Director Information Security
Information security analyst job in Topeka, KS
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Location: Remote
Reports to: VP, Black Lotus Security Group
Clearance Required: Active TS/SCI with CI polygraph
About Black Lotus Security Group
Black Lotus Security Group (BLSG) is Lumen Technologies' advanced threat intelligence and network engineering organization. BLSG combines global internet telemetry, large-scale analytics, and deep security engineering expertise to uncover, disrupt, and defend against the most sophisticated cyber threats. Our mission is to protect critical infrastructure, enterprises, and governments by transforming raw network visibility into actionable intelligence and resilient security solutions. Through close collaboration with customers, partners, and the broader security ecosystem, BLSG delivers scalable defenses that safeguard the world's most complex networks.
**The Main Responsibilities**
We are seeking a Principal Information Security Engineer Director, Information Security to support high-value public- and private-sector customers. You will be primarily responsible for deploying, configuring, and securing network security gear, with a strong emphasis on optical fiber installation, testing, and maintenance. You will focus on hands-on implementation, troubleshooting, and support in complex environments, while collaborating with internal teams and customers to ensure resilient and secure solutions.
What You'll Do
Deploy, configure, and maintain routers, switches, firewalls, and VPNs across data center and field environments.
Install, terminate, and test optical fiber (single-mode and multi-mode), and end-to-end troubleshooting.
Serve as a trusted technical contact for customers, vendors, and peers during deployments and escalations.
Produce clear, reusable technical documentation including network diagrams, Methods of Procedure (MoPs), and runbooks.
Identify risks during deployment and ensure adherence to compliance and government security standards.
Collaborate with cross-functional teams to integrate security into network design and deployments.
Travel domestically as required to support surveys, installations, and cutovers.
Perform advanced troubleshooting of network security issues and escalations to restore service quickly and prevent recurrence.
Define and execute repeatable lab and field test procedures; help standardize deployment patterns and acceptance criteria.
Coordinate activities with vendors, internal teams, and customer stakeholders to meet scope, schedule, and quality objectives.
Contribute to peer knowledge transfer and the documentation of best practices and lessons learned.
Who You Are
You are a hands-on engineer who thrives in complex, mission-critical environments. You communicate with clarity, drive accountability through partnership, and can translate strategy into executable tasks in the field. You bring a bias for action, meticulous documentation habits, and the ability to apply structure to ambiguity while engaging stakeholders professionally.
**What We Look For in a Candidate**
Active TS/SCI clearance with CI polygraph.
Applicants selected will be subject to a government security investigation and must meet eligibility requirements and either currently possess an active security clearance or be clearable to obtain one. US Citizenship required.
8+ years of progressively responsible experience in network engineering or security operations.
Strong hands-on expertise with optical fiber (testing and troubleshooting across single-mode and multi-mode).
Proven experience with routed and switched networks: TCP/IP, Ethernet, VLANs, IPsec, VPNs, and firewalls.
Familiarity with automation/configuration tools (e.g., Ansible).
Background in system, network, or security administration (Unix/Linux preferred).
Excellent written and verbal communication skills; proven stakeholder engagement with customers and vendors.
Preferred Qualifications
Experience with SD-WAN platforms (e.g., Fortinet, Juniper, Viptela, Aruba) and load balancers (F5, Citrix).
Familiarity with NIST standards, DISA STIGs, TIC 3.0, and Zero Trust architectures.
Demonstrated contributions to standards, documentation, and technical training in large-scale environments.
Success in This Role
30 days: Complete onboarding, assume responsibility for assigned environments, and deliver an initial deployment assessment.
60 days: Independently execute deployments, including optical fiber testing and documentation.
90 days: Lead deployments end-to-end and produce hardened design recommendations aligned to compliance requirements.
Additional Details
Work Model: Remote; domestic travel as required for site surveys, installation, testing, and cutovers.
Documentation & Quality: Create and maintain MoPs, runbooks, test plans, and as-built diagrams; contribute to continuous improvement of deployment standards.
Compliance: Ensure risk mitigation and compliance in all deployments; raise and track issues to closure in collaboration with stakeholders.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 339752
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
11/30/2025
Detection & Response Security Engineer, Threat Intelligence
Information security analyst job in Topeka, KS
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Auto-ApplySenior IT Security Analyst
Information security analyst job in Wichita, KS
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyIT Security Manager
Information security analyst job in Overland Park, KS
This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization
·Ensures consistent and effective security practices
·Establishes appropriate Information Security procedures and governance
·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures
·Manages investigations into identified problematic activity and provides on-going communication with IT senior management
·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division
·Provides centralized guidance and governance of Information Security solutions
·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals
·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk
·Assist with Information Security awareness programs
·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management.
·Participates in annual and long-range planning activities to ensure Information Security needs are addressed
Qualifications
Must be open to travel approximately 35% of the time.
A college degree in MIS, CIS, Business Management, or related field
5+ years of overall Information Security experience
1+ years working on an Information Security implementation team
An Information Security industry certification is preferred
Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred
Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks:
CIS Critical Security Controls
ISO 27000-series standards
NIST SP800-53 and related standards
Must have a working knowledge of the following Information Security practices, standards, and systems:
Data Loss Prevention (DLP) systems
Encryption technologies and standards
Endpoint security software
Governance, Risk, and Compliance (GRC) systems
Identity and Access Management (IAM)
Incident response practices
Network security (e.g. firewalls, IDS/IPS, VPN, etc.…)
Risk assessment practices
Security Information Event Management (SIEM) systems
Vulnerability management practices and scanning tools
Additional Information
Solid company with excellent track record of stability,.Great opportunities for growth and learning.
GRC Security Architect
Information security analyst job in Kansas City, KS
**Title:** GRC Security Architect **Salary:** Up to $150K **About PSI** Join Us at PSI - Where You Belong, Grow, and Thrive! At PSI, we believe that people achieve their best when they feel they truly belong. That's why fairness and opportunity are at the heart of everything we do - not just words, but values deeply embedded in our culture and the full employee experience.
We're proud to foster an environment where everyone is supported to reach their full potential. From your first day through every step of your journey with us, you'll feel the difference in how we work, grow, and succeed together.
What You Can Expect From Us - We know that great work starts with feeling valued. That's why we've benchmarked all our roles against local market rates and why you'll always see salary details in our job postings. We believe in transparency, and we want you to feel confident that your next move aligns with your expectations.
**About the Role**
The GRC Security Architect plays a key role in supporting PSI's commitment to data security, privacy, and compliance. This role is responsible for driving core activities across quality, risk management, Information Security, data protection, and audit readiness to ensure the organization meets ISO, PCI, SOC 2, and other relevant standards. The position helps deliver assurance to stakeholders that PSI prioritizes the security and privacy of its data and systems.
This is a full-time, permanent role, Monday to Friday, with flexible working hours around a standard 09:00 - 17:30 schedule. The role reports to the Snr Director of Information Security, Governance, Risk and Compliance and may be performed remotely, with occasional travel to offices and test centres as required for audits and assessments.
This role requires that the successful applicant have experience working on Federal projects, be a United States resident and be able to obtain Federal clearance.
**Role Responsibilities**
+ Collaborating with Internal teams to ensure that secure systems and networks are designed and implemented.
+ Identify potential security vulnerabilities within existing and prospective systems and devise strategies to address them.
+ Working with internal teams ensure that our infrastructure and applications adhere to established security measures.
+ Identify security risks in our organization and come up with possible preventative measures.
+ Assess the organization's security status in order to identify areas that need improvement.
+ Stay up-to-date with the emergence of new security threats while continuously adopting the industry's best practices.
+ Collaborate with internal teams to embed Security by Design principles in Infrastructure, Development and DevOps practices, implementing a framework to ensure that security controls are documented for all systems as part of standard operating procedures.
+ Collaborate with internal teams to support an integrated end-to-end GRC approach across the organization.
+ Maintain and update security policies, standards, procedures, and guidelines, ensuring they align with current business and IT practices.
+ Monitor and assess the effectiveness of security controls across business systems and processes.
+ Ensure alignment with client, regulatory, and internal compliance requirements.
+ Support the automation and continual improvement of GRC processes and tools.
+ Generate and present GRC-related metrics and reports to internal stakeholders and executive leadership.
+ Support internal and external audits (e.g., ISO27001, SOC2, etc.), including gathering evidence and managing responses.
+ Build and maintain cross-functional relationships with teams such as Legal, IT, Audit, Finance, and Business Operations to ensure GRC practices support overall business objectives.
+ Support ongoing compliance initiatives, including security incident reviews, risk memos, and policy exceptions.
+ Participate in the development of operational reports, metrics dashboards, and trend analysis related to security and compliance activities.
+ Support audit plans and compliance documentation for internal or external stakeholders.
**Knowledge, Skills and Experience Requirements**
+ Experience working within, achieving and/or maintaining third-party attestations such as FedRAMP, SOC2, ISO27001
+ Solid understanding of common security tools (e.g., vulnerability scanners, firewalls, IDS/IPS, AV software) strongly recommended
+ Experience working on a Federal Program is essential and contributing to core document set eg SSP, ConMon reporting, POAMs, System Narrative, SCP, SIA
+ Experience implementing or maintaining FedRAMP Moderate Authorization is desirable.
+ Experience documenting security controls in Architecture diagrams is essential
+ Extensive training and experience in IT disciplines such as application and data security, systems programming, systems design, computer technology or software disciplines
+ Familiarity with OneTrust or ServiceNow GRC and Privacy tools desired
+ Certified training in security management, risk and compliance solutions and practices. CISSP, ISSAP, CISA, CISM, GSEC, or related certification(s) desirable.
+ Experience in a fast-paced GRC function (desirable).
**Benefits & Culture**
Alongside a competitive salary, we offer a comprehensive benefits package designed to support your well-being, your future, and your sense of purpose:
+ Retirement Benefits: 401(k), pension, or country-specific retirement plans with employer contributions
+ Generous Time Off: Enhanced paid time off/annual leave policies
+ Health & Wellbeing Coverage: Medical insurance tailored to your region, plus:
+ US: Dental, vision, life, and short-term disability insurance
+ UK: Medical cashback plan including dental, vision, and income protection
+ Flexible Spending Accounts (US)
+ Employee Assistance Program (EAP): Confidential support whenever you need it
+ Work-Life Balance: We understand life happens outside of work, and we fully support flexibility
+ Wellness Culture: Regular global wellness initiatives to help you stay healthy and inspired
+ Future Planning: Tools and support to help you grow personally and professionally
+ Giving Back: Enjoy a Volunteer Day each year and opportunities to support our communities and industry
At PSI, we're more than just a workplace - we're a global team driven by shared values and real impact. If you're ready to be part of a company that's committed to your growth and well-being, we'd love to hear from you.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
Engineer, Information Security
Information security analyst job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplyOffensive Security Engineer, Assessments (Web3)
Information security analyst job in Topeka, KS
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Network Security Analyst
Information security analyst job in Wichita, KS
SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise.
We guarantee you the best rate for your skills and performance.
Job Description
Position: Network Security Analyst( Citizens and Authorised to work in the US only)
Location: Wichita, KS (Locals preferred)
Employment: Contract to hire/Full time
Salary - DOE
Job Functions
Resolve trouble tickets and respond to alerts generated by monitoring systems
Design and implement network and security solutions
Participate in cross-discipline troubleshooting for high visibility or complex issues
Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet
Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks
Job Requirements
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment.
2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention.
Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP
Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements
Must have excellent communication skills.
***NO REMOTE WORK***
Qualifications
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
Additional Information
Shibu
************
Cyber Security Engineer
Information security analyst job in Beverly, KS
Job DescriptionDescription:
Client Solution Architects (CSA) is currently seeking a Cyber Security Engineer to support our program at Fort Leavenworth, KS.
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools and proven processes to advance federal missions.
How Role will make an impact:
Maintains the appropriate operational security posture and documentation for MCTSP information systems
Implementing DoD, Army, ARNG, and MCTSP information security policies
Creating and implementing POA&M in response to vulnerabilities identified during risk assessments, audits, and inspections
RMF document and artifact management
Managing and tracking the IAVM system
Physical and environmental protection, access control, incident handling, security training, vulnerability and compliance management, configuration management, and assistance in the development of security policies and procedures.
Requirements:
What you'll need to have to join our award-winning team:
Clearance: Must possess and maintain an active Secret Clearance.
Bachelor's degree in Cyber Security or related field or associate degree and 5 years of specialized experience.
IAT II Certification
3 years' experience in assessing and mitigating risk for networks and systems utilized in LVC and integrated training environments that include simulations that stimulate Army C2 Systems.
3 years' experience planning architectures for LVC and integrated training environments and for stimulation of Army Mission Command Systems in support of Division and Above training events and distributed exercises;
5 years' experience with military training and training support; experience designing and supporting distributed, simulation-supported exercises
Why You'll Love this Job:
Purpose filled roles that contribute to impactful solutions to advance our federal clients' mission.
You may examine doctrine, plans, policies and procedures that will enhance and enrich the training environment, ensuring our warfighters are fully prepared for any challenge.
Daily opportunities to develop new skills
Team environment
What We Can Offer You:
Compensation
Health & Wellbeing
We strive to provide our team members and their loved ones with a comprehensive suite of benefits that supports their physical, financial and emotional wellbeing.
Personal & Professional Development
We also invest in your career because the better you are, the better we all are. We have specific programs catered to helping you reach any career goals you have - whether you want to become a knowledge expert in your field or apply your skills to another division.
Diversity, Inclusion & Belonging
We are unconditionally inclusive in the way we work and celebrate individual uniqueness. We know diverse backgrounds are valued and succeed here. We have the flexibility to manage our work and personal needs. We make bold moves, together, and are a force for good.
Benefits
Healthcare (medical, dental, vision, prescription drugs)
Pet Insurance
401(k) savings plan
Paid Time Off (PTO)
Holiday pay opportunities
Basic life insurance
AD&D insurance
Company-paid Short-Term and Long-Term Disability
Employee Assistance Program
Tuition Support Options
Identity Theft Program
Engineer, Information Security
Information security analyst job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplySecurity Engineer
Information security analyst job in Overland Park, KS
Job Description
Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply!
What You'll Do:
As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include:
Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services.
General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively.
Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments.
Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments.
Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives.
Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams.
Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends.
Who You Are:
Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats.
Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies.
Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to:
Google Cloud Security Command Center (SCC)
Google Security Operations
Google Threat Intelligence
Cloud Logging and Monitoring for security
Google Cloud Identity and Access Management (IAM)
Google Cloud Armor
Certifications: Possess one or more security certifications such as:
CompTIA Security+
(ISC)² SSCP or CISSP (Associate of (ISC)²)
Google Cloud Professional Cloud Security Engineer (highly preferred)
Other relevant cloud security certifications
Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences.
Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail.
Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
Information Security Officer
Information security analyst job in Shawnee, KS
Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team!
Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position.
E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Office of Information Technology Services
About the Position:
* Who can apply: Anyone
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule.
Compensation:
* Annual Salary/Hourly Rate: $85,000 - 95,000/Annually
Note: Salary can vary depending upon education, experience, or qualifications.
Position Summary:
The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch.
Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF).
Key Responsibilities:
* Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53).
* Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure.
* Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs.
* Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others.
* Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects.
* Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans.
* Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices.
Required skills:
* Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53.
* Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences.
* Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders.
* Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment.
* Ability to assess regulatory requirements and determine whether existing controls meet those requirements.
* Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems.
Minimum Qualifications:
* Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security.
Preferred:
* One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year.
* Familiarity with government and public sector environments
* Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075.
Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment.
Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor).
Employment Benefits:
In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
* This benefits package represents additional annual compensation.
Visit the Employee Benefits page for more information…
Recruiter Contact Information:
* Name: Brenda Cripps
* Email: OITS_******************
* Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents."
Job Application Process
* First Sign in or register as a New User
* Complete or update your contact information on the:
* Careers> My Contact Information page
* NOTE: This information is included on all your job applications
* Upload required documents listed above for the Careers> My Job Applications page
* NOTE: This information is included on all your job applications
* Start your draft job application, upload other required documents, and submit when it is complete.
* Manage your draft and submitted applications on the Careers> My Job Applications page.
* Check your email and My Job Notifications for written communications from the Recruiter
* Email - sent to the Preferred email on the My Contact Information page
* Notifications - view the Careers> My Job Notifications page
Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions."
How to Claim Veterans Preference
Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference:
Disability Hiring Preference | Kansas Department of Administration (ks.gov)
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. We value diversity, equity, and inclusion as essential elements that create and foster a welcoming workplace. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
Security Engineer II
Information security analyst job in Topeka, KS
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Security Engineer
Information security analyst job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplySecurity Alignment Engineer
Information security analyst job in Lenexa, KS
Onsite Logic: Security Alignment Engineer
Do you have a passion for cybersecurity and a knack for solving technical challenges? Are you a detail-oriented individual who thrives in a fast-paced environment? If so, then Onsite Logic wants you!
About the Role
We are growing fast and are looking to add a motivated person with awesome people skills, strong communication abilities, and most importantly, the desire to help others and make a real difference with clients needs. Our clients rely on us for their day-to-day technology needs along with strategic planning and management of their technology infrastructure. This is a role that is perfect for someone with great attention to detail and a security focused mindset who wants an entry level role in IT and Managed Services.
As a Security Alignment Engineer at Onsite Logic, you will play a critical role in safeguarding our clients' IT infrastructure. You will lead intermediate security alignment reviews, ensure adherence to our rigorous standards, and provide technical support to end-users.
Responsibilities:
Lead Security Alignment Reviews: Conduct comprehensive audits for mid-sized clients, identifying and mitigating intermediate technical risks. You'll then provide actionable recommendations to enhance their security posture.
Standards Champion: Independently manage and maintain the company's IT security standards library. This includes keeping documents current, incorporating new best practices, and seamlessly distributing updates to internal teams.
Technical Support Rockstar: Provide intermediate technical support to end-users by resolving tickets efficiently and expertly. Utilize documented Standard Operating Procedures (SOPs) to ensure consistent and high-quality service.
Process Improvement Advocate: Continuously analyze our processes and proactively suggest improvements to streamline workflow and maximize efficiency.
Documentation Guru: Maintain detailed and accurate client technical documentation with a focus on 98% accuracy.
vCIO Collaboration: Conduct regular vCIO review meetings with clients, fostering open communication and building strong relationships.
Qualifications:
College degree in Information Technology or equivalent experience (preferred)
3-5 years of IT Help Desk experience (preferred)
Advanced knowledge of cybersecurity concepts and best practices
Strong experience working with IT ticketing systems (e.g., ServiceNow, Jira)
CompTIA A+ and Network+ certifications (preferred)
Excellent analytical and problem-solving skills
Strong communication and interpersonal skills
Meticulous attention to detail with a commitment to accuracy
Ability to work independently and manage multiple tasks simultaneously
Success Metrics:
Successfully complete technology alignments on assigned dates (>95%)
Reduce reactive tickets from assigned clients by 15% quarter over quarter
Implement at least two best practice improvements per quarter
Maintain a documentation accuracy rate of 98%
Benefits:
Competitive salary and benefits package
Opportunity to work in a dynamic and collaborative environment
Ongoing training and professional development opportunities
Be part of a team dedicated to client success
Salary - $55,000 - $88,000 DOE
Ready to Join Our Team?
If you're a detail-oriented IT professional with a passion for security, we encourage you to apply!
Onsite Logic: Empowering businesses through secure IT Solutions.
Manager, Information Security GRC
Information security analyst job in Merriam, KS
YOUR OPPORTUNITY
We have an exciting Manager, Information Security GRC opportunity in our Merriam, KS office. The Manager, Information Security GRC will lead the Governance, Risk, and Compliance function within the Information Security organization. This is a hands-on leadership role responsible for executing day-to-day GRC operations while managing and mentoring a team of analysts. The manager will drive operational consistency, cross-divisional collaboration, and strategic maturity across GRC processes, platforms, and initiatives. The manager will collaborate with cross-functional teams, including IT, legal, audit, and business units, to maintain a robust security posture and drive continuous improvement. This role offers the opportunity to shape the organization's security posture, influence cross-divisional strategy, and develop leadership skills through mentorship and high-impact projects.
The Manager, Information Security GRC requires an advanced level of competency in risk management, security, regulatory compliance, and privacy practices. They understand and explain to others the cybersecurity requirements for legal and regulatory compliance including Sarbanes Oxley (SOX), SWIFT, and other applicable federal regulations and statutes. This role requires strong communication skills and the ability to collaborate with IT staff, leadership, business partners, auditors, and vendors.
ABOUT US
At Seaboard Foods, we create the most sought-after pork. A top U.S. pork producer/processor and leading exporter to 30+ countries, we are committed to bringing excellence to the table, seeking a better way to produce wholesome pork and connect every step between our farms and family tables. More than 5,400 employees in five states work on our farms, feed mills, and processing plant to produce Prairie Fresh pork, ensuring the well-being of our animals, the environment, our employees, and the communities we call home. We are a Fortune 500 employer, recently nominated by the Business Journal as one of the “Best Places to Work”, representing our dynamic culture, where our employees can contribute and understand why they matter.
ESSENTIAL DUTIES AND RESPONSIBILITIES
This list is not intended to be all-inclusive, and other duties may be assigned.
Provide day-to-day leadership and mentorship to the Information Security GRC Analysts
Assign resources to projects to ensure security requirements are embedded from the start
Lead and actively contribute to high-impact GRC initiatives including SOX controls audit readiness, vendor information security risk assessments, control readiness reviews, operational technology security gap analysis, and other GRC activities
Lead efforts to document and enhance current GRC processes, ensuring scalability and consistency
Align GRC efforts with broader cybersecurity transformation goals and internal audit partnerships
Define and implement performance metrics to measure the effectiveness, consistency, and efficiency of GRC functions; use these metrics to drive accountability and continuous improvement
Evaluate and evolve the existing GRC platform to ensure long-term suitability
Design and implement a Risk Management Framework and a Security Control Capabilities Maturity Process to be used across all divisions
Partner with other Seaboard divisions to provide training and guidance on corporate security policies, standards, and risk management practices
Leads the process for addressing exception requests to information security policies and standards across all divisions
Meet regularly with Seaboard divisional security contacts to gather updates on control implementation progress and support board-level reporting
Draft cybersecurity update content for Board presentations in collaboration with the Information Security GRC Analysts
CORE COMPETENCIES FOR SUCCESS IN ALL ROLES:
instills trust, communicates effectively, action-oriented, ensures accountability, and drives results.
QUALIFICATION REQUIREMENTS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required or preferred. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
Required:
Minimum five years of relevant experience in Information Security or GRC roles, including at least two years of proven leadership experience encompassing team coaching and mentoring responsibilities
Excellent communication, analytical, stakeholder engagement, and cross-functional collaboration skills
Proven ability to lead by example through direct hands-on operational contributions
Advanced knowledge and understanding of security control frameworks (such as CIS Critical Security Controls, NIST SP800-453, etc.), regulatory requirements (SOX, SWIFT, GDPR, CCPA), and demonstrated experience working with and interpreting information security controls attestation reports (e.g., SOC1, SOC2, etc.).
Demonstrated expertise in information risk concepts and risk assessment methodologies, with proven experience in administering electronic GRC platforms such as OneTrust
Extensive expertise in IT General Controls and a proven ability to apply these principles across information systems, infrastructure, applications, and cloud-based environments
Demonstrated ability to lead complex projects, manage timelines, and deliver results in a fast-paced environment
Ability to drive adoption of new security policies and processes across multiple departments and divisions
Preferred:
University degree in Cybersecurity, Information Security, Risk Management, Information Technology or related field
One or more of the following certifications: CISSP, CRISC, CISA
Commitment to staying updated on the latest cybersecurity trends, threats, and best practices through continuous learning
Comfort with managing competing priorities and meeting tight deadlines
WORK ENVIRONMENT
The physical and work demands listed here represent those an employee should possess to successfully perform the job's essential functions. Reasonable accommodation may be made to enable individuals with disabilities to perform essential functions.
Primarily an office environment with some need to work in the field.
The hours and days of work are established by departmental needs and at the discretion of management. After-hours, weekends, and overnight travel as requested.
WHY SEABOARD FOODS?
Medical, vision & dental benefits upon hire
401K with company match
Paid Time Off & Company Holidays
Wellness Program
Tuition reimbursement
Employee pork purchase program
For a complete list of our benefits please visit our career site: **********************************************
Seaboard Foods is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, gender identity, protected veterans' status, status as a disabled individual, or any other status protected by law.
Security Engineer Investigator, Insider Trust
Information security analyst job in Topeka, KS
As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats.
**Required Skills:**
Security Engineer Investigator, Insider Trust Responsibilities:
1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats
2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes
3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations
4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation
5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities
6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities
7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success
**Minimum Qualifications:**
Minimum Qualifications:
8. Bachelor's degree in Computer Science, Engineering, or equivalent experience
9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role
10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis
11. Experience with attacker tactics, techniques, and procedures
12. Proficiency in coding or scripting in one or more general-purpose programming languages
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Auto-ApplyNetwork Security Analyst
Information security analyst job in Wichita, KS
SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise.
We guarantee you the best rate for your skills and performance.
Job Description
Position: Network Security Analyst( Citizens and Authorised to work in the US only)
Location: Wichita, KS (Locals preferred)
Employment: Contract to hire/Full time
Salary - DOE
Job Functions
Resolve trouble tickets and respond to alerts generated by monitoring systems
Design and implement network and security solutions
Participate in cross-discipline troubleshooting for high visibility or complex issues
Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet
Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks
Job Requirements
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment.
2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention.
Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP
Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements
Must have excellent communication skills.
***NO REMOTE WORK***
Qualifications
Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background.
Additional Information
Shibu
************
Information Security Engineer - Black Lotus Labs Threat Researcher (APT)
Information security analyst job in Topeka, KS
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
Black Lotus Labs is seeking a Principal Security Engineer on the Research & Analysis team. This team leverages Lumen's global visibility of one of the world's largest and most interconnected IP backbones and a petabyte-scale compute cluster to perform cutting edge threat research, hunting and tracking advanced persistent threat actors (APTs) and emerging criminal activity as the threat actors traverse the internet. They empower customers to stay ahead of the evolving threat landscape.
**The Main Responsibilities**
+ Serve as Threat Research Subject Matter Expert, offering guidance and support to the Black Lotus Labs team on threat hunting activities, such as identifying knowledge gaps, troubleshooting technical challenges, developing solutions, and mentoring team members in overcoming obstacles. Set priorities for what threats to analyze to maximize team's impact.
+ Conduct threat research across technical data sets, fusing Black Lotus Labs telemetry with third party data sets, to automate detection of the latest threat attacker tools, techniques and procedures (TTPs) with a goal of automating detection.
+ Use industry-leading technical knowledge of adversary capabilities and infrastructure and define, develop, and implement techniques to lead the team in tracking sophisticated adversaries, delivering actionable threat intelligence data to Lumen customers.
+ Lead and enhance threat hunting operations by actively engaging with other research teams, building strong partnerships to achieve shared goals, exploring new data sources, and mentoring team members in executing workflows and solving complex challenges.
+ Provide expert analysis and strategic insights on emerging threats and vulnerabilities, translating complex technical information into actionable intelligence for executive leadership and external stakeholders.
+ Spearhead thought leadership initiatives by leading Black Lotus Lab's voice at security conferences and internal executive briefings.
**What We Look For in a Candidate**
+ Proven experience in threat hunting and in-depth technical security research, demonstrating a strong track record of successfully identifying, tracking, and disrupting nation-state and cybercriminal threat actors.
+ Deep understanding of advanced threat hunting methodologies, attacker tactics, techniques, and procedures (TTPs), and the ability to derive actionable threat hunts from complex data sets.
+ Demonstrated experience building prototype threat hunting solutions and large data analysis tools with Python (or other equivalent languages).
+ Proven experience initiating and coordinating technical projects focused on telemetry collection, TTP based threat hunting, or developing threat hunt tools that have cross-organization impact on threat visibility, including leading private-public partnerships and multi-company collaborations.
+ 5+ years of experience in the IC, DoD or similar tracking and defending against nation state threat activity.
+ Exceptional communication and presentation skills, including the ability to clearly and concisely convey complex technical information to both technical and non-technical audiences, ranging from executives and board members to conference attendees and internal stakeholders.
+ Experience presenting at industry conferences and in the media.
+ Highly organized with the ability to manage multiple tasks, prioritize effectively, and triage competing demands in a fast-paced environment.
+ Proven ability to lead and manage complex technical projects, effectively driving them to successful completion.
+ Active TS/SCI clearance with poly
**Well-experienced candidates may also have the following skills: **
+ Proficiency in malware reverse engineering and incident response.
+ 5+ years of experience leading teams of technical threat discovery professionals.
+ Software development experience in Docker and big data technologies like Hadoop, Spark, and Tensor Flow.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
**What to Expect Next**
\#LI-JS1
Requisition #: 339093
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
11/12/2025
PSA I-IT Fiscal Analyst
Information security analyst job in Shawnee, KS
Job Posting Important Recruitment Information for this vacancy: 218486 Agency Information: Kansas Department of Corrections Our Mission: Partnering to Promote Safety and Responsibility through Best Practices.
Our Vision: Transforming Lives for the Safety of All.
Our Beliefs: Our employees are our most influential resource. Everyone has worth and will be treated with dignity and respect through our words and actions. Everyone deserves compassion, empathy, and support. Everyone has the potential for future success through effective development and support. Transformative change is accomplished through teamwork and collaboration. Trust, honesty and transparency are essential to our success. Inclusive practices, acceptance and diversity are the foundation of our mission.
Join Us Today and Make a Lasting Difference!
Work Authorization & Employment Eligibility
The Kansas Department of Corrections (KDOC) does not sponsor employment visas for any positions and does not participate in the STEM-OPT extension program. All candidates must be legally authorized to work in the United States at the time of application and throughout the duration of employment without the need for current or future visa sponsorship.
Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents, please refer to the federal Form I-9.
E-Verify Participation
KDOC participates in E-Verify and will provide the federal government with the information from your Form I-9 to confirm authorization to work in the United States. For more information about E-Verify, please visit E-Verify.gov. For information about your rights under the Immigrant and Employee Rights Section (IER), please visit justice.gov/crt/immigrant-and-employee-rights-section.
KDOC is an Equal Opportunity Employer. We value diversity and are committed to creating an inclusive environment for all employees.
About the Position: PSA I - IT Fiscal Analyst, 218486
This position will be located at our Kansas Department of Corrections Central Office, in Shawnee County.
Who can apply: Applicants who meet the minimum requirements
Classified/Unclassified Service: Unclassified Service
Full-Time/Part-Time: Full-Time
Regular/Temporary: Regular
Work Schedule: 8:00 AM - 5:00 PM, Monday through Friday
Eligible to Receive Benefits: Yes
Follow KDOC on Social Media
Facebook, Twitter, LinkedIn, YouTube
#PATHWAY4SUCCESS
Starting Salary for this Position: $41,870.40/Annual ($20.13/Hr.)*
* Offered salary will be determined by experience, qualifications, and skill set that the candidate brings to the position. Though this position is unclassified, the posted starting salary is equivalent to classified Pay Grade 26, step 6. Please contact Recruitment Coordinator for further details.
Employment Benefits
Comprehensive medical, mental, dental, vision, and additional coverage
Sick & Vacation leave
Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
Paid State Holidays (designated by the Governor annually)
Fitness Centers in select locations
Employee discounts with the STAR Program
Retirement and deferred compensation programs
Visit the Employee Benefits page for more information…
Position Summary & Responsibilities
Position Summary:
The Purpose of this position is to provide evaluation of the agency's Information Technology resources through fiscal and financial audits and provide fiscal services to the Information Technology Division.
Job Responsibilities may include but are not limited to the following:
As requested by the Chief Information Officer, this position conducts routine and special financial analyses to identify inefficiencies, under utilization of resources, and billing errors and provide recommendations to remedy. Conduct audits to ensure compliance with statutes, regulations, KDOC policy and standards, as well as generally accepted accounting principles. During the audit process, this position is responsible for making follow-up contact with the agency to obtain any missing records and/or documentation as well as answer procedural questions during the audit process.
Prepares written reports summarizing audit findings and recommending corrective action which are submitted to
* agency officials;
* appropriate Central Office staff which may include the Chief Information Officer and
Director of Fiscal Services;
* others as prescribed by statute, Information Technology Executive Council, Kansas Criminal Justice Information Systems, Kansas Administrative Regulations, and internal procedures.
Prepares work papers to support audit findings and audit work performed.
Assists in the development of the annual IT budget. Reviews annual budgets submitted. Compares budget documents with comprehensive plans to ensure funds are budgeted in correlation to approved comprehensive plan.
Manages software licenses, hardware, cellphones, etc. purchases and support renewals. Work requires interpreting guidelines, regulations and policies governing the acquisition of products. A thorough understanding of state contracts is required.
Maintain and Track IT Inventory from the point of purchase and assignment to transfers to retirement/destruction.
Develops and conducts annual training on accounting and fiscal procedures and requirements for local agency fiscal staff. Other duties as assigned to support Fiscal Division functions.
Qualifications
Minimum Qualifications:
Three years of experience in examining internal work processes, financial and operational records and controls to assess effectiveness, accuracy of records and compliance with statutes, regulations and professional/legal standards. Education in accounting/auditing, business administration, or economics may be substituted for experience as determined relevant by the agency.
Substitution: Bachelor's/Advanced Degree in Accounting or Auditing.
Preferred Qualifications:
Knowledge of generally accepted accounting principles (GAAP), practices and standards.
Ability to develop audit findings and recommendations for improvement or compliance with laws and regulations and to present this information in clear and concise written reports.
Knowledge of or experience with general ledgers and cash reconciliation.
Experience and ability to detect and reconcile discrepancies in financial records.
Knowledge of budget and procurement practices and procedures.
Ability to analyze and interpret financial information and to take the appropriate correction actions.
Advanced training in Microsoft Excel documented by training certificates.
Effective oral and written communication skills.
Post-Offer, Pre-employment Requirements:
Must possess and maintain a valid driver's license. Must pass a criminal history records check.
Recruiter Contact Information
Name: Alyssa Cabello
Human Resources - Recruitment Manager
Email: *********************
Name: Daniel Cline
Human Resources - Recruitment Coordinator
Email: *******************
Job Application Process
First Sign in or register as a New User.
Complete or update your contact information on the Careers> My Contact Information page. *This information is included on all your job applications.
Upload required documents listed below for the Careers> My Job Applications page. *This information is included on all your job applications.
Start your draft job application, upload other required documents, and Submit when it is complete.
Manage your draft and submitted applications on the Careers> My Job Applications page.
Check your email and My Job Notifications for written communications from the Recruiter.
Email - sent to the Preferred email on the My Contact Information page
Notifications - view the Careers> My Job Notifications page
Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions"
Required Documents for this Application to be Complete
Upload these on the Careers - My Job Applications page
* Tax Clearance Certificate
* College Transcripts (if applicable)
* DD214 (if you are claiming Veteran's Preference)
Upload these on the Attachments step in your Job Application
* Cover Letter
* Resume
Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents"
Kansas Tax Clearance Certificate: A valid Kansas Tax Clearance Certificate is a condition of employment for all employees of the State of Kansas. Applicants (including non-residents) who receive a formal job offer for a State job, are required to obtain a valid Tax Clearance within ten (10) days of the job offer. A Tax Clearance can be obtained through the Kansas Department of Revenue who reviews individual accounts for compliance with Kansas Tax Law.
If you have a missing tax return(s) or you owe taxes to the State of Kansas, please know that the Kansas Department of Revenue will work with you. The Kansas Department of Revenue can set you up on a payment plan to receive a Tax Clearance so you can get a job working for the State of Kansas. The Kansas Department of Revenue can be contacted at ************. Kansas Department of Revenue - Tax Clearance Frequently Asked Questions
How to Claim Veterans Preference
Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
Learn more about claiming Veteran's Preference
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference
PLEASE NOTE: The documentation verifying a person's eligibility for use of this preference should not be sent along with other application materials to the hiring agency but should be sent directly to OPS. These documents should be sent either by fax to *************, scanned and emailed to *************************, or can be mailed/delivered in person to:
ATTN: Disability Hiring Preference Coordinator
Office of Personnel Services
Landon State Office Building
900 SW Jackson, Rm 401
Topeka, KS 66612
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. We value diversity, equity, and inclusion as essential elements that create and foster a welcoming workplace. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.