we serve.
We cannot achieve our bold vision without our talented PEOPLE
We are passionate about fostering a best-in-class workforce that is engaged, respected, and empowered to deliver results.
We believe in CURIOSITY and continued learning
Success requires a culture of discovery, curiosity and continued learning to expand our knowledge, seek new perspectives and challenge the status quo.
We know COLLABORATION is the only way to end childhood hunger
We cannot succeed alone. It will take all of us - our employees, donors, partners, volunteers - working together to accomplish our ambitious goals.
We DREAM big
When we work together, we collectively reimagine what is possible. We dream big to solve complex problems and create deep impact in communities around the world.
We VALUE every donor
We respect our donors' intentions and promote responsible stewardship of the resources they entrust to us.
Join Feed the Children and help create a world where no child goes to bed hungry.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
Feed the Children is an equal opportunity employer. All qualified candidates will receive consideration for positions without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, political affiliation, pregnancy, military and/or veterans' status, genetic characteristics, marital status or any other considerations made unlawful by applicable state, federal, or local law. Feed the Children welcomes and encourages applications from persons with physical and mental disabilities and will make every effort to reasonably accommodate the needs of those persons. Additionally, Feed the Children strives to provide an environment free from sexual exploitation and abuse and harassment in all places where relief and development programs are implemented. Feed the Children expects its employees to maintain high ethical standards, protect organizational integrity and reputation, and ensure that Feed the Children work is carried out in honest and fair methods, in alignment with the Feed the Children safeguarding and associated policies.
Security Engineer II
Cyber security analyst job in Topeka, KS
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Security Engineer
Cyber security analyst job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyNetwork Security Analyst
Cyber security analyst job in Wichita, KS
SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise.
We guarantee you the best rate for your skills and performance.
Job Description
Position: Network Security Analyst( Citizens and Authorised to work in the US only)
Location: Wichita, KS (Locals preferred)
Employment: Contract to hire/Full time
Salary - DOE
Job Functions
Resolve trouble tickets and respond to alerts generated by monitoring systems
Design and implement network and security solutions
Participate in cross-discipline troubleshooting for high visibility or complex issues
Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet
Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks
Job Requirements
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment.
2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention.
Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP
Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements
Must have excellent communication skills.
***NO REMOTE WORK***
Qualifications
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
Additional Information
Shibu
************
Cyber Security Engineer
Cyber security analyst job in Beverly, KS
Job DescriptionDescription:
Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
Maintains the appropriate operational security posture and documentation for MCTSP information systems
Implementing DoD, Army, ARNG, and MCTSP information security policies
Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections
RMF document and artifact management
Managing and tracking the IAVM system
Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures.
Requirements:
What you'll need to have to join our award-winning team:
Clearance: Must possess and maintain an active Secret Clearance.
Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience.
IAT II Certification
3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems.
3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises;
5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises
Why You'll Love this Job:
Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission.
You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge.
Daily opportunities to develop new skills
Team environment
What We Can Offer You:
Compensation
Health & Wellbeing
We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
Personal & Professional Development
We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
Diversity, Inclusion & Belonging
We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
Benefits
Healthcare (medical, dental, vision, prescription drugs)
Pet Insurance
401(k) savings plan
Paid Time Off (PTO)
Holiday pay opportunities
Basic life insurance
AD&D insurance
Company-paid Short-Term and Long-Term Disability
Employee Assistance Program
Tuition Support Options
Identity Theft Program
Information Security Specialist
Cyber security analyst job in Oklahoma City, OK
At Feed the Children, we recognize the value of outstanding people, and we are looking for compassionate changemakers to join our team. We pride ourselves on cultivating a collaborative workplace where employees experience productive and rewarding employment and feel engaged in our mission to end childhood hunger. Our passionate team shares a deep sense of purpose, and we dream big to solve complex problems and create positive impact in communities around the world.
Feed the Children is recognized by Candid with its Platinum Seal of Transparency and is accredited by the BBB Wise Giving Alliance. The organization has received a 4-star rating from Charity Navigator and is consistently recognized on the Forbes Top 100 Charities list.
We are currently in search of an Information Security Specialist to join our Information Technology team! The Information Security Specialist will investigate, analyze, and learn from cybersecurity researchers, attackers, and incidents to develop durable detective controls across the IT infrastructure. This role will provide support and resolution for scanning, reporting, and vulnerability remediation. This position will collaborate with the Senior Director of Information Security to assist in prioritizing vulnerabilities, planning mitigations, and security control configuration.
NOTE: This is an entry level position working from our corporate office in Oklahoma City, OK. Salary range: Up to $21.64/hr. based on education and experience.
Job Requirements:
Education
Bachelor's degree in Computer Science, CIS, Engineering, Cybersecurity, or related field preferred. High school diploma or GED required.
Experience
2+ years' experience working with technical and business teams related to information security
Ability to analyze general cyber security-related technical problems and provide basic engineering and technical support in solving these problems.
Familiarity with Azure and Office 365 security suite of tools, to include Microsoft Defender.
Industry-standard knowledge of activities relating to identity and access management, MDR, SIEM, and least privilege access management.
Basic understanding of NIST-specific security assessments.
Aware of the legal, regulatory, and ethical considerations of working with sensitive information
Proactive, self-motivated, well organized, reliable, and detail-oriented team member
Ability to communicate across all levels of the organization with strong organizational skills
Ability to multitask, self-prioritize daily tasks, and experience with task management tools.
Analytical and critical thinking skills, required
Any combination of education, training and experience which provides the required knowledge, skills and abilities to perform the essential functions of this job may be considered.
Essential Functions:
Execute day-to-day threat hunting for targeted attacks against multiple environments.
Work closely with Information Technology's Director of Data Governance and the Sr. Director of Information Security to make sure identified vulnerabilities are patched and remediated.
Maintain an understanding of security-related IT policies to assess the effectiveness of controls.
Facilitate incident remediation including monitoring Data Loss Prevention (DLP) tools and responding to alerts.
Investigate network threats such as computer viruses, exploits, and malicious attacks to determine true threats, false positives, and network system misconfigurations.
Monitor potential compromise, intrusion, deficiency, significant event or threat to the security posture and provide solutions to issues.
Work within the IT department verifying and validating security compliance against corporate standards, regulatory standards, and other industry defined practices.
Assist with security awareness training of employees, as needed.
Champion the NIST 800-53 program, documenting policies and procedures as well as performing audits, risk assessments and implementation reviews.
Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; monitoring information security news for emerging threats; and participating in professional organizations.
Document specific activities, problems solved, and issues resolved.
Protect our organization by keeping information confidential.
Collaborate cross-functionally throughout the organization to safeguard sensitive information from potential insider risks and threat actors.
Develop, update, and maintain policies and other technical documentation
Establish an environment of high performance and continuous improvement that values learning, a commitment to quality, welcomes and encourages collaboration, and fosters both intra and inter-departmental dialogue and respect.
Model the type and level of behavior, professionalism and leadership that is in accordance with the values of the organization.
Perform other related duties as required
About Feed the Children:
As a leading anti-hunger organization, Feed the Children is committed to ending childhood hunger. We provide children and families in the U.S. and around the world with the food and essentials kids need to grow and thrive.
Through our programs and partnerships, we feed children today while helping their families and communities build resilient futures. In addition to food, we distribute household and personal care items across the United States to help parents and caregivers maintain stable, food-secure households. Internationally, we expand access to nutritious meals, safe water, improved hygiene, and training in sustainable living. Responsible stewards of our resources, we are driven to pursue innovative, holistic, and child-focused solutions to the complex challenges of hunger, food insecurity, and poverty.
For children everywhere, we believe that having enough to eat is a fundamental right.
Our Values:
We are driven by a shared sense of PURPOSE
At Feed the Children, our commitment to the mission is at the heart of what we do and fuels our collective impact in the communities where we serve.
We cannot achieve our bold vision without our talented PEOPLE
We are passionate about fostering a best-in-class workforce that is engaged, respected, and empowered to deliver results.
We believe in CURIOSITY and continued learning
Success requires a culture of discovery, curiosity and continued learning to expand our knowledge, seek new perspectives and challenge the status quo.
We know COLLABORATION is the only way to end childhood hunger
We cannot succeed alone. It will take all of us - our employees, donors, partners, volunteers - working together to accomplish our ambitious goals.
We DREAM big
When we work together, we collectively reimagine what is possible. We dream big to solve complex problems and create deep impact in communities around the world.
We VALUE every donor
We respect our donors' intentions and promote responsible stewardship of the resources they entrust to us.
Join Feed the Children and help create a world where no child goes to bed hungry.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
Feed the Children is an equal opportunity employer. All qualified candidates will receive consideration for positions without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, political affiliation, pregnancy, military and/or veterans' status, genetic characteristics, marital status or any other considerations made unlawful by applicable state, federal, or local law. Feed the Children welcomes and encourages applications from persons with physical and mental disabilities and will make every effort to reasonably accommodate the needs of those persons. Additionally, Feed the Children strives to provide an environment free from sexual exploitation and abuse and harassment in all places where relief and development programs are implemented. Feed the Children expects its employees to maintain high ethical standards, protect organizational integrity and reputation, and ensure that Feed the Children work is carried out in honest and fair methods, in alignment with the Feed the Children safeguarding and associated policies.