Post job

Sap security consultant full time jobs - 49 jobs

  • SAP HANA and BOBJ Security Consultant

    Next Level Business Services 4.3company rating

    Cincinnati, OH

    NLB Services offers a wide-range and best-in-class suite of value-based business solutions comprising of IT services, HR solutions, On-site & Off-site Outsourcing and Consulting services that are built on its robust process domain and people management expertise. At NLB Services, we believe in a work culture that is open and energetic. Our operational methodology is clear and object oriented, blended with flexibility and a proactive attitude to help us focus on developing the right expertise that is required to deliver an unmatched set of services and products. Our team of experts works 24/7 to add value to your existing business and help you grow exponentially. Hi, My Name is Ajay Singh and I'm a Resource Manager at Next Level Business Services, Inc. Please find the below and respond with an expected salary range, suitable time to call and contact details. Also, attach a copy of your updated resume. Position Title: SAP HANA and BOBJ Security Consultant Location: Cincinnati, OH Hire Type: Full Time Only Salary: As per Market Job Description: 1. Designing Overall Security for SAP HANA implementation 2. Create customized roles in HANA DB for Developers, Modelers, Technical Admins, End Users, Power Users. 3. Design, Restrict and Control authorizations for HANA DB objects and Packages/Contents based on System Privileges, Objects Privileges and Analytic Privileges for various Schema Users 4. Define controls to restrict Create, Drop, Alter other DB Admin rights on HANA DB Schema and its objects 5. Transportation of Security Objects/Roles within HANA Landscape 6. Users creation and Role assignment 7. Setting up Password policy 8. Create Groups in BOBJ Server for different type of Users (Admins, Managers, Developers, End Users etc..) 9. Define and Control access to various Folders 10. Setup SSO with AD or LDAP for SAP, Enterprise and other types of Authentication 11. Define & Control access at Object level for different types of BOBJ Reports (Full control, View, Schedule, View on Demand) 12. Transportation of Security objects within BOBJ Landscape 13. Integration of BOBJ Security with HANA DB Security Roles Thanks, Ajay Singh Additional Information All your information will be kept confidential according to EEO guidelines.
    $71k-98k yearly est. 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • SAP BASIS - Full time perm job

    E Pro Consulting 3.8company rating

    Cincinnati, OH

    E*Pro Consulting service offerings include contingent Staff Augmentation of IT professionals, Permanent Recruiting and Temp-to-Hire. In addition, our industry expertise and knowledge within financial services, Insurance, Telecom, Manufacturing, Technology, Media and Entertainment, Pharmaceutical, Health Care and service industries ensures our services are customized to meet specific needs. For more details please visit our website ***************** We have been retained for providing recruiting assistance, for direct hires, by one of the world-leading information technology consulting, services, and business process outsourcing organization that envisioned and pioneered the adoption of the flexible global business practices that today enable companies to operate more efficiently and produce more value. Job Description SAP BASIS Administration skills in some of the following Applications •SAP ECC •SAP SRM and ARIBA •SAP GTS •SAP APO •SAP PI •SAP BW/BI •SAP GRC •SAP GBT •SAP LVM •SAP Cronacle •SAP BI (BO, BODS) •SAP SLT •Solution Manager •Enterprise Portal •SAP Persona/Other latest SAP UX tools •SAP HANA experience would be a definite plus. •Experience in Core SAP Basis administration tasks, Performance Tuning, Landscape Optimization and troubleshooting •Hands on in SAP Support Packages download, evaluation of relevance, upgrade of software components and support packages for all above SAP Landscapes •Multiple Database Administration Knowledge from Basis perspective (Oracle, DB2, SQL Server) •Providing deep technical BASIS design and architecture in support of complex global SAP environments and business requirements. •Release Management, Transport Management •EhP and Support Pack Stack Upgrades •Capacity and sizing design and management •System design and integration •Knowledge and experience on high availability, Disaster recovery •Experience in SAP implementation, upgrade, support, roll outs and enhancements projects Generic Managerial Skills •Communicate effectively with key stakeholders in a multinational environment •Work with multiple teams in delivering technical support •Adherence to client coding standards •Work with Offshore/Nearshore teams •Good team player and willing to stretch to achieve goals Qualifications •8-10 years of experience in the technical field(s) of expertise. •Minimum of 2 full SAP life-cycle implementations on multiple platforms •Strong experience in SAP system installations, migrations, and systems copies Additional Information Full time perm job Only GC,GC EAD, US Citizens Onsite, no remote
    $75k-109k yearly est. 60d+ ago
  • Cloud Security Engineer

    Lubrizol 4.6company rating

    Ohio

    Shape the Future with Us. At Lubrizol, we're transforming the [industry/market - link to relevant LZ business page, if applicable] through science, sustainability, and a culture of inclusion. As part of our global team, you'll be empowered to make a real impact-on your career, your community, and the world around you. Travel: < 5% (very limited) Job Type: Full-time. Collaborate in person 4 days each week, with 1 flexible day. How You'll Make an Impact As a Cloud Security Engineer, you will strengthen Lubrizol's global cloud security posture across AWS, Azure, and GCP by implementing robust security protocols, policies, and procedures to safeguard cloud-based systems, applications, and data. Design, deploy, and maintain cloud-native and third-party security tools and solutions that enhance monitoring, detection, and response capabilities across our environments. Conduct cloud-specific vulnerability assessments, penetration testing, and risk evaluations to proactively identify and mitigate risks, prioritizing remediation to fortify defenses. Ensure compliance with international regulations and industry frameworks (e.g., ISO 27001, GDPR, NIST, SCF, PCI DSS) through technical audits, assessments, and documentation. Collaborate closely with DevOps, application development, and infrastructure teams to embed security into cloud architectures, CI/CD pipelines, and deployment processes using secure-by-design principles. Continuously monitor emerging threats, technologies, and compliance requirements; recommend enhancements to our cloud security architecture and operational processes. Contribute to incident response activities and other security initiatives that improve our global cybersecurity resilience. Required Qualifications that Enable Your Success Bachelor's degree in Computer Science, Information Technology, or a related field; or a relevant combination of education and 5+ years of experience. 3+ years of experience in cybersecurity or a related role with hands-on work in cloud security across AWS, Azure, and/or GCP. Proficiency implementing security protocols, policies, and procedures; conducting vulnerability assessments, penetration testing, and risk evaluations for cloud or hybrid environments. Experience performing technical security audits and assessments aligned to frameworks such as ISO 27001, NIST, GDPR, PCI DSS, SOC 2. Practical experience integrating security into cloud architectures and CI/CD pipelines in collaboration with DevOps and application teams. Strong analytical, problem-solving, and communication skills with the ability to influence and drive accountability across teams. Working knowledge of identity and access management, PKI, MFA, and authentication/authorization protocols (e.g., SAML, OAuth). Preferred Qualifications that Drive you Forward Advanced degree in a relevant field. Certifications such as GIAC Cloud Security Essentials (GCLD), GIAC Public Cloud Security (GPCS), GIAC Security Essentials (GSEC), Microsoft Azure Fundamentals, CompTIA Cloud Essentials, Automation certificates, or Microsoft 365. Hands-on experience with cloud security platforms and tools (e.g., CASB, CSPM, CWPP) and SIEM solutions (e.g., Splunk ES, QRadar, XSIAM). Familiarity with SAP S/4HANA, industrial control systems (DCS/PLC/SCADA), and related security considerations. Experience with network security technologies (firewalls, IDS/IPS, VPN, NAC) and web application firewalls (e.g., F5 BIG-IP). Knowledge of data encryption and key management (e.g., Azure Key Vault) and vulnerability management tools (e.g., Rapid7 InsightVM). Your Work Environment At Lubrizol, we're committed to providing a safe, inclusive, and empowering environment where you can do your best work-whether in a lab, on the production floor, or in a hybrid office setting. Depending on your role, your work environment may include: Standing, walking, or operating equipment for extended periods Working in a lab or manufacturing setting with appropriate PPE provided Use of computers and digital tools in an office or hybrid environment Occasional lifting or movement of materials Adherence to rigorous safety protocols and ergonomic standards We continuously invest in our facilities and technologies to ensure they support your well-being, productivity, and growth. If you require reasonable accommodation, we are committed to working with you to ensure an inclusive and accessible experience. Benefits that Empower You Competitive salary with performance-based bonus plans 401(k) match + Age-Weighted Defined Contribution Comprehensive medical, dental & vision coverage Health Savings Account (HSA) Paid holidays, vacation, and parental leave Flexible work environment Learning and development opportunities Career and professional growth Inclusive culture and vibrant community engagement Learn more at benefits.lubrizol.com! Lubrizol: Imagined for Life. Enabled by Science.™ Delivered by You. We tackle the world's toughest challenges with science-based solutions, deeply understanding our customers to deliver innovative chemistry and differentiated value. Our inclusive culture, dedication to safety, and incredible global talent drive our success. Our solutions meet the evolving needs of the modern world-brought to life by science and, most importantly, delivered by you. Whether you're in the lab, on the production floor, or in the office, you'll be part of a team around the world that empowers you to think boldly, drive results, and contribute to solutions that shape a better, more sustainable future. We win because of you. Let's build the future together. #LZBUS #LI-CM1
    $70k-87k yearly est. 5d ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Columbus, OH

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago
  • Applications Security Architect

    Crown Equipment 4.8company rating

    Ohio

    : Crown Equipment Corporation is a leading innovator in world-class forklift and material handling equipment and technology. As one of the world's largest lift truck manufacturers, we are committed to providing the customer with the safest, most efficient and ergonomic lift truck possible to lower their total cost of ownership. Job Posting External Primary Responsibilities Define security architecture standards and blueprints for web, mobile, cloud, and Application Programming Interface (API)-based applications. Review design documents and perform architecture risk assessments for new and existing applications. Collaborate with DevOps, Engineering, and Infrastructure teams to ensure architectures align with secure design principles. Integrate automated security testing/scanning tools (Static Application Security Testing (SAST), Software Composition Analysis (SCA)) into Continuous Integration (CI) or Continuous Delivery (CD) pipelines. Define and enforce secure coding standards and practices across development teams. Provide training and guidance to developers on secure development principles and vulnerability prevention. Conduct threat modeling and attack surface reviews for high-risk or critical applications. Identify potential security flaws and recommend mitigations early in development process. Track and communicate technical risk to product managers, developers, and leadership teams. Develop and maintain application security policies, baselines, and architecture frameworks. Ensure application security practices align with regulations including General Data Protection Regulation (GDPR) and Payment Card Industry Data Security Standard (PCI-DSS). Support audit and compliance initiatives by providing documentation and evidence of secure development practices. Minimum Qualifications Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related field is required, along with 2-4 years related experience. Non-degree considered if 12+ years of related experience along with a high school diploma or GED Preferred Qualifications 5+ years in cybersecurity with at least 3 years in application security or secure software development experience. Secure Software Development Life Cycle (SDLC) in development. Deep knowledge of Open Web Application Security Project (OWASP) Top 10, National Institute of Standards and Technology (NIST), and secure coding frameworks. Experience with Securing Secrets and Service Accounts. Experience with Web Application Firewall (WAF) implementation/support. Familiarity with Identity and Access Management and cloud security practices (AWS, Azure). Certified Information Systems Security Professional (CISSP), Certified Secure Software Lifecycle Professional (CISSP), Certified Ethical Hacker (CEH) certified. Familiarity with container security (Docker, Kubernetes). Experience in Threat Modeling. Understanding of authentication protocols (Open Authorization (OAuth) and Security Assertion Markup Language (SAML)). Experience with DEVSECOPStools and container security tools. Work Authorization: Crown will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas or who need sponsorship for work authorization now or in the future, are not eligible for hire. No agency calls please. Compensation and Benefits: Crown offers an excellent wage and benefits package for full-time employees including Health/Dental/Vision/Prescription Drug Plan, Flexible Benefits Plan, 401K Retirement Savings Plan, Life and Disability Benefits, Paid Parental Leave, Paid Holidays, Paid Vacation, Tuition Reimbursement, and much more. EOE Veterans/Disabilities
    $100k-123k yearly est. 60d+ ago
  • Senior Security Analyst

    Capgemini Holding Inc. 4.5company rating

    Westerville, OH

    Choosing Capgemini means choosing a company where you will be empowered to shape your career in the way you'd like, where you'll be supported and inspired by a collaborative community of colleagues around the world, and where you'll be able to reimagine what's possible. Join us and help the world's leading organizations unlock the value of technology and build a more sustainable, more inclusive world. The Senior Security Analyst supports the governance of service provider activities in the enterprise security program, monitoring and escalating problems and providing information on security issues. Undertakes security assurance and audit activities to ensure compliance and to identify risks and opportunities. Provides information to senior managers and executives to ensure that they are aware of any security-related risks or opportunities. Provides subject matter expertise, consultancy and training in security-related matters. Must be able to function in a fast-paced, multi-vendor outsourced environment, facilitating conference calls among other subject matter experts and the client. Your Responsibilities: Handles monthly reporting duties for the Information Risk Management team; Facilitates audit planning and audit remediation activities of the service providers, leading calls and documenting and reporting progress; Has familiarity with Security technologies and controls; Expertise not required, but ability to escalate to more senior subject matter experts is important. Develops work plans to structure solutions and communications; Able to involve client and vendor staff appropriately in resolving Security problems; Participates effectively within the business' Security governance framework; Tracks the corrective and preventive actions being taken to improve Security to closure. Possess strong communication skills to communicate technical and security risk information to management. Your Experience: Ability to self-manage with little interaction from other management staff. Flexible and able to adapt to manage a fast-changing environment. Ability to solve complex issues and provide recommendations and advice regarding remediations. Security architecture, security software, or security policy experience Ability to organize agendas, lead conference calls, and track action items to completion. Security and Audit certifications such as SSCP, CISSP, CISA, CISM, CGEIT, CRISC, Security + are preferred. Job Description - Grade Specific The base compensation range for this role in the posted location is: $65,586-121,980. Capgemini provides compensation range information in accordance with applicable national, state, provincial, and local pay transparency laws. The base compensation range listed for this position reflects the minimum and maximum target compensation Capgemini, in good faith, believes it may pay for the role at the time of this posting. This range may be subject to change as permitted by law. The actual compensation offered to any candidate may fall outside of the posted range and will be determined based on multiple factors legally permitted in the applicable jurisdiction. These may include, but are not limited to: Geographic location, Education and qualifications, Certifications and licenses, Relevant experience and skills, Seniority and performance, Market and business consideration, Internal pay equity. It is not typical for candidates to be hired at or near the top of the posted compensation range. In addition to base salary, this role may be eligible for additional compensation such as variable incentives, bonuses, or commissions, depending on the position and applicable laws. Capgemini offers a comprehensive, non-negotiable benefits package to all regular, full-time employees. In the U.S. and Canada, available benefits are determined by local policy and eligibility and may include: * Paid time off based on employee grade (A-F), defined by policy: Vacation: 12-25 days, depending on grade, Company paid holidays, Personal Days, Sick Leave * Medical, dental, and vision coverage (or provincial healthcare coordination in Canada) * Retirement savings plans (e.g., 401(k) in the U.S., RRSP in Canada) * Life and disability insurance * Employee assistance programs * Other benefits as provided by local policy and eligibility Important Notice: Compensation (including bonuses, commissions, or other forms of incentive pay) is not considered earned, vested, or payable until it becomes due under the terms of applicable plans or agreements and is subject to Capgemini's discretion, consistent with applicable laws. The Company reserves the right to amend or withdraw compensation programs at any time, within the limits of applicable legislation. Disclaimers Capgemini is an Equal Opportunity Employer encouraging inclusion in the workplace. Capgemini also participates in the Partnership Accreditation in Indigenous Relations (PAIR) program which supports meaningful engagement with Indigenous communities across Canada by promoting fairness, accessibility, inclusion and respect. We value the rich cultural heritage and contributions of Indigenous Peoples and actively work to create a welcoming and respectful environment. All qualified applicants will receive consideration for employment without regard to race, national origin, gender identity/expression, age, religion, disability, sexual orientation, genetics, veteran status, marital status or any other characteristic protected by law. This is a general description of the Duties, Responsibilities and Qualifications required for this position. Physical, mental, sensory or environmental demands may be referenced in an attempt to communicate the manner in which this position traditionally is performed. Whenever necessary to provide individuals with disabilities an equal employment opportunity, Capgemini will consider reasonable accommodations that might involve varying job requirements and/or changing the way this job is performed, provided that such accommodation does not pose an undue hardship. Capgemini is committed to providing reasonable accommodation during our recruitment process. If you need assistance or accommodation, please reach out to your recruiting contact. Please be aware that Capgemini may capture your image (video or screenshot) during the interview process and that image may be used for verification, including during the hiring and onboarding process. Click the following link for more information on your rights as an Applicant in the United States. ************************************************************************** Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 50 countries. With its strong over 55-year heritage, Capgemini is trusted by its clients to unlock the value of technology to address the entire breadth of their business needs. It delivers end-to-end services and solutions leveraging strengths from strategy and design to engineering, all fueled by its market leading capabilities in AI, generative AI, cloud and data, combined with its deep industry expertise and partner ecosystem.
    $65.6k-122k yearly 14d ago
  • Senior Offensive Security Engineer, Red Team

    Procter & Gamble 4.8company rating

    Cincinnati, OH

    Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands. From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded. The Opportunity Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries? The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise. Responsibilities: + Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR. + Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes. + Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails). + Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC. + Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership. + Mentor junior engineers; set standards for craft quality, methodology, and safety. + Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment. + Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use. + Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management. Job Qualifications Required: + BA or BS degree in Information Security, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree). + 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response. + Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint; IoT/OT; or directory services. + Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE. + Strong engineering skills (Python, PowerShell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft. + Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering. + Excellent executive and technical communication. + Ability to work in Cincinnati, Ohio based office 3 days per week. Preferred: + Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement. + Building program metrics/KPIs, standardizing reporting, and integrating with risk governance. + Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact. + Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams. + Coordinating large third-party exercises and setting complex ROE. Pay Range: $110,000 - $165,000 Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process. Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE (******************************************************* . P&G participates in e-verify as required by law. Qualified individuals will not be disadvantaged based on being unemployed. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Job Schedule Full time Job Number R000138781 Job Segmentation Experienced Professionals Starting Pay / Salary Range $110,000.00 - $165,000.00 / year
    $110k-165k yearly 60d+ ago
  • Lead Security Engineer - DevOps

    Jpmorgan Chase & Co 4.8company rating

    Columbus, OH

    JobID: 210701359 JobSchedule: Full time JobShift: : Take on a crucial role where you'll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future of software security at one of the world's largest and most influential companies. As a Lead Security Engineer at JP Morgan Chase within the Cybersecurity & Technology Controls, you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. * Specific experience deploying commercial software at scale into an enterprise environment. * Develop and enforce robust change management practices to ensure system integrity and security. * Show strong experience defining and implementing infrastructure as Code (IaC), working with CI/CD pipelines, and associated automation tooling. * Function in systems engineering, systems integrations, and systems administration roles. Demonstrate strong working knowledge of Windows and Linux systems internals. * Execute on key deliverables in the security engineering space. Design and develop production deployments with the ability to think beyond routine or conventional approaches in order to deliver technology solutions for key stakeholders. * Develop secure and high-quality production code and review and debug code written by others. Able to implement complex business logic in Python, Bash, PowerShell, and other scripting languages. * Engage effectively with third-party vendors and communicate and collaborate with a broad range of internal teams. * Minimize security vulnerabilities by following industry insights and government regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls. * Work with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability. * Add to team culture of diversity, equity, inclusion, and respect. Required qualifications, capabilities, and skills * Formal training or certification on Engineering and/or Cybersecurity concepts and 5+ years applied experience as a cloud engineer, deployment engineer, DevOps engineer, or equivalent role. * Experience with cloud engineering, deployment engineering, DevOps engineering, or equivalent * Demonstrated skills in planning, designing, and implementing enterprise level security solutions. * Strong experience defining and implementing infrastructure as Code (IaC), working with CI/CD pipelines, and associated automation tooling * Commanding knowledge of a programming/scripting language for automation and integration tasks. * Proficiency in all aspects of the Software Development Life Cycle. * Strong analytical experience with problem solving mindset and the ability to solve complex challenges. * Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security. Preferred qualifications, capabilities, and skills * Cloud computing related certifications with an AWS focus are strongly preferred, such as Certified Solutions Architect, DevOps Engineer, or similar. * Experience effectively communicating with senior business leaders.
    $86k-112k yearly est. Auto-Apply 8d ago
  • Security Engineer - Airlock

    Blue Star Partners 4.5company rating

    Columbus, OH

    Job Title: Security Engineer - Cloud & Endpoint Security Pay Rate: $50/hr - $85/hr Duration: 2/10/2025 - 12/31/2025 (Temp-to-Hire) Contract Type: W2 (must be authorized to work in the US; no sponsorships or C2C) Job Overview Our Cloud and Endpoint Security team is looking for a Security Engineer to drive the deployment and management of an allowlisting/reverse proxy solution (Airlock). This engineer will collaborate with cross-functional teams to ensure integration with existing infrastructure, refine security policies, and contribute to the enhancement of the organization's cybersecurity posture. The role involves hands-on configuration, monitoring, and ongoing maintenance of security solutions, while remaining adaptable to changing threats and technologies. Key Responsibilities Allowlisting & Reverse Proxy Deployment: Lead the deployment and configuration of Airlock, ensuring seamless integration with current systems and networks. Policy Development: Define and implement allowlisting policies to enhance application security, access control, and threat detection. Incident Response Collaboration: Work closely with the incident response team to optimize alerting and logging capabilities, ensuring swift detection and remediation of potential security incidents. Security Strategy & Best Practices: Assist in shaping the broader cybersecurity strategy, aligning it with business objectives and recognized frameworks (e.g., NIST, MITRE, ISO 27001). Automation & Reporting: Identify opportunities to automate configurations, streamline reporting processes, and enhance visibility into system performance. Monitoring & Analysis: Track solution performance and review security logs for emerging threats or anomalies; implement proactive measures where necessary. Research & Continuous Improvement: Stay informed about the latest cybersecurity threats and trends, applying relevant findings to enhance Airlock's configurations. Documentation & Maintenance: Support the development of incident response plans, secure access protocols, and maintain thorough documentation of all configurations and processes. Qualifications Minimum Requirements Bachelor's Degree in a related field or equivalent work experience. 3+ years of experience in cybersecurity, IT, or related roles. 1+ years of hands-on experience deploying or managing application allowlisting or reverse proxy solutions. 1+ years of experience with security frameworks (e.g., NIST, MITRE, ISO 27001). Proficiency with Windows and Linux environments, including command-line configurations. Preferred Skills Experience using Airlock or similar allowlisting tools. Familiarity with scripting/automation (Python, PowerShell, Bash) for configuration and reporting. Industry certifications (e.g., Sec+, CCSP, GIAC). Strong analytical and problem-solving abilities, especially in process development and root cause analysis. Additional Information Temp-to-Hire: This is a W2 contract position with potential to convert to a full-time role, contingent on performance and business needs. Work Arrangements: Local candidates are preferred; remote candidates will be considered if necessary. Team Environment: The Cloud & Endpoint Security team collaborates with multiple departments, playing a crucial part in establishing security best practices and ensuring incident response readiness.
    $50 hourly 60d+ ago
  • Application Security Engineer

    Central Insurance 3.6company rating

    Columbus, OH

    Location: Van Wert, OH; Dublin, OHWork Model: Hybrid Position type: Full time - salary We're a team of employees passionate about delivering best-in-class customer service and driving innovation in IT support. Integrity, relationships, and excellence are at the heart of everything we do. Our employees fully utilize their talents and bring their best selves to work. We believe who you are is just as important as what you do! Help shape the future of secure software at Central. We're looking for a detail-oriented, and innovative Application Security Engineer to join our cybersecurity team. In this role, you'll be responsible for embedding security into the software development lifecycle, identifying vulnerabilities, and collaborating with developers to build resilient applications. If you're passionate about threat modeling, testing, and hardening within the application environment including AI applications and driving a culture of security across engineering teams, we'd love to have you on board. Key Responsibilities of the Role Conduct secure code reviews, threat modeling, and vulnerability assessments. Collaborate with engineers to integrate security controls into CI / CD pipelines. Develops, maintains, and champions secure coding guidelines and training materials. Collaborates with DevOps and Software Engineering to integrate security into the SDLC process. Implements and manages application security tools (SAST, DAST, SCA, WAF, etc..) Assists with monitoring security events and contributes with the incident response. team Collaborates on data security to ensure secure data access configurations with Data Engineering and Infrastructure. Collaborates with Software Engineering to integrate security into AI/ML pipelines and governance frameworks. Responsible for scripting automation for integration of security tools and functions. Utilizes scripting for meta-data aggregation to allow for the creation of dashboards or other metrics for security analytics. Stay current with emerging threats, vulnerabilities, and security technologies. Required Qualifications Bachelor's degree in Computer Science or related field and 2 years related experience Or 4 years related experience Preferred Qualifications CISSP, CASE, GWAPT, or CSSLP certifications preferred Knowledge, Skills, and Abilities Creativity and passion for application security Curious mind and strong desire to constantly learn. Strong understanding of OWASP Top Ten, secure coding practices, and common attack vectors. Proven ability to apply secure design principles within application architecture. Strong analytical, research, and problem-solving skills Understanding of the software development life cycle. Understanding of security tools such as Burp Suite, Snyk, Rapid7, or similar tools. Familiarity with CI/CD tools such as Azure DevOps, GitLab, Jenkins or similar tools. Ability to work with product, software, data, and infrastructure engineering teams. Strong understanding of data protection principles and technologies (Encryption, DLP, IAM) Understanding of scripting automation using Python, PowerShell, Bash. Possess a positive, professional, cooperative, and quality-conscious attitude Possesses verbal and written communication skills, including negotiation, presentation, and influence skills Ability to understand Central Insurance's policies and processes Total Rewards Central establishes base pay based on several factors including labor market data and an evaluation of candidate qualifications relative to role requirements. Base pay is one component of a comprehensive total rewards package designed to support employees' financial, health, career, and retirement objectives. Central provides extensive health and wellness benefits to promote flexibility, work-life balance, and long-term financial security. For more information, see Central Insurance Benefits
    $84k-106k yearly est. 60d+ ago
  • Security Engineer, Identity Management

    Interstate Gas Supply 4.8company rating

    Ohio

    For this role, we are looking for a curious and innovative Security Engineer with a passion for information security, customer service, and compliance. You will be responsible for guiding security best practices while following security frameworks such as NIST, and SOC2. You will be leading the security programs to ensure minimal risk exposure. At IGS, we take a risk-based approach to our decisions and utilize industry best practices and security frameworks to guide us along the way. We are looking for someone that is good at understanding and solving complex and ambiguous problems and constantly seek improvement. Primary Responsibilities Architect and manage Azure Entra infrastructure, including tenant design, hybrid identity configurations, and conditional access policies. Maintain and optimize Active Directory environments, including domain controllers, group policies, organizational units, and security hardening. Design and implement Active Directory Federation Services (ADFS) and manage complex federation trusts between internal and external identity providers. Plan and execute domain trust relationships, including forest trusts, external trusts, and realm trusts across complex enterprise environments. Lead identity platform through organizational transitions, including tenant-to-tenant migrations, directory consolidations, and identity lifecycle transitions. Manage multi-tenant Microsoft 365 migrations, ensuring secure data transfer and seamless user transitions during organizational changes. Develop and maintain disaster recovery and business continuity plans for identity infrastructure. Implement identity security best practices, including privileged access management, MFA enforcement, and identity protection policies. Monitor identity infrastructure health, performance, and security posture, responding to incidents and anomalies. Collaborate with business stakeholders during organizational transitions to ensure smooth identity transitions with minimal business impact. Other Responsibilities Work closely with IT and other departments to ensure security measures are integrated into all aspects of the organization's technology and operations. Apply knowledge of information security principles and practices. Ability to think strategically but willingness to handle, first-hand, the mechanics of technology services required by the business. Other duties and responsibilities as assigned. Required Skills Proven experience managing complex Microsoft 365 environments, particularly multi-tenant migrations and consolidations. Strong understanding of Active Directory Federation Services, domain trusts, and forest architectures. Hands-on experience with Azure Entra, including conditional access, privileged identity management, and hybrid identity configurations. Solid understanding of authentication protocols (SAML, OAuth 2.0, OpenID Connect, Kerberos, LDAP). Exceptional organizational skills, follow through, and multitasking abilities. Decisiveness, good judgment, analytical aptitude, and problem-solving skills to act with authority and take risks in an environment with little direction from others. Excellent communicator with strong organizational savvy and leadership skills necessary to interface with and influence all levels of organization. Ability to work in a fast-paced and dynamic environment. Minimum Education and Experience Minimum of 5 years of technical experience, with at least 3 years of security focus. Demonstrated knowledge of, and experience in implementing security technologies and processes. Professional certifications within security-related areas, while not a minimum requirement, would be highly desirable. #LI-AM1 Work Authorization: Applicants must be authorized to work in the US on a full-time basis. Unfortunately, a current or future need for sponsorship is not supported or available for this position. Salary Range: $87,630.00 - $140,210.00 *This range reflects base pay only. Incentive earnings, like commissions or bonuses, are not included. This role is also eligible for an annual incentive plan based on company performance. How We Support Your Wellbeing: Our employees are our most valuable asset. That's why at IGS, we are committed to offering a holistic benefit program that allows employees to stay healthy, feel secure, and maintain flexibility in their wellbeing journey. Healthcare Essentials: Comprehensive coverage including medical (plus free telehealth), dental, vision, and employer health savings account contributions. Mental Wellbeing: Robust support through Headspace and free mental healthcare visits for you and your dependents. Family Planning Support: Extensive assistance with Maven, paid family and caregiver leave, and fertility, adoption, and surrogacy services. Financial Readiness: Strong financial foundation with a 401(k) plan, company match, and access to financial wellbeing tools. Work-Life Balance: paid time off, tuition reimbursement, paid leaves, employee hardship fund, and a wide range of additional perks. Equal Opportunity Employment: It is the policy of IGS Energy to ensure equal employment opportunity in accordance with all applicable federal and state regulations and guidelines. Employment discrimination against employees and applicants due to race, color, religion, sex (including sexual harassment), national origin, disability, age, sexual orientation, gender identity, military status, and veteran status or other legally protected class under applicable law is prohibited.
    $87.6k-140.2k yearly Auto-Apply 21d ago
  • Information Systems Security Officer (ISSO) III

    General Dynamics 4.7company rating

    Dayton, OH

    Full Part/Time: Full time Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC) Experience: 5 + years of related experience US Citizenship Required: Yes Job Description: The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: * Assist the ISSM in meeting their duties and responsibilities. * Prepare, review, and update authorization packages. * Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. * Notify ISSM when changes occur that might affect the authorization determination of the information system(s). * Conduct periodic reviews of information systems to ensure compliance with the security authorization package. * Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. * Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. * Ensure all IS security-related documentation is current and accessible to properly authorized individuals. * Ensure audit records are collected, reviewed, and documented (to include any anomalies) * Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. * Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans. * Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. * Prepare reports on the status of security safeguards applied to computer systems. * Perform ISSO duties in support of in-house and external customers. * Conduct continuous monitoring activities for authorization boundaries under your preview. * Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts. Experience: * 5+ years related experience. * 2+ years SAP experience required. * Prior performance in roles such as System, Network Administrator or ISSO. Education: * Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: * IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire Clearance Required to Start: * TS/SCI required * Must be able to Attain - TS/SCI with CI Polygraph #AirforceSAPOpportunities The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most. We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology. Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $92.7k-125.5k yearly 35d ago
  • Staff Product Security Engineer

    6120-Janssen Scientific Affairs Legal Entity

    Cincinnati, OH

    At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at ******************* Job Function: R&D Product Development Job Sub Function: R&D Software/Systems Engineering Job Category: Scientific/Technology All Job Posting Locations: Cincinnati, Ohio, United States of America, Santa Clara, California, United States of America : About Surgery Fueled by innovation at the intersection of biology and technology, we're developing the next generation of smarter, less invasive, more personalized treatments. Are you passionate about improving and expanding the possibilities of MedTech surgery? Ready to join a team that's reimagining how we heal? Our MedTech Surgery team will give you the chance to deliver surgical technologies and solutions to surgeons and healthcare professionals around the world. Your contributions will help effectively treat some of the world's most prevalent conditions such as obesity, cardiovascular disease and cancer. Patients are waiting. Your unique talents will help patients on their journey to wellness. Learn more at *******************/medtech. We are searching for the best talent for a Staff Product Security Engineer position, to be located in Santa Clara, CA or Cincinnati, OH. Job Description: The Staff Product Security Engineer will be a key member of the Capital R&D organization, make vital contributions to the New Product Development (NPD) pipeline and transform patient care through innovation. They are accountable for leading our NPD teams and creating a strategy to implement cybersecurity into the design and development of product hardware and software for use in cutting edge medical devices and associated capital equipment You will be responsible for: Identify threats and vulnerabilities to patient safety and product integrity, assess current security controls and determine potential impact of a threat and the risk level associated with threat/vulnerability pairs. Drive architecture, requirements, and design to ensure that decisions incorporate security considerations. Advise embedded system security software to ensure system hardening and secure coding practices. Support all stakeholders on patch management, vulnerability handling, and SBOM scanning Document designs and specifications per design control processes and conform to Industry Standards for Medical Device Software (IEC 62304) Qualifications / Requirements: Education: Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity or related degree Experience and Skills 6+ years' experience (or 4+ with M.S.) establishing security architecture or implementing security solutions in consumer products or medical devices 3+ experience in a software engineering or software architectural role in a New Product Development (NPD) environment Proven experience with threat modeling and risk assessments for connected products or medical devices Ability to work autonomously and proactively seek out security opportunities within the different surgical robotics teams Ability to think big picture and have attention to detail - aligning strategic objectives with tactical implementation. Proven experience with electrical and embedded software design Experience developing software for embedded Real-Time Operating Systems (RTOS) Experience developing embedded software systems using Modern C++ (preferably standards 17+) A results and performance driven demeanor with strong sense of accountability Understanding of penetration testing, vulnerability scanning, and/or other general security testing principles Preferred Skills & Experience: Experience with FDA, data governance, and privacy standards (HIPAA, ISO 27001, UL 2900) Work experience with Systems Engineering activities: requirements management and development, risk management, and verification Strong collaboration, proven technical leadership capabilities, and conflict resolution skills A security certification from an accredited body is preferred and may be considered in lieu of a portion of required years of experience Experience working with secure boot, Trusted Platform Module (TPM), Data Distribution System (DDS), and QNX Other Requirements: Ability to travel up to 10% domestic US and Internationally The anticipated base pay range for this position is $105,000- $169,050. California Bay Area - The anticipated base pay range for this position is $141,000 - $227,000. The Company maintains highly competitive, performance-based compensation programs. Under current guidelines, this position is eligible for an annual performance bonus in accordance with the terms of the applicable plan. The annual performance bonus is a cash bonus intended to provide an incentive to achieve annual targeted results by rewarding for individual and the corporation's performance over a calendar/performance year. Bonuses are awarded at the Company's discretion on an individual basis. Employees and/or eligible dependents may be eligible to participate in the following Company sponsored employee benefit programs: medical, dental, vision, life insurance, short- and long-term disability, business accident insurance, and group legal insurance. Employees may be eligible to participate in the Company's consolidated retirement plan (pension) and savings plan (401(k)). This position is eligible to participate in the Company's long-term incentive program. Employees are eligible for the following time off benefits: Vacation - up to 120 hours per calendar year Sick time - up to 40 hours per calendar year Holiday pay, including Floating Holidays - up to 13 days per calendar year Work, Personal and Family Time - up to 40 hours per calendar year Additional information can be found through the link below. For additional general information on Company benefits, please go to: - ********************************************* This job posting is anticipated to close on 7/22/25. The Company may however extend this time-period, in which case the posting will remain available on *************************** to accept additional applications. Johnson & Johnson is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, protected veteran status or other characteristics protected by federal, state or local law. We actively seek qualified candidates who are protected veterans and individuals with disabilities as defined under VEVRAA and Section 503 of the Rehabilitation Act. Johnson & Johnson is committed to providing an interview process that is inclusive of our applicants' needs. If you are an individual with a disability and would like to request an accommodation, external applicants please contact us via *******************/contact-us/careers . internal employees contact AskGS to be directed to your accommodation resource. #RADSW #Li-Hybrid Required Skills: Product Security, Threat Modeling Preferred Skills: C++ STL, Embedded C++
    $74k-102k yearly est. Auto-Apply 1d ago
  • Senior Security Analyst

    Layerzero Power Systems

    Aurora, OH

    Full-time Description About Us: LayerZero Power Systems Inc. is a globally recognized leader in providing state-of-the-art power distribution solutions for critical industries. With a strong focus on reliability, innovation, and customer satisfaction, we deliver advanced power systems products that ensure uninterrupted and dependable power supply in mission-critical environments. Our customer base is comprised of companies in the transaction processing, financial, computer service provision and semiconductor manufacturing sectors. LayerZero Power Systems is on a trajectory of sustained growth, with a loyal customer base of existing Fortune 100 customers and an expanding portfolio of new customers. Position Description: Senior Security Analyst Responsible for monitoring, analyzing, and responding to security events across LayerZero's IT environment. This role requires a proactive professional with strong technical skills who can identify risks, investigate incidents, and support the implementation of security controls and best practices. Primary Duties: • Monitoring & Incident Response • Monitor security alerts, logs, and dashboards for potential threats. • Investigate and respond to security incidents, escalating as needed. • Perform root cause analysis and recommend corrective actions. • Risk Management & Compliance • Assist with vulnerability assessments, penetration testing, and remediation efforts. • Support compliance initiatives and audits (e.g., ISO, NIST, SOC). • Maintain documentation of policies, procedures, and incident reports. • Security Operations • Manage endpoint protection, firewalls, intrusion detection/prevention systems, and SIEM tools. • Ensure timely patching and updates across systems. • Collaborate with IT teams to enforce access controls and data protection practices. • Continuous Improvement • Stay current on emerging threats, tools, and best practices. • Recommend improvements to security architecture and processes. • Provide training and awareness to employees on cybersecurity practices. Requirements Skills & Experience • Familiarity with SIEM platforms, firewalls, IDS/IPS, and endpoint protection tools. • Knowledge of security frameworks (NIST, ISO, CIS). • Strong analytical and problem-solving skills. • Excellent communication and documentation abilities. Education: • Bachelor's degree in Information Security, Computer Science, or related field (preferred). • 2-4 years of experience in IT security or systems administration. What We Offer: Competitive pay with performance incentives 100% company-paid medical, dental, and vision 401(k) with company match 3 weeks PTO, 8 paid holidays, and 2 floating holidays Why You Will Love Working with Us: Impact: Develop your skills and expertise in a rapidly growing industry, with your work directly influencing the success of mission-critical projects. Innovation: Immerse yourself in an environment that celebrates forward-thinking and continuous improvement. Collaborative spirit: Work closely with engineers, marketers, and other professionals to bring ideas to life. Grow with us: We are committed to your personal and professional development, offering endless opportunities to improve your skills and advance your career. At LayerZero, we are proud to be an Equal Opportunity Employer. We welcome and celebrate diversity, and we are committed to creating an inclusive environment for all employees. Salary Description $85k-115k Annually based on Skills & Experience
    $85k-115k yearly 44d ago
  • SAP WM Consultant

    Global Placement Firm

    Cleveland, OH

    SAP WM Consultant (22960-1) Cleveland, OH (On-site) Industry: Information Technology & Services Experience Level: MidSenior Employment Type: 6-Month Contract Compensation: $45 per hour Visa Sponsorship: Not Available Opportunity Presented by Global Placement Firm Global Placement Firm is excited to partner with a leading IT organization in Cleveland, OH, seeking an experienced SAP WM Consultant for a 6-month on-site contract. This role is ideal for a professional with deep expertise in SAP Extended Warehouse Management (EWM) and SAP WM/LE implementation, who thrives on designing efficient warehouse solutions and optimizing logistics processes. Position Overview The SAP WM Consultant will work closely with clients to understand business requirements and deliver tailored SAP WM/EWM solutions. This position requires strong hands-on implementation experience, warehouse setup knowledge, and expertise in interfaces, EDI, and supply chain processes. The consultant will also support ongoing system improvements and ensure operational excellence across warehouse management processes. Key Responsibilities Implement and configure SAP WM and LE solutions across warehouse operations. Set up and optimize warehouses, including Outbound, Inbound, Internal Movement, and RF processes. Understand business requirements and provide effective solutions and design. Manage interfaces inbound/outbound between SAP WM/EWM and 3PL/4PL systems. Investigate system issues and provide recommendations for service improvements. Support 3PL/4PL and shipment processes (OTC). Configure Picking and Put Away strategies and WM-PP interface. Ensure compliance with SLA-based projects. Required Skills & Competencies 7+ years of experience in SAP Extended Warehouse Management (EWM). Extensive implementation knowledge in SAP WM and LE. Hands-on experience setting up warehouses and defining warehouse operations. Strong knowledge of Inventory Management, EDI, and cross-functional SAP modules. Understanding of 3PL/4PL processes and shipment management. Excellent interpersonal, organizational, and communication skills. Basic knowledge of archiving. Qualifications Experience: Minimum 7 years in SAP EWM/WM implementation. Education: Bachelors degree required. Schedule: On-site in Cleveland, OH, full-time during contract. Compensation Pay Rate: $45 per hour Contract Length: 6 months Relocation Assistance: Not available Visa Sponsorship: Not available Partner with Global Placement Firm At Global Placement Firm, we specialize in connecting highly skilled IT professionals with top organizations. This is your opportunity to leverage your SAP expertise on impactful projects that optimize warehouse operations and logistics. Apply Today Ready to take on a challenging SAP WM Consultant role and deliver high-value solutions for a leading organization? Join the team in Cleveland, OH, through Global Placement Firm and make your mark on warehouse management and logistics excellence.
    $45 hourly 14d ago
  • Cloud Security Engineer

    Uhhospitals

    Ohio

    Cloud Security Engineer - (23000FK6) Description The Cloud Security Engineer (CSE) should be hands-on in all aspects of Azure security including implementing security controls and threat protection, manage identity and access management, defining organizational structure and policies, using Azure technologies in order to provide data protection, configuring network security defenses, collecting and analyzing Azure logs, managing incident responses, and an understanding of regulatory concerns. As a Cloud Security Engineer you design and implement a secure end-to-end infrastructure on Azure in a hybrid cloud setup. Essential FunctionsMonitor security events daily, performing investigations and working with appropriate team members, business teams and Technology teams to develop solutions that address critical security concerns Maintain and improve the security posture of the Azure platform, identifying, and remediating vulnerabilities by using a variety of security tools. Provide cyber security expertise in the analysis, assessment, development, and evaluation of security solutions and architectures to secure applications, operating systems, databases, and networks. Implement and configure security controls and policies, manage access to data, and monitor threats to ensure that apps, containers, infrastructure, and networks are protected. Implementing threat protection and responding to security incident escalations. Automate security controls, data, and processes to provide better metrics and operational support using security-as-code. Configure access within a cloud solution environment using the defense-in-depth principle Configure network security including in a hybrid context with traditional network centric controls Ensure data protection Manage operations within a cloud solution environment such as operations tasks, using cloud native tools, like Log Analytics, Azure Monitor and Azure Security Center or other monitoring tooling. Support our cloud engineers to implement security best-practices and enable secure development and release processes. Deep understanding of configuring security policies and securing applications and data. Required For All JobsPerforms other duties as assigned. Complies with all policies and standards. For specific duties and responsibilities, refer to documentation provided by the department during orientation. Must abide by all requirements to safely and securely maintain Protected Health Information (PHI) for our patients. Annual training, the UH Code of Conduct and UH policies and procedures are in place to address appropriate use of PHI in the workplace. Qualifications QualificationsEducationBachelor's Degree in Information Technology, Computer Science, or a related field Required Work Experience5+ years IT security experience Required and 3+ years building and maintaining secure azure cloud solution and tools (Azure Monitor, Log Analytics, Azure Security Center) Required Knowledge, Skills, & Abilities Understand agile and DevOps concepts in a security context such as “trust but verify”, central vs decentral controls, make agile teams as autonomous as possible while ensuring the teams adhere to the NonFunctional-Requirements. A deep understanding of networking, e. g. IP subnetting, Network Security Groups, routing, Azure Firewall, ExpressRoute, load balancer, DNS. Strong familiarity with cloud capabilities and products and services for Azure, e. g. Azure Active Directory, Privileged Identity Management, VMs, Container Registry, Azure Kubernetes Services (AKS), Data Services, KeyVault. Have the intrinsic quality to want to continuously improve and do better Hands-on and can-do mentality Feeling of ownership Good communication and presentation skills Team player Able to express ideas effectively in individual and group situations. Able to execute a task in a good manner and with good results with limited supervision Strong skills in scripting and automation, Infrastructure-as-Code and using CI/CD concepts. Experience with pipeline tooling for automated deployments and applying security controls. Experience with Experience with infrastructure orchestration tools such as Terraform and other cloud-specific infrastructure automation tools (Azure Resource Manager, Google Cloud Deployment Manager) to automate the creation of staging, testing and production environments. Work experience from large, international companies and have dealt with or worked for global service providers. Licenses and CertificationsCertified Information System Security Professional (CISSP) Preferred Certified Ethical Hacker (CEH) Preferred Additional Licenses and Certifications Microsoft Azure Security related certifications Microsoft Certified: Azure Security Engineer Associate, Microsoft Certified: Information Protection Administrator Associate, or Microsoft Certified: Security Operations Analyst Associate) Preferred Certified Cloud Security Professional (CCSP) Preferred Certificate of Cloud Security Knowledge (CCSK) Preferred Global Information Assurance Certification (GIAC) Preferred Physical DemandsStanding Occasionally Walking Occasionally Sitting Constantly Lifting Rarely 20 lbs Carrying Rarely 20 lbs Pushing Rarely 20 lbs Pulling Rarely 20 lbs Climbing Rarely 20 lbs Balancing Rarely Stooping Rarely Kneeling Rarely Crouching Rarely Crawling Rarely Reaching Rarely Handling Occasionally Grasping Occasionally Feeling Rarely Talking Constantly Hearing Constantly Repetitive Motions Frequently Eye/Hand/Foot Coordination Frequently Primary Location: United States-Ohio-Shaker_HeightsWork Locations: 3605 Warrensville Center Road 3605 Warrensville Center Road Shaker Heights 44122Job: Information TechnologyOrganization: UHHS_Information_TechnologySchedule: Full-time Employee Status: Regular - ShiftDaysJob Type: StandardJob Level: ProfessionalTravel: NoRemote Work: YesJob Posting: Nov 14, 2025, 1:58:20 PM
    $76k-104k yearly est. Auto-Apply 23h ago
  • Information System Security Officer (ISSO)

    Huntington Ingalls Industries 4.3company rating

    Wright-Patterson Air Force Base, OH

    Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $72,181.00 - $100,000.00 Security Clearance: TS/SCI Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the role that's right for you. Apply today. We look forward to meeting you. To learn more about Mission Technologies, click here for a short video: *************************** Job Description As the Information Systems Security Officer (ISSO) the individual works closely with the Information Systems Security Manager (ISSM) proposing, coordinating, implementing and enforcing information system security policies, standards and methodologies. Implementing operating systems and network devices security configuration in accordance with approved Security Technical Implementation Guides (STIGs). Collaborate with team members to define and implement cybersecurity requirements for managed systems and software. Conduct security assessments of Risk Management Framework (RMF) controls implemented for assigned systems. Identify corrective actions and mitigation strategies to achieve and sustain RMF compliance. Job Duties Include: Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP). Performing security control continuous monitoring, security audits, risk analysis and developing mitigation strategies for DoD information systems. Essential Job Responsibilities Assist with all activities associated with the assessment and authorization (A&A) of all hosted computing environments. Perform cybersecurity site audits to verify architecture analysis, cybersecurity requirements and controls, verify mitigation actions, witness cybersecurity testing and evaluation and to assist the ISSM with the final approval for Authority to Operate (ATO) and/or Authority to Connect (ATC). Interface with end users to discuss IT, data management and collaboration tools understanding and benefits. Ensures software, hardware and firmware complies with appropriate security configuration guidelines. Coordinates changes or modifications with the ISSM and SCAR/SCA. Initiates protective or corrective measures, in coordination with the ISSM. Reports security incidents or vulnerabilities to the ISSM. Minimum Qualifications + 2 years relevant experience with Bachelors in related field; 0 years experience with Masters in related field; or High School Diploma or equivalent and 6 years relevant experience. + Experience planning and implementing network layouts of varying classifications in SCIF/SAPF spaces. + Ability to coordinate and plan IT requirements across several Enterprise, MAJCOM, and agency partners. + Familiarity with ICD/ICS 705 Standards as they pertain to networks. + DoD 8570 (Sec+ or applicable) IAT level II cert required + Active TS/SCI clearance with ability to gain SAP/SAR Preferred Requirements Experience working as a COMSEC responsible Officer or familiarity handling and safeguarding COMSEC Physical Requirements May require working in an office or laboratory environment. Capable of climbing ladders and tolerating confined spaces and extreme temperature variances. The listed salary range for this role is intended as a good faith estimate based on the role's location, expectations, and responsibilities. When extending an offer, HII's Mission Technologies division takes a variety of factors into consideration which include, but are not limited to, the role's function and a candidate's education or training, work experience, and key skills. Together we are working to ensure a future where everyone can be free and thrive. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, physical or mental disability, age, or veteran status or any other basis protected by federal, state, or local law. Do You Need Assistance? If you need a reasonable accommodation for any part of the employment process, please send an e-mail to ************************** and let us know the nature of your request and your contact information. Reasonable accommodations are considered on a case-by-case basis. Please note that only those inquiries concerning a request for reasonable accommodation will be responded to from this email address. Additionally, you may also call ************** for assistance. Press #3 for HII Mission Technologies.
    $72.2k-100k yearly 60d+ ago
  • FULL-TIME Opportunity SAP-HANA consultant

    Stem Xpert

    Ohio

    Role: SAP HANA Consultant Duration: Full-time Salary: Open Market/ competitive Rate. Responsibilities: · Understanding the Business requirements & convert them into Blueprint · Define the Design Documents for the HANA Models · Essential Configurations for SAP ECC Accelerations using SAP HANA · Translating Functional Specifications into Technical Specifications · Translate the Business KPIs into HANA & Define the Reports/dashboard Layouts · Design & Creation of HANA Attributes / Analytic / Calculation views · Manage Attribute Mapping · Activate Impacted Objects · Validate Information Models · Compare Object Versions, Check Model References · Display Audit Trails of Information Models · Managing Modeling Content · Set up Information Modeler · Configure Data Services for Metadata Import · Configure the Information Modeler · Creating Schemas, Manage Schema Mapping · Define the Business Blueprint · Creation of Functional specifications · Design the Information Models for HANA · Configure and implement SLT replication Mandatory: Must have SAP Functional knowledge in FICO MUST have experience in SAP BI/BW MUST have experience with at least 1 SAP Hana architecture design and implementation Experience with SAP HANA Data Administration including managing schemas, data model objects, import/export content Experience designing and delivering complex SAP BW/BI enterprise solutions for global organizations Experience with SAP BW 7.3 and/or migration of BW 7.0 to BW 7.3 to Hana Experience with SAP BW 7.x data modeling, data flow design (LSA design), data structures, security concepts, defining overall best practice and code migration through development, QA and Production. Experience with ETL tools (such as Data Services) to extract both SAP and non-SAP data Preferred: SAP HANA RDS (Rapid Deployment Solutions) preferably for Management Reporting or COPA accelerator Experience working on projects across other SAP systems and components (e.g. across ECC, CRM and BW); ECC experience is a plus Subject matter expertise on SAP landscapes and related architecture SAP HANA Certification is a plus. SAP Budget Planning and Consolidation (BPC) and/or ABAP Development Additional Information
    $71k-95k yearly est. 60d+ ago
  • Information Security Engineer - Level 2 - Cloud

    Default 4.5company rating

    Ohio

    Cintas is currently looking for an IT Security Engineer-Level 2 for the IT Security Team within IT. This role researches, recommends and implements changes to enhance information systems security and monitoring capabilities. The Information Security Engineer-Level 2 is responsible for: engineering solutions (processes, technologies) to mitigate control gaps; presenting proposed solutions to IT management; coordinating with vendors for proof-of-concept, proof-of-value, and pilot exercises; reviewing information systems to identify potential security weaknesses, recommending improvements to reduce vulnerabilities; taking part of on-call rotation to triage any potential security incidents; participating in network and systems design to ensure implementation of appropriate systems security policies; maintaining and growing knowledge and understanding of information security, risk management and regulatory compliance topics, providing occasional after hours and weekend support for project efforts; acting as mentor for junior engineers; and working collaboratively with various Cintas partners to design, build, and deploy security frameworks. Skills/Qualifications REQUIRED: High school diploma/GED required; Bachelor's degree in Computer Science or related IT area, preferred Minimum 7 years of experience in Information Technology Minimum 4 years of experience in Information Security Strong knowledge of cyber security practices and procedures Strong knowledge of networking and infrastructure best practices Ability to act as the primary SME for Cloud Security Strong working knowledge of the CSF Framework Strong working knowledge of GCP, GCVE required; Azure preferred Preferred: Industry certifications (e.g., GCP, ACE) Benefits Cintas offers comprehensive and competitive medical, dental and vision benefits, with premiums below the national average. We offer flexibility with four different medical plan options; one plan is offered at zero cost. Additionally, our employee-partners enjoy: • Competitive Pay • 401(k) with Company Match/Profit Sharing/Employee Stock Ownership Plan (ESOP) • Disability, Life and AD&D Insurance, 100% Company Paid • Paid Time Off and Holidays • Skills Development, Training and Career Advancement Opportunities Company Information Cintas Corporation helps more than one million businesses of all types and sizes get Ready™ to open their doors with confidence every day by providing products and services that help keep their customers' facilities and employees clean, safe, and looking their best. With offerings including uniforms, mats, mops, towels, restroom supplies, workplace water services, first aid and safety products, eye-wash stations, safety training, fire extinguishers, sprinkler systems and alarm service, Cintas helps customers get Ready for the Workday . Headquartered in the U.S., Cincinnati, OH, Cintas is a publicly held Fortune 500 company traded over the Nasdaq Global Select Market under the symbol CTAS and is a component of both the Standard & Poor's 500 Index and Nasdaq-100 Index. Cintas Corporation is proud to be an Equal Opportunity Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), national origin, age, genetic information, disability, protected veteran status, or any other characteristic or category protected by local, state, or federal law. This job posting will remain open for at least five (5) days. Job Category: Information Technology Organization: Employee Status: Regular Schedule: Full Time Shift: 1st Shift
    $98k-127k yearly est. 60d+ ago
  • Information Systems Security Officer, Mid

    Booz Allen Hamilton 4.9company rating

    Ada, OH

    The Opportunity: Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to our clients. In all of this “cyber noise,” how can these organizations understand their risks and how to mitigate them? The answer is you. We need your knowledge as an information security risk specialist to help break down complex threats into manageable plans of action. As an information security risk specialist on our team, you'll work with clients to discover their cyber risks, understand applicable policies, and develop a mitigation plan. You'll get technical and personnel details from colleagues to assess the entire threat landscape. Then, you'll help your team guide your client through a plan of action with presentations, whitepapers, and milestones. You'll work on translating security concepts for your client so they can make the best decisions to secure their mission-critical systems. This is your opportunity to take an active role in information security while growing your skills in cloud technologies. Be a part of our team as we protect our nation's critical information systems. Join us. The world can't wait. You Have: 5+ years of experience as an ISSO or Information System Security Analyst (ISSA) Experience conducting tools assessments and configuration analysis against best practices, vendor specifications, and government security guidelines and requirements Experience with the implementation, oversight, and maintenance of the security configuration, practices, and procedures for systems Experience implementing controls from NIST 800-53, FedRAMP, ICD 503, RMF, and DoD Information Levels, including applying them to the design and implementation of information technology solutions to achieve an authorization to operate (ATO) Experience with eMASS or Xacta IA Manager Ability to perform risk analysis Active TS/SCI clearance; willingness to take a polygraph exam HS diploma or GED DoD 8570 IAM Level II Certification such as CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP Certification Nice If You Have: Experience with DoD security technical implementation guides (STIGs), checklists, and testing tools, including STIG Viewer, SCAP, and ACAS scanning tool Experience assessing configuration changes such as new COTS tools or web application upgrades, to system security boundary Experience with cyber-related tools such as Splunk or STIG Viewer Experience with SAP Knowledge of Zero Trust principles and concepts Ability to work within a collaborative team and a fast-paced and dynamic environment Possession of excellent written, organizational, presentation, and verbal communication skills AWS, Azure, or GCP Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page. Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $61,900.00 to $141,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date. Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud. Work Model Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
    $61.9k-141k yearly Auto-Apply 11d ago

Learn more about sap security consultant jobs