Post job

Information security analyst jobs in Grand Island, NE

- 126 jobs
All
Information Security Analyst
Information Security Engineer
Cyber Security Analyst
Information Security Officer
Information Assurance Analyst
Senior Information Security Analyst
Securities Analyst
Director Of Information Technology Security
Information Technology Analyst
Cyber Security Specialist
Information Technology Security Manager
Information Assurance Engineer
  • Cyber Security (CISSP Certified)

    Global Connect Technologies 4.4company rating

    Information security analyst job in Omaha, NE

    Job Description & Skill Requirement: THE SECURITY ENGINEER IS RESPONSIBLE FOR IMPLEMENTING, MAINTAINING, MONITORING, AND MANAGING SECURE SOLUTIONS, WITH A FOCUS ON SECRETS MANAGEMENT AND PRIVILEGED ACCESS MANAGEMENT (PAM). TO BE SUCCESSFUL, THE CANDIDATE NEEDS TO HAVE PROFICIENCY WITH WINDOWS AND LINUX OPERATING SYSTEMS AND POSSESS THE ABILITY TO UNDERSTAND AND WRITE SCRIPTS OR APPLICATIONS USED TO AUTOMATE REPETITIVE TASKS. CANDIDATES SHOULD BE SELF-STARTERS, QUICK LEARNERS, AND OPEN TO CHALLENGING EXISTING PROCESSES. THIS POSITION REQUIRES EFFECTIVE COLLABORATION WITH TEAM MEMBERS TO TROUBLESHOOT ISSUES AND GATHER NEW REQUIREMENTS FROM THE TECHNOLOGY DEPARTMENT. GIVEN THE CONTINUOUSLY EVOLVING SECURITY LANDSCAPE, CANDIDATES WILL NEED TO CONTINUOUSLY LEARN, ADAPT, AND COLLABORATE. REQUIRED QUALIFICATIONS: BACHELORS DEGREE IN INFORMATION TECHNOLOGY, COMPUTER SCIENCE, OR A RELATED FIELD. TECHNICAL AND ANALYTICAL EXPERTISE WITH EXPERIENCE IN TECHNOLOGY DESIGN, IMPLEMENTATION, AND DELIVERY. WORKING KNOWLEDGE OF WINDOWS, LINUX, AND NETWORKS, INCLUDING TECHNIQUES FOR TROUBLESHOOTING, IDENTIFYING, AND SOLVING PROBLEMS. 5+ YEARS OF EXPERIENCE WITH WINDOWS AND/OR LINUX TROUBLESHOOTING. 5+ YEARS OF EXPERIENCE IN AN ENGINEERING ROLE. ABILITY TO THINK STRATEGICALLY AND TACTICALLY WITH EFFECTIVE DECISION-MAKING SKILLS. EXCELLENT WRITTEN AND VERBAL COMMUNICATION SKILLS. MUST BE FLEXIBLE AND ABLE TO HANDLE STRESSFUL SITUATIONS PROFESSIONALLY. DEMONSTRATED ABILITY TO WORK UNDER MINIMAL SUPERVISION. HIGH DEGREE OF SELF-MOTIVATION, COMMITMENT, AND INTEGRITY. ABILITY TO WORK WELL WITH OTHERS AND AS PART OF A TEAM. PREFERRED QUALIFICATIONS: CISSP OR OTHER SECURITY CERTIFICATION UNDERSTANDING OF PAM TOOLS AND PRODUCTS 3+ YEARS' EXPERIENCE IN A SECURITY ROLE PRIOR EXPERIENCE CREATING SCRIPTS OR APPLICATIONS TO ANALYZE DATA AND AUTOMATE PROCESSES
    $68k-94k yearly est. 5d ago
  • Cyber Security Training

    Kanshe Infotech

    Information security analyst job in Omaha, NE

    Kanshe Infotech - Houston, TX Kanshe Infotech is committed and noticed in the Information Technology industry as a company with exceptional talent and expertise in the area of software development and solutions. The company is formed by a group of people with extensive industry experience and wide ranging domain expertise with a vision to create a cost effective, high value solution provisions comparable to the big consulting companies. The mission of our company is to be an industry leader by offering innovative technology solutions that will give companies the edge to succeed in today's competitive environment.We work with large fortune 100 clients and are looking to add consultants to our team in the following technologies based on the career choice of the individual and also position with our clients. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information No
    $69k-93k yearly est. 60d+ ago
  • Information Security Compliance Analyst

    National Capitol Contracting LLC 4.5company rating

    Information security analyst job in Bellevue, NE

    Job Description This is a FULL-TIME, onsite position located in Omaha, NE. Active SECRET government security clearance required at the time of application. NCC is seeking an Information Security Compliance Specialist for an upcoming contract. Key Areas of Responsibility Planning: Cyber Operational Readiness Assessment Planning (CORA) consisting of the following: Testing and analysis of all applicable STIGs. Scheduling and implementation of all applicable STIGs. Monitoring and execution of the quarterly revalidation schedule. Monitoring emerging changes to the applicable STIGs outside of the quarterly schedules. (CDRL A003). Meeting Support: The contractor personnel shall support the following: (a) briefing 557 WW leadership on Cyber Security updates; (b) preparing biweekly Cyber Security Update meetings; (c) meeting with stakeholders to facilitate Cyber Security collaboration and (d) obtaining input from stakeholders to present to 557 WW leadership. (CDRL A002, A003, A005). Monitoring the cybersecurity risk and threat to the 557 WW's cyber environment. Assisting with the implementation plans for the 557 WW's transition to a cloud environment. Minimum Qualifications Active Secret Government Security Clearance. 5 years of relevant experience in Cyber Security and system accreditation. Experience in the following: Endpoint Security Assured Compliance Assurance Solutions (ACAS) Threat hunting and risk analysis Intrusion Detection Systems DISA STIGS IAT Level II Certification Preferred Qualifications Bachelors Degree in relevant field. NCC provides reasonable accommodations to qualified individuals with disabilities. If you are an applicant that requires a reasonable accommodation, please email us. Please reference the position in your email. NCC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristic. E-Verify Employer. VEVRAA Federal Contractor.
    $64k-92k yearly est. 2d ago
  • Cyber Security Service Defensive Cyber Operations Analyst (Government)

    Att

    Information security analyst job in Bellevue, NE

    This position requires office presence of a minimum of 5 days per week and is only located at customer's site. No relocation is offered. AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government. We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. AT&T is hiring to support a US Government Program that provides IT Services to US Strategic Command located in Omaha Nebraska. Job Duties/Responsibilities: Monitor Cybersecurity Service Provider (CSSP) sensors to detect and investigate abnormal findings. Perform threat intelligence analysis and generate timely, actionable reports. Triage cybersecurity incidents and provide support for incident response activities. Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems, networks, databases, and web-based assets. Assist in the development of mission-critical technical documentation. Analyze and assess business impacts resulting from theft, destruction, alteration, or denial of access to information. Conduct regular security audits to ensure secure operation of systems and adherence to defined security policies and procedures. Ensure compliance with security policies and plans for data, software, hardware, and telecommunications. Perform shift work to provide continuous 7x24 coverage and cybersecurity support. Required Clearance: TS/SCI (#clearable) (#tssci) Additional Clearance Requirements: Can start with a TS (#topsecret) Required Qualifications: 15+ years of experience in cybersecurity engineering, management, and strategy for USAF and other DoD IT programs. At least one of the following certifications: GCIA, GCLD, GDSA, GICSP, CISSP-ISSAP, or CISSP-ISSEP. Desired Qualifications: ITIL v4 certification. Extensive hands-on experience with CSSP operations, sensor monitoring, and incident response. Deep knowledge of DoD and USAF cybersecurity frameworks, policies, and procedures. Strong background in threat intelligence analysis and reporting. Experience developing technical and mission-critical documentation. Advanced analytical skills to assess business impacts of cyber incidents. Demonstrated ability to conduct comprehensive security audits. Experience supporting 24/7 operations in a shift-based environment. Excellent communication and collaboration skills for cross-functional team environments. Proven ability to adhere to, and help evolve, cybersecurity policies and security plans. Our Cyber Security Service Defensive Cyber Operations Analyst's earn between $78,800 - $91,500. Not to mention all the other amazing rewards that working at AT&T offers. Individual starting salary within this range may depend on geography, experience, expertise, and education/training. Joining our team comes with amazing perks and benefits: Medical/Dental/Vision coverage 401(k) plan Tuition reimbursement program Paid Time Off and Holidays (based on date of hire, at least 23 days of vacation each year and 9 company-designated holidays) Paid Parental Leave Paid Caregiver Leave Additional sick leave beyond what state and local law require may be available but is unprotected Adoption Reimbursement Disability Benefits (short term and long term) Life and Accidental Death Insurance Supplemental benefit programs: critical illness/accident hospital indemnity/group legal Employee Assistance Programs (EAP) Extensive employee wellness programs Employee discounts up to 50% off on eligible AT&T mobility plans and accessories, AT&T internet (and fiber where available) and AT&T phone Weekly Hours: 40 Time Type: Regular Location: Bellevue, Nebraska It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
    $78.8k-91.5k yearly Auto-Apply 53d ago
  • Information Technology Security Director - INFORMATION TECHNOLOGY

    Sedgwick County, Ks 4.0company rating

    Information security analyst job in Wichita, KS

    Department: Information Technology Pay: Salary Range: $93,196 - $139,644 annually, commensurate with education and experience. Work Schedule: Monday - Friday, 8:00 am to 5:00 pm The IT Security Director is responsible for leading the county's security program to set the IT enterprise security vision as well as safeguard information systems and data. This includes establishing and implementing comprehensive security policies, ensuring compliance with applicable regulations, and maintaining effective coordination with internal and external agencies. This role will oversee the IT security team, providing technical leadership, guidance, employee development. The IT Security Director will also be expected to function as a working manager who is able to provide "hands on" assistance to the county's security efforts. Reporting to the CIO, this position will make security recommendations to county management to ensure alignment exists between business objectives and information security best practices Lead IT security operations including detecting, investigating, and responding to incidents/threats * Supervise IT Security staff and oversee daily security operations. * Coordinate and monitor security activities to ensure effective, efficient protection. * Lead and conduct investigations of security breaches or incidents and implement corrective actions. * Manage deployment, maintenance, and optimal performance of security technologies. * Prepare and manage the annual security budget Implement comprehensive security strategy and policies to provide safeguards against threats * Develop a comprehensive, cybersecurity strategy to safeguard data and systems from current and emerging threats. * Create, implement, and enforce security policies, protocols, and procedures. * Build a roadmap for adopting and integrating modern defense approaches. * Evaluate, refine, and manage key risk and performance indicators. * Implement risk management and incident response plans to ensure effective handling of security breaches and cyber incidents. Advocate for robust security practices across the County and with external agencies * Promote cybersecurity awareness and provide training on best practices. * Collaborate with leaders to integrate IT security policies and best practices into strategies and processes. * Participate in business continuity and disaster recovery planning and exercises. * Deliver regular updates on security posture, emerging threats, and the effectiveness of County security measures. * Serve as an active, non-voting member of the Technology Review Board. * Act as the County liaison with law enforcement, emergency management, and regulatory agencies during investigations or critical incidents. Assess and mitigate potential risks to the County's assets and operations * Stay current on industry trends, tools, and technologies, recommending improvements as needed. * Lead periodic risk assessments and security audits for compliance (PCI, HIPAA, CJIS) and recommend mitigation strategies. * Prepare and present risk assessments of proposed business applications and technologies to the Technology Review Board. Minimum Qualifications: Ten (10) years of IT experience with six (6) years of information security with progressively responsible experience in business-related technology solutions. Up to two years of experience may be substituted with education that provides applicable knowledge and skills. Two (2) years of supervisory responsibilities. Per Sedgwick County policy, this is a driving level position that requires a valid U.S. driver's license without restrictions and current proof of automobile insurance. Preferred Qualifications: Ten (10) years of information security experience. Four (4) years of information security leadership experience. Bachelor's degree from an accredited college or university in Computer Science, Cybersecurity, or a related field. CISSP, CISM, CRISC. It is the policy of Sedgwick County not to discriminate in its programs or services provided to the general public, including employment and all other activities, on the basis of race, color, religion, national origin, citizenship, sex, age, disability, veteran status or any other similarly protected status. Sedgwick County is committed to making the application, interview, and pre-employment testing process accessible to persons with disabilities. If you wish to volunteer information regarding any special assistance you may need, please notify Human Resources by phone at **************, TDD (Kansas Relay at 711 or *************. Do not use this phone number for employment questions. This number is provided only for those requiring ADA assistance. You will be contacted should the department feel that you are a qualified candidate.
    $93.2k-139.6k yearly 1d ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Information security analyst job in Wichita, KS

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 47d ago
  • Cyber Security Risk & Compliance Analyst

    Kansas State University 3.9company rating

    Information security analyst job in Manhattan, KS

    The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security p... * 520805 * Manhattan, Kansas, United States * Division of Info Tech * Staff Full Time (Unclassified - Regular) * Closing on: Jan 31 2026 * On-site Add to favorites Favorited View favorites About This Role The Cyber Security Risk & Compliance Analyst is responsible for assessing and managing cybersecurity risks across the university's IT environment while ensuring adherence to regulatory requirements, industry standards, and institutional security policies. This position plays a key role in identifying vulnerabilities, conducting risk assessments, monitoring compliance controls, and providing actionable recommendations to strengthen the university's overall security and compliance posture. About Us The role is with the Security Incident Operations Center (SIOC) team and works to optimize detection capabilities, improve response, and maintain proactive threat response protocols. The security operations engineer ensures that the university's IT assets remain resilient against evolving security threats while delivering high-quality service to stakeholders across the institution. Worksite Description This position is On-site. What You'll Need to Succeed Minimum Qualifications: * Requires a bachelor's degree and two years of relevant experience Preferred Qualifications: * 3-5 years of experience in compliance, audit, or risk management * Strong knowledge of regulatory frameworks and standards * Experience with GRC platforms * Understanding of risk assessment methodologies * Excellent written and verbal communication skills * Experience with audit processes and evidence collection * Knowledge of cybersecurity frameworks (NIST, ISO 27001) * Compliance or risk management certifications (CISA, CRISC, CISM) * Experience with specific industry regulations (FERPA, GLBA, PCI DSS, etc) * Knowledge of business process mapping and documentation * Experience with policy management systems * Understanding of legal and regulatory research Additional Role Information: * Occasional after-hours work for incident response or change management work in designated maintenance windows * Participation in on-call rotation (applicable positions) * Occasional travel required for training, conferences, or other events Sponsorship eligibility: Candidates must be legally authorized to work in the U.S. on an ongoing basis without sponsorship How to Apply Please submit the following documents: * Resume * Cover Letter * Three Professional References Application Window Applications close on: January 31, 2026 Anticipated Hiring Pay Range $61,591-$70,000 frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_2dca1e396ec8ae7afb704142b6b8ab6b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/2dca1e396ec8ae7afb704142b6b8ab6b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_1"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_c0d64716b16e90313d8327ce9bb0af04" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/c0d64716b16e90313d8327ce9bb0af04?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_3"> frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_7d751c6b5967126ac4d8c55b815f613b" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/7d751c6b5967126ac4d8c55b815f613b?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=1_5"> You may also be interested in Assistant Professor, Swine Nutrition Manhattan Animal Sciences & Industry Assistant/Associate Professor, Swine Manhattan Animal Sciences & Industry Infrastructure Security Engineer Manhattan Division of Info Tech Why Join Us: Kansas State University offers a supportive and inclusive community, dedicated to your professional growth. While specific benefits may vary by position, many roles come with comprehensive packages that support your well-being and work-life balance, including health and life insurance, retirement plans, and generous paid time off. To learn more about benefits that are available for various positions, visit our benefits overview page. Work Authorization: Applicants must be currently authorized to work in the United States at the time of employment. Equal Employment Opportunity: Kansas State University is an Equal Opportunity Employer. All applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender, gender identity, age, national origin, disability or status as a protected veteran. Remote and Hybrid work options: Some positions are eligible for remote or hybrid working arrangements. An employee who is working in a remote or hybrid capacity for K-State must reside within the United States in order to comply with all federal and state laws, filings, or tax requirements. Remote and hybrid work arrangements are not available for anyone who resides in the state of Idaho. Background Screening Statement: Upon acceptance of a contingent offer of employment, a candidate may be subject to a background check per K-State's background check policy. Interview Preferences: Kansas State University honors interview preferences for qualified applicants who are veterans or individuals with disabilities. Eligible applicants who meet the minimum qualifications, submit all required application materials, and submit required preference documentation by the closing date on the job advertisement will be granted a first-level interview. The disability and veteran interview preferences do not apply to student employment positions, temporary positions, athletics positions, academic and administrative department heads*, positions that require licensure as a physician, and positions that require that the employee be admitted to practice law in Kansas. * Heads of Departments refers to any individual holding a primary leadership role responsible for the overall strategic direction, management and operational oversight of a recognized academic or administrative unit within the university. To learn more about interview preferences at K-State, please visit our interview preferences page. frame-loader#show Progress clinch:authenticated@document->frame-loader#reload" id="turbo_frame_page_block_b63d88fbc8447ba82fcff7e6eacf09b0" src="/pages/d32a1bf2ca581efcac00c7ce472481d4/blocks/b63d88fbc8447ba82fcff7e6eacf09b0?job_uid=6bf61e527a0064241fb5d0e2f13b6ab7&postfix=3_0">
    $61.6k-70k yearly 3d ago
  • Information Security Analyst

    Mid American Credit Union 3.5company rating

    Information security analyst job in Wichita, KS

    Job DescriptionSalary: $24 About Us Credit Unions are not-for-profit organizations that exist to serve their members rather than to maximize profits. As a member-owned institution, our focus is on providing a safe place to save and borrow at reasonable rates! That is why our mission at Mid American Credit Union is to be the best choice for quality financial services, above and beyond all other alternatives. Who Should Apply Mid American Credit Union is looking for individuals that like to be challenged, rewarded and inspired! This job is perfect for self-motivated, quick thinkers with unmatched problem-solving skills. Are you ready to be a part of a team that provides outstanding service each and every day? What You'll Do As part of the IS team, the Information Security Analyst is responsible for assisting in on going reviews of IS systems and hardware to assure that regulatory requirements are met, and that all internal policies and procedures conform to regulatory levels. The Information Security Analyst is also responsible for assisting in the detection and remediation to third party audits, testing, and real time security vulnerabilities. The Information Security Analyst will also assist other members of the IS team and third-partyvendors in maintaining technology infrastructure and processing cycles in a manner that adheres to IS Compliance, IS Security, and IS performance standards. Operations IS Compliance and Cybersecurity Lead the completion of Mid American Credit Unions ongoing review of IS systems and procedures. Assist management to ensure information security policies and procedures conform to the appropriate regulatory level. Assist management by monitoring and advising on status of emerging trends in the industry and research potential security enhancements as directed by management. Third Party Audits and Testing Schedule and review periodic vulnerability and penetration test reports to track vulnerability and patch remediation efforts. Work with 3rd party vendors and IS staff to identify the appropriate mitigation action and remedies to reduce the risk to Mid American Credit Union information assets with minimal negative impact on the associated business processes. Investigate and report security violations of Mid American Credit Union Information Security policies and procedures Assist in Mid American Credit Unions annual Disaster Recovery testing and complete internal audits which include, but are not limited to, active directory reviews, internet logs, internal privileges, system access, media access, etc. Network Performance and Hardware Review hardware, software, and firmware technologies for possible security vulnerabilities that could impact the security of Mid American Credit Union assets. Provide trouble shooting and problem resolution for functional security and resolve security issues. User Support Respond to user requests for assistance in a timely, accurate and professional manner. Log all users requests in the Help Desk ticketing systems. Assist other team members with open tickets as needed. Perform any other duties as needed. Third Party Vendor, Training and Documentation Establish and maintain relationships that adhere to the credit union service standards with other Mid American Credit Union employees and third party vendors. Assist in the daily coordination and collaboration with third party vendors. Assist in IS security awareness and training efforts throughout the credit union. Assist in updating existing IS policies and procedures. Maintain all required documentation which includes, but not limited to; the ACET workbook, exam documentation, daily monitoring, vulnerabilities and remediation, audit test findings and remediation, incident response, change management, etc. Cultural Responsibilities Committed to being part of the Mid American team! Show commitment to learning and growth. Consistently demonstrate a positive attitude and strong people skills during interactions with co-workers and members. Be able to work individually as well as with a team. Embrace change and be able to think of new ideas to assist our members. Demonstrate financial responsibility and professionalism. What You Need to Get the Job Done Must be team oriented and possess a positive attitude while working well with others. Customer service experience including the ability to effectively perform the skills necessary to deliver exceptional service, such as communication, empathy, patience and organization. Education A 2-year college degree or completion of a specialized course of study at a business or trade school preferred. Experience 6 months to 2 years of similar or related experience, including time spent in preparatory positions. Working knowledge of front and back office financial institution processes is a plus. Understanding of networks and cyber security. Working knowledge relating to Microsoft server, exchange, and active directory preferred. A significant level of trust and diplomacy is required to be an effective subject matter expert in the position. In-depth dialogues, conversations and explanations with customers, direct and indirect reports and outside vendors of a sensitive and/or high confidential nature is a normal part of the day-to-day experience. Communications can involve motivating, influencing, educating and/or advising others on matters of significance. Must be able to work extended hours and/or travel off site when requested by management. 24x7 on call is required with on-site Saturday rotation duties. Must be able to perform job functions independently or with limited supervision and work effectively on own or as part of a team. Must be able to read and carry out various written instructions and follow oral instructions. Strong verbal and written communication skills. Strong organizational skills Ability to demonstrate a high degree of integrity, trust-worthiness, and maintain confidentiality of information and job-related data. Ability to prioritize multiple tasks and adjust to changing priorities, as well as, meet hard deadlines. What You'll Love About Us A Company that Cares.We are more than a financial institution; we give back to our community. We teach financial literacy and donate to and support local organizations. Work that Stays at Work.Genuine work/life balance served here! Rest and Relaxation. Paid vacation time, personal leave and paid holidays An Equal Opportunity Employer Mid American Credit Union is an Equal Opportunity Employers whose policy is not to discriminate unlawfully against any qualified employee or applicant for employment on the basis of protected military or veteran status, disability, race, color, religion, sex, age, national origin, pregnancy, genetic information, sexual orientation, gender identity, or any other classification protected by applicable local, state or federal law. Because our team members are trusted to handle sensitive information, we require all candidates who receive and accept employment offers to complete a background check before being hired. This Company Participates in E-Verify The Right to Work Este Empleador Participa en E-Verify El Derecho a Trabajar
    $24 hourly 3d ago
  • IT Security Manager

    True North Consulting 4.4company rating

    Information security analyst job in Overland Park, KS

    This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization ·Ensures consistent and effective security practices ·Establishes appropriate Information Security procedures and governance ·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures ·Manages investigations into identified problematic activity and provides on-going communication with IT senior management ·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division ·Provides centralized guidance and governance of Information Security solutions ·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals ·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk ·Assist with Information Security awareness programs ·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management. ·Participates in annual and long-range planning activities to ensure Information Security needs are addressed Qualifications Must be open to travel approximately 35% of the time. A college degree in MIS, CIS, Business Management, or related field 5+ years of overall Information Security experience 1+ years working on an Information Security implementation team An Information Security industry certification is preferred Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks: CIS Critical Security Controls ISO 27000-series standards NIST SP800-53 and related standards Must have a working knowledge of the following Information Security practices, standards, and systems: Data Loss Prevention (DLP) systems Encryption technologies and standards Endpoint security software Governance, Risk, and Compliance (GRC) systems Identity and Access Management (IAM) Incident response practices Network security (e.g. firewalls, IDS/IPS, VPN, etc.…) Risk assessment practices Security Information Event Management (SIEM) systems Vulnerability management practices and scanning tools Additional Information Solid company with excellent track record of stability,.Great opportunities for growth and learning.
    $102k-138k yearly est. 30m ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 14d ago
  • Security Analyst

    Foresite 4.3company rating

    Information security analyst job in Overland Park, KS

    Job Description About the Role As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite. Responsibilities: Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time. Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision. Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients. Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events. Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports. Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture. Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks. Qualifications: Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies. SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events. Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes. Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences. Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals. Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats. Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
    $61k-87k yearly est. 12d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Information security analyst job in Overland Park, KS

    We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant. If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you. What You'll Do Implement, operate, and maintain enterprise-level information security tools and controls across the organization. Conduct security assessments and control testing to evaluate system performance and operational effectiveness. Support and mature core security processes, including: Malware response and remediation Vulnerability management and patch governance Security log analysis and monitoring Incident tracking, reporting, and documentation Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations. Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives. Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input What You Bring Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience. 3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus. Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Proven ability to operate with independence and accountability in a dynamic environment. Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority. Analytical mindset with strong attention to detail, organization, and documentation discipline. Why Join Us We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients. We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance. EOE/M/F/D/V
    $66k-91k yearly est. Auto-Apply 27d ago
  • Information Security Officer

    State of Kansas

    Information security analyst job in Shawnee, KS

    Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team! Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position. E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here. Office of Information Technology Services About the Position: * Who can apply: Anyone * Classified/Unclassified Service: Unclassified * Full/Part-time: Full-Time * Regular/Temporary: Regular * Eligible to Receive Benefits: Yes * Veterans' Preference Eligible: Yes * This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule. Compensation: * Annual Salary/Hourly Rate: $85,000 - 95,000/Annually Note: Salary can vary depending upon education, experience, or qualifications. Position Summary: The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch. Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF). Key Responsibilities: * Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53). * Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure. * Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs. * Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others. * Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects. * Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans. * Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices. Required skills: * Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53. * Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences. * Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders. * Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment. * Ability to assess regulatory requirements and determine whether existing controls meet those requirements. * Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems. Minimum Qualifications: * Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security. Preferred: * One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year. * Familiarity with government and public sector environments * Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075. Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment. Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor). Employment Benefits: In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in: * Comprehensive medical, mental, dental, vision, and additional coverage * Sick & Vacation leave * Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave * Paid State Holidays * Employee discounts with the STAR Program * Retirement and deferred compensation programs * This benefits package represents additional annual compensation. Visit the Employee Benefits page for more information… Recruiter Contact Information: * Name: Brenda Cripps * Email: OITS_****************** * Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612 Required documents for this application to be complete: * On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed. * DD214 (if you are claiming Veteran's Preference) * Inside your Job Application upload these documents: * Resume (or choose existing if you have one) * Cover Letter Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents." Job Application Process * First Sign in or register as a New User * Complete or update your contact information on the: * Careers> My Contact Information page * NOTE: This information is included on all your job applications * Upload required documents listed above for the Careers> My Job Applications page * NOTE: This information is included on all your job applications * Start your draft job application, upload other required documents, and submit when it is complete. * Manage your draft and submitted applications on the Careers> My Job Applications page. * Check your email and My Job Notifications for written communications from the Recruiter * Email - sent to the Preferred email on the My Contact Information page * Notifications - view the Careers> My Job Notifications page Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions." How to Claim Veterans Preference Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager. How to Claim Disability Hiring Preference Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager. Learn more about claiming Disability Hiring Preference: Disability Hiring Preference | Kansas Department of Administration (ks.gov) Equal Employment Opportunity The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job. If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
    $85k-95k yearly 40d ago
  • IT Infrastructure Analyst II

    Faith Regional Health Services 4.7company rating

    Information security analyst job in Norfolk, NE

    Work Status Details: Full Time | 80.00 Hours Every Two Weeks Exempt from Overtime: Exempt Shift Details: Evening and weekend work will be required as needed for projects. Department: Information Technology | Reports To: Manager-IT Infrastructure & Telecommunications The mission of Faith Regional Health Services is to serve Christ by providing all people with exemplary medical services in an environment of love and care. Summary: Responsible for the installation, configuration, maintenance, and support of an organization's computer systems, mobile device management, networks (LAN/WAN), and servers. Collaborate with or escalates issues to vendors and subject matter experts as needed. Monitors systems to ensure configurations, performance, resources, and security of the systems meet user needs. Maintains and supports computer hardware and software, and diagnoses issues when necessary. Ensures security measures are effective, including backup and disaster recovery. Trains and/or mentors junior staff. * This position may be performed on-site, hybrid, or remotely with the following guidelines: * The employee resides in Nebraska * Successfully completes a 90 day on-site introductory period starting on Day 1 * If fully remote, may be required to come on-site up to 20% * Adherence to all other organizational remote work requirements and policies The listing of job duties contained in this job description is not all inclusive. Duties may be added or subtracted at any time due to the needs of the organization. Responsibilities: Essential Job Duties and Responsibilities: 1. Designs, implements, and maintains complex system infrastructures. This includes applying OS patches, upgrading administrative tools, and performing daily system monitoring. This role will ensure the integrity, availability, and efficiency of all hardware, server resources, and key processes, including scheduled jobs like backups 2. Assists in designing, building, and implementation of the security posture for a variety of information systems. This involves protecting software from intrusion, ensuring infrastructure is secure, and evaluating user access to confirm it is appropriate. This role also includes monitoring for of hacking incidents, providing guidance to users, and auditing security master files. 3. Constructs, supports, and maintains information system integrations to ensure efficiency and cost-effectiveness while always looking for opportunities for automation. This involves analyzing client systems and infrastructure to guarantee compatibility and adherence to connectivity standards. 4. Assists with managing the local area network (LAN), including performance, maintenance, security, and upgrades. This role involves assisting with monitoring network traffic, troubleshooting network protocols (IP, TCP, OSPF, BGP), and analyzing application interactions at the network layer. 5. Responsible for storage management practices, including developing storage allocation, backup, and archival procedures. This role is also involved in monitoring storage usage and resource utilization, as well as detecting and resolving system outages quickly. 6. Assist in the management of desktop services enterprise-wide, including troubleshooting and problem resolution for devices like desktops, laptops, tablets, and smartphones. This also includes the maintenance of remote control, software distribution, and virus protection services. 7. Navigates technical issues related to telehealth devices, including installation support, troubleshooting, coordinating with vendors, and resolving any stakeholder issues. 8. Maintains voice and data networks by running, pulling, terminating, and splicing cables. This includes installing telecommunications equipment, following industry standards, and coordinating with contractors. 9. Manages setups, changes, and moves for on-site and remote telephones. This involves programming telephone switches, installing system and firmware updates, and maintaining backup procedures for the phone system. 10. Maintains up-to-date job knowledge by participating in educational opportunities and reading technical publications. Hours will be dependent on patient census and workload. Ability and willingness to work a flexible schedule, to include after-hours and weekends as necessary. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Other information: Job Requirements: The requirements listed below must be representative of the knowledge, skills, minimum education, training, licensure, experience, and/or ability required. EDUCATION (Minimum Requirements for Position): Associate's Degree preferred. CERTIFICATES, LICENSES, REGISTRATIONS: Current, valid driver's license issued in the state of legal residence required. Operate FRHS owned vehicles required. IT Certification in one or more role specific systems preferred. Previous Experience Requirements: EXPERIENCE: Previous experience with supporting and managing IT Infrastructure required. Combination of four years of education and experience in position field required. Skills/Knowledge Requirements: SKILLS (If Applicable): Language Skills - Ability to read, write, speak, and understand the English language required. KNOWLEDGE (If Applicable): MS O365; MS Intune; Active Directory; MS Server; MS SQL required. SQL Server, MS Teams, SharePoint, Backup Systems and Network/Cloud Storage required. LAN/WAN, Wireless Network, and VPN Management Tools preferred. Network topology, Ethernet, and Wireless Networking required. Antivirus Administration preferred. Omnissa Virtual Desktops and Server preferred. Other Certifications/Requirements: Your own personal smart phone (Faith Regional mobile apps, as well as consent to receive messages by SMS/MMS on personal phone, may be necessary to perform the functions of this position) required. Either possess or obtain Panduit cable certification within 6 months of hire required. Faith Regional Health Services is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws.
    $54k-67k yearly est. 30d ago
  • EXECUTIVE DIRECTOR FOR INFORMATION SECURITY & CHIEF INFORMATION SECURITY OFFICER

    Emporia State University 4.1company rating

    Information security analyst job in Emporia, KS

    Developing, and implementing secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Educating and managing information and technology risk in collaboration with business leaders.Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets. Maintain Professional Knowledgebase; keep apprised of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to ESU.Continuously evaluating and managing the cyber and technology risk posture of the organization.Implementing and managing the cyber governance, risk, and compliance process. Developing, justifying, and evaluating cybersecurity investments. Developing and implementing ongoing security awareness training and education for users. In coordination with the CIO and emergency management team, implementing disaster recovery protocols and business continuity plans with business resilience in mind. QUALIFICATIONS: Minimum Qualifications: * Bachelor's degree; preference for advanced degree. * Minimum of five years' experience in information security or equivalent. * Strong commitment to customer-focused and team-oriented management. * Proven leadership abilities with a history of advancing roles in security management. * Proficiency in project planning, implementation, and management. * Demonstrated capability in collaborating with diverse populations. * Experience handling sensitive and confidential information in compliance with federal and state laws. * Skilled in presenting complex security concepts to various audiences (e.g., end-user training, executive-level briefings). * Up-to-date knowledge of emerging information security technologies and strategies. * Availability for off-hours support when necessary. COMPENSATION: * Annual salary range is $130,000-$160,000 * Salary will be commensurate with experience and qualifications. BENEFITS: Base pay is one component of Emporia State University's total rewards package. We are dedicated to supporting the needs of the "whole you" with our holistic approach to employee benefits by offering comprehensive well-being benefits for you and your family that include: * Health Insurance * Free Dental insurance for employees * Retirement through the Kansas Board of Regents * Paid parental leave * Up to 31 days paid vacation and holiday days * Tuition reduction and tuition assistance * Dependent tuition waiver * For full details about our benefit plan offerings, please visit here. APPLY: Please upload a cover letter, resume, and contact information of three references here. Consideration of applications will begin immediately, and will continue until the position is filled. A background check is required prior to hire. For more information Human Resources ****************** ************** Emporia State University is an equal opportunity and affirmative action employer. All qualified applicants will receive consideration for
    $130k-160k yearly Easy Apply 18d ago
  • Information Security Compliance Analyst

    National Capitol Contracting 4.5company rating

    Information security analyst job in Offutt Air Force Base, NE

    This is a FULL-TIME, onsite position located in Omaha, NE. Active SECRET government security clearance required at the time of application. NCC is seeking an Information Security Compliance Specialist for an upcoming contract. Key Areas of Responsibility * Planning: Cyber Operational Readiness Assessment Planning (CORA) consisting of the following: * Testing and analysis of all applicable STIGs. * Scheduling and implementation of all applicable STIGs. * Monitoring and execution of the quarterly revalidation schedule. * Monitoring emerging changes to the applicable STIGs outside of the quarterly schedules. (CDRL A003). * Meeting Support: The contractor personnel shall support the following: (a) briefing 557 WW leadership on Cyber Security updates; (b) preparing biweekly Cyber Security Update meetings; (c) meeting with stakeholders to facilitate Cyber Security collaboration and (d) obtaining input from stakeholders to present to 557 WW leadership. (CDRL A002, A003, A005). * Monitoring the cybersecurity risk and threat to the 557 WW's cyber environment. * Assisting with the implementation plans for the 557 WW's transition to a cloud environment. Minimum Qualifications * Active Secret Government Security Clearance. * 5 years of relevant experience in Cyber Security and system accreditation. * Experience in the following: * Endpoint Security * Assured Compliance Assurance Solutions (ACAS) * Threat hunting and risk analysis * Intrusion Detection Systems * DISA STIGS * IAT Level II Certification Preferred Qualifications * Bachelors Degree in relevant field. NCC provides reasonable accommodations to qualified individuals with disabilities. If you are an applicant that requires a reasonable accommodation, please email us. Please reference the position in your email. NCC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristic. E-Verify Employer. VEVRAA Federal Contractor.
    $64k-92k yearly est. 60d+ ago
  • Cyber Security Training

    Kanshe Infotech

    Information security analyst job in Omaha, NE

    Kanshe Infotech - Houston, TX Kanshe Infotech is committed and noticed in the Information Technology industry as a company with exceptional talent and expertise in the area of software development and solutions. The company is formed by a group of people with extensive industry experience and wide ranging domain expertise with a vision to create a cost effective, high value solution provisions comparable to the big consulting companies. The mission of our company is to be an industry leader by offering innovative technology solutions that will give companies the edge to succeed in today's competitive environment.We work with large fortune 100 clients and are looking to add consultants to our team in the following technologies based on the career choice of the individual and also position with our clients. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information No
    $73k-102k yearly est. 32m ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 14d ago
  • Jr. Information Assurance Analyst

    National Capitol Contracting LLC 4.5company rating

    Information security analyst job in Bellevue, NE

    Job Description This is a FULL-TIME, onsite position located in Omaha, NE. Active SECRET government security clearance required at the time of application. NCC is seeking a Junior Information Assurance Analyst for an upcoming contract. Key Areas of Responsibility This position is designed for a junior level individual who will assist more senior positions and perform functional duties under their oversight The role requires collaboration with the Information System Security Officer (ISSO) and Information System Security Manager (ISSM) to develop technical solutions to problems, implement enhancements, and upgrade system architectures The Cyber Security Analyst will be responsible for implementing categorization for security control selection and creating, maintaining, and updating required Risk Management Framework (RMF) artifacts for Authorization to Operate (ATO) packages The analyst will define system security requirements, assess system security architecture designs, and support the development and sustainment of the RMF authorization package throughout all lifecycle phases Additionally, the role involves updating and assessing hardware, software, policies, and processes for compliance with system ATO packages As part of the Continuous Monitoring process, the analyst will review and update the Plan of Action and Milestones (POA&Ms) and perform required security testing as part of the RMF Assess & Authorize process This includes running SCAP or Evaluate-STIG, completing DISA Security Technical Implementation Guides (STIGs), and running ACAS scans The analyst will accurately review vulnerability scan and STIG Checklist results and update them as needed Attendance at meetings requiring cyber support is necessary, and effective communication of cybersecurity and operations issues to the ISSO/ISSM is essential Assist more senior positions and perform functional duties under their oversight Work with ISSO and ISSM to develop technical solutions to problems, implement enhancements, and upgrade system architectures Implement categorization for security control selection Create, maintain, and update required RMF artifacts for ATO packages Define system security requirements and assess system security architecture designs Support the development and sustainment of the RMF authorization package throughout all lifecycle phases Update and assess hardware, software, policies, and processes for compliance of system ATO packages Review and update POA&Ms as part of the Continuous Monitoring process Perform required security testing as part of the RMF Assess & Authorize process Accurately review vulnerability scan and STIG Checklist results and update as needed Attend meetings requiring cyber support as necessary Communicate cybersecurity and operations issues to ISSO/ISSM Minimum Requirements Active Secret Government Security Clearance. 1-2 years experience in a similar role. IAT Level I Certification or higher. Preferred Qualifications Bachelors Degree in relevant field. NCC provides reasonable accommodations to qualified individuals with disabilities. If you are an applicant that requires a reasonable accommodation, please email us. Please reference the position in your email. NCC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status, political affiliation, genetic information, or any other legally protected status or characteristic. E-Verify Employer. VEVRAA Federal Contractor.
    $45k-67k yearly est. 2d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 14d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Grand Island, NE?

The average information security analyst in Grand Island, NE earns between $52,000 and $101,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Grand Island, NE

$73,000
Job type you want
Full Time
Part Time
Internship
Temporary