Post Job

Information Security Analyst Jobs in Grain Valley, MO

- 49 Jobs
All
Information Security Analyst
Security Engineer
Information Systems Security Officer
Cyber Security Specialist
Information Security Engineer
Information Technology Analyst
Information Security Officer
Senior Cyber Security Analyst
Information Security Director
Information Technology Security Manager
  • Information Security Specialist

    Midwest Transplant Network 4.3company rating

    Information Security Analyst Job 22 miles from Grain Valley

    Job Details Westwood - Westwood, KS Full TimeDescription The Information Security Specialist is responsible for driving information security initiatives. The individual will perform internal and external security compliance monitoring activities, manage client compliance audits, IT control audits, security gap analyses and security risk assessments/analyses. This role will assist in the management of key compliance areas such as HIPAA and the implementation of administrative, physical, and technical safeguards, PCI DSS, policy, process, and procedure governance, and the implementation of industry standards. ESSENTIAL JOB FUNCTIONS Maintain security and compliance initiatives to ensure that corporate policies, standards, procedures, and audit activities are in alignment with business, IT, legal, and regulatory requirements. Develop and maintain a comprehensive set of policies, standards, processes, and procedures to ensure compliance with industry standards (,e.g., the NIST Cybersecurity Framework, the HIPAA Security Rule, and applicable laws. Maintain a written information security program (WISP) that ensures security policies, standards and process are being adhered to by the business. Monitor electronic systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and evolving and emerging cybersecurity attack vectors. Respond to electronic system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interact with third-party incident responders, including law enforcement, and legal counsel. Partner with IT leadership to administer authentication and access controls, including provisioning, changes, and deprovisioning of user and system accounts, security/access roles, and access permissions to information assets according to industry standards. Lead the development, implementation and management of MTN's WISP, ensuring compliance and auditing for improvements on an ongoing basis. Ensure compliance with healthcare information security best practices and HIPAA. Ensure compliance with, and management of, the MTN cybersecurity incident response plan and provide guidance for improvements on an ongoing basis in conjunction with the HIPAA Compliance Officer. Monitor security trends and drive information security best practices throughout the organization. Evaluate, design, test, and recommend new or improved controls to keep MTN current with industry standards and compliance requirements. Work with third party firms and consultants to conduct independent security audits, vulnerability scans, and penetration tests including social engineering. Work together with the business to provide an interface for client information security audits Collaborate with IT, legal, and other teams by providing cybersecurity input and guidance in relation to MTN's mission. Conduct regular risk analyses, advise Senior Director, Information Technology Services and Senior management on appropriate recommendations and implement recommendations in an efficient and timely manner documenting remedial actions as directed. Be informed about changes to the HIPAA Security Rule and other applicable laws and their impact on MTN's compliance obligations and business operations. Work with the Manager, Corporate Education & Development and HIPAA Compliance Officer to develop and administer, or provide advice, evaluation, and oversight for, ePHI information security training and awareness programs. Qualifications QUALIFICATIONS AND PHYSICAL DEMANDS Undergraduate degree in information systems or a related field or similar experience leading cybersecurity/information security initiatives. Five or more years experience managing security in a healthcare environment where HIPAA/HITECH regulations and guidelines for securing ePHI data required Experience advising and mentoring diverse teams without direct authority of team members Professional certification in the information security space preferred (e.g. CISM, CISSP, CISA, GIAC) or other security certification at a similar level. Experience in cybersecurity or information security systems, (Cisco Firepower, Firewalls, SIEM, EDR and NDR) Experience with the Security Risk Assessment Tool developed by the Department of Health and Human Services' Office for Civil Rights. Detail oriented, organized, excellent tracking/reporting skills, effective written and verbal communication. Demonstrated understanding of business process analysis and how to use information technology to cost-effectively optimize business and clinical work processes. Must maintain a valid driver's license in accordance with MTN motor vehicle policy. Must have reliable personal automobile transportation to be used with company reimbursement using IRS guidelines. Must be able to travel within the service area by ground or air. Ability to lift 50 pounds and transfer short distances. Possess ability to operate telephones, computers and office equipment. Ability to speak and communicate clearly in order to accurately convey information in person or by phone. OSHA Category III - No exposure to bloodborne pathogens while performing assigned job duties. Home internet and wireless phone access may be required. MTN BEHAVIORAL COMPETENCIES Belonging: Intentionally connects with colleagues by embracing differences and finding commonalities to create a workplace where all employees feel safe and genuine at work. Models the philosophy that lived experiences make individuals unique by respecting and seeking to understand beliefs, values and opinions that are new or different from their own. Represents through actions and influence, the idea that diverse perspectives make MTN stronger as we serve our mission. Respect: Builds a positive and supportive foundation inviting open, honest, and clear communication. Fosters a sensitive, supportive, and trustworthy environment, which promotes active listening and strengthens rapport throughout all interactions. Cultivates teamwork through acceptance and inclusion by valuing differences and empowering strengths. Excellence: Demonstrates excellence by going above and beyond, while maintaining compassion and humility in all interactions. Demonstrates a high rate of achievement and success for the organization through proactive objectives centered on the overall mission and vision. Consistently models a positive attitude, a willingness to help others, and a dedication to improvement. Takes full responsibility for their role and challenges themselves to find workable solutions. Accountability: Demonstrates the highest ethical standards, by honoring commitments to each other and professional partners. Executes all interactions through honesty and transparency. Demonstrates responsibility and integrity through ownership of the mission. Utilizes resources appropriately. Leadership: Empowers, mentors and encourages all staff, while displaying a high-level of professionalism. Demonstrates ability to cultivate teams and relationships through open lines of communication, honesty and respect. Handles challenges with compassion by developing trust through respectful feedback and support. Acts as a resource by providing the tools, which enable others to reach their highest potential. It is the policy of Midwest Transplant Network (MTN) to provide equal opportunity in employment to all employees and applicants for employment. No person will be discriminated against in employment because of race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, ethnic origin, age, genetic information, disability, protected veteran status, arrest record, or any characteristic protected by applicable federal, state or local laws. In addition, the organization complies with applicable state and local laws governing non-discrimination in employment in every location in which the organization has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, training, employee activities and general treatment during employment MTN is committed to complying with state and federal disability laws and makes reasonable accommodations when requested by a qualified applicant or employee with a disability to enable the applicant or employee to be considered for the position they desire, to perform the essential functions of the position in question, or to enjoy equal benefits and privileges of employment as are enjoyed by other similarly situated employees without disabilities, unless the accommodation would impose an undue hardship on the operation of MTN's mission.
    $75k-104k yearly est. 39d ago
  • Sr. Information Systems Security Officer (ISSO)

    Contact Government Services, LLC

    Information Security Analyst Job 20 miles from Grain Valley

    Sr. ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: - Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. - Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. - Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). - Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. - Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. - Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. - Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. - Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: - Bachelor's Degree. - A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. - eMASS experience. - Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. - Strong desktop publishing skills using Microsoft Word and Excel. - Experience with industry writing styles such as grammar, sentence form, and structure. - Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: - CISSP, CASP, or a similar certificate is preferred. - Master's Degree in Cybersecurity or related field. - Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. - Demonstrated ability to work well independently and as a part of a team. - Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: ******************* $118,560 - $171,253.33 a year
    $118.6k-171.3k yearly Easy Apply 1d ago
  • Information Security Specialist

    Aspis

    Information Security Analyst Job 20 miles from Grain Valley

    Aspis Consulting is hiring a full-time Information Security Specialist position to join our growing team. This position will be responsible for working on internal company projects as well as with clients of Aspis. You will be asked to support both our company and client information security needs. This is not a full-time remote position; candidates must be able to work at the company's offices or client job site in the Kansas City, Missouri metropolitan area. Relocation assistance will not be provided. Duties: Lead and Mentor a Small Team: Oversee daily operations, assign tasks, and guide team members to meet project goals and deadlines. Coordinate Access Reviews: Ensure compliance with user access review processes, track and report status updates, and collaborate with internal/external auditors. Facilitate Cross-Functional Efforts: Work closely with other team leads to support contingency planning and information risk management activities. Conduct Productive Meetings: Engage client and third-party stakeholders, presenting project progress, challenges, and solutions in a clear, concise manner. Drive Continuous Improvement: Identify process gaps, propose improvements, and support the adoption of new tools or methods to enhance team efficiency. Assist Other Teams on Project: Assist with documentation, testing, and reporting of A-123 Computer Controls for identified federal information systems; lead the Contingency Planning team when the primary lead is unavailable, supporting exercises, and maintaining documentation; provide occasional support to triage, filter, and assign vulnerability remediation tickets to the appropriate stakeholders, and track statuses. Additional Duties as requested Qualifications: Experience, Education & Certifications: Resume must demonstrate FISMA compliance and risk mitigation experience. A degree is not required however a combination of relevant experience such as IT controls assessments and audits and education is required. This is not an entry-level position, resumes should clearly demonstrate relevant experience that supports the duties and technical understanding required of the position. Candidates with a Bachelor's degree in IT, Cybersecurity, or a related field and information security audit or project management certifications (e.g., CISA and PMP) will be preferred. Technical Understanding: Familiarity with cybersecurity best practices, compliance frameworks, or standards (e.g., NIST, FISMA) and comfort using ticketing/project management tools like JIRA or ServiceNow. Background Investigation: Must be eligible to work as a contractor for the federal government and pass a public trust background investigation. Personal Work Ethic: Integrity, accountability, assuming responsibility for the success of your projects. Adaptable and flexible; able to think quickly in stressful situations. Self-Starter & Adaptable: Comfortable working independently while being open to direction and feedback. Aptitude and willingness to learn and show continuous engagement and learning of their position and duties. Local to the Kansas City Metropolitan Area: Must be able to work at client's work site or at Aspis Consulting's work site in the Kansas City, Missouri area. Leadership Experience: Passion for leading innovation, energizing and developing people, delivering outstanding results. Previous experience managing small to mid-sized technical teams or cybersecurity units, ideally within a government or highly regulated environment. Organizational skills to prioritize and plan work, multi-task, and meet schedules. Strong Communication Skills: Proven ability to lead meetings, produce status reports, and coordinate with diverse stakeholder groups, including federal officials and auditors. Analytical & Detail-Oriented: Analytical skills to resolve problems and think creatively, capable of reviewing and interpreting user access data, ensuring accuracy, and catching inconsistencies or security risks. About Us Aspis Consulting makes enterprise cybersecurity solutions and professional services accessible to all sizes of organizations from small to medium-sized businesses to large Fortune 500 enterprises; non-profits; and municipal, state, and federal government agencies. Aspis is a Certified HUBZone Small Business, Certified LGBTBE, and Certified Virginia Values Veterans company. Our Values are Integrity, Community, and Diversity. ************************ We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability, protected veteran status, or any other characteristic protected by law. We will consider for employment qualified applicants with criminal histories consistent with applicable law.
    $68k-96k yearly est. 33d ago
  • Sr Cyber Security Analyst

    Honeywell 4.5company rating

    Information Security Analyst Job 20 miles from Grain Valley

    The Sr. Cyber Security Analyst provides security guidance and expertise and performs and coordinates design, development, maintenance, and quality control functions on highly complex computer security projects. Regularly develops solutions to significant business operations computer security problems by applying advanced information security technology. Duties and Responsibilities * Design, implement and maintain data ingestion pipelines into Splunk. * Developand manage API integrations ensuring efficient data exchange between external systems and Splunk. * Process and transform structure text formats to align with Splunk ingestion requirements, data parsing and utilization for reporting. * Develops security policy to comply with security requirements as defined by the customer and provides input to the customer as requested when the customer develops security requirements. * Evaluates security requirements and conducts feasibility studies to examine software requirements, administration costs, information flow, and makes computer security solutions recommendations to management. * Analyzes, designs, tests, implements, and maintains most complex computing security systems including hardware, software, data bases, networks, and/or telecommunication for IT Systems while maintaining project and computer security documentation. * Plans and schedules computer security project activities and monitors and reports project progress to management while maintaining project and computer security documentation. * Works with clients to implement system security measures, assists with system security plans and documentation, and provides technical guidance and training. * Performs installation, functional and performance testing, maintenance, and modification of vendor supplied hardware, software, network, and telecommunication computer security products. * Resolves complex computer security issues by designing, developing, and implementing innovative technical solutions. * Demonstrates knowledge about complex computer security applications software and is able to train clients and assist them in resolving computer security problems. * Demonstrates project management skills and may serve as acting manager in the managers absence. * Evaluates and makes recommendations to management regarding technological advances that improve computing system security, reduce flow time, and enhance operational surety. You Must Have * Bachelor's degree in cyber security, Computer Science, Computer Engineering, Information Systems, a related discipline, or two additional years of direct work experience in lieu of bachelor's degree. * Five (5) or more years of related experience in cyber security, networking, hardware, operating systems, or a similar role. * Experience with Splunk data ingestion processes, including configuring and optimizing data inputs, managing data pipelines and ensuring efficient indexing of diverse data sources into Splunk environments * Demonstrated proficiency in integrating APIs with Splunk. Design, develop and troubleshooting experience in API-based data feeds. * Strong experience in working with structured text formats, including parsing transforming and mapping data for Splunk ingestion. * Experience with Hardware Asset Management (HWAM) and Software Asset Management (SWAM) technologies including inventory, controls, configuration management and compliance. * Ability to travel up to 25% of the time * Ability to work remote, hybrid, or on-site as directed by management and is determined by the needs of the business. * Regular and reliable attendance is an essential function of this job. * United States Citizenship * Ability to obtain and maintain, a U.S. Department of Energy (DOE) security clearance (some positions require additional DOE designations) We Value * Demonstrated knowledge of system security acquired through years of direct experience. * Demonstrate knowledge and experience with enterprise cyber security tools and applications. * Strong verbal, written skills. * Demonstrated initiative to maintain technical currency through outside studies and trainings. * Skill in analyzing and interpreting computer system audit reports. * Ability to read and comprehend technical documents, maintain accurate records, prioritize work, and analyze problems to develop innovative effective solutions. * Scripting and programming experience in various programming languages. FMT2021 Additional Information * JOB ID: 2589 * Remote Eligibility: Hybrid * Travel Required: 0-10% * Hourly/Salary: Salary * Relocation Available: Yes
    $65k-89k yearly est. 21d ago
  • Engineer, Information Security - Hybrid

    Mariner High School 4.2company rating

    Information Security Analyst Job 28 miles from Grain Valley

    We are currently seeking strong candidates for a full-time Information Security Engineer position in our Overland Park, Kansas headquarters. Responsibilities Responsible for the analysis, implementation, testing, operations, and maintenance of Information Security solutions Conduct assessments as required for the Information Security Program to determine whether systems performed as expected and provide input to the determination of operational effectiveness Day-to-day support for Information Security and Technology functions: Malware Response Process Log Management Process Vulnerability Management Process Tracking and reporting on information generated by Information Security Program activities Analysis of the security aspects of new or existing computer applications, software, or specialized utility programs, draw insights about their possible implications and provide appropriate recommendations Qualifications Bachelor's degree from an accredited college/university or equivalent experience 3 - 5 years of work experience, financial services industry experience a plus Skills & Knowledge Strong self-starter who thrives in a fast-paced, dynamic environment Experience confidently and collaboratively working with individuals at all levels of an organization Ability to conceptualize and support big-picture concepts and goals of the organization Excellent verbal and written communication skills to provide an exceptional client service experience Strong attention to detail and critical thinking skills Highly organized, able to manage multiple tasks with tight deadlines We welcome your interest in being a part of our firm. We believe in giving associates progressive opportunities, actively nurturing professional growth and giving back to the community. We are dedicated to building a diverse culture where everyone has the support they need to achieve their career goals. We offer an innovative workplace and a culture that fosters camaraderie, teamwork and work-life balance. EOE/M/F/D/V #LI-SA1 #LI-HYBRID
    $61k-76k yearly est. 1d ago
  • IT Security Manager

    True North Consulting 4.4company rating

    Information Security Analyst Job 28 miles from Grain Valley

    This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization ·Ensures consistent and effective security practices ·Establishes appropriate Information Security procedures and governance ·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures ·Manages investigations into identified problematic activity and provides on-going communication with IT senior management ·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division ·Provides centralized guidance and governance of Information Security solutions ·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals ·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk ·Assist with Information Security awareness programs ·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management. ·Participates in annual and long-range planning activities to ensure Information Security needs are addressed Qualifications Must be open to travel approximately 35% of the time. A college degree in MIS, CIS, Business Management, or related field 5+ years of overall Information Security experience 1+ years working on an Information Security implementation team An Information Security industry certification is preferred Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks: CIS Critical Security Controls ISO 27000-series standards NIST SP800-53 and related standards Must have a working knowledge of the following Information Security practices, standards, and systems: Data Loss Prevention (DLP) systems Encryption technologies and standards Endpoint security software Governance, Risk, and Compliance (GRC) systems Identity and Access Management (IAM) Incident response practices Network security (e.g. firewalls, IDS/IPS, VPN, etc.…) Risk assessment practices Security Information Event Management (SIEM) systems Vulnerability management practices and scanning tools Additional Information Solid company with excellent track record of stability,.Great opportunities for growth and learning.
    $102k-138k yearly est. 1d ago
  • IT Compliance Analyst

    Collabera 4.5company rating

    Information Security Analyst Job 20 miles from Grain Valley

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $525 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia), and Europe (Ireland, Netherlands, Poland, United Kingdom). We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 50 offices across the globe with a presence in ten countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognition --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description A Fortune manufacturing electric utility industry looking for IT Compliance analyst who will be supporting the IT Division staff in meeting compliance obligations and will provide support to ensure compliance with compliance obligations involving Information Technology systems that support the Bulk Electric System (BES) and SOX application environments. Duties and Responsibilities: · Help with specific assignments related to developing, implementing, documenting and monitoring compliance activities for Information Technology. · Help with specific assignments related to developing, implementing, documenting and monitoring Critical Infrastructure Protection (CIP) program activities for the Company. · Aid in ensuring the compliance activities, functions, plans and recommendations meet the risk posture of the corporation and the goals and performance measurements of the Information Systems Compliance Department. · Contribute to the effectiveness of the compliance program by assisting with the documentation and implementation of departmental procedures. Qualifications · Bachelor's degree in Information Systems, Computer Science or related field, 2 years of information technology experience and a minimum of 1 year of direct NERC CIP Standards Compliance experience or 2 years of other relevant experience OR 4 years of information technology experience and 1 year of direct NERC CIP Standards compliance experience or 2 years of other relevant experience. · Change Management or general ticketing systems · Personal experience with Industrial Defender, an application used for the configuration and management of computer system baselines. · Certified Information Systems Auditor (CISA) or other compliance related certification a plus. Additional Information If you want to know more and apply, please connect with: Niraj Singh **************************** ************ ***********************************************
    $68k-93k yearly est. Easy Apply 1d ago
  • Director of Research Information Security Strategy

    KUMC University of Kansas Medical Center

    Information Security Analyst Job 29 miles from Grain Valley

    Department:Information Security Administration ----- Information Security Engineering and OperationsPosition Title:Director of Research Information Security StrategyJob Family Group: Professional Staff Summary:The Director of Research Information Security Strategfy reports to the Chief Information Security Officer, while collaborating closely with IT Governance and Research Leadership to ensure project milestones are appropriately prioritized and met. The Director provides strategic leadership in aligning research technology initiatives with the university's broader information security and risk management goals. This position acts as a key advisor and liaison between research teams and IT services (KITS), ensuring that all technology integration solutions are both compliant and supportive of the university's research mission. The Director will drive initiatives to enhance research-related cybersecurity and risk governance, while also facilitating clear communication between technical teams and researchers. This role requires a professional with a deep understanding of both IT infrastructure and information security principles, coupled with excellent communication and relationship-building skills. This individual will work closely with researchers to understand their unique needs, translate those needs into technical requirements, and collaborate with the KITS teams to develop solutions that are secure, compliant, and effective. This position requires being on-site three or more days a week and does not have any direct reports.:Job Responsibilities: Consultation & Communication: Engage with university researchers to understand their specific technology onboarding needs including the IT and IS needs for deployment. Clearly and effectively communicate the technical and security needs of emerging researcher technologies to KITS teams Act as a primary contact of communication with technology vendors to collect all necessary documentation to support a full, robust risk analysis and integration discussion with the Information Security, Systems Integration, Software Support, Hardware Support, Customer Support, Networking, and other KITS teams as needed. Work directly with vendors to describe any technology limitations that may emerge from the proposed integration solution. Serve as the primary point of contact between researchers and KITS teams for projects, ensuring both sides are aligned on expectations and requirements. Coordinate with Enterprise Project Management as needed to ensure project alignment. Solution Development & Implementation: Collaborate with KITS teams to design and implement solutions that meet the researchers' needs while adhering to regulations, state and university policies, industry best practices, and compliance requirements. Evaluate existing IT and security solutions and propose enhancements or alternatives that better align with the needs of the research community. Drive technology deployment solutions to completion addressing challenges timely which would otherwise lead to a failure of deployment. Translation of Technical Solutions: Translate complex IT and security solutions into language that is understandable for non-technical individuals. Ensure researchers are fully aware of any limitations, boundaries, or requirements associated with the implemented solutions. Relationship Building & Management: Foster strong, positive relationships with researchers and KITS personnel Act as a trusted advisor and advocate for researchers within the KITS teams. Facilitate open lines of communication to ensure ongoing alignment and satisfaction among all stakeholders. Training & Support: Provide ongoing training and support to researchers on the use of IT systems which support compliant and desirable solutions. Develop and deliver workshops or informational sessions tailored to the research community's needs. Responsible for coordinating rounding tours with researchers for routine technology health checks, documenting findings and working with KITS teams to appropriately route workstreams for follow up and implementation. Compliance & Risk Management: Ensure that all IT solutions comply with policies, as well as applicable regulatory and legal requirements including data security and retention policies. Assist researchers in understanding and adhering to information security protocols to protect sensitive data and research outputs. This may require developing or implementing strategies which are responsive to a variety of types of data and policy standards. Continuous Improvement: Gather feedback from researchers on the effectiveness of IT and security solutions, and work with KITS teams to make necessary adjustments Stay up to date with the latest trends and advancements in IT and IS, particularly as they relate to academic research. Stay up to date with emerging technologies across the life science research domains. Participate in the development of a long-term security roadmap for research-related IT systems. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. It is only a summary of the typical functions of the job, not an exhaustive list of all possible job responsibilities, tasks, duties, and assignments. Furthermore, job duties, responsibilities and activities may change at any time with or without notice. Required Qualifications: Education: Bachelor's degree in information technology, computer science, or a related field OR bachelor's degree in biology or related science with lab experience and demonstrated knowledge of computer science or information technology Work Experience: 10+ years of combined experience in information technology (IT), information security (IS) and highly technical research laboratory roles Background in IT infrastructure and information security, with a focus on compliance, risk management, or technology integration Proven experience in project management and cross-functional multidisciplinary collaboration Experience with IS Risk Management (ISRM) 3+ years in a leadership role within research or IT disciplines Experience leading cross-functional teams, driving strategic initiatives. Experience managing multiple projects with varying timelines, stakeholders, and information streams simultaneously. Preferred Qualifications: Education: Master's degree in information technology, computer science, or other scientific field ITIL, PMP, Security+, CISA, SSCP, CISSP, CISM, CRISC or other relevant certifications Work Experience: 3+ years in an academic research environment Proven track record of deploying various types of research technologies in a secure, compliant fashion. Experience with relevant regulations and standards (e.g., NIST 800-53 & 171, HIPAA, NSPM-33) Research laboratory experience including primary data collection, analysis, sharing and dissemination including high performance computing across a variety of technology platforms. Experience using with research methodologies, data analysis tools, and laboratory information management systems (LIMS) Skills: Problem solving and organizational skills. Interpersonal and communication skills. Time and project management skills. Required Documents: Resume/CV Cover Letter If selected as a final candidate for this position, you may be required to complete the Association of American of Universities Representations and Warranties document and sign a release of records that will allow the University of Kansas Medical Center to conduct a further background check with former employers. A copy of the Representations and Warranties document can be found here. Comprehensive Benefits Package: Coverage begins on day one for health, dental, and vision insurance and includes health expense accounts with generous employer contributions if the employee participates in a qualifying health plan. Employer-paid life insurance, long-term disability insurance, and various additional voluntary insurance plans are available. Paid time off, including vacation and sick, begins accruing upon hire, plus ten paid holidays. One paid discretionary day is available after six months of employment, and paid time off for bereavement, jury duty, military service, and parental leave is available after 12 months of employment. A retirement program with a generous employer contribution and additional voluntary retirement programs (457 or 403b) are available. ************************************************** Employee Type: RegularTime Type: Full time Rate Type: Salary Compensation Statement: The pay range listed for this position is determined by our compensation program using market data and salary benchmarking. A combination of factors is considered in making compensation decisions including, but not limited to, education, experience and training, qualifications relative to the requirements of the position, and funding. At the University of Kansas Medical Center, a reasonable estimate for the starting pay range will be the minimum to midpoint of the posted range, taking into account the combination of factors listed above. Pay Range:$96,000.00 - $152,000.00 Minimum $96,000.00 Midpoint $124,000.00 Maximum $152,000.00
    $96k-152k yearly 60d+ ago
  • Information Security Officer

    UCM 4.4company rating

    Information Security Analyst Job 32 miles from Grain Valley

    The Information Security Officer (ISO) is responsible for overall planning, development, implementation, and oversight of the University's information security program. The ISO works collaboratively with the campus community to establish information security programs to include Information security policies, practices and standards. Management of information security team and resources. Developing and managing information security incident response and management, risk assessment, security-related architecture, security awareness and training. Serves as the primary information security liaison to federal, state, local and professional organizations Examples of Duties 25% Information security policy, practices, and standards Plan, develop, implement, and oversee the University's information security program in support of academic and administrative information systems and technology Lead the development and work with University leadership to implement effective and reasonable policies and practices Collaborate with Office of Technology leadership, Deans, and administrative leaders to maintain and update an IT security risk management program, while building relationships and goodwill 25% Information security team and resources Provide management, leadership, supervision, and accountability of the Information Security team Mentor Information Security team members and implement professional development plans for all members of the team Prepare financial forecasts for security operations and maintenance of security assets Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position 10% Information security awareness and training Communicate information security-related issues to campus on a regular basis Design and implement education programs focused on user awareness and security compliance 10% Information security incident response and management Develop security incident response plans Lead the Security Incident Response Team (SIRT) in investigation and resolution of major security incidents 10% Information risk assessment and management Provide leadership, direction and guidance in assessing and evaluating information security risks Work with internal/external auditors for required security assessments and audits 10% Information security-related architecture Develop, implement and administer technical security standards, security services and tools 10% Primary information security liaison to federal, state, local and professional organizations Lead efforts to internally assess and evaluate the adequacy of the security controls for the University's information and technology systems to protect against threats and verify compliance with state and federal statutory and regulatory requirements Typical Qualifications Education: Bachelor's degree in Computer Information Systems, Management Information Systems, Computer Science, Cybersecurity, or related field. A master's degree is preferred. Education may be substituted for experience or if experience may be substituted for education. Note that equivalencies are based on the following: AA = 2 years experience; BA/BS = 4 years experience; MA/MS = 6 years experience. Experience: Eight years of progressive management experience in a technology environment with increasing levels of responsibility in a combination of information security and systems/network administration. Experience in a higher education technology environment is preferred. Knowledge, Skills, and Abilities for this position include: Knowledge of risk assessment tools, technologies, and methods Experience planning, researching, and developing information security policies, standards, and procedures. Experience defining, planning, executing, and managing technology-based projects. Knowledge and understanding of relevant legal and regulatory requirements, such as the Gramm-Leach-Bliley Act (GLBA), and the Family Educational Rights and Privacy Act (FERPA). Experience with Anti-Malware, Next-Generation Firewalls (NGFW), Web Application Firewalls (WAF), Security Incident Event Management(SIEM), Data Loss Prevention(DLP), intrusion detection (IDS), intrusion prevention(IPS), Domain-based Message Authentication, Reporting, and Conformance (DMARC) penetration testing, and vulnerability assessment tools. Advanced knowledge of information security principles, techniques and protocols. Experience with PKI and SSL industry best practices. Knowledge of cloud security best practices. Knowledge of web and application security development best practices. Licenses and CertificationsProfessional information security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager(CISM), or other similar credentials, is desired. Supervisory and Budget Responsibilities Supervisory Responsibilities: Supervisor 1-2 employees Budget Responsibilities: Manage Budget 30% Supplemental Information Physical Requirements: Lifting (weight) - 50-75 lbs Special Instructions: Full-time benefits-eligible position: Benefits include competitive salary; health, dental, vision, life insurance, AD & D, long-term disability; 3 weeks paid vacation per year; 3 weeks of accrued sick leave per year; 13 paid holidays; retirement; and generous education assistance for an employee, spouse and dependent children taking classes at UCM. Part-time benefits-eligible positions: Benefits include generous education assistance for the employee. Temporary, adjunct, student employment, or graduate assistant positions: Benefits are not included. Completed UCM online application for employment required. Incomplete applications will not be considered. A review will begin immediately and continue until filled unless indicated otherwise. NOTE: A background check is required for the selected candidate of all staff, faculty, adjunct, and temporary positions and any job offer is contingent on the results of this check. Student employees and graduate assistants do not require a background check to be conducted prior to employment. The University of Central Missouri is an Equal Opportunity Employer and specifically invites applications from women, minorities, veteran status, and people with disabilities.
    $111k-153k yearly est. 7d ago
  • Infrastructure Security Engineer - FedRAMP (US Citizen)

    Psi Services 4.5company rating

    Information Security Analyst Job 20 miles from Grain Valley

    **Title:** Infrastructure Security Engineer (US citizen) **Salary:** $120K/annually **About PSI** We are PSI Services. We power world leading tests. Delivered with trusted science and the very best test taker experience. PSI supports test-takers on their journey to pursuing dreams and gaining certifications that are important to them. They believe that their dreams are worth working for; that their dreams are worth the effort. And we believe that too. This is our core purpose, to empower people to achieve their dreams. We do this by being the best provider of workforce solutions, which foster both technology and science to deliver the best solutions for our test takers. We are searching for top talent to join our PSI team and help grow our products and services. We have a creative, supportive and inclusive culture where we empower people in their careers to be their authentic self and make the most of their great talent. At PSI, we are committed to helping people meet their potential and we believe that promoting diversity, equity and inclusion is critical to our success. That's why you'll find these ideals are intrinsic to our company culture and applied throughout the employee lifecycle. Learn more about what we do at: ************************* **About the Role** The Infrastructure Security Engineer (ISE) is responsible for ensuring that PSI systems are secure, well maintained, and appropriately monitored. They work with senior management across all business units to design security solutions and ensure that PSI environments are designed and maintained in accordance with industry standards. Infrastructure Security Engineers ensure adherence to ISO27001, SOC2, CIS, NIST and other standards. They possess a broad understanding of log aggregation solutions, server hardware, Linux and Windows operating systems, storage, networking, and load balancing. The Infrastructure Security Engineer leads projects and organizes teams to achieve technical and security objectives. Infrastructure Security Engineers work as part of a global team to design, implement, and monitor security across the organization. They engage with vendors, business and technology partners to lead projects and constantly improve security posture. **Role Responsibilities** + Lead projects to evaluate, select, and implement security technologies + Design, configure, implement, and maintain all security platforms and their associated software: firewalls, intrusion detection/intrusion prevention, antivirus/EDR, URL Filtering, email security gateway, SIEM, vulnerability assessment solutions, DLP + Respond to security events and incidents performing containment, root cause analysis, and remediation. + Maintain enterprise vulnerability scanning infrastructure, ensuring daily operation of scans and reporting are occurring as required + Coordinate and sequence external scans and penetration testing + Monitor application and system activity logs for potential threats + Keep up to date with evolving trends and changes in security models and methodologies + Threat model common attacker methods to develop appropriate mitigation techniques + Define and develop technical security standards and guidelines with business stakeholders + Participate in product security architecture planning for both on-premises and cloud-based solutions + Ensure server infrastructure is secure, patched and updated + Take proactive steps to resolve issues before they impact the business + Maintain accurate and up to date security documentation + Serve as team lead and subject matter expert for security **Knowledge, Skills and Experience Requirements** + Bachelor's degree in computer science or equivalent training/certification. + 10+ years of working experience as a Security Engineer or Systems Engineer + 5+ years of working experience with email security tools such as Proofpoint + 5+ years of working experience with CrowdStrike EDR and SIEM solutions + Ability to achieve federal security clearance, must be a US Citizen + Experience with FedRamp security controls, + In-depth knowledge and understanding of the integration of AWS with fundamental Information Security methodologies for both architectural review and implementation + Strong knowledge of Windows and Linux environments + Experience drafting and promoting security policy with all levels of business stakeholders + Experience and detailed technical knowledge of security engineering, system and network security, authentication and security protocols, cryptography, and application security + Detailed knowledge of core server technologies and domain configuration and management, including DNS, DHCP, AD and group policy + Experience in Domain Trusts, Active Directory Federation, and Entra ID + Experience managing remote infrastructure across multiple time zones + Detailed understanding of Azure, AWS, Hyper-V, VMWare and SAN technologies + Understanding of network topologies such as VLANs, IPs, subnets, and routing + Understanding of PowerShell / VB Scripting + Good written and verbal communication skills with the ability to follow a project from beginning to end while providing updates along the way, while prioritizing time and dealing with multiple projects + Experience with CIS Hardening Standards and/or DISA STIGs + Experience with load balancers (F5, Barracuda, Azure) **Benefits & Culture** At PSI, our culture is to be transparent and fair. That's why all of our roles have been benchmarked at a competitive rate against the local market they are based in. To be transparent all of our adverts now include the salary so you can see if we align with your expectations when looking for your next role. In addition to a competitive salary, we offer a comprehensive benefits package and supportive culture when you join us. This includes: + 401k/Pension/Retirement Plan - with country specific employer % + Enhanced PTO/Annual Leave + Medical insurance - country specific + Dental, Vision, Life and Short-Term Disability for US + Flexible Spending Accounts - for the US + Medical Cashback plan covering vision, dental and income protection for UK + Employee Assistance Programme + Commitment and understanding of work/life balance + Dedicated DE&I group that drive core people initiatives + A culture of embracing wellness, including regular global initiatives + Access to supportive and professional mechanisms to help you plan for your future + Volunteer Day and a culture of giving back to our community and industry through volunteering opportunities Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $120k yearly 27d ago
  • Security Engineer

    Spring Venture Group 3.9company rating

    Information Security Analyst Job 20 miles from Grain Valley

    Who We Are: Spring Venture Group is a leading digital direct-to-consumer sales and marketing company with product offerings focused on the senior market. We specialize in distributing Medicare Supplement, Medicare Advantage, and related products via our family of brands and dedicated team of licensed insurance agents. Powered by our unique technologies that combine sophisticated marketing, comparison shopping, sales execution, and customer engagement - we help thousands of seniors across the country navigate the complex world of Medicare every day. Job Description Job Summary: The Security Engineer plays a crucial role in protecting Spring Venture Group's information assets and ensuring the integrity of our systems. This position requires a proactive and collaborative individual with a strong understanding of security principles and technologies. The ideal candidate will have 3-5 years of experience in IT or security, with a focus on SIEM, EDR, cloud security platforms, incident response, orchestration and automation, and vulnerability management. Must have experience with hands on coding and tool integration. To be successful in this role, a candidate needs to be a team player who can effectively collaborate across IT teams and possess strong written and verbal communication skills. Responsibilities: SIEM Management: Monitor and analyze security events and logs from various sources using SIEM tools. Develop and maintain SIEM rules, alerts, and dashboards. Investigate and respond to security incidents identified by the SIEM. EDR Management: Deploy, configure, and manage the organization's Endpoint Detection and Response (EDR) solution. Analyze EDR alerts and investigate potential security incidents. Develop and implement EDR rules and policies. Respond to and contain endpoint threats. Cloud Security Platform Administration: Configure and maintain cloud security platforms. Monitor and analyze cloud application usage and security events. Implement and enforce cloud security policies. Incident Response: Participate in incident response activities, including investigation, containment, and remediation. Document incident response procedures and findings. Contribute to the development and improvement of incident response plans. Orchestration and Automation: Develop and implement security automation scripts and workflows. Integrate security tools and systems for streamlined operations. Utilize orchestration tools to automate incident response and security tasks. Vulnerability Management: Conduct vulnerability scans and assessments. Analyze vulnerability reports and prioritize remediation efforts. Coordinate with IT teams to patch and remediate vulnerabilities. Maintain and improve the vulnerability management program. Collaboration and Communication: Collaborate with IT teams to implement security controls and address security issues. Participate in technology support groups Provide security guidance and support to other departments. Document security procedures and maintain accurate records. Communicate security issues and recommendations effectively to both technical and non-technical audiences. And all other duties as assigned. Qualifications Qualifications: 3-5 years of experience in IT or security. Must have 2-3 years work experience coding scripting languages (Python, PowerShell, etc.) Must have 2-3 years of work experience with automation tools and tool configuration. Experience with SOAR. Proven experience with SIEM tools (e.g., Splunk, Sentinel). Experience managing an EDR solution. Experience with cloud security platforms (e.g. Netskope). Strong understanding of incident response principles and methodologies. Knowledge of vulnerability management processes and tools. Strong understanding of networking and security protocols. Excellent problem-solving and analytical skills. Ability to work independently and as part of a team. Strong written and verbal communication skills. Relevant security certifications (e.g., Security+, CEH, CISSP) are a plus. Desired Skills: Experience with cloud security (AWS, Azure, GCP). Knowledge of compliance frameworks (e.g., NIST, ISO 27001). Experience conducting threat hunting, penetration testing, or purple team exercises. Experience in a regulated industry. Personal Attributes: Team player with a collaborative mindset. Proactive and detail-oriented. Ability to adapt to a fast-paced environment. Strong work ethic and commitment to continuous learning. BEHAVIORS The SVG behaviors are listed below: Be Aware (Emotional Intelligence) Be Open & Honest (Communication) Be a Team Player (Teamwork and Collaboration) Be Accomplished (Drive for Results) Be the Example (Develop Self & Empower People) Be Forward Thinking (Strategic Thinking) Be a Problem Solver (Continuous Improvement) Additional Information Benefits: The Company offers the following benefits for this position, subject to applicable eligibility requirements: Competitive Compensation Medical, Dental and vision benefits after a short waiting period 401(k) matching program Life Insurance, and Short-term and Long-term Disability Insurance Optional enrollment includes HSA/FSA, AD&D, Spousal/Dependent Life Insurance, Travel Assist and Legal Plan Generous paid time off (PTO) program starting off at 15 days your first year 15 paid Holidays (includes holiday break between Christmas and New Years) 10 days of Paid Parental Leave and 5 days of Paid Birth Recovery Leave Annual Volunteer Time Off (VTO) and a donation matching program Employee Assistance Program (EAP) - health and well-being on and off the job Rewards and Recognition Diverse, inclusive and welcoming culture Training program and ongoing support throughout your Venture Spring Venture Group career Security Responsibilities: Operating in alignment with policies and standards Reporting Security Incidents Completing assigned training Protecting assigned organizational assets Spring Venture Group is an Equal Opportunity Employer
    $71k-95k yearly est. 1d ago
  • Engineer, Information Security - Hybrid

    Mariner Wealth Advisors 4.4company rating

    Information Security Analyst Job 28 miles from Grain Valley

    We are currently seeking strong candidates for a full-time Information Security Engineer position in our Overland Park, Kansas headquarters. Responsibilities Responsible for the analysis, implementation, testing, operations, and maintenance of Information Security solutions Conduct assessments as required for the Information Security Program to determine whether systems performed as expected and provide input to the determination of operational effectiveness Day-to-day support for Information Security and Technology functions: Malware Response Process Log Management Process Vulnerability Management Process Tracking and reporting on information generated by Information Security Program activities Analysis of the security aspects of new or existing computer applications, software, or specialized utility programs, draw insights about their possible implications and provide appropriate recommendations Qualifications Bachelor's degree from an accredited college/university or equivalent experience 3 - 5 years of work experience, financial services industry experience a plus Skills & Knowledge Strong self-starter who thrives in a fast-paced, dynamic environment Experience confidently and collaboratively working with individuals at all levels of an organization Ability to conceptualize and support big-picture concepts and goals of the organization Excellent verbal and written communication skills to provide an exceptional client service experience Strong attention to detail and critical thinking skills Highly organized, able to manage multiple tasks with tight deadlines We welcome your interest in being a part of our firm. We believe in giving associates progressive opportunities, actively nurturing professional growth and giving back to the community. We are dedicated to building a diverse culture where everyone has the support they need to achieve their career goals. We offer an innovative workplace and a culture that fosters camaraderie, teamwork and work-life balance. EOE/M/F/D/V #LI-SA1 #LI-HYBRID
    $66k-91k yearly est. 4d ago
  • Information Security Officer

    State of Kansas

    Information Security Analyst Job 27 miles from Grain Valley

    Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team! Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position. E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here. About the Position: * Who can apply: Anyone * Must be Local to Topeka, Kansas Area * Classified/Unclassified Service: Unclassified * Full/Part-time: Full-Time * Regular/Temporary: Regular * Eligible to Receive Benefits: Yes * Veterans' Preference Eligible: Yes * This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule. Compensation: * Annual Salary/Hourly Rate: $85,000 - 95,00/Annually Note: Salary can vary depending upon education, experience, or qualifications. Position Summary: The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the State Executive Branch CISO, with a dotted line to the Agency Secretary. Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF). Required skills: * Minimum of seven (7) years of progressive IT work experience, with at least three (3) years of direct experience in information security experience. * One or more cybersecurity certifications (CISSP, CISM, CISA) * Strong working knowledge of security frameworks such as NIST CSF, ISO 27001, or NIST 800-53. * Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences. * Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders. * Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment. * Ability to assess regulatory requirements and determine whether existing controls meet those requirements. * Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems. Qualifications: * Bachelor's degree from an accredited college or university in information security, computer science, or a related field preferred. Equivalent vocational education and experience, along with certification(s), will be considered. Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment. Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor). Employment Benefits: In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in: * Comprehensive medical, mental, dental, vision, and additional coverage * Sick & Vacation leave * Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave * Paid State Holidays * Employee discounts with the STAR Program * Retirement and deferred compensation programs * This benefits package represents additional annual compensation. Visit the Employee Benefits page for more information… Recruiter Contact Information: * Name: Brenda Cripps * Email: OITS_****************** * Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612 Required documents for this application to be complete: * On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed. * Inside your Job Application upload these documents: Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents." Job Application Process * First Sign in or register as a New User * Complete or update your contact information on the: * Upload required documents listed above for the Careers> My Job Applications page * Start your draft job application, upload other required documents, and submit when it is complete. * Check your email and My Job Notifications for written communications from the Recruiter Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions." How to Claim Veterans Preference Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager. __________________________________________________________________________ How to Claim Disability Hiring Preference Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager. Learn more about claiming Disability Hiring Preference: Disability Hiring Preference | Kansas Department of Administration (ks.gov) __________________________________________________________________________ Equal Employment Opportunity The State of Kansas is an Equal Opportunity Employer. We value diversity, equity, and inclusion as essential elements that create and foster a welcoming workplace. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job. If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
    $85k-95k yearly 10d ago
  • Security Engineer

    Jedunn 4.6company rating

    Information Security Analyst Job 20 miles from Grain Valley

    Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years. Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection. Role Summary The Security Engineer will design, install, administer, document, and maintain enterprise security systems. This position will be responsible for providing specifications, analyzing, and recommending solutions to problems, and providing specifications for new products and services. The Security Engineer will be expected to deliver results via projects, implementations, operations, and support. All activities will be performed in support of the strategy, vision and values of JE Dunn. * Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor. * Career Path: Senior Security Engineer Key Role Responsibilities - Core SECURITY ANALYST FAMILY - CORE * Analyzes security logs to identify threat events; triage and respond accordingly to security incidents following internal security protocols. * Configures security controls in multiple protection systems and IT infrastructure in accordance with policy, standards, and procedures. * Tests network security controls; coordinating remediation efforts and closure of any identified issues. * Works with various internal teams to test, discover and resolve vulnerabilities. * Acts as first line of support for triage and remediation of support tickets related to security and tracks ongoing support issues. * Stays current with IT security trends and standards through local special interest group involvement and monitoring online information sources. * Responsible for asset management of enterprise security inventory, excluding end user devices. * Facilitates administrator and end-user IT security training. * Manages questionnaires related to third-party vendor security management. * Stays current with released security features of internal IT systems and software. * Maintains confidentiality and integrity in dealing with sensitive information systems and processes. Key Role Responsibilities - Additional Core SECURITY ENGINEER In addition, this position will be responsible for the following: * Acts as escalation contact and subject matter expert for information security and related solutions. * Mentors team members on technical and security methodology characteristics. * Assists with automation and orchestration scripting for security operations efficiency and effectiveness. * Acts as primary technical resource for design and implementation projects. * Drafts and recommends operating procedures and changes to information security practices and solutions. * Trains and engages operations and support personnel on security solutions. * Advises on trends, threats, and emerging security risks, relevant to the organization. * Engineers effective solutions that securely enable and protect in alignment with our organization compliance requirements. * May be a subject matter expert for a variety of security related systems or applications. * Communicates with operational groups for collaboration of security program management. * Advocates secure culture and provides education throughout the appropriate client group. * Improves maturity capability of processes, procedures, and operations of the security program. * Communicates intelligence and program effectiveness reports to supervision. Knowledge, Skills & Abilities * Ability to perform work accurately and completely, and in a timely manner * Communication skills, verbal and written - Intermediate * Ability to manage and lead technical projects * Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX * Ability to solve technical issues - Advanced * Demonstrated expert knowledge of information security practices * Substantial knowledge of Python and Powershell scripting languages * Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers * Technical writing and documentation skills * Organizational skills * Ability to quickly and effectively solve complex problems * Ability to deliver quality through attention to detail * Ability to work in team and independently * Ability to work a flexible schedule - might be on call in the evenings and weekends * Ability to build relationships and collaborate within a team, internally and externally Education * Bachelor's degree in information security or related field (Preferred) * In lieu of the above requirements, equivalent relevant experience will be considered Experience * 5+ Years information security experience (Preferred) Working Environment * Must be able to lift up to 50 pounds * May require periods of overnight travel * Normal office environment * Frequent activity: Sitting, Viewing Computer Screen * Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling Benefits Information The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details. Click here for benefits details. JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace. JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to accommodations@jedunn.com JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails. Why People Work Here At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them Building on our rich history, our employee owners are shaping the future of JE Dunn. In our team-focused environment we do life together and are generously rewarded for our efforts About JE Dunn For more information on who we are, click here. EEO NOTICES Know Your Rights: Workplace Discrimination is Illegal California Privacy Policy E-Verify JE Dunn participates in the Electronic Employment Eligibility Verification Program. E-Verify Participation (English and Spanish) Right to Work (English) Right to Work (Spanish)
    $67k-83k yearly est. 12d ago
  • IT Security Analyst II

    Unavailable

    Information Security Analyst Job 28 miles from Grain Valley

    About Us More than 35 years ago, SelectQuote was founded on one core promise: to help our customers protect the people they value most. We pioneered the way consumers shopped for term life insurance, and now, we also help people find home insurance, auto insurance, senior health insurance and more. Our quick and easy process saves consumers both time and money, and today, more than 2 million families trust us to help them with their insurance needs. But what truly sets us apart is our people, and the opportunities to grow your career with SelectQuote are unmatched. About the Role The IT Security Analyst II will be an experienced security practitioner responsible for the operations and administration of enterprise security solutions and processes. As a Tier 2 Security Engineer you will play a critical role in an integrated enterprise-wide security team that includes 24x7 SOC operations. In this role you will serve as the Subject Matter Expert (SME) for SIEM configuration and vulnerability management systems ensuring the seamless operation and continuous enhancement of these critical security functions. You will be responsible for maintaining and fine-tuning SIEM data connections log collectors and alerts while also driving comprehensive vulnerability management through targeted scans and detailed reporting. Supervisory Responsibilities: This position has no direct supervisory responsibilities. Essential Duties and Responsibilities: Serve as the SME for SIEM configuration ensuring optimal data connections and log collection from various sources Fine-tune alerts and dashboards to reduce noise and improve the SOC's response effectiveness Continuously improve SIEM use cases and correlation rules to enhance detection capabilities Perform vulnerability scans analyze results and collaborate with IT teams to prioritize remediation efforts Fine-tune scan settings to optimize performance and coverage without impacting network or system performance Generate detailed reports that highlight vulnerabilities and track remediation progress Continuously improve the security posture of client-facing applications by identifying risks and implementing appropriate mitigation strategies Conduct periodic security scanning and internal security testing to identify and remediate potential security breaches Conduct advanced adversary analysis SIEM analysis and deep dives using blue-team and red-team pen-test tools to identify and address security vulnerabilities Collaborate with SOC analysts to analyze and respond to threats in real-time Develop and document incident response run-books with detailed methods and procedures for the SOC team Participate in incident response activities providing expertise and guidance during security incidents Generate detailed reports for business managers and system owners to evaluate the effectiveness of security policies and recommend improvements Provide regular updates to senior management on the status of security systems vulnerabilities and incident response activities Skills/Abilities: Ability to analyze complex security issues and recommend effective solutions Precision in configuring and maintaining security systems Strong ability to troubleshoot and resolve security issues Work effectively with cross-functional teams to improve security posture Ability to adjust to rapidly changing security landscapes and emerging threats Expected to work under own initiative prioritize own work and meet agreed timescales and deliverables Education and Experience: 3+ years of experience in a security engineering or related role Hands-on experience with SIEM tools (e.g. Splunk Rapid 7) and vulnerability management platforms (e.g. Qualys Rapid 7) preferred Strong knowledge of security principles techniques and technologies Experience in conducting adversary analysis and using blue-team/red-team tools Excellent communication skills with the ability to explain complex technical concepts to non-technical stakeholders Certificates/Licenses/Registration Relevant certifications (e.g. CISSP CEH GCIH) are preferred Physical Requirements: Work is performed indoors with potential for exposure to safety and health hazards related to office work. Could periodically travel to other office and operational sites. The noise level in the work environment is usually moderate. Prolonged periods of sitting at a desk and working on a computer. SelectQuote Core Values: Service: We create positive customer experiences. Entrepreneurship: We create innovate & take risks. Leadership: We build & invest in high-performing teams. Empowerment: We embrace a changing environment. Courage: We challenge the status quo & drive continuous improvement. Teamwork: We help support & celebrate each other. Disclaimer: The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be construed as an exhaustive list of all responsibilities duties and skills required.
    $63k-86k yearly est. 28d ago
  • Sr. Information Systems Security Officer (ISSO)

    Contact Government Services

    Information Security Analyst Job 29 miles from Grain Valley

    Sr. ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: * Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. * Maintain responsibility for managing cybersecurity risk from an organizational perspective. * Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. * Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. * Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). * Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. * Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. * Provide subject matter expertise for cyber security and trusted system technology. * Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. * Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. * Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. * Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: * Bachelor's Degree. * A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. * eMASS experience. * Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. * Strong desktop publishing skills using Microsoft Word and Excel. * Experience with industry writing styles such as grammar, sentence form, and structure. * Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: * CISSP, CASP, or a similar certificate is preferred. * Master's Degree in Cybersecurity or related field. * Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. * Demonstrated ability to work well independently and as a part of a team. * Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: ******************* $118,560 - $171,253.33 a year
    $118.6k-171.3k yearly Easy Apply 60d+ ago
  • Sr Cyber Security Compliance Specialist

    Honeywell 4.5company rating

    Information Security Analyst Job 20 miles from Grain Valley

    This position is responsible for developing and maintaining cyber security policy and plans to comply with cyber security requirements. Other responsibilities include providing guidance for other staff members and analyzing, testing, implementing, and maintaining moderately complex cyber security systems. Duties and Responsibilities * Evaluates security requirements and conducts feasibility studies to examine software requirements, administration costs, and information flow. * Plans and schedules cyber security assessments and monitors and reports progress. * Works with customers to implement system security measures, assists with cyber security plans, documentation, technical guidance, and obtaining risk acceptance. * Identifies, tracks, and monitors routine cyber security problems and coordinates the resolution of identified cyber security issues. You Must Have * Bachelor of Information Technology or Cyber Security or 2 additional years of experience in lieu of bachelor degree. * 5+ years of related experience in cyber security, security programs or compliance assurance. * Ability to travel up to 15% of the time. * United States Citizenship. * Ability to work remote, hybrid, or on-site as directed by management and is determined by the needs of the business. * Regular and reliable attendance is an essential function of this job. * Ability to obtain and maintain a U.S. Department of Energy (DOE) security clearance (some positions require additional DOE designations). We Value * Demonstrates ability to read and comprehend government compliance documents, maintain accurate records, prioritize work from multiple projects and analyze problems to develop innovative and effective solutions. * Possesses knowledge of National Institute of Standards and Technology (NIST) special publications (Federal Information Processing Standards (FIPS) 199, 200, 800-53, 800-37) and the certification and accreditation process. * Experience working with third party vendors desired. * Industry certifications, i.e., CISSP, CISA, etc. preferred. * Advanced degree (i.e. master's degree) preferred. * Demonstrates knowledge of security programs acquired through years of direct experience. * Demonstrated knowledge and experience with cyber security tools and applications. * Demonstrated initiative to maintain technical currency through outside studies and training. * Displays skill in analyzing and interpreting computer system audit reports. * Displays ability to read and comprehend government compliance documents, maintain accurate records, prioritize work, and analyze problems to develop innovative and effective solutions. FMT2021 Additional Information * JOB ID: 2634 * Remote Eligibility: Hybrid * Travel Required: 10-25% * Hourly/Salary: Salary * Relocation Available: Yes
    $75k-103k yearly est. 8d ago
  • Security Engineer

    Spring Venture Group 3.9company rating

    Information Security Analyst Job 20 miles from Grain Valley

    Who We Are: Spring Venture Group is a leading digital direct-to-consumer sales and marketing company with product offerings focused on the senior market. We specialize in distributing Medicare Supplement, Medicare Advantage, and related products via our family of brands and dedicated team of licensed insurance agents. Powered by our unique technologies that combine sophisticated marketing, comparison shopping, sales execution, and customer engagement - we help thousands of seniors across the country navigate the complex world of Medicare every day. Job Description Job Summary: The Security Engineer plays a crucial role in protecting Spring Venture Group's information assets and ensuring the integrity of our systems. This position requires a proactive and collaborative individual with a strong understanding of security principles and technologies. The ideal candidate will have 3-5 years of experience in IT or security, with a focus on SIEM, EDR, cloud security platforms, incident response, orchestration and automation, and vulnerability management. Must have experience with hands on coding and tool integration. To be successful in this role, a candidate needs to be a team player who can effectively collaborate across IT teams and possess strong written and verbal communication skills. Responsibilities: SIEM Management: Monitor and analyze security events and logs from various sources using SIEM tools. Develop and maintain SIEM rules, alerts, and dashboards. Investigate and respond to security incidents identified by the SIEM. EDR Management: Deploy, configure, and manage the organization's Endpoint Detection and Response (EDR) solution. Analyze EDR alerts and investigate potential security incidents. Develop and implement EDR rules and policies. Respond to and contain endpoint threats. Cloud Security Platform Administration: Configure and maintain cloud security platforms. Monitor and analyze cloud application usage and security events. Implement and enforce cloud security policies. Incident Response: Participate in incident response activities, including investigation, containment, and remediation. Document incident response procedures and findings. Contribute to the development and improvement of incident response plans. Orchestration and Automation: Develop and implement security automation scripts and workflows. Integrate security tools and systems for streamlined operations. Utilize orchestration tools to automate incident response and security tasks. Vulnerability Management: Conduct vulnerability scans and assessments. Analyze vulnerability reports and prioritize remediation efforts. Coordinate with IT teams to patch and remediate vulnerabilities. Maintain and improve the vulnerability management program. Collaboration and Communication: Collaborate with IT teams to implement security controls and address security issues. Participate in technology support groups Provide security guidance and support to other departments. Document security procedures and maintain accurate records. Communicate security issues and recommendations effectively to both technical and non-technical audiences. And all other duties as assigned. Qualifications Qualifications: 3-5 years of experience in IT or security. Must have 2-3 years work experience coding scripting languages (Python, PowerShell, etc.) Must have 2-3 years of work experience with automation tools and tool configuration. Experience with SOAR. Proven experience with SIEM tools (e.g., Splunk, Sentinel). Experience managing an EDR solution. Experience with cloud security platforms (e.g. Netskope). Strong understanding of incident response principles and methodologies. Knowledge of vulnerability management processes and tools. Strong understanding of networking and security protocols. Excellent problem-solving and analytical skills. Ability to work independently and as part of a team. Strong written and verbal communication skills. Relevant security certifications (e.g., Security+, CEH, CISSP) are a plus. Desired Skills: Experience with cloud security (AWS, Azure, GCP). Knowledge of compliance frameworks (e.g., NIST, ISO 27001). Experience conducting threat hunting, penetration testing, or purple team exercises. Experience in a regulated industry. Personal Attributes: Team player with a collaborative mindset. Proactive and detail-oriented. Ability to adapt to a fast-paced environment. Strong work ethic and commitment to continuous learning. BEHAVIORS The SVG behaviors are listed below: Be Aware (Emotional Intelligence) Be Open & Honest (Communication) Be a Team Player (Teamwork and Collaboration) Be Accomplished (Drive for Results) Be the Example (Develop Self & Empower People) Be Forward Thinking (Strategic Thinking) Be a Problem Solver (Continuous Improvement) Additional Information Benefits: The Company offers the following benefits for this position, subject to applicable eligibility requirements: Competitive Compensation Medical, Dental and vision benefits after a short waiting period 401(k) matching program Life Insurance, and Short-term and Long-term Disability Insurance Optional enrollment includes HSA/FSA, AD&D, Spousal/Dependent Life Insurance, Travel Assist and Legal Plan Generous paid time off (PTO) program starting off at 15 days your first year 15 paid Holidays (includes holiday break between Christmas and New Years) 10 days of Paid Parental Leave and 5 days of Paid Birth Recovery Leave Annual Volunteer Time Off (VTO) and a donation matching program Employee Assistance Program (EAP) - health and well-being on and off the job Rewards and Recognition Diverse, inclusive and welcoming culture Training program and ongoing support throughout your Venture Spring Venture Group career Security Responsibilities: Operating in alignment with policies and standards Reporting Security Incidents Completing assigned training Protecting assigned organizational assets Spring Venture Group is an Equal Opportunity Employer
    $71k-95k yearly est. 5d ago
  • Infrastructure Security Engineer - FedRAMP (US Citizen)

    Psi Services 4.5company rating

    Information Security Analyst Job 29 miles from Grain Valley

    **Title:** Infrastructure Security Engineer (US citizen) **Salary:** $120K/annually **About PSI** We are PSI Services. We power world leading tests. Delivered with trusted science and the very best test taker experience. PSI supports test-takers on their journey to pursuing dreams and gaining certifications that are important to them. They believe that their dreams are worth working for; that their dreams are worth the effort. And we believe that too. This is our core purpose, to empower people to achieve their dreams. We do this by being the best provider of workforce solutions, which foster both technology and science to deliver the best solutions for our test takers. We are searching for top talent to join our PSI team and help grow our products and services. We have a creative, supportive and inclusive culture where we empower people in their careers to be their authentic self and make the most of their great talent. At PSI, we are committed to helping people meet their potential and we believe that promoting diversity, equity and inclusion is critical to our success. That's why you'll find these ideals are intrinsic to our company culture and applied throughout the employee lifecycle. Learn more about what we do at: ************************* **About the Role** The Infrastructure Security Engineer (ISE) is responsible for ensuring that PSI systems are secure, well maintained, and appropriately monitored. They work with senior management across all business units to design security solutions and ensure that PSI environments are designed and maintained in accordance with industry standards. Infrastructure Security Engineers ensure adherence to ISO27001, SOC2, CIS, NIST and other standards. They possess a broad understanding of log aggregation solutions, server hardware, Linux and Windows operating systems, storage, networking, and load balancing. The Infrastructure Security Engineer leads projects and organizes teams to achieve technical and security objectives. Infrastructure Security Engineers work as part of a global team to design, implement, and monitor security across the organization. They engage with vendors, business and technology partners to lead projects and constantly improve security posture. **Role Responsibilities** + Lead projects to evaluate, select, and implement security technologies + Design, configure, implement, and maintain all security platforms and their associated software: firewalls, intrusion detection/intrusion prevention, antivirus/EDR, URL Filtering, email security gateway, SIEM, vulnerability assessment solutions, DLP + Respond to security events and incidents performing containment, root cause analysis, and remediation. + Maintain enterprise vulnerability scanning infrastructure, ensuring daily operation of scans and reporting are occurring as required + Coordinate and sequence external scans and penetration testing + Monitor application and system activity logs for potential threats + Keep up to date with evolving trends and changes in security models and methodologies + Threat model common attacker methods to develop appropriate mitigation techniques + Define and develop technical security standards and guidelines with business stakeholders + Participate in product security architecture planning for both on-premises and cloud-based solutions + Ensure server infrastructure is secure, patched and updated + Take proactive steps to resolve issues before they impact the business + Maintain accurate and up to date security documentation + Serve as team lead and subject matter expert for security **Knowledge, Skills and Experience Requirements** + Bachelor's degree in computer science or equivalent training/certification. + 10+ years of working experience as a Security Engineer or Systems Engineer + 5+ years of working experience with email security tools such as Proofpoint + 5+ years of working experience with CrowdStrike EDR and SIEM solutions + Ability to achieve federal security clearance, must be a US Citizen + Experience with FedRamp security controls, + In-depth knowledge and understanding of the integration of AWS with fundamental Information Security methodologies for both architectural review and implementation + Strong knowledge of Windows and Linux environments + Experience drafting and promoting security policy with all levels of business stakeholders + Experience and detailed technical knowledge of security engineering, system and network security, authentication and security protocols, cryptography, and application security + Detailed knowledge of core server technologies and domain configuration and management, including DNS, DHCP, AD and group policy + Experience in Domain Trusts, Active Directory Federation, and Entra ID + Experience managing remote infrastructure across multiple time zones + Detailed understanding of Azure, AWS, Hyper-V, VMWare and SAN technologies + Understanding of network topologies such as VLANs, IPs, subnets, and routing + Understanding of PowerShell / VB Scripting + Good written and verbal communication skills with the ability to follow a project from beginning to end while providing updates along the way, while prioritizing time and dealing with multiple projects + Experience with CIS Hardening Standards and/or DISA STIGs + Experience with load balancers (F5, Barracuda, Azure) **Benefits & Culture** At PSI, our culture is to be transparent and fair. That's why all of our roles have been benchmarked at a competitive rate against the local market they are based in. To be transparent all of our adverts now include the salary so you can see if we align with your expectations when looking for your next role. In addition to a competitive salary, we offer a comprehensive benefits package and supportive culture when you join us. This includes: + 401k/Pension/Retirement Plan - with country specific employer % + Enhanced PTO/Annual Leave + Medical insurance - country specific + Dental, Vision, Life and Short-Term Disability for US + Flexible Spending Accounts - for the US + Medical Cashback plan covering vision, dental and income protection for UK + Employee Assistance Programme + Commitment and understanding of work/life balance + Dedicated DE&I group that drive core people initiatives + A culture of embracing wellness, including regular global initiatives + Access to supportive and professional mechanisms to help you plan for your future + Volunteer Day and a culture of giving back to our community and industry through volunteering opportunities Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $120k yearly 27d ago
  • Information Systems Security Officer (ISSO)

    Contact Government Services

    Information Security Analyst Job 29 miles from Grain Valley

    ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: * Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. * Maintain responsibility for managing cybersecurity risk from an organizational perspective. * Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. * Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies. * Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO). * Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes. * Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF. * Provide subject matter expertise for cyber security and trusted system technology. * Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems. * Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. * Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring. * Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems. Qualifications: * Bachelor's Degree. * A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc. * eMASS experience. * Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher. * Strong desktop publishing skills using Microsoft Word and Excel. * Experience with industry writing styles such as grammar, sentence form, and structure. * Ability to multi-task in a deadline-oriented environment. Ideally, you will also have: * CISSP, CASP, or a similar certificate is preferred. * Master's Degree in Cybersecurity or related field. * Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking. * Demonstrated ability to work well independently and as a part of a team. * Excellent work ethic and a high commitment to quality. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. Health, Dental, and Vision Life Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: ******************* $92,213.33 - $125,146.66 a year
    $92.2k-125.1k yearly Easy Apply 15d ago

Learn More About Information Security Analyst Jobs

How much does an Information Security Analyst earn in Grain Valley, MO?

The average information security analyst in Grain Valley, MO earns between $58,000 and $112,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average Information Security Analyst Salary In Grain Valley, MO

$81,000
Job type you want
Full Time
Part Time
Internship
Temporary