Information security analyst jobs in Oklahoma City, OK - 57 jobs
All
Information Security Analyst
Security Engineer
Information Technology Analyst
Information Security Engineer
Information Security Manager
Senior Information Security Analyst
Cyber Security Analyst
Senior Security Analyst
Senior Security Architect
Information Security Specialist
Federal Reserve Bank of Kansas City 4.7
Information security analyst job in Oklahoma City, OK
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
Important Information
Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen.
No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered.
This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility.
This position is not eligible to be remote and relocation assistance is not available.
We are seeking cybersecurity professionals to join our InformationSecurity team as a security specialist focused on operating our DevSecOps program according to standards and policies.
This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization.
Candidates with strong understanding and experience in cloud environment deployments, informationsecurity, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal.
Key Activities
Interpret and evaluate policies in order to mature and implement the DevSecOps program.
Assess maturity of development teams' DevSecOps practices against an existing framework.
Proactively advocate for and drive enhancements into the program.
Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC).
Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process.
Monitors informationsecurity policy compliance using security tooling.
Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives.
Provide technical expertise and support to internal teams on security-related matters.
Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure.
Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture.
Support leadership decision making through timely analysis and written communications.
Qualifications
Typically requires 3-6 years of relevant experience.
Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience.
Strong competence in cloud technologies such as AWS, Azure, and other platforms.
Expert understanding of DevSecOps practices, frameworks, and tools.
Expertise with tool integration for the DevOps pipeline such as Git.
Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules.
Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work.
Conveys complex and technical issues to diverse audiences.
Demonstrated competencies with artificial intelligence are beneficial.
Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others.
Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java
Technical expertise in security tools and knowledge of security practices and procedures.
A learning mindset, proactiveness, collaboration, and strong attention to detail.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Locations: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Relocation Assistance: No
Salary:
$79,100 - $111,500 / Experienced Level
$98,600 - $139,000 / Senior Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels.
Privacy Notice
$98.6k-139k yearly 3d ago
Looking for a job?
Let Zippia find it for you.
Manager Information Security & Risk Management - Cloud Security Manager
Highmark Health 4.5
Information security analyst job in Oklahoma City, OK
This job provides InformationSecurity and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various InformationSecurity personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the InformationSecurity ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents InformationSecurity awareness and training programs.
**ESSENTIAL RESPONSIBILITIES**
+ Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity.
+ Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority.
+ Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management.
+ Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion informationsecurity innovation; encourage and enforce proper training in regards to security issues.
+ Ensure compliance to Corporate and InformationSecurity policies, standards and procedures.
+ Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources.
+ Other duties as assigned or requested.
**EDUCATION**
**Required**
+ Bachelor's Degree in InformationSecurity, Information Systems, Information Assurance, Computer Science or related field
**Substitutions**
+ 6 years of relevant experience substitution for a Bachelor's Degree
**Preferred**
+ Master's Degree in Computer Science, InformationSecurity or related field
**EXPERIENCE**
**Required**
+ 7 - 10 years in InformationSecurity and/or Information Risk Management and/or Information Technology
+ 7 - 10 years in developing, communicating and presenting InformationSecurity and Risk Management concepts to varying audiences
+ 1 - 3 years in mentoring others in a leadership role
+ 1 - 3 years in Staff Management
+ 1 - 3 years in developing and executing strategic plans to realize business objectives
**Preferred**
+ 10 - 15 years in InformationSecurity and/or Information Risk Management and/or Information Technology
+ Experience managing an informationsecurity function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework
+ Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits
+ Experience establishing budgets and meeting fiduciary goals
+ Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.)
**LICENSES AND CERTIFICATIONS**
**Required**
+ None
**Preferred**
+ Certified Information Systems Security Professional (CISSP) **OR**
+ Certified InformationSecurity Manager (CISM) **OR**
+ Certified in Risk and Information Systems Controls (CRISC) **OR**
+ Information Technology Infrastructure Library (ITIL)
**SKILLS**
+ Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
+ Strong teamwork and interpersonal skills
+ Experience in leading process improvement initiatives
+ Ability to motivate high performance, multi-discipline teams
+ Demonstrated competency in project execution
+ Demonstrated abilities in relationship management
**Languages (Other than English)**
None
**Travel Requirement**
0% - 25%
**PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS**
**Position Type**
Office-Based
Teaches/Trains others regularly
Frequently
Travels regularly from the office to various work sites or from site-to-site
Occasionally
Works primarily out-of-the office selling products/services (Sales employees)
Does Not Apply
Physical Work Site Required
Yes
Lifting: up to 10 pounds
Does Not Apply
Lifting: 10 to 25 pounds
Does Not Apply
Lifting: 25 to 50 pounds
Does Not Apply
**_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._
**_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._
_As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and InformationSecurity Policy._
_Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._
**Pay Range Minimum:**
$108,000.00
**Pay Range Maximum:**
$201,800.00
_Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets._
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
Req ID: J269753
$108k-201.8k yearly 60d+ ago
Cyber Threat Analyst
Fortiphi
Information security analyst job in Oklahoma City, OK
**Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)**
Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
$65k-88k yearly est. 60d+ ago
Product Security Engineer, Instagram
Meta 4.8
Information security analyst job in Oklahoma City, OK
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Sr. Security Analyst
Maximus 4.3
Information security analyst job in Oklahoma City, OK
Description & Requirements Maximus is seeking a qualified Sr. Technical/SecurityAnalyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in informationsecurity, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$83k-111k yearly est. Easy Apply 9d ago
Senior/Information Security Analyst
Western Farmers Electric Co-Op 3.8
Information security analyst job in Moore, OK
Applications will be accepted until January 20, 2026 - Apply on-line at ************ * At the option of the hiring official, a candidate will be placed in one of the following levels based on education, experience, knowledge, skills, and behaviors required.
SUMMARY - Senior InformationSecurityAnalyst: Under the general supervision of the Supervisor, IT Infrastructure, the Senior InformationSecurityAnalyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems. In addition, the incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
SUMMARY - InformationSecurityAnalyst: Under the general supervision of the Supervisor, IT Infrastructure, the InformationSecurityAnalyst performs troubleshooting, installation and maintenance on equipment and software related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems. In addition, the incumbent participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required. The incumbent also participates in exercises that test policies, procedures and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
ESSENTIAL DUTIES AND RESPONSIBILITIES - Senior InformationSecurityAnalyst include the following; other duties may be assigned. Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems, and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments. Performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. Installs, troubleshoots, and maintains hardware and software systems related to electronic access control and monitoring systems. Reviews logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy/procedure. Responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security. Tests and implements IDS/IPS rule sets and signatures. Conducts security controls testing after significant changes to cyber assets to ensure proper security posture to meet regulatory guidelines. Monitors cyber assets and critical infrastructure to ensure system up-time. Engages in change/configuration management activities for cyber assets. Performs network traffic analysis when anomalous traffic needs to be investigated. Assists in conducting incident response and forensic investigations. Conducts vulnerability testing, analysis, and mitigation for cyber assets. Analyzes network infrastructure rule sets manually and uses software tools to ensure proper security posture for compliance. Writes reports and briefings related to specific informationsecurity issues. Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group. Conducts research on network products, services, protocols, and standards to remain abreast of developments in the informationsecurity industry. Participates in exercises that test policies, procedures, and skills which are required by business and critical operations. Participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.
ESSENTIAL DUTIES AND RESPONSIBILITIES - InformationSecurityAnalyst include the following; other duties may be assigned. Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments. Installs, troubleshoots and maintains hardware and software systems related to electronic access control and monitoring systems. Reviews logs, configurations, rule sets, user accounts, account groups and network traffic for adherence to policy/procedure. Responds to anomalous events that will require analysis and synthesizes and correlates complex events to ensure operational security. Monitors cyber assets and critical infrastructure to ensure system up-time. Engages in change/configuration management activities for cyber assets. Performs network traffic analysis when anomalous traffic needs to be investigated. Writes reports and briefings related to specific informationsecurity issues related to WFEC systems and critical cyber assets. Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group. Conducts research on network products, services, protocols and standards to remain abreast of developments in the informationsecurity industry. Participates in exercises that test policies, procedures and skills which are required by business and critical operations. Participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required.
COMPETENCIES: To perform the job successfully, an individual should demonstrate the following competencies:
Analysis/Design: Synthesizes complex or diverse information; collects and researches data; uses experience to complement data; designs workflows and procedures; generates creative solutions; translates concepts and information into images; uses feedback to modify designs; applies design principles; demonstrates attention to detail.
Problem Solving: Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Develops alternative solutions; Works well in group problem solving situations; Uses reason even when dealing with emotional topics.
Professional Knowledge: Generates creative solutions; translates concepts and information into applications; uses feedback to modify recommendations; pursues training and development opportunities; strives to continuously build knowledge and skills; shares expertise with others.
Oral and Written Communication: Speaks clearly and persuasively in positive or negative situations; listens and gets clarification; responds well to questions; demonstrates group presentation skills; participates in meetings; writes clearly and informatively; varies writing style to meet needs; presents numerical data effectively; able to read and interpret written information.
Teamwork: Balances team and individual responsibilities; exhibits objectivity and openness to others' views; gives and welcomes feedback; able to build morale and group commitments to goals and objectives; supports everyone's efforts to succeed.
Planning/Organizing: Prioritizes and plans work activities; uses time efficiently; sets goals and objectives; develops realistic action plans.
Project Management: Develops project plans; coordinates projects effectively; communicates changes and progress; completes projects on time and budget; manages project team activities.
Adaptability: Adapts to changes in the work environment; manages competing demands; changes approach or method to best fit the situation; able to deal with frequent change, delays or unexpected outcomes.
Customer Service: Manages difficult or emotional customer situations; responds promptly to customer needs; solicits customer feedback to improve service; responds to requests for service and assistance; meets commitments to customers.
Cost Consciousness: Works within approved budget; develops and implements cost saving measures; conserves organizational resources.
QUALIFICATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the education, experience, knowledge, skills, abilities, and behaviors required.
Education and Experience:
Sr. InformationSecurityAnalyst - ($98,946 - $155,088): A Bachelor's degree in a related field and five (5) years of directly related experience in informationsecurity, digital networking, computing, telecommunications or SCADA/EMS operations is required. Extensive knowledge of TCP/IP and Cisco routing and switching, as well as proven experience with Cisco ASA firewall and VPN appliances, is preferred. Industry specific certifications may be substituted for experience at the rate of one (1) year experience for each certification. Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
InformationSecurityAnalyst - ($89,710 - $139,142): A Bachelor's degree in Computer Science, Information Management, or a related field and two (2) years of directly related experience in informationsecurity, digital networking, computing, telecommunications or SCADA/EMS operations is required. An Associate's degree in Computer Science, Information Management, or a related field and six (6) years of direct work experience may be considered as a substitute for a degree. Extensive knowledge of TCP/IP, Cisco routing and switching and proven experience with Cisco ASA firewall and VPN appliances is preferred. Industry specific certifications may be substituted for experience at the rate of one (1) year of experience for each certification. Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
Language Skills: Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations. Ability to write reports, business correspondence and procedure manuals. Ability to effectively present information and respond to questions from groups of employees, managers, clients or customers.
Mathematical Skills: Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry, trigonometry, calculus and differential equations. Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations.
Reasoning Ability: Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
Computer Skills: In addition to the qualifications listed above, knowledge and experience using Microsoft Office products is required.
CERTIFICATES, LICENSES, REGISTRATIONS: Requires a current driver's license. CCNA, CCNP, Comptia Network +, Comptia Security +, CISSP, GIAC, CEH or Engineer-level Operating System certifications is desirable. Must be able to attain CISSP or similar within twelve (12) months of hire.
WORK SCHEDULE REQUIREMENTS: Normally works a weekday schedule, but may be required to work evenings, holidays or weekends. May be required to travel on short notice. May be required to work differentiated 8-hour work schedule between 8:00 am to 7:00 pm. On-call nights and weekends will be required for response to anomalous issues.
PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit and talk or hear. The employee is frequently required to use hands to finger, handle, or feel and reach with hands and arms. The employee is occasionally required to stand and walk. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, distance vision and color vision.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee will be subject to moderate outdoor weather conditions. The noise level in the work environment is usually quiet. In accordance with WFEC Administrative Procedure 805-Alcohol and Drug-Free Workplace this position is classified as "safety sensitive".
MUST MEET ALL PHYSICAL AND ENVIRONMENTAL REQUIREMENTS
WFEC IS AN EQUAL OPPORTUNITY PROVIDER AND EMPLOYER AND
TAKES AFFIRMATIVE ACTION WITH RESPECT TO INDIVIDUALS
WITH DISABILITIES AND PROTECTED VETERANS
$98.9k-155.1k yearly 15d ago
Information Security Risk & Compliance Analyst
Midfirst Bank 4.8
Information security analyst job in Oklahoma City, OK
The Security Risk and Compliance Analyst is a member of the informationsecurity team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise.
The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment.
Key Result Areas:
Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including:
Develop and maintain enterprise security policies and procedures
Assist in the coordination and completion of informationsecurity risk assessments and documentation
Work with informationsecurity management to develop strategies and plans to enforce security requirements and address identified risks
Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance
Work with IT department and members of the informationsecurity team to identify, select and implement technical controls
Provide direct support to the business and IT staff for security related
Maintain an awareness of security and control issues in emerging technologies
Perform other duties as assigned
Knowledge, skills, and experience required:
Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience
Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.)
Strong analytical and problem-solving skills to enable effective security incident and problem resolution
Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously
Ability to work well under minimal supervision
Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel
Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting
Strong customer/client focus with the ability to manage expectations appropriately
General understanding of risk management
Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC
Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas)
Preferred Qualifications:
Understanding of enterprise risk management systems and automation platforms
Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions
*This position is on-site located in Oklahoma City, must reside within the area to be considered.
*Position requires a minimum of 3 years of relevant US based experience.
#LI-Onsite
#LI-DNI
$77k-104k yearly est. 58d ago
Manager Information Security
Weokie Federal Credit Union
Information security analyst job in Oklahoma City, OK
We are seeking an experienced and mission-driven Manager of InformationSecurity to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, and has experience in IT Security, Business Continuity, and Vendor Management, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector.
The Manager InformationSecurity responsible for overseeing the InformationSecurity program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the informationsecurity framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan.
Major Activities:
* Develops, maintains, and reviews appropriate informationsecurity policies and procedures needed to maintain the integrity of the informationsecurity program.
* Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats.
* Organizes and conducts cybersecurity simulation exercises.
* Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit.
* Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated.
* Responsible for performing informationsecurity risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied.
* Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned.
* Assist with development of company wide informationsecurity training materials for computer-based training modules and build company wide informationsecurity awareness materials.
* Support technology/systems that enable all vendor management activities by administering the Tandem platform.
* Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities.
* Maintain, develop, update, and test WEOKIE's Business Continuity Plan.
* Write reports to summarize testing activities, including results and recommendations.
* Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented.
Critical Results:
* WEOKIE's informationsecurity program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs.
* InformationSecurity risks and threats are clearly identified, measured and remediated timely.
* The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts.
* Members and credit union informationsecurity assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities.
* WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources.
* WEOKIE's informationsecurity program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders.
* Risk assessments are completed annually and deficiency are quickly addressed and/or remediated.
* Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented.
* New quality control activities are developed and presented to leadership that correspond to the informationsecurity program.
* Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately.
* Vendor Management is collaboratively managed with fellow team members.
* Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures.
* WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident.
Qualifications:
* Specialized or Technical Knowledge and Skills: The Manager InformationSecurity is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of informationsecurity concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact.
* A bachelor's degree is required, preferably in Information Technology or Computer Science.
* A minimum of three years of experience in the informationsecurity field.
* A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified InformationSecurity Manager (CISM) are preferred.
* Demonstrated experience in managing and working with third party vendors.
* Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels.
* In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them.
B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position.
* Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values.
* Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members.
* Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements.
* Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad.
* Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position:
* Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations.
* Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans.
* Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others.
* Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges.
* Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile.
* Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace.
* Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis.
* Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality.
C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus.
D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate.
WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
$91k-132k yearly est. 9d ago
Senior Security Architect - Oklahoma
Cyberone Security
Information security analyst job in Oklahoma City, OK
CyberOne is hiring! We hire smart, talented and high-performing professionals to push our organization forward and provide superior service to our customers. We each take accountability for our work, strive to make each other better, and genuinely love what we do. If you value learning new things, being innovative, and working in a supportive, collaborative environment, CyberOne may be the place for you.
If you are ready to raise the bar for your career and be part of our exciting journey, we would like to hear from you!
The Presales Senior Security Architect partners closely with Account Managers, Professional Services, and partner resources to design and deliver tailored cybersecurity solutions that address customer needs. Acting as a trusted advisor, this role combines deep technical expertise with strong communication skills to build confidence and drive successful outcomes. The Senior Security Architect will primarily support customers in the Oklahoma region, while providing additional support to other regions as needed.
This position requires the candidate to reside in Oklahoma in order to effectively serve the assigned region.Essential Functions
Build strong customer relationships and serve as a trusted technical advisor, helping them achieve their business and security goals.
Work in close partnership with Account Managers, Professional Services, and vendor partners.
Continuously expand and update knowledge of cybersecurity use cases, leading partner technologies, and CyberOne's Professional Services offerings to align with customer needs.
Maintain a strong understanding of the broader cybersecurity ecosystem with deep knowledge of key verticals (e.g., network, cloud, OT, application security).
Provide training and knowledge sharing to sales teams on vendor products, cybersecurity trends, and market insights.
Perform assessments and consulting services to help customers identify risks within their environments.
Lead strategic conversations with enterprise customers on industry trends and emerging technologies.
Act as the customer's advocate for technical issues, ensuring timely follow-up and resolution.
Travel as needed to participate in customer meetings, workshops, and strategic discussions.
Education/Experience
7+ years of experience designing and implementing security solutions in large environments.
Experience leading and recommending technology selection processes within or for enterprise organizations.
Proven experience as a senior or lead technical resource/architect (cybersecurity, network, cloud, etc.) within a large organization, reseller, or systems integrator.
Effectively lead and support customer demonstrations with Systems Engineers to highlight CyberOne's value proposition.
Certification/License Requirements
Industry-recognized certifications (e.g., CISSP, CCSP, SANS, Open CA) preferred.
Vendor/technology certifications (e.g., AWS, Palo Alto Networks, Tenable) preferred.
Core Skills/Abilities
Excellent relationship-building skills with the ability to engage clients confidently in person and virtually.
Strong organizational skills with the ability to manage multiple priorities in a fast-paced environment.
Strong presentation, written, and oral communication skills across all organizational levels, from senior leadership to peers and team members.
Proficiency with standard office equipment such as laptops and smartphones.
Work Environment
Ability to travel up to 50% within the Oklahoma territory and occasionally to the Plano, TX headquarters.
Ability to navigate client environments, including walking, stairs, and carrying light materials (up to 25 lbs).
Prolonged periods of sitting or standing while working remotely or attending meetings.
Operates a laptop and standard office equipment for prolonged periods.
Participates in virtual meetings and occasional in-person training or company events.
Strong verbal, visual, and auditory capabilities to effectively present, communicate, and engage with clients and internal teams.
If you are passionate, driven and ready to take your career to the next level, we invite you to apply today!
CyberOne is a proud Equal Opportunity and Affirmative Action Employer. All qualified applicants, regardless of race, color, genetic information, national origin, religion or belief, sex, affectional or sexual orientation, gender identity or expression, immigration status, ancestry, age, marital status, disability, or protected veteran status, are encouraged to apply and will receive equal consideration based on merit, qualifications, and business need.
Recruitment Agencies Please Note:
"In accordance with our recruitment policy, CyberOne strictly prohibits any form of solicitation of our employees by external agencies or third parties. Any candidate information that may be received from such agencies or third parties shall be deemed as a voluntary gift and shall become the exclusive property of CyberOne. Exceptions to this policy apply only when an Agency/Third Party is an Authorized Vendor of CyberOne, holding a valid and current contract that has been duly signed by our People Services Manager or CFO of CyberOne. Under no circumstances will any payment be made to any Agency/Third Party unless they are an Authorized Vendor or possess written approval from the CyberOne People Services Manager or CFO, granting them explicit permission to engage in recruitment efforts on behalf of CyberOne."
$98k-132k yearly est. Auto-Apply 60d+ ago
IT Security Risk Analyst - Oklahoma City - Full-time
Two95 International 3.9
Information security analyst job in Oklahoma City, OK
Title: InformationSecurity Risk Analyst
Type: Full-time
Salary: DOE
Requirement:
Under senior staff supervision, assist in informationsecurity policy development, maintenance and auditing; security policy education, training, and awareness activities; monitor compliance with security policy and applicable law. Participate in risk assessment reviews, and assist with audit/compliance activities.
Requirements
RESPONSIBILITIES:
Review policies and procedures related to InformationSecurity and regulatory compliance.
Engage in IT SOX, ISO 27001/2, and other compliance activities.
Assist in implementation of SANS 20 Critical Security Controls.
Participate in risk assessments for projects.
Engage in process review and improvement, document as required.
Be prepared to deliver security awareness and policy training.
Actively seek to expand individual skills through research, training, and collaboration with peers.
Monitor informationsecurity news for emerging threats, technologies, and regulations that could have an impact on the security of Client's processes, systems, and applications.
Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
Work flexible hours, including weekends and evenings.
Availability to respond to emergency situations.
Perform additional duties and assignments as requested.
Education/Certification:
Bachelor's Degree required, CS, MIS or related field preferred
Industry Certification (ISACA, ISC2, GIAC) highly preferred
Experience with SOX/SOC/ISO/Privacy Shield/GDPR compliance highly preferred
Experience Required:
3 years of IT risk management, IT audit or regulatory compliance, business continuity, and/or policy and procedure experience
Knowledge/Skills/Abilities:
Informationsecurity standards such as ISO 27001/2, SANS 20 Critical Controls
Strong analytical and problem solving skills
Excellent written and verbal communication skills
Note: If interested please send your updated resume and include your rate requirement along with your contact details with a suitable time when we can reach you. If you know of anyone in your sphere of contacts, who would be a perfect match for this job then, we would appreciate if you can forward this posting to them with a copy to us.
We look forward to hearing from you at the earliest!
$69k-95k yearly est. Auto-Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, InformationSecurity and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, InformationSecurity, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Offensive Security Engineer, Assessments (Web3)
Coinbase 4.2
Information security analyst job in Oklahoma City, OK
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$152.4k-179.3k yearly 60d+ ago
IT Financial Analyst
Cayuse Holdings
Information security analyst job in Oklahoma City, OK
**JOB TITLE:** IT Financial Analyst **CAYUSE COMPANY:** Cayuse Commercial Services, LLC **SALARY:** $28.00-$35.00/hr **EMPLOYEE TYPE:** Full-Time Hourly Non-Exempt **The Work** The IT Financial Analyst will provide day-to-day support for invoice review and approval processing. The role will also assist IT managers with other financial tasks as assigned.
This position performs all duties and responsibilities in accordance with the Mission, Vision, and Core Values of Cayuse.
**Responsibilities**
**Key Responsibilities**
+ Monitor vendor invoice mailbox
+ Review vendor invoices
+ Match against contract or purchase order
+ Verify invoice for payment or return to vendor
+ Record invoice in general ledger
+ Notify Accounts Payable for vendor payment
+ Work with IT managers on other financial tasks as assigned
+ Respond to assigned tasks in accordance with predefined guidelines.
+ Other duties as assigned.
**Qualifications**
**Qualifications - Here's What You Need**
+ High school diploma or equivalent required
+ Two (2) to five (5) years of experience working in a finance position with focus on billing, invoicing, vendor management.
+ Preference with experience supporting an IT organization
+ Must be able to pass a background check. May require additional background checks as required by projects and/or clients at any time during employment.
**Minimum Skills:**
+ Microsoft Office experience (Work, Excel)
+ Experience with JD Edwards preferred
+ Financial billing, accounts payable experience
+ General accounting
+ Excellent communication skills
+ Experience working with suppliers and third-party vendors
+ Ability to quickly analyze a situation and react appropriately and effectively
+ Effective prioritization skills
+ Self-starter
+ Financial analysis credibility and independent judgment
+ Able to contribute to IT financial planning and operations
**Our Commitment to you / overview of benefits**
+ Medical, Dental and Vision Insurance; Wellness Program
+ Flexible Spending Accounts (Healthcare, Dependent Care, Commuter)
+ Short-Term and Long-Term Disability options
+ Basic Life and AD&D Insurance (Company Provided)
+ Voluntary Life and AD&D options
+ 401(k) Retirement Savings Plan with matching after one year
+ Paid Time Off
**Reports to:** **Program Manager**
**Working Conditions**
+ Professional remote office environment.
+ Must reside in Central or Eastern Time Zone.
+ Must be physically and mentally able to perform duties extended periods of time.
+ Ability to use a computer and other office productivity tools with sufficient speed to meet the demands of this position.
+ Must be able to establish a productive and professional workspace.
+ Must be able to sit for long periods of time looking at computer screen.
+ May be asked to work a flexible schedule which may include holidays.
+ May be asked to travel for business or professional development purposes.
+ May be asked to work hours outside of normal business hours.
**Other Duties:** _Please note this job description is not designed to cover or contain a comprehensive list of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice._
**_Cayuse is an Equal Opportunity Employer. All employment decisions are based on merit, qualifications, skills, and abilities. All qualified applicants will receive consideration for employment in accordance with any applicable federal, state, or local law._**
**Pay Range**
USD $28.00 - USD $35.00 /Hr.
Submit a Referral (*********************************************************************************************************************************
**Can't find the right opportunity?**
Join our Talent Community (********************************************************** or Language Services Talent Community (******************************************************** and be among the first to discover exciting new possibilities!
**Location** _US-_
**ID** _103881_
**Category** _Accounting/Finance_
**Position Type** _Full-Time Hourly Non Exempt_
**Remote** _Yes_
**Clearance Required** _None_
$28-35 hourly 10d ago
IT - Helpdesk Analyst
Intelliswift 4.0
Information security analyst job in Oklahoma City, OK
My name is Soujanya. Kothuri My contact number ************ and I'm a staffing specialist at Intelliswift, a global staffing and IT consulting company. We are constantly on the lookout for professionals to fulfil the staffing needs of our clients and we currently have a job opening that may interest you. Below is a summary of the position
Job Description:
Provides customer and technical support through analysis and problem solving to facilitate installation, implementation, maintenance, education, and documentation of a variety of technologies.
Position Comments:
Flexability to work any shift
Good communication skills necessary
Good troubleshooting/reasoning ability
Must be able to make it work on time each day
Typing skills are preferred (average 25+ wpm)
Thank You & Regards……
Soujanya. Kothuri
Sr. Technical Recruiter
Additional Information
NICE TO HAVE:
$62k-86k yearly est. 3d ago
Security Solution Engineer - Email Security
Proofpoint 4.7
Information security analyst job in Oklahoma City, OK
**About Us:** Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people.
**How We Work:**
At Proofpoint you'll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values:
**Bold** in how we dream and innovate
**Responsive** to feedback, challenges and opportunities
**Accountable** for results and best in class outcomes
**Visionary** in future focused problem-solving
**Exceptional** in execution and impact
**POSITION SUMMARY**
The Security Solutions Engineer is an informationsecurity expert responsible for assessing and improving the security posture of customer environments.
The Security Solutions Engineer manages the technical aspects of customer systems and is primarily responsible for solution uptime, availability, policy development and problem troubleshooting. Security Solutions Engineers are also responsible for the technical development of various clients' security solutions such as: Proofpoint Protection Server, TAP, TRAP, and other Proofpoint products.
Platform Engineers serve as an escalation point and mentor for other members of the team. Platform Engineers also help develop internal process, procedure, and drive collaboration across business units to help streamline service delivery.
He or she must ensure that all tasks performed adhere to the firm's ISO 27001 InformationSecurity Management System (ISMS). This includes participation in annual information and network security training and acceptance of spot checks on an ad hoc basis to guarantee that Proofpoint is constantly improving upon the organization's ISMS. Each member of our team must understand the importance of the ISMS and the corresponding handling of customer data.
**DUTIES & ESSENTIAL JOB FUNCTIONS:**
+ Serve as an escalation point for other engineers on the team
+ Optimize security policies to protect against emerging threats and adhere to industry best practices
+ Create and develop custom solutions for managed security systems
+ Maximize system uptime, availability, and performance
+ Utilize internal CRM for problem tracking and project development
+ Assist the team in meeting all customer SLAs
+ Unsurpassed attention to detail, analytical problem-solving skills, and ability to diagnose and troubleshoot technical issues
+ Maintain awareness of industry trends, security news, and best practices
+ Take on-call rotation after hours and on weekends, serving as a point of escalation as necessary
+ Provide flexibility with schedule to cover job requirements
+ Ability to quickly and efficiently resolve client issues while maintaining high levels of client satisfaction
+ Lead technical discussions with customers and partnering organizations
+ Research and analyze industry trends and security vulnerabilities, in order to effectively communicate to customers any risk to their
+ environments and implement solutions to mitigate the risk
+ Administer and support lab environment to include change request review and approval, maintenance, and design
**QUALIFICATIONS:**
+ Bachelor's Degree in Computer Science, Information Technology, or related discipline. Experience may be considered in lieu of a degree
+ Experience with Email Security
+ Corporate computer networking, technical support, system administration, Windows, Unix/Linux Operating System administration and/or
+ network security experience
+ Experience and proficiency in Proofpoint email security products, to include certification and training
+ Experience and proficiency designing and implementing Proofpoint solutions
+ High Level of critical thinking and proven ability to manage customer expectations high pressure situations
+ Proficiency in technical writing, diagraming, and communications.
+ Combine patience, determination, and persistence to troubleshoot client issues
+ Ability to work effectively with team members and clients
+ Desire to mentor junior engineers
+ Self-motivated, with ability to manage and follow up on multiple tasks simultaneously
+ Strong analytical capabilities, problem solving skills, providing solutions in a systematic and clear manner, and easily understood by
+ colleagues and customers
+ Strong time-management skills
**PREFERRED**
+ Experience with Proofpoint email security products - PoD/TAP/TRAP
+ Expert in informationsecurity or network security
+ SQL or Oracle database experience
+ Regular expression experience
+ Scripting knowledge of Perl, Python, Java, or Bash
+ Proofpoint product certifications
+ Industry certifications such as CISSP, Network+, Security+, etc.
+ Experience working in Managed Services.
\#LI-Remote
**Why Proofpoint?**
At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us:
+ Competitive compensation
+ Comprehensive benefits
+ Career success on your terms
+ Flexible work environment
+ Annual wellness and community outreach days
+ Always on recognition for your contributions
+ Global collaboration and networking opportunities
**Our Culture:**
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone.
We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com .
**How to Apply**
Interested? Submit your application along with any supporting information- we can't wait to hear from you!
Consistent with Proofpoint values and applicable law, we provide the following information to promote pay transparency and equity. Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets as set out below. Pay within these ranges varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate. The range provided may represent a candidate range and may not reflect the full range for an individual tenured employee. This role may be eligible for variable compensation and/or equity. We offer a competitive benefits package, including flexible time off, a comprehensive well-being program with two paid Wellbeing Days and two paid Volunteer Days per year, plus a three-week Work from Anywhere option.
**Base Pay Ranges:**
SF Bay Area, New York City Metro Area:
Base Pay Range: 98,900.00 - 155,430.00 USD
California (excludes SF Bay Area), Colorado, Connecticut, Illinois, Washington DC Metro, Maryland, Massachusetts, New Jersey, Texas, Washington, Virginia, and Alaska:
Base Pay Range: 78,800.00 - 123,805.00 USD
All other cities and states excluding those listed above:
Base Pay Range: 70,400.00 - 110,605.00 USD
Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams.
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
Our BRAVE Values:
At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow.
We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact.
We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together.
This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one.
Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
$85k-110k yearly est. 10d ago
Cloud Security Engineer
Ford Motor Company 4.7
Information security analyst job in Oklahoma City, OK
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
The Enterprise Cyber Security Cloud Security team is responsible for working with other security and cloud services teams to ensure alignment and collaboration in securing Ford's public cloud infrastructure. The teams work closely together to identify security gaps in the cloud environments and address them.
The Cloud Security team is responsible for identifying, evaluating, and recommending cloud security tools and functions to enhance security around Ford's public cloud. The team is also responsible for developing and managing the following Security Services in Ford's public cloud environments:
- Cloud Security Automation Development
- GCP/Azure Security Compliance
- GCP VPC Service Control
- GCP Cloud Armor/ Azure WAF
**What you'll do...**
+ Partner with other Cloud Security team members to identify and develop automation for security related workflows and audits (VPC SC, DLP, Exceptions, Org Policy, etc..).
+ Lead evaluation and develop an understanding of tools needed to address security gaps.
+ Lead/Collaborate with EPEO Services teams on security gap remediation.
**You'll have...**
+ Bachelor's degree in Computer Science, Information Technology or related OR a combination of education and experience
+ 5+ years of scripting and automation experience
+ Proven experience in developing and implementing automation using scripting languages such as
+ Python, PowerShell, or Go, particularly for API integrations, security tool orchestration, and custom audit scripts.
+ Solid understanding and practical experience with Git and GitHub for version control, collaborative development, and security automation pipeline management.
+ Familiarity with CI/CD pipelines and automated deployment tools (e.g., Jenkins, Azure DevOps, GitHub Actions) to integrate security automation into the software development lifecycle.
+ Knowledge of Infrastructure-as-Code (IaC) principles and tools like Terraform.
+ Strong knowledge of security best practices and guidelines (at the enterprise-level) related to GCP and Azure Cloud deployments as well as common web application frameworks
+ Understand the functionality and secure usage of various GCP services: VPCs, IAM, security groups, compute engine, cloud storage, Security Command Center, VPC Service Control, Cloud DLP and Cloud Armor
+ Customer focused and strong team orientation
+ Self-starter and fast-learner
+ Strong communication and interpersonal skills
+ Strong problem solving and Analytical/Reasoning skills
+ Strong drive for results and ability to work independently
+ Demonstrated commitment to quality and project timing
+ Familiarity with the agile project planning process and use of Rally.
+ Document processes & procedures and developing other documentation.
**Even better, you may have...**
+ Understand the functionality and secure usage of various Azure services: Virtual Machines, Virtual Networks, Azure Active Directory, App Services, Azure SQL Databases, Storage Accounts, Kubernetes, Containers, Key vaults.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder...or all of the above? No matter what you choose, we offer a work life that works for you, including:
- Immediate medical, dental, vision and prescription drug coverage
- Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
- Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
- Vehicle discount program for employees and family members and management leases
- Tuition assistance
- Established and active employee resource groups
- Paid time off for individual and team community service
- A generous schedule of paid holidays, including the week between Christmas and New Year's Day
- Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
SOUTHEAST MI RESIDENTS: This role is posted as remote unless you reside within 50 miles of Dearborn, MI-in which case we request on-site presence up to 4 days a week.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
\#LI-Remote
**Requisition ID** : 54783
$72k-100k yearly est. 9d ago
Security Engineer II
Trustmark 4.6
Information security analyst job in Oklahoma City, OK
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
$73k-94k yearly est. 60d+ ago
Security Engineer - IR Threat Intelligence
Meta 4.8
Information security analyst job in Oklahoma City, OK
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture.
**Required Skills:**
Security Engineer - IR Threat Intelligence Responsibilities:
1. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
2. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
3. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
4. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
5. Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
**Minimum Qualifications:**
Minimum Qualifications:
6. 5+ years threat intelligence experience
7. Bachelor's degree or equivalent experience in Security
8. Familiarity with campaign tracking techniques and ability to convert the tracking results to long term countermeasures
9. Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework
10. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
11. Proven track record of managing and executing on short term and long term projects
12. Ability to work with a team spanning multiple locations/time zones
13. Ability to prioritize and execute tasks with minimal direction or oversight
14. Ability to think critically and qualify assessments with solid communications skills
15. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
16. Experience close collaborating with incident responders on incident investigations
17. Familiarity with malware analysis or network traffic analysis
18. Familiarity with nation-state, sophisticated criminal, or supply chain threats
19. Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
20. Experience in one or more query languages such as SQL
21. Experience writing production code for threat intelligence tooling
22. Experience conducting large scale data analysis
23. Experience working across the broader security community
**Public Compensation:**
$154,000/year to $217,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$154k-217k yearly 9d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Information security analyst job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**InformationSecurity and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including InformationSecurity, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, InformationSecurity, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
IT - Helpdesk Analyst
Intelliswift 4.0
Information security analyst job in Oklahoma City, OK
My name is Soujanya. Kothuri My contact number ************ and I'm a staffing specialist at Intelliswift, a global staffing and IT consulting company. We are constantly on the lookout for professionals to fulfil the staffing needs of our clients and we currently have a job opening that may interest you. Below is a summary of the position
Job Description:
Provides customer and technical support through analysis and problem solving to facilitate installation, implementation, maintenance, education, and documentation of a variety of technologies.
Position Comments:
Flexability to work any shift
Good communication skills necessary
Good troubleshooting/reasoning ability
Must be able to make it work on time each day
Typing skills are preferred (average 25+ wpm)
Thank You & Regards……
Soujanya. Kothuri
Sr. Technical Recruiter
Additional Information
NICE TO HAVE:
$62k-86k yearly est. 60d+ ago
Learn more about information security analyst jobs
How much does an information security analyst earn in Oklahoma City, OK?
The average information security analyst in Oklahoma City, OK earns between $55,000 and $107,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.
Average information security analyst salary in Oklahoma City, OK
$77,000
What are the biggest employers of Information Security Analysts in Oklahoma City, OK?
The biggest employers of Information Security Analysts in Oklahoma City, OK are: