Post job

Information security analyst jobs in Wichita, KS - 150 jobs

All
Information Security Analyst
Information Security Engineer
Senior Security Analyst
Cyber Security Engineer
Securities Analyst
Network Security Analyst
Security Architect
Cyber Security Analyst
Information Systems Security Officer
Senior Information Assurance Engineer
Information Assurance Engineer
Information Technology Analyst
Senior Information Security Analyst
Information Security Manager
Information Security Officer
  • Senior Information Security Analyst

    Hctec 4.3company rating

    Information security analyst job in Tulsa, OK

    Title: Sr Information Security Analyst Salary: $100K Job Summary: As a member of the Information Security team, responsibilities include manages and mitigates information security risk by identifying, evaluating, assessing, designing, monitoring, administering, reporting and implementing systems, policies and processes. Provides information security risk insight and guides management on information security risk issues and serves as advisor to peers, team members and management. Minimum Education: Bachelor's degree in Computer Science, MIS, Computer Engineering, Cyber Security or related discipline. Licensure, Registration and/or Certification: One or more of the following certifications are preferred: Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA). Work Experience: 3 - 4 years related experience inclusive of two years working directly in an Information Services department and previous experience with HIPAA/PHI compliance programs, policies, procedures, risk assessments and audits. Knowledge, Skills and Abilities: In-depth knowledge of cyber security methodology and security practices. Knowledge of HIPAA, PCI, SOX, ISO and NIST cybersecurity frameworks. Knowledge of intrusion detection and intrusion prevention systems, penetration and vulnerability testing. Knowledge of data loss prevention, anti-virus and anti-malware software tools. Knowledge of computer networking, TCP/IP, routing and switching, network protocols and packet analysis tools. Knowledge of Windows, UNIX and Linux operating systems. Excellent problem solving and analytical skills. Excellent written and oral communication skills. Excellent organizational and interpersonal skills. Ability to work independently as well as in a team setting. Essential Functions and Responsibilities: Define, implement, and enforce information security policies, strategies, and procedures that align with healthcare laws and regulations, such as HIPAA. Conduct and/or support targeted risk assessment. Determine significant risk points and exercise process for risk assessment and risk acceptance. Review assessment results for vulnerabilities, gaps, control deficiencies, and work with key stakeholders to establish plans for sustainable resolution. Maintain an effective information security awareness program and educate internal teams on best practices. Ensures that business and clinical software applications include adequate information and security controls. Establish and maintain metrics based on the information security framework..
    $100k yearly 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Industrial Security Analyst

    Northrop Grumman 4.7company rating

    Information security analyst job in Oklahoma

    RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: Top SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Northrop Grumman Aeronautics Systems (NGAS) is currently seeking an Industrial Security Analyst to join our team as the Northrop Grumman Security Representative for Weapon System Support Center (WSSC) based out of Tinker Air Force Base, Oklahoma. Roles and Responsibilities: Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken. Your essential job functions will include but may not be limited to: Maintain accountability of classified material or classified media as required by contract(s). Implement policies and procedures for introducing classified material or classified media into a SCIF. Ensure the development, documentation, and presentation of classified security education, awareness, and training activities. Analyze, investigate, and resolve classified security issues while providing leadership and guidance to employees, supervisors, managers on actions(s) to be taken to ensure compliance with the classified security program. Maintain liaison with government agencies, external customers, contractors, employees, and managers. Basic Qualifications: 2 years of Industrial Security experience with Bachelors; 0 years with Masters or an additional 4yrs of security experience will be considered in lieu of a degree Must be a US Citizen Must have Active Top-Secret Clearance and the ability to obtain and maintain Special Program Access Must have the ability to work 1st Shift and 9/80 schedule. Ability to collaborate in a team environment Ability to work independently and follow projects through to completion. Preferred Qualifications: Experience with DISS, NISS, SIMS, JADE, or similar data bases. Working knowledge of DoD, SAP, and SCI programs to provide procedural and policy guidance. Additional consideration for CDSE SAP Orientation course or CDSE SAP Mid-Level course. Excellent customer service and communication skills. Ability to work independently and follow projects through to completion. Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint). Strong knowledge of data entry and inventory control. Willing to work in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications. Classification review experience. Primary Level Salary Range: $62,100.00 - $93,100.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $62.1k-93.1k yearly Auto-Apply 6d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline 4.1company rating

    Information security analyst job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS Ā· Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities Ā· Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. Ā· Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. Ā· Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. Ā· Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. Ā· Knowledge of TSA security requirements and regulations. Ā· Knowledge of identity management processes and procedures. Ā· Skill in project management. Ā· Ability to manage, track and analyze information. Ā· Ability to effectively work and cooperate with supervisors, co-workers, and vendors. Ā· Ability to follow corporate policies and the directions of supervisors. Ā· Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 48d ago
  • Information Security Analyst

    Tenex.Ai

    Information security analyst job in Overland Park, KS

    TENEX is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is composed of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. Backed by leading investors, we are rapidly growing and seeking top talent to join our mission of revolutionizing the MDR landscape. We're a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you'll play a meaningful role in defining and building our culture. Get in on the ground floor. We're a small but well-funded team that just raised a substantial round - joining now comes with limited risk and unlimited upside. Culture is one of the most important things at TENEX.AI-explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work. We are looking for a detail-oriented Information Security Analyst to spearhead our internal compliance efforts and manage our Third-Party Risk Management (TPRM) program. In this role, you won't just be checking boxes; you will be the architect of the controls that protect our customers' data involving AI and other cutting edge technologies. You will bridge the gap between technical security operations and formal audit requirements, ensuring we remain a gold standard in the industry. Location: This role will require onsite in our Overland Park, KS or Sarasota, FL location. Key Responsibilities 1. Internal SOC 1 & SOC 2 Compliance Audit Readiness: Lead the preparation for annual SOC 1 Type II and SOC 2 Type II audits. Control Monitoring: Perform continuous testing of technical and administrative controls (e.g., access reviews, change management, encryption standards). Evidence Collection: Coordinate with Engineering, HR, and DevOps teams to gather and organize audit evidence throughout the year. Remediation: Identify gaps in current processes and work with department heads to implement corrective actions. 2. Third-Party Risk Management (TPRM) Vendor Assessments: Conduct security assessments of new and existing vendors, reviewing their SOC reports, ISO certifications, and SIG questionnaires. Risk Scoring: Evaluate the risk profile of third-party tools and services, providing recommendations to leadership on whether to approve or mitigate risks. Contract Review: Partner with Legal to ensure security addendums (DSAs/BAsAs) meet our internal compliance requirements. 3. Policy & Governance Maintain and update the Information Security Management System (ISMS) documentation. Develop and deliver security awareness training tailored to compliance requirements. Act as the primary point of contact for client inquiries regarding our security posture. Required Qualifications & Skills: Experience: At least 2 years in Information Security, IT Audit, or Compliance (GRC). Frameworks: Deep understanding of AICPA Trust Services Criteria (SOC 2) and SSAE 18 (SOC 1) along with ISO 27001, NIST-800. Technical Knowledge: Familiarity with cloud environments (GCP/AWS/Azure), IAM, and vulnerability management. TPRM Tools: Experience with risk assessment platforms (e.g., OneTrust, Vanta, or Drata). Certifications: CISA, CRISC, or Security+ preferred (CPA-tracked experience is a plus). Ideal Candidate Profile: The "Translator": You can explain complex frameworks like ISO27001, NIST 800, and map them to internal controls in policy documentation to support compliance requirements. Meticulous: You audit the environment and policies for consistency and enforcement. Proactive: You don't wait for the audit window to open; you are constantly looking for ways to automate evidence collection. Education & Certifications: Bachelor's degree in Computer Science, Cybersecurity, Engineering, or a related field (or equivalent experience). Why Join Us? Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions. Collaborate with a talented and innovative team focused on continuously improving security operations. Competitive salary and benefits package. A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
    $68k-95k yearly est. Auto-Apply 13d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Wichita, KS

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $81k-108k yearly est. Easy Apply 7d ago
  • Cyber Threat Analyst

    Fortiphi

    Information security analyst job in Oklahoma City, OK

    **Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)** Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
    $65k-88k yearly est. 60d+ ago
  • Network Security Analyst

    Sa Technologies Inc. 4.6company rating

    Information security analyst job in Wichita, KS

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. We guarantee you the best rate for your skills and performance. Job Description Position: Network Security Analyst( Citizens and Authorised to work in the US only) Location: Wichita, KS (Locals preferred) Employment: Contract to hire/Full time Salary - DOE Job Functions Resolve trouble tickets and respond to alerts generated by monitoring systems Design and implement network and security solutions Participate in cross-discipline troubleshooting for high visibility or complex issues Manage legacy WAN environment, and participate in the design and implementation of new customer-facing applications hosted via the internet Create and maintain documentation including: network diagrams, incident reports, audit remediation and runbooks Job Requirements Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. At least 5 years' experience in information services, with demonstrated knowledge in complex multi-site LAN/WAN environment. 2 or more years of experience with: Switching and Routing, Firewall Support and Troubleshooting, Wireless Networking, Intrusion prevention. Relevant certifications are beneficial including: CISSP, CCSA, CCSE, CCNA, and CCNP Location: Local to Wichita, KS is preferred. Work on-site in Wichita, KS with minimum travel requirements Must have excellent communication skills. ***NO REMOTE WORK*** Qualifications Bachelor's degree in computer science, management information systems or related field. An equivalent amount of related experience may be substituted for this academic background. Additional Information Shibu ************
    $61k-81k yearly est. 21h ago
  • Information Security Risk & Compliance Analyst

    Midfirst Bank 4.8company rating

    Information security analyst job in Oklahoma City, OK

    The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise. The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment. Key Result Areas: Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including: Develop and maintain enterprise security policies and procedures Assist in the coordination and completion of information security risk assessments and documentation Work with information security management to develop strategies and plans to enforce security requirements and address identified risks Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance Work with IT department and members of the information security team to identify, select and implement technical controls Provide direct support to the business and IT staff for security related Maintain an awareness of security and control issues in emerging technologies Perform other duties as assigned Knowledge, skills, and experience required: Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.) Strong analytical and problem-solving skills to enable effective security incident and problem resolution Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously Ability to work well under minimal supervision Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting Strong customer/client focus with the ability to manage expectations appropriately General understanding of risk management Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas) Preferred Qualifications: Understanding of enterprise risk management systems and automation platforms Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions *This position is on-site located in Oklahoma City, must reside within the area to be considered. *Position requires a minimum of 3 years of relevant US based experience. #LI-Onsite #LI-DNI
    $77k-104k yearly est. 55d ago
  • IDP Information Assurance and Security Engineer

    Wichita State University 4.2company rating

    Information security analyst job in Wichita, KS

    Department: Ennovar Hire Type: Full Time Pay: Commensurate with experience Work Schedule: Typically Monday - Friday, 8am - 5pm; additional hours, including after-hours support of firewalls, may be required to support business needs. Work is completed onsite and in-person. Export Compliance Requirement: This position requires access to EAR or ITAR controlled technologies. Applicants are required to be eligible for employment under U.S. export control laws and must meet the requirement of being a "U.S. Citizen". Job Details We are looking for a person who is a self-driven and highly motivated team player who can perform in a fast-changing business environment. This cross functional role requires coordination with technical managers, system administrators, application owners, software developers, infrastructure, service delivery, and IT management to monitor and control company networks. Diverse knowledge and experience, primarily in networks, but also in operating systems, applications, and databases is needed to ensure least privilege is followed and networks are secured from unauthorized devices and excessive access. Job Summary Implements secure networking solutions to meet internal and external compliance requirements. Works in a cross-functional role requiring coordination with internal partners to monitor and control company networks. Ensures least privilege is followed and networks are secured from unauthorized devices and excessive access. May require collaboration with external companies to understand technical and business requirements in order to deliver solutions. Essential Functions Sets up, maintains, and performs ongoing configuration of firewalls, Performs vulnerability management and is responsible for change controls. Creates and maintains network security architecture and strategy. Responsible for device discovery, identification, and inventory. Provides enforcement of least privilege network access. Manages network isolation projects. Delivers troubleshooting and user support efforts. Provides incident management support. Manages and trains students. Performs other duties as assigned. Required Education and Experience High school diploma or equivalent at time of hire Three (3) years of cybersecurity or network security field experience Knowledge, Skills and Abilities Ability to work in a fast-changing business environment Ability to work and collaborate with a cross-functional team Ability to troubleshoot and support end-users Ability to coordinate projects with multiple partners Diverse knowledge and experience in networks, operating systems, applications, and databases Ability to implement secure networking solutions to meet internal and external compliance requirements, in partnership with other functional areas of IT and external partners. Ability to collaborate with other companies to understand technical and business requirements in order to deliver solutions. Preferred Qualifications 5+ years in cybersecurity operations, engineering or IT Project Management with a technical background Strong technical background in automation, audit readiness, and governance Experience mentoring junior staff or student teams Familiarity with ServiceNow and/or scripting (PowerShell, Python) Experience using AI tools (e.g., GitHub Copilot, AI-based analytics platforms) Excellent communication skills with ability to interface across technical and non-technical teams Physical Requirements Ability to communicate with others and accurately exchange information. Ability to operate a computer and other office equipment including but not limited to phone, printers, copiers, and calculators. Ability to remain in a stationary position. Ability to interpret effectively, accurately and impartially, both receptively and expressively.
    $57k-69k yearly est. 13d ago
  • Information Systems Security Officer - 201810

    Delaware Nation Industries

    Information security analyst job in Oklahoma City, OK

    Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology. An active security clearance is REQUIRED. A Security+ Certification is REQUIRED. This position is 100% onsite. Ā· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems Ā· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform Ā· Ensure common controls are available for all hosted systems to inherit and maintain Ā· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy Ā· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents Ā· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls. Ā· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation Ā· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies Ā· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications Ā· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings. Ā· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle Ā· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated Ā· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A). Ā· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports. Requirements At least 2+ years of related experience Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices Knowledge of NIST regulatory compliance requirements Deep knowledge of the information security principles Experience developing Information Security policies and procedures Experience performing A&As and supporting the Risk Management Framework lifecycle Ability to communicate, both written and orally, to both technical and non-technical stakeholders Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer Benefits Benefits Include: Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental Matching 401K Short- and Long-Term Disability Pet Insurance Professional Development/Education Reimbursement Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas Other Duties: Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
    $71k-97k yearly est. Auto-Apply 59d ago
  • Manager Information Security

    Weokie Federal Credit Union

    Information security analyst job in Oklahoma City, OK

    We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, and has experience in IT Security, Business Continuity, and Vendor Management, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector. The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan. Major Activities: * Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program. * Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats. * Organizes and conducts cybersecurity simulation exercises. * Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit. * Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated. * Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied. * Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned. * Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials. * Support technology/systems that enable all vendor management activities by administering the Tandem platform. * Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities. * Maintain, develop, update, and test WEOKIE's Business Continuity Plan. * Write reports to summarize testing activities, including results and recommendations. * Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented. Critical Results: * WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs. * Information Security risks and threats are clearly identified, measured and remediated timely. * The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts. * Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities. * WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources. * WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders. * Risk assessments are completed annually and deficiency are quickly addressed and/or remediated. * Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented. * New quality control activities are developed and presented to leadership that correspond to the information security program. * Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately. * Vendor Management is collaboratively managed with fellow team members. * Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures. * WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident. Qualifications: * Specialized or Technical Knowledge and Skills: The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of information security concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact. * A bachelor's degree is required, preferably in Information Technology or Computer Science. * A minimum of three years of experience in the information security field. * A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM) are preferred. * Demonstrated experience in managing and working with third party vendors. * Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels. * In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them. B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position. * Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values. * Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members. * Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements. * Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad. * Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position: * Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations. * Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans. * Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others. * Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges. * Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile. * Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace. * Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis. * Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality. C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus. D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate. WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
    $91k-132k yearly est. 7d ago
  • Security Architect

    Deloitte 4.7company rating

    Information security analyst job in Wichita, KS

    Are you an experienced, passionate pioneer in technology who wants to work in a collaborative environment? As an experienced Security Architect you will have the ability to share new ideas and collaborate on projects as a consultant without the extensive demands of travel. If so, consider an opportunity with Deloitte under our Project Delivery Talent Model. Project Delivery Model (PDM) is a talent model that is tailored specifically for long-term, onsite client service delivery. Recruiting for this role ends on 03/13/2026 Work you'll do/Responsibilities + Responsible for supporting the team with secure network designs and regulatory requirements. + Translate business objectives and risk management strategies into practical, secure technological solutions. + Ensure security principles are infused at every level of the enterprise. + Communicate regularly with Engagement Managers (Directors), project team members, and representatives from various functional and / or technical teams, including escalating any matters that require additional attention and consideration from engagement management + Independently and collaboratively lead client engagement workstreams focused on improvement, optimization, and transformation of processes including implementing leading practice workflows, addressing deficits in quality, and driving operational outcomes The Team Our Cyber Operate offering develops and transforms cyber programs in line with a client's strategic objectives, regulatory requirements, and risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes design of the cyber organization, governance, and risk assessments. Qualifications Required + Bachelor's degree, preferably in Computer Science, Information Technology, Computer Engineering, or related IT discipline; or equivalent experience + 5+ years of proven experience as a Security Architect + Experience with information security engineering + Experience with security compliance (NIST Cybersecurity Framework) + Strong understanding of secure architecture methodologies. + Experience with incidence response + Limited immigration sponsorship may be available + Ability to travel 10%, on average, based on the work you do and the clients and industries/sectors you serve Preferred + Experience with Security Operations The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $90,000 to $150,000. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Additional Requirements Information for applicants with a need for accommodation: ************************************************************************************************************ All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
    $90k-150k yearly 5d ago
  • Information Security Analyst

    Capitol Federal Savings Bank 4.4company rating

    Information security analyst job in Topeka, KS

    Make a direct impact on protecting the Bank's people, systems, and customers! As an Information Security Analyst, you'll play a hands-on role in strengthening the Bank's security posture while working closely with Compliance, Risk Management, and IT Security. This position offers visibility across the organization, meaningful responsibility, and the opportunity to influence how security awareness and risk management are practiced every day. You'll be trusted to monitor critical system access, investigate and respond to real-world phishing threats, and lead the Bank's security awareness and social engineering programs. From training employees to advising leadership on security risks, your work will directly reduce risk and improve the organization's security culture. What You'll Do * Protect critical systems by monitoring access changes and advising on best practices * Investigate suspicious emails and manage phishing response and testing programs * Lead engaging security awareness training and new-hire education * Plan and report on phishing and social engineering exercises * Support key information security risk assessments and control reviews * Partner with IT and business leaders to identify and mitigate security risks What You Bring * 5+ years of experience in IT security, risk management, audit, or compliance CapFed is an equal opportunity employer.
    $82k-111k yearly est. Auto-Apply 11d ago
  • Infrastructure Security Senior Specialist - 1-Year Engagement

    Mena Consultant

    Information security analyst job in Kansas

    Years of Experience: 5+ years. Project Duration: 1 year (with the possibility of extension for another year). Working Arrangement: on-site. Language Requirements: Fluency in English (written and spoken). Responsible for managing and optimizing the security posture of mission-critical infrastructure services within the Infrastructure Security Tower. This includes ensuring operational resilience, compliance, and continuous improvement across NGFW, Secure DNS, VPN, WAF, and privileged-access platforms. Reports to Infrastructure Tower Lead. Key Requirements Bachelor's degree in Cybersecurity, Network Engineering, or related field. Minimum of 5 years' experience in infrastructure or network security operations. Experience in Fortinet, Palo Alto, Checkpoint, Infoblox, BlueCat, CyberArk, BeyondTrust, Nutanix, and VMware. Preferred Certifications Fortinet NSE5/NSE6 or equivalent (e.g., Palo Alto PCNSE, Checkpoint CCSE). Infoblox Core DDI Specialist or BlueCat Professional. CyberArk Trustee or Thales CipherTrust. Nutanix Certified Professional or VMware VCP. Key Responsibilities Oversee and maintain Secure DNS, Remote Access, and WAF posture across multi-vendor platforms. Integrate and manage PKI, PAM, and certificate lifecycle solutions. Conduct vulnerability assessments and coordinate remediation efforts. Collaborate with SOC and platform teams for incident triage and root-cause analysis. Lead configuration reviews, patch management, and compliance validation. Develop and maintain operational runbooks and SOPs. Mentor junior specialists and participate in knowledge-transfer sessions. If you would like to know more about the Global Consulting Bootcamp Visit: ***************************************************** If you would like to know more about the MC Club Visit: ***********************************
    $61k-103k yearly est. Auto-Apply 60d+ ago
  • Security Analyst

    Foresite 4.3company rating

    Information security analyst job in Overland Park, KS

    Job Description About the Role As a SOC Analyst at Foresite, you're not just monitoring screens-you're safeguarding the digital frontier. You'll be the vigilant guardian of our clients' security, analyzing threats, responding to incidents, and ensuring their peace of mind in the cloud. But it's more than just a job; it's a launching pad for your cybersecurity career. If you have a passion for security, a keen eye for detail, and a drive to protect organizations from cyberattacks, this role is your first step towards an exciting future at Foresite. Responsibilities: Stand Watch: Monitor security information and event management (SIEM) systems, including Google Chronicle SIEM, to detect and analyze potential security threats in real-time. Investigate and Respond: Investigate suspicious activities, analyze security alerts, and respond to security incidents with urgency and precision. Uncover the Unknown: Conduct threat hunting activities to proactively identify and mitigate emerging threats before they impact our clients. Collaborate and Communicate: Work closely with security engineers, incident responders, and clients to ensure a coordinated and effective response to security events. Document and Analyze: Document security incidents, analyze attack patterns, and contribute to the development of threat intelligence reports. Continuously Learn: Stay up-to-date on the latest security threats, vulnerabilities, and best practices to maintain a cutting-edge security posture. Embrace the Challenge: Thrive in a fast-paced environment, adapt to evolving threats, and embrace the challenge of protecting our clients from cyberattacks. Qualifications: Security Foundation: Solid understanding of security principles, common attack vectors, and security technologies. SIEM Experience: Hands-on experience with SIEM systems, preferably Google Security Operations, demonstrating your ability to monitor, analyze, and respond to security events. Analytical Mindset: Strong analytical and problem-solving skills, enabling you to effectively investigate security incidents and identify root causes. Communication Skills: Excellent written and verbal communication skills, allowing you to clearly convey technical information to both technical and non-technical audiences. Teamwork and Collaboration: Ability to work effectively as part of a team, collaborating with colleagues and clients to achieve shared security goals. Passion for Security: A genuine passion for cybersecurity and a desire to protect organizations from cyber threats. Relevant Certifications (Preferred): Industry certifications such as CompTIA Security+, BTL1, or GIAC Security Essentials Certification (GSEC) are a plus.
    $61k-87k yearly est. 29d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Information security analyst job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 60d ago
  • SME Engineer/Cyber Security Architect/Engineer - C

    Telos Corporation 4.6company rating

    Information security analyst job in McConnell Air Force Base, KS

    The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security. Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment! This position will be based at McConnell AFB, KS. Responsibilities: We are seeking a Subject Matter Expert (SME) to support the Air Force Information Network (AFIN), a multibillion-dollar global initiative ensuring secure, high-speed communications infrastructure for the Department of the Air Force (DAF). The SME will serve as the technical lead for the integration and deployment of Illumio solutions within the Air Force Network (AFNET) to support the Department of Defense (DoD) Zero Trust Architecture (ZTA). This role will focus on micro-segmentation, network mapping, and maintaining a secure environment through the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) on NIPR and SIPR networks. The SME will provide subject matter expertise, assist with installation, provide tiered support, and ensure the system's cybersecurity posture is maintained and updated with the latest patches, upgrades, and security rules. Key Tasks & Responsibilities: * Install, reinstall, upgrade, or advise on configuring the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) across NIPR and SIPR networks. * Provide guidance on traffic analysis, micro-segmentation, and write security rules to prevent adversary lateral movement and optimize application/workload security. * Oversee project management, providing advice to the Air Force management team on best practices for Illumio deployments. * Build and deploy Open Virtualization Appliances (OVA) and assist in maintaining the ITF (Integration Test Facility) environment to ensure system stability. * Maintain and sustain the cyber security posture of Illumio deployments. * Test and validate patches, upgrades, and security controls in lab environments prior to fielding. * Ensure the Authority to Operate (ATO) is continuously updated in accordance with STIG (Security Technical Implementation Guides) requirements and remediate vulnerabilities. * Provide in-person Type 1, over-the-shoulder training and hands-on experience for Air Force personnel using Illumio. * Offer local Tier 3 and Tier 4 support for ongoing operations, troubleshooting, monitoring, and management of Illumio installations. * Develop best practice operational procedures and runbooks for ongoing Illumio maintenance, including backup/restore, cold standby PCE, and system rebuilds. * Work on system integrations, including Syslog/SIEM and Single Sign-On (SSO). * Develop a labeling schema and deployment methodology using Air Force automation frameworks and Illumio best practices. * Provide Tier 3 support for the Illumio suite, ensuring rapid response and resolution of system issues. * Prepare and maintain detailed project documentation, reports, and metrics. * Author Illumio policy frameworks for core data center services, administrative access, and traffic management (egress, IP lists, multi-tenant workloads). * Develop Illumio-specific API scripts to optimize operational services. * Assist with technical reviews, change preparations, and customer framework integration. Job Requirements Desired Education & Experience: * Bachelor's degree in Systems Engineering, Computer Science, or a related field * 4+ years of hands-on experience in network engineering and firewall management * 4+ years of experience with cloud networking and virtualization technologies (e.g., VMware) * Expert skills to install/reinstall/upgrade or advise on the tasks required to place the Illumio Policy Compute Engine and Virtual Enforcement Nodes * Subject matter expertise on Illumio micro segmentation to provide consulting to customer throughout integration into its service set. * Expert skills in required to develop Illumio labeling and policy design Minimum Certification Requirements: * Information Assurance (IA) Technician (IAT) Level II (DODM 8140) Potentially Required Certification(s): * Illumio Core Expert, Certification * CompTIA Network+ Certification Security Clearance: * Valid DoD Secret clearance is required. Additionally, NATO Secret and/or DoD Top Secret/SSBI clearances, favorably adjudicated for SCI eligibility, are required at certain locations The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship. Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment. Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: ********************************** Telos Corporation is an EEO/AA employer. Job Type Full-Time Location MCCONNELL AFB, KS 67221-3606 US (Primary) Telos offers an excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos and its subsidiaries are an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
    $75k-99k yearly est. 18d ago
  • Cyber Security Engineer - Illumio SME

    Nana Regional Corporation 4.2company rating

    Information security analyst job in McConnell Air Force Base, KS

    The Cyber Security Engineer - Illumio SME provides technical implementation, support, and training services for Illumio on NIPR and SIPR networks. Plans and implements security measures to protect computer systems, networks, and data from loss and service interruptions. Analyzes and documents security risks, breaches, and other cyber security incidents and the damage they cause. Develops and implements a network disaster recovery plan and oversees the monitoring of the computer networks for security issues. Collaborates with the security team to perform tests and find network weaknesses. Researches and keeps current on the latest IT intelligence technologies, trends, and security standards. Performs work under general supervision. Handles moderately complex issues and problems and refers more complex issues to higher-level staff. Possesses solid working knowledge of subject matter **Responsibilities** **Tasks include but are not limited to:** + Conduct research, documentation, and testing for architecture/system redesign + Support system transitions and integration into new infrastructure + Assist throughout the acquisition life cycle + Support engineering and design for change initiatives + Provide administration, maintenance, and configuration of infrastructure + Assist with TCTO development, review, and implementation + Support Information Assurance (IA) assessments and remediation + Support AFIN Cyber Operational Readiness Assessments (CORA) + SMEs may be cross-leveraged across programs as directed by the PMO + Status updates must be provided in the Monthly Status Report (MSR) **Post-Deployment Support** + Provide ongoing system administration and maintenance to ensure secure and effective operation of deployed systems to include routine tasks and responsive support, performed locally or remotely as directed. **Key Support Activities:** + User management: Administer user accounts and PINs + System installation: Install/reinstall hardware and software per TOs + System monitoring: Oversight of alerts, logs, and performance data + Troubleshooting & maintenance: Diagnose issues, perform backups, and conduct routine maintenance **Compliance & reporting:** + Ensure systems meet STIG requirements + Generate custom/ad-hoc reports and system performance metrics **Support tasks:** + Apply TCTOs/FCOs and support integration/test events + Assist with risk/issue identification and provide advisement to users + Documentation & configuration: + Maintain site-specific system documentation + Create/update logical and physical network diagrams + Submit baseline change data to the PMO + Contractor must travel as directed by the COR + Must assist in developing or refining network and security procedures **Software Installation & Configuration:** + Install/reinstall/upgrade the Illumio Policy Compute Engine in a secure, approved configuration + Install/reinstall/upgrade Illumio Virtual Enforcement Nodes across AF servers as directed **Professional Services & Support** + Analyze traffic and create security rules for relevant applications + Provide project management support and technical advisement to Air Force leadership + Deliver in-person, Type 1 "over-the-shoulder" training + Trainers guide trainees through real-time hands-on Illumio operations + Offer local Tier 3 and Tier 4 support, aligned with IT support level definitions + Provide ARC Tier 3 support for Illumio suite **Virtualization & Lab Support** + Build and maintain Open Virtualization Appliances (OVAs) + Maintain cyber posture by testing application upgrades/patches in a lab (ITF) environment + The ITF should mirror the fielded system to the greatest extent possible + Validate system functionality post-patch or upgrade + Support TCTO/TO development and validation **Security Compliance** + Maintain Authority to Operate (ATO) status through + Applying STIG updates + Testing and remediating vulnerabilities **Qualifications** + An active DoD Secret clearance is required for consideration + Bachelor's Degree and 4+ years' experience. + Microsoft Teams, Microsoft Suite of Tools, Microsoft Office 365 + 4+ years of hands-on experience in network engineering and firewall management + 4+ years of experience with cloud networking and virtualization technologies (e.g. VMware) + Subject matter expert on Illumio micro segmentation to provide consulting to customer throughout integration into its service set. + Expert skills in required to develop Illumio labeling and policy design **Certifications:** + Illumio Core Expert + IAT Level 2 Certification or higher + CompTIA Network+ Information Technology Infrastructure Library (ITIL) Foundation certified (v3 or higher) + Certified to Information Assurance (IA) Technician (IAT) Level II (DODM 8140) + At least one of the following certifications: Network+, A+, Server+, Cloud+, or Linux+ (Network+, Server+, Cloud+ preferred) **Job ID** 2025-16892 **Work Type** On-Site **Company Description** **Work Where it Matters** Qivliq Federal Group, an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska. At Qivliq, the work you do every day makes a difference in the lives of our 15,000 IƱupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States. **For our shareholders** , Qivliq provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years. **For our government customers** , Qivliq delivers leading edge IT expertise, ensuring high-performing infrastructure systems in support of complex missions. **As a Qivliq employee** , you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options. We are an equal opportunity employer and comply with all applicable federal, state, and local fair employment practices laws. All applicants will receive consideration for employment, without regard to race, color, religion, creed, national origin, gender or gender-identity, age, marital status, sexual orientation, veteran status, disability, pregnancy or parental status, or any other basis prohibited by law. If you are an individual with a disability, or have known limitations related to pregnancy, childbirth, or related medical conditions, and would like to request a reasonable accommodation for any part of the employment process, please contact us at ******************** or ************ (information about job applications status is not available at this contact information).
    $70k-94k yearly est. 60d+ ago
  • KS-Director of Information Technology/Security

    Blue Diamond Career Consultants

    Information security analyst job in Winfield, KS

    Schedule: Monday - Friday, 8a-4:30p Job Summary: Monitors and controls the software, hardware, support needs and data entry station to process business and medical operation needs of the patient care providers. Directs the operational activities of the department including but not limited to, the evaluation and installation of new software systems. Is a member of the decision team used in making selections of appropriate software systems to provide support in short and long-term planning, directing operations and monitoring process of special projects according to hospital policy and procedures. Job Duties & Responsibilities: Ability to comprehend technical language of operating instructions and equipment manuals. Must possess the ability to deal tactfully with personnel, visitors, government agencies/personnel and general public. Must possess the ability to work harmoniously with professional and non-professional personnel including all departments of the facility. Must possess the ability to plan, organize, develop, implement, and interpret the goals, objectives, policies and procedures, etc. that are necessary for providing a sound information systems department. Manual dexterity is required to operate machines quickly and accurately. Demonstrates knowledge of office procedures, maintains confidential materials, establishes priorities and procedures for daily workload and documents any system problems. Completes special projects in the time frame allotted. Identify and resolve equipment, system and user errors and problems upon notification. Demonstrates effective verbal and written communication, reports significant information and all unusual incidents occurring within area of responsibility to management in a timely manner. Maintain confidentiality and demonstrate ethical conduct as outlined by hospital policy. Communicates using effective sending and listening techniques so that information in written and verbal form is acknowledged as understood. Participating in organizational activities and attends in-service opportunities. Have knowledge of and comply with organizational policies and procedures. Must be able to move intermittently throughout the work day. Must be able to cope with the mental and emotional stress of the position. Must be able to relate to and work with all individuals within the facility. Experience in computer operation and networking required. Requirements: Professional Requirements: Adheres to dress code; appearance is neat and professional. Assists in the selection of IT staff. Evaluates IT personal on a regular basis according to prescribed guidelines. Resolves personnel concerns of the department. Assigns job duties to IT staff. Completes annual educational requirements. Wears identification while on duty, uses computerized punch time system correctly. Communicates the mission, vision, core values, ethics and goals of the hospital as well as the focus statement of the department. Maintains regulatory requirements, including all state, federal and CMS regulations. Maintains and ensures patient confidentiality at all times. Reports to work on time and as scheduled, completes work within designated time. Performs department in-services, completes and returns in a timely fashion. Works at maintaining a good rapport and a cooperative working relationship with physicians, department and staff. Represents the organization in a positive and professional manner. Attends committee, CQI and management meetings, as appropriate, actively participates in the departments CQI activities. Ensures compliance with policies and procedures regarding department operations, fire, safety and infection control. Effectively and consistently communicates administrative directive to personnel and encourages interactive departmental meetings and discussion. Complies with all organizational policies regarding ethical business practices. Resolves personnel concerns at the departmental level, utilizing the grievance process as required. Complies with Rules of Conduct. Regulatory Requirements: Minimum of a Bachelor's Degree with emphasis on IT, Business Administration or related field. Experience may be accepted in lieu of a college degree. A minimum of six months experience in IT procedures in the healthcare environment.
    $90k-136k yearly est. 60d+ ago
  • EXECUTIVE DIRECTOR FOR INFORMATION SECURITY & CHIEF INFORMATION SECURITY OFFICER

    Emporia State University 4.1company rating

    Information security analyst job in Emporia, KS

    Developing, and implementing secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Educating and managing information and technology risk in collaboration with business leaders.Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets. Maintain Professional Knowledgebase; keep apprised of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to ESU.Continuously evaluating and managing the cyber and technology risk posture of the organization.Implementing and managing the cyber governance, risk, and compliance process. Developing, justifying, and evaluating cybersecurity investments. Developing and implementing ongoing security awareness training and education for users. In coordination with the CIO and emergency management team, implementing disaster recovery protocols and business continuity plans with business resilience in mind. QUALIFICATIONS: Minimum Qualifications: * Bachelor's degree; preference for advanced degree. * Minimum of five years' experience in information security or equivalent. * Strong commitment to customer-focused and team-oriented management. * Proven leadership abilities with a history of advancing roles in security management. * Proficiency in project planning, implementation, and management. * Demonstrated capability in collaborating with diverse populations. * Experience handling sensitive and confidential information in compliance with federal and state laws. * Skilled in presenting complex security concepts to various audiences (e.g., end-user training, executive-level briefings). * Up-to-date knowledge of emerging information security technologies and strategies. * Availability for off-hours support when necessary. COMPENSATION: * Annual salary range is $130,000-$160,000 * Salary will be commensurate with experience and qualifications. BENEFITS: Base pay is one component of Emporia State University's total rewards package. We are dedicated to supporting the needs of the "whole you" with our holistic approach to employee benefits by offering comprehensive well-being benefits for you and your family that include: * Health Insurance * Free Dental insurance for employees * Retirement through the Kansas Board of Regents * Paid parental leave * Up to 31 days paid vacation and holiday days * Tuition reduction and tuition assistance * Dependent tuition waiver * For full details about our benefit plan offerings, please visit here. APPLY: Please upload a cover letter, resume, and contact information of three references here. Consideration of applications will begin immediately, and will continue until the position is filled. A background check is required prior to hire. For more information Human Resources ****************** ************** Emporia State University is an equal opportunity and affirmative action employer. All qualified applicants will receive consideration for
    $130k-160k yearly Easy Apply 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Wichita, KS?

The average information security analyst in Wichita, KS earns between $57,000 and $110,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Wichita, KS

$79,000
Job type you want
Full Time
Part Time
Internship
Temporary