Post job

Information security analyst jobs in Enid, OK

- 106 jobs
All
Information Security Analyst
Information Security Engineer
Cyber Security Analyst
Information Technology Analyst
Information Security Officer
Information Systems Security Officer
Cyber Security Engineer
Securities Analyst
Director Of Information Technology Security
Information Technology Security Manager
  • Cyber Security Analyst

    Wildfire Talent Solutions

    Information security analyst job in Tulsa, OK

    The Mid-Level Cyber Analyst plays a key role in securing enterprise systems through proactive monitoring, advanced threat analysis, and incident response. The role involves collaboration with IT, engineering, and compliance teams to improve the organization's overall security posture. Key Responsibilities Lead analysis of complex security incidents and drive incident response efforts. Develop detection rules, tuning SIEM use cases, and creating actionable alerts. Conduct vulnerability assessments and partner with infrastructure teams for remediation. Support endpoint detection and response (EDR) and network intrusion detection (NIDS/NIPS) tuning. Perform threat hunting and forensic analysis to identify indicators of compromise (IoCs). Assist in designing and implementing security controls for new technologies or projects. Mentor junior analysts and support continuous process improvement in SOC operations. Qualifications Bachelor's degree in Cybersecurity, Computer Science, or related discipline. Must be a US Citizen or Permanent resident 3-5 years of experience in security operations, incident response, or network defense. Expertise with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and vulnerability management platforms. Knowledge of MITRE ATT&CK framework and common attack vectors. Certifications such as CompTIA CySA+, CEH, GCIH, or CISSP (in progress) preferred. Strong analytical, scripting (Python, PowerShell), and communication skills.
    $65k-88k yearly est. 5d ago
  • Cyber Security Operations Engineer

    Oaktree Staffing

    Information security analyst job in Tulsa, OK

    The CSOC Operations Engineer III position is a technical leader responsible for the tactical execution of incident response, threat detection and continuous improvement of solutions which defend and protect our computer systems, information, and networks from intentional or unintentional access, modification, or destruction. This position is responsible for technical leadership in the design, planning, documenting and support of projects and cyber security solutions for the company. This position needs to intently focus on prioritization and always seek the improvement of processes and tools, providing recommendations to engineering and architecture teams. A successful CSOC Operations Engineer III will have a multidisciplinary background beyond cyber security, with advanced knowledge in fields such as client and server systems, networking, and application development. This position will also be responsible for ensuring systems and processes follow regulatory requirements, such as PCI-DSS, HIPAA and SOX. This position is responsible for the mentorship of other IT staff and performs third level support for incidents and issues. Major functions for this position Cyber Security Incident Response - 15% of total job Lead Cyber Security Incident Response as an incident owner, direct incident response activities, provide real-time decision making and communicate with the incident commander. Function as a threat hunter, working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests and reviewing vulnerability assessments. Continuously develop and improve security technologies, focusing on the development of automation and orchestration capabilities as it relates to incident response. Coordinate documentation of activities during an incident and provide status updates to the incident commander during the life cycle of the incident. Participate in post-mortem collections and after-action reviews to identify and remediate gaps in processes and technologies. Participate in regular table-top sessions with the CSIRT and E-CSIRT teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Cyber Security Infrastructure Operations - 60% of total job Serve as an escalation point for all cyber security infrastructure operational issues during business hours and on-call for junior members of the team. Provide third tier support and subject matter expertise for all cyber security technologies and solutions. Work with the CSOC Principal and Manager to provide the team with tactical direction of operational technology capabilities focused on continuous improvement. Guide Security Engineering with necessary support as needed during IT projects with Cyber Security needs. Ensure project transitions meet CSOC operational standards for needed functionality, prevention, monitoring, detection, and response. Cyber Security Threat Operations - 15% of total job Perform third tier analysis of exploits such as malware, network intrusions, and unauthorized use to help determine attack-surface, patient zero, and possible pivot-points for escalation. Provide technical leadership to the team and guidance in investigating escalated notable/suspicious events and the latest investigation techniques, containment and mitigation methods, evidence handling standards, threat intelligence, playbook development and case documentation best practices. Participate in the Cyber Security Risk Scoring process to include scoring risks, providing remediation or compensating control guidance and risk remediation/mitigation validation. Stay current on monitoring, detection, prevention, analysis, and investigation techniques/tools and adversary techniques, to implement recommendations for improving cyber security event processes, procedures and tooling. Participate in regular technical table-top sessions with the cyber security teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Technical Leadership - 10% of total job Provide leadership and mentoring to IT staff in the following manner. Coordinate or lead necessary training to develop staff. Ensure that appropriate technology is implemented in the appropriate manner. Provide timely and effective communication of changes to processes and technologies. Maintain technical competence and relevance on existing and emerging cyber security, infrastructure, and automation technologies. Conceive, define, develop, and deploy tools/processes which help automate our cyber security technologies to produce higher business value. Help develop cyber security awareness content and provide education on security policies and practices both internal and external to the group. Routinely evaluate documentation provided by Security Engineering staff to ensure complete coverage of required diagrams, support articles, and other necessary documentation. Position Specifications: The required specifications (education, experience, and skills) are those that the employee must have to hold the position. Applicants applying for this position must possess the required specifications in order to be considered for the job. The desired specifications are those that are not required for the employee to hold the position, but the employee should try to obtain the desired education, experience, and/or skills to be effective and successful in the position. Required education: Bachelors in relevant field or the equivalent combination of education and experience. Desired education: Bachelor's degree in Cyber Security or a degree in a technology related field. Multiple industry certifications in Security, Systems Administration, and/or Networking, such as CISSP, GDSA, CCNP Security, or PCNSE. Required experience: Minimum of 8 years of progressive experience with cyber security technology design, administration or incident response in large, complex environments, particularly in multi-region retail. Advanced expertise in cryptography, network defense, endpoint protection, forensics, data protection, and incident response. Advanced understanding of data center technologies and concepts including services, security, infrastructure design, disaster recovery practices. Advanced level troubleshooting of IT systems. In depth knowledge of compliance standards such as HIPAA, PCI, and SOX. Experience mentoring, training, and developing other IT staff. Desired experience: Advanced experience in all aspects of cyber security technologies and knowledge in supporting and building large, complex cyber security environments. Experience planning and implementing a technical backlog to drive continuous improvement of technology and practices. Required skills: Advanced knowledge of multiple cyber security technologies, including next generation firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, data protection, credential vaulting, certificate management, Multi-Factor, access brokering, SIEM, public cloud compliance and Cybersecurity automation and orchestration technologies. Advanced experience in planning and tracking the execution of large and complex projects or other efforts. Experience in scripting or software development. The ability to communicate effectively to both business and IT staff in a professional manner. Desired skills: Working experience with Active Directory and Microsoft and/or Linux OS, networking, identity and access management, wireless networking and security, penetration testing, incident response, and application security methodologies. Understanding of encryption systems and methodology. Advanced experience in software development or secure coding techniques. This position will require shift work that could include weekends and nights as dictated by support needs. On call 24/7. Must have knowledge of many areas and be able to switch between them rapidly. Must be able to work under pressure and provide guidance to Information Technology and business users during a crisis. This position will require ability to maintain absolute confidentiality of information or events due to the sensitivity of their natures.
    $73k-99k yearly est. 2d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline Corporation 4.1company rating

    Information security analyst job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS * Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities * Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. * Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. * Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. * Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. * Knowledge of TSA security requirements and regulations. * Knowledge of identity management processes and procedures. * Skill in project management. * Ability to manage, track and analyze information. * Ability to effectively work and cooperate with supervisors, co-workers, and vendors. * Ability to follow corporate policies and the directions of supervisors. * Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 25d ago
  • Cyber Threat Analyst

    Fortiphi

    Information security analyst job in Oklahoma City, OK

    **Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)** Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
    $65k-88k yearly est. 60d+ ago
  • Engineer, Information Security

    Mariner High School 4.2company rating

    Information security analyst job in Overland Park, KS

    We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience. 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. Why Join Us We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance. We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building. Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits. #LI-JS1 #LI-REMOTE EOE/M-F/D/V
    $99k-125k yearly Auto-Apply 49d ago
  • Information Security Risk & Compliance Analyst

    Midfirst Bank 4.8company rating

    Information security analyst job in Oklahoma City, OK

    The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise. The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment. Key Result Areas: Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including: Develop and maintain enterprise security policies and procedures Assist in the coordination and completion of information security risk assessments and documentation Work with information security management to develop strategies and plans to enforce security requirements and address identified risks Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance Work with IT department and members of the information security team to identify, select and implement technical controls Provide direct support to the business and IT staff for security related Maintain an awareness of security and control issues in emerging technologies Perform other duties as assigned Knowledge, skills, and experience required: Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.) Strong analytical and problem-solving skills to enable effective security incident and problem resolution Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously Ability to work well under minimal supervision Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting Strong customer/client focus with the ability to manage expectations appropriately General understanding of risk management Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas) Preferred Qualifications: Understanding of enterprise risk management systems and automation platforms Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions *This position is on-site located in Oklahoma City, must reside within the area to be considered. *Position requires a minimum of 3 years of relevant US based experience. #LI-Onsite #LI-DNI
    $77k-104k yearly est. 30d ago
  • Cyber Security Risk & Compliance Analyst

    Kansas State University 3.9company rating

    Information security analyst job in Manhattan, KS

    The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p... * 520805 * Manhattan, Kansas, United States * Division of Info Tech * Staff Full Time (Unclassified - Regular) * Closing at: Jan 31 2026 - 23:55 CST * On-site Add to favorites View favorites About This Role The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture. About Us The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution. Worksite Description This position is On-site. What You'll Need to Succeed Minimum Qualifications: * Requires a bachelor's degree and two years of relevant experience Preferred Qualifications: * 3-5 years of experience in compliance, audit, or risk management * Strong knowledge of regulatory frameworks and standards * Experience with GRC platforms * Understanding of risk assessment methodologies * Excellent written and verbal communication skills * Experience with audit processes and evidence collection * Knowledge of cybersecurity frameworks (NIST, ISO 27001) * Compliance or risk management certifications (CISA, CRISC, CISM) * Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc) * Knowledge of business process mapping and documentation * Experience with policy management systems * Understanding of legal and regulatory research Additional Role Information: * Occasional after-hours work for incident response or change management work in designated maintenance windows * Participation in on-call rotation (applicable positions) * Occasional travel required for training, conferences, or other events Sponsorship eligibility: Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship How to Apply Please submit the following documents: * Resume * Cover Letter * Three Professional References Application Window Applications close on: January 31, 2026 Anticipated Hiring Pay Range $61,591-$70,000 frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_4650332558b21669fa83e78563da6196" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/4650332558b21669fa83e78563da6196?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_e47216657db48a486035c815d104c7f6" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/e47216657db48a486035c815d104c7f6?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_58f37b37f84e4a0db98b2ea6a72ad9c2" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/58f37b37f84e4a0db98b2ea6a72ad9c2?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5"> You may also be interested in Assistant/Associate Professor - Wheat Breeding Manhattan Agronomy Fellow (Post Doc) Manhattan Grain Science & Industry Human Resources Manager Manhattan Provost Office Why Join Us: Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page. Work Authorization: Applicants must be currently authorized to work in the United States at the time of employment. Equal Employment Opportunity: Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran. Remote and Hybrid work options: Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho. Relocation to Kansas: Kansas participates in the MakeMyMove program, which connects eligible newcomers with participating communities offering financial incentives, housing support, and local perks to help make your move easier and more rewarding. If relocating you can visit the site apply online for the program incentives. Background Screening Statement: Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy. Interview Preferences: Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview. The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas. * Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university. To learn more about interview preferences at K-State, please visit our interview preferences page. frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_d6dc64c040e23c5cfc1cdfbb292e89db" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/d6dc64c040e23c5cfc1cdfbb292e89db?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
    $61.6k-70k yearly 25d ago
  • Chief Information Security Officer (CISO)

    Buffkin/Baker

    Information security analyst job in Stillwater, OK

    Oklahoma State University Chief Information Security Officer Oklahoma State University invites nominations and applications for the position of Chief Information Security Officer. This position reports directly to the Chief Information Officer. Oklahoma State University (OSU) is a modern land-grant university, fostering student success through a blend of tradition and innovation. OSU's goal is to become the preeminent land-grant institution in the country through its university strategy. Through leadership and service, we are preparing students for a bright future and building a brighter world for all. As a Very High Research Activity institution, OSU improves the lives of people in Oklahoma, the nation, and the world through integrated, high-quality teaching, research, and outreach. OSU has more than 35,000 students across its five-campus system and more than 26,000 on its combined Stillwater and Tulsa campuses, with students from all 50 states and more than 100 nations. Established in 1890, OSU has graduated more than 290,000 students. The Chief Information Security Officer (CISO) provides strategic leadership for the university's comprehensive information security and cybersecurity programs. This position is responsible for protecting the institution's digital assets, research data, student information, and technology infrastructure while enabling academic excellence and research innovation. The CISO reports directly to the Chief Information Officer and serves as a key collaborator to the senior leadership team. Minimum Qualifications: Bachelor's degree and seven years of information security work experience from one or a combination of security architecture and design, security engineering, auditing and compliance, incident response and forensics, security awareness training, and the management of an IT security department. Demonstrated experience managing enterprise-wide security programs in complex distributed environments. Familiarity with Zero Trust architecture principles and enterprise identity governance. Experience in conducting security tabletop exercises or cyber incident simulations; use of cybersecurity maturity models such as NIST CSF Tiers or CMMC. Professional security certifications required (CISSP, CISM, CISA, or equivalent). Excellent written and verbal communication skills with ability to present complex technical concepts to non-technical audiences. Strong leadership and team management capabilities. Knowledge of emerging technologies in higher education (cloud computing, IoT, AI/ML security implications). Preferred Qualifications: Bachelor's degree in computer science, management information systems, computer engineering, or related area. Higher education experience. Deep knowledge of information security frameworks (NIST Cybersecurity Framework, ISO 27001/27002, CIS Controls). Experience with security technologies including SIEM, endpoint protection, network security tools, and cloud security platforms. Knowledge of research security requirements and federal compliance mandates. Experience with security program maturity ssessments and continuous improvement initiatives. While applications and nominations will be accepted until a successful candidate has been appointed, interested parties are encouraged to submit their materials by September 5, 2025 to receive optimal consideration. Applications (letter of interest addressing the qualifications and responsibilities listed above, current resume, and the names, email addresses and telephone numbers of five references) must be submitted to jobs.okstate.edu, req # 492963. For questions, please contact Martin Baker and Chelsie Whitelock at Buffkin/Baker as indicated below: Martin M. Baker, Managing Partner Buffkin/Baker Chelsie Whitelock, Associate Partner ************************ Oklahoma State University (OSU) strives to provide a safe study, work, and living environment for its faculty, staff, volunteers and students. To support this environment and comply with applicable laws and regulations, OSU conducts pre-employment background checks on final candidates. Offers of employment are contingent upon the successful completion of a background check. The type of background check conducted varies by position and can include, but is not limited to, criminal (felony and misdemeanor) history, sex offender registry, motor vehicle history, financial history, and/or education verification. Background checks will be conducted when required by law or contract and when, in the discretion of the university, it is reasonable and prudent to do so. Oklahoma State University, as an equal opportunity employer, complies with all applicable federal and state laws regarding non-discrimination. Oklahoma State University is committed to a policy of equal opportunity for all individuals and does not discriminate based on race, religion, age, sex, color, national origin, marital status, disability, or veteran status with regard to employment, educational programs and activities, and/or admissions. For more information, visit eeo.okstate.edu. To Request Full Profile, Click here.
    $99k-149k yearly est. Easy Apply 60d+ ago
  • IT Security Manager

    True North Consulting 4.4company rating

    Information security analyst job in Overland Park, KS

    This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization ·Ensures consistent and effective security practices ·Establishes appropriate Information Security procedures and governance ·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures ·Manages investigations into identified problematic activity and provides on-going communication with IT senior management ·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division ·Provides centralized guidance and governance of Information Security solutions ·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals ·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk ·Assist with Information Security awareness programs ·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management. ·Participates in annual and long-range planning activities to ensure Information Security needs are addressed Qualifications Must be open to travel approximately 35% of the time. A college degree in MIS, CIS, Business Management, or related field 5+ years of overall Information Security experience 1+ years working on an Information Security implementation team An Information Security industry certification is preferred Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks: CIS Critical Security Controls ISO 27000-series standards NIST SP800-53 and related standards Must have a working knowledge of the following Information Security practices, standards, and systems: Data Loss Prevention (DLP) systems Encryption technologies and standards Endpoint security software Governance, Risk, and Compliance (GRC) systems Identity and Access Management (IAM) Incident response practices Network security (e.g. firewalls, IDS/IPS, VPN, etc.…) Risk assessment practices Security Information Event Management (SIEM) systems Vulnerability management practices and scanning tools Additional Information Solid company with excellent track record of stability,.Great opportunities for growth and learning.
    $102k-138k yearly est. 6h ago
  • Information Security Specialist

    Feed The Children 4.1company rating

    Information security analyst job in Oklahoma City, OK

    At Feed the Children, we recognize the value of outstanding people, and we are looking for compassionate changemakers to join our team. We pride ourselves on cultivating a collaborative workplace where employees experience productive and rewarding employment and feel engaged in our mission to end childhood hunger. Our passionate team shares a deep sense of purpose, and we dream big to solve complex problems and create positive impact in communities around the world. Feed the Children is recognized by Candid with its Platinum Seal of Transparency and is accredited by the BBB Wise Giving Alliance. The organization has received a 4-star rating from Charity Navigator and is consistently recognized on the Forbes Top 100 Charities list. We are currently in search of an Information Security Specialist to join our Information Technology team! The Information Security Specialist will investigate, analyze, and learn from cybersecurity researchers, attackers, and incidents to develop durable detective controls across the IT infrastructure. This role will provide support and resolution for scanning, reporting, and vulnerability remediation. This position will collaborate with the Senior Director of Information Security to assist in prioritizing vulnerabilities, planning mitigations, and security control configuration. NOTE: This is an entry level position working from our corporate office in Oklahoma City, OK. Salary range: Up to $21.64/hr. based on education and experience. Job Requirements: Education Bachelor's degree in Computer Science, CIS, Engineering, Cybersecurity, or related field preferred. High school diploma or GED required. Experience 2+ years' experience working with technical and business teams related to information security Ability to analyze general cyber security-related technical problems and provide basic engineering and technical support in solving these problems. Familiarity with Azure and Office 365 security suite of tools, to include Microsoft Defender. Industry-standard knowledge of activities relating to identity and access management, MDR, SIEM, and least privilege access management. Basic understanding of NIST-specific security assessments. Aware of the legal, regulatory, and ethical considerations of working with sensitive information Proactive, self-motivated, well organized, reliable, and detail-oriented team member Ability to communicate across all levels of the organization with strong organizational skills Ability to multitask, self-prioritize daily tasks, and experience with task management tools. Analytical and critical thinking skills, required Any combination of education, training and experience which provides the required knowledge, skills and abilities to perform the essential functions of this job may be considered. Essential Functions: Execute day-to-day threat hunting for targeted attacks against multiple environments. Work closely with Information Technology's Director of Data Governance and the Sr. Director of Information Security to make sure identified vulnerabilities are patched and remediated. Maintain an understanding of security-related IT policies to assess the effectiveness of controls. Facilitate incident remediation including monitoring Data Loss Prevention (DLP) tools and responding to alerts. Investigate network threats such as computer viruses, exploits, and malicious attacks to determine true threats, false positives, and network system misconfigurations. Monitor potential compromise, intrusion, deficiency, significant event or threat to the security posture and provide solutions to issues. Work within the IT department verifying and validating security compliance against corporate standards, regulatory standards, and other industry defined practices. Assist with security awareness training of employees, as needed. Champion the NIST 800-53 program, documenting policies and procedures as well as performing audits, risk assessments and implementation reviews. Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; monitoring information security news for emerging threats; and participating in professional organizations. Document specific activities, problems solved, and issues resolved. Protect our organization by keeping information confidential. Collaborate cross-functionally throughout the organization to safeguard sensitive information from potential insider risks and threat actors. Develop, update, and maintain policies and other technical documentation Establish an environment of high performance and continuous improvement that values learning, a commitment to quality, welcomes and encourages collaboration, and fosters both intra and inter-departmental dialogue and respect. Model the type and level of behavior, professionalism and leadership that is in accordance with the values of the organization. Perform other related duties as required About Feed the Children: As a leading anti-hunger organization, Feed the Children is committed to ending childhood hunger. We provide children and families in the U.S. and around the world with the food and essentials kids need to grow and thrive. Through our programs and partnerships, we feed children today while helping their families and communities build resilient futures. In addition to food, we distribute household and personal care items across the United States to help parents and caregivers maintain stable, food-secure households. Internationally, we expand access to nutritious meals, safe water, improved hygiene, and training in sustainable living. Responsible stewards of our resources, we are driven to pursue innovative, holistic, and child-focused solutions to the complex challenges of hunger, food insecurity, and poverty. For children everywhere, we believe that having enough to eat is a fundamental right. Our Values: We are driven by a shared sense of PURPOSE At Feed the Children, our commitment to the mission is at the heart of what we do and fuels our collective impact in the communities where we serve. We cannot achieve our bold vision without our talented PEOPLE We are passionate about fostering a best-in-class workforce that is engaged, respected, and empowered to deliver results. We believe in CURIOSITY and continued learning Success requires a culture of discovery, curiosity and continued learning to expand our knowledge, seek new perspectives and challenge the status quo. We know COLLABORATION is the only way to end childhood hunger We cannot succeed alone. It will take all of us - our employees, donors, partners, volunteers - working together to accomplish our ambitious goals. We DREAM big When we work together, we collectively reimagine what is possible. We dream big to solve complex problems and create deep impact in communities around the world. We VALUE every donor We respect our donors' intentions and promote responsible stewardship of the resources they entrust to us. Join Feed the Children and help create a world where no child goes to bed hungry. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire. Feed the Children is an equal opportunity employer. All qualified candidates will receive consideration for positions without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, political affiliation, pregnancy, military and/or veterans' status, genetic characteristics, marital status or any other considerations made unlawful by applicable state, federal, or local law. Feed the Children welcomes and encourages applications from persons with physical and mental disabilities and will make every effort to reasonably accommodate the needs of those persons. Additionally, Feed the Children strives to provide an environment free from sexual exploitation and abuse and harassment in all places where relief and development programs are implemented. Feed the Children expects its employees to maintain high ethical standards, protect organizational integrity and reputation, and ensure that Feed the Children work is carried out in honest and fair methods, in alignment with the Feed the Children safeguarding and associated policies.
    $21.6 hourly 13d ago
  • Information Systems Security Officer - 201810

    Delaware Nation Industries

    Information security analyst job in Oklahoma City, OK

    Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology. An active security clearance is REQUIRED. A Security+ Certification is REQUIRED. This position is 100% onsite. · Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems · Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform · Ensure common controls are available for all hosted systems to inherit and maintain · Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy · Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents · Update POA&Ms throughout the POA&M lifecycle till closure for all system controls. · Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation · Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies · Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications · Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings. · Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle · Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated · Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A). · Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports. Requirements At least 2+ years of related experience Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices Knowledge of NIST regulatory compliance requirements Deep knowledge of the information security principles Experience developing Information Security policies and procedures Experience performing A&As and supporting the Risk Management Framework lifecycle Ability to communicate, both written and orally, to both technical and non-technical stakeholders Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer Benefits Benefits Include: Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $71k-97k yearly est. Auto-Apply 34d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Information security analyst job in Overland Park, KS

    We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience. 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. Why Join Us We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance. We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building. Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits. #LI-JS1 #LI-REMOTE EOE/M-F/D/V
    $99k-125k yearly Auto-Apply 49d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 35d ago
  • Security Analyst

    Foresite 4.3company rating

    Information security analyst job in Overland Park, KS

    Job Description About the Role As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite. Responsibilities: Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time. Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision. Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients. Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events. Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports. Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture. Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks. Qualifications: Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies. SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events. Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes. Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences. Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals. Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats. Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
    $61k-87k yearly est. 4d ago
  • IT - Helpdesk Analyst

    Intelliswift 4.0company rating

    Information security analyst job in Oklahoma City, OK

    My name is Soujanya. Kothuri My contact number ************ and I'm a staffing specialist at Intelliswift, a global staffing and IT consulting company. We are constantly on the lookout for professionals to fulfil the staffing needs of our clients and we currently have a job opening that may interest you. Below is a summary of the position Job Description: Provides customer and technical support through analysis and problem solving to facilitate installation, implementation, maintenance, education, and documentation of a variety of technologies. Position Comments: Flexability to work any shift Good communication skills necessary Good troubleshooting/reasoning ability Must be able to make it work on time each day Typing skills are preferred (average 25+ wpm) Thank You & Regards…… Soujanya. Kothuri Sr. Technical Recruiter Additional Information NICE TO HAVE:
    $62k-86k yearly est. 60d+ ago
  • IT Security Analyst

    OSU Applicant Site

    Information security analyst job in Stillwater, OK

    The Oklahoma State University IT Information Security Office is seeking a technically talented IT Security Analyst. The successful candidate will become part of a small team of experienced professionals working together to maintain confidentiality, integrity, and availability of information and technology resources. The candidate will interact with University departments in the support of IT policy and legal compliance ( PCI , HIPAA , FERPA , GLBA , etc.) through conducting risk and vulnerability assessments of information systems. The candidate will assist in locating/identifying exploits and assessing vulnerabilities in applications, operating systems and network systems. The candidate will assist in designing/developing and maintaining large scale information systems. The candidate will also be responsible for creating and resolving security and support tickets relating to specific incidents as well as be a part of an “on-call” rotation which will require the candidate to be available to respond to security incidents as needed. Experience with PHP V4/5, C++, HTML , Pearl, XML , CSS , Apache, IIS , Joomla, Dreamweaver, Java, Java Script, and be familiar with Linux, Windows, Networking Technologies, and W3C standards. Work Schedule 8 a.m. to 5 p.m., Monday - Friday, some weekend work required.
    $60k-84k yearly est. 60d+ ago
  • KS-Director of Information Technology/Security

    Blue Diamond Career Consultants

    Information security analyst job in Winfield, KS

    Schedule: Monday - Friday, 8a-4:30p Job Summary: Monitors and controls the software, hardware, support needs and data entry station to process business and medical operation needs of the patient care providers. Directs the operational activities of the department including but not limited to, the evaluation and installation of new software systems. Is a member of the decision team used in making selections of appropriate software systems to provide support in short and long-term planning, directing operations and monitoring process of special projects according to hospital policy and procedures. Job Duties & Responsibilities: Ability to comprehend technical language of operating instructions and equipment manuals. Must possess the ability to deal tactfully with personnel, visitors, government agencies/personnel and general public. Must possess the ability to work harmoniously with professional and non-professional personnel including all departments of the facility. Must possess the ability to plan, organize, develop, implement, and interpret the goals, objectives, policies and procedures, etc. that are necessary for providing a sound information systems department. Manual dexterity is required to operate machines quickly and accurately. Demonstrates knowledge of office procedures, maintains confidential materials, establishes priorities and procedures for daily workload and documents any system problems. Completes special projects in the time frame allotted. Identify and resolve equipment, system and user errors and problems upon notification. Demonstrates effective verbal and written communication, reports significant information and all unusual incidents occurring within area of responsibility to management in a timely manner. Maintain confidentiality and demonstrate ethical conduct as outlined by hospital policy. Communicates using effective sending and listening techniques so that information in written and verbal form is acknowledged as understood. Participating in organizational activities and attends in-service opportunities. Have knowledge of and comply with organizational policies and procedures. Must be able to move intermittently throughout the work day. Must be able to cope with the mental and emotional stress of the position. Must be able to relate to and work with all individuals within the facility. Experience in computer operation and networking required. Requirements: Professional Requirements: Adheres to dress code; appearance is neat and professional. Assists in the selection of IT staff. Evaluates IT personal on a regular basis according to prescribed guidelines. Resolves personnel concerns of the department. Assigns job duties to IT staff. Completes annual educational requirements. Wears identification while on duty, uses computerized punch time system correctly. Communicates the mission, vision, core values, ethics and goals of the hospital as well as the focus statement of the department. Maintains regulatory requirements, including all state, federal and CMS regulations. Maintains and ensures patient confidentiality at all times. Reports to work on time and as scheduled, completes work within designated time. Performs department in-services, completes and returns in a timely fashion. Works at maintaining a good rapport and a cooperative working relationship with physicians, department and staff. Represents the organization in a positive and professional manner. Attends committee, CQI and management meetings, as appropriate, actively participates in the departments CQI activities. Ensures compliance with policies and procedures regarding department operations, fire, safety and infection control. Effectively and consistently communicates administrative directive to personnel and encourages interactive departmental meetings and discussion. Complies with all organizational policies regarding ethical business practices. Resolves personnel concerns at the departmental level, utilizing the grievance process as required. Complies with Rules of Conduct. Regulatory Requirements: Minimum of a Bachelor's Degree with emphasis on IT, Business Administration or related field. Experience may be accepted in lieu of a college degree. A minimum of six months experience in IT procedures in the healthcare environment.
    $90k-136k yearly est. 60d+ ago
  • EXECUTIVE DIRECTOR FOR INFORMATION SECURITY & CHIEF INFORMATION SECURITY OFFICER

    Emporia State University 4.1company rating

    Information security analyst job in Emporia, KS

    Developing, and implementing secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Educating and managing information and technology risk in collaboration with business leaders.Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets. Maintain Professional Knowledgebase; keep apprised of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to ESU.Continuously evaluating and managing the cyber and technology risk posture of the organization.Implementing and managing the cyber governance, risk, and compliance process. Developing, justifying, and evaluating cybersecurity investments. Developing and implementing ongoing security awareness training and education for users. In coordination with the CIO and emergency management team, implementing disaster recovery protocols and business continuity plans with business resilience in mind. QUALIFICATIONS: Minimum Qualifications: * Bachelor's degree; preference for advanced degree. * Minimum of five years' experience in information security or equivalent. * Strong commitment to customer-focused and team-oriented management. * Proven leadership abilities with a history of advancing roles in security management. * Proficiency in project planning, implementation, and management. * Demonstrated capability in collaborating with diverse populations. * Experience handling sensitive and confidential information in compliance with federal and state laws. * Skilled in presenting complex security concepts to various audiences (e.g., end-user training, executive-level briefings). * Up-to-date knowledge of emerging information security technologies and strategies. * Availability for off-hours support when necessary. COMPENSATION: * Annual salary range is $130,000-$160,000 * Salary will be commensurate with experience and qualifications. BENEFITS: Base pay is one component of Emporia State University's total rewards package. We are dedicated to supporting the needs of the "whole you" with our holistic approach to employee benefits by offering comprehensive well-being benefits for you and your family that include: * Health Insurance * Free Dental insurance for employees * Retirement through the Kansas Board of Regents * Paid parental leave * Up to 31 days paid vacation and holiday days * Tuition reduction and tuition assistance * Dependent tuition waiver * For full details about our benefit plan offerings, please visit here. APPLY: Please upload a cover letter, resume, and contact information of three references here. Consideration of applications will begin immediately, and will continue until the position is filled. A background check is required prior to hire. For more information Human Resources ****************** ************** Emporia State University is an equal opportunity and affirmative action employer. All qualified applicants will receive consideration for
    $130k-160k yearly Easy Apply 40d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline 4.1company rating

    Information security analyst job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS · Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities · Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. · Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. · Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. · Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. · Knowledge of TSA security requirements and regulations. · Knowledge of identity management processes and procedures. · Skill in project management. · Ability to manage, track and analyze information. · Ability to effectively work and cooperate with supervisors, co-workers, and vendors. · Ability to follow corporate policies and the directions of supervisors. · Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 23d ago
  • Information Systems Security Officer - 201810

    Delaware Nation Industries

    Information security analyst job in Oklahoma City, OK

    Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology. An active security clearance is REQUIRED. A Security+ Certification is REQUIRED. This position is 100% onsite. · Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems · Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform · Ensure common controls are available for all hosted systems to inherit and maintain · Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy · Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents · Update POA&Ms throughout the POA&M lifecycle till closure for all system controls. · Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation · Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies · Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications · Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings. · Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle · Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated · Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A). · Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports. Requirements At least 2+ years of related experience Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices Knowledge of NIST regulatory compliance requirements Deep knowledge of the information security principles Experience developing Information Security policies and procedures Experience performing A&As and supporting the Risk Management Framework lifecycle Ability to communicate, both written and orally, to both technical and non-technical stakeholders Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer Benefits Benefits Include: Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $71k-97k yearly est. 6d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Enid, OK?

The average information security analyst in Enid, OK earns between $54,000 and $106,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Enid, OK

$76,000
Job type you want
Full Time
Part Time
Internship
Temporary