Post job

Security architect jobs in Altoona, PA

- 377 jobs
All
Security Architect
Information Systems Security Officer
Security Engineer
Architect
Security System Engineer
Information Security Engineer
Information Security Analyst
Information Security Director
Information Security Consultant
Senior Security Analyst
Senior Information Security Consultant
  • OT Security Engineer

    VMC Soft Technologies, Inc.

    Security architect job in Collegeville, PA

    Must have an OT background with life sciences experience Deliver OT security firewall policy design and document Investigate and deliver appropriate OT architectures for RD systems Troubleshoot connectivity issues experienced during migration activities Must be proficient in Palo Alto Must have an OT background with life sciences experience Knowledge of supporting technologies, Zscaler, Cisco network infrastructure, Azure, and Google cloud Good to have Experience using ServiceNow Preferred RD lab experience, knowledge of lab systems, such as LIMS. HPLC etc Experience with project software (ADO) Generic US or UK based (US preferred) Good communicator, role requires frequent conversations with the business Note : If you are interested please share me your resumes to ********************* or else reach me at **********.
    $80k-111k yearly est. 4d ago
  • Cloud Security Engineer

    GHR Healthcare 3.7company rating

    Security architect job in Philadelphia, PA

    The Cloud Security Engineer will play a pivotal role in the cloud security service delivery model. The role combines deep technical expertise, collaboration across internal and external teams to design, implement, and optimize cloud security controls and service lines. The candidate will support both project-based and continuous security initiatives, focusing on securing HOSPITAL's cloud migration, supporting cloud security tool optimization, cloud security processes for the Information Security team, cloud/hybrid controls, automation, and risk-driven security outcomes. Proven experience in securing a multi-cloud environment. Proven experience with Identity and access management in the cloud Proven experience with all security service lines in a cloud environment and the supporting security tools and processes to be successful. Demonstrate collaboration with internal stakeholders, vendors, and supporting teams to design, implement, and maintain security technologies across network, endpoint, identity, and cloud infrastructure. Drive continuous improvement and coverage of cloud security controls by validating alerts, triaging escalations, and working with the MSP to fine-tune detection and prevention capabilities. Lead or support the development of incident response plans, engineering runbooks, tabletop exercises, and system hardening guides. Ensure alignment of security architectures with HOSPITAL's policies, standards, and external frameworks such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS Well Architected framework, Google CAF Participate in design and governance forums to provide security input into infrastructure, DevSecOps, and cloud-native application strategies. Assist with audits, compliance assessments, risk remediation plans, and evidence collection with internal compliance and external third-party stakeholders. Mentor and support junior InfoSec engineers through documentation, training, and peer reviews. Hands-on experience in security engineering, systems integration, and cloud architecture (Azure preferred). Proficiency in tools and domains such as: EDR (Microsoft Defender), SIEM (Sentinel or Splunk), CSPM (e.g., Wiz), IAM (Entra ID), VPNs/NGFWs, NAC, and encryption protocols. Demonstrated understanding of secure configuration management, automation pipelines (e.g., Terraform, PowerShell), and vulnerability management platforms. What you will do A Principal Information Security Specialist has similar responsibilities to Information Security Specialist III personnel. However, a Principal Information Security Specialist is deemed to be the subject matter expert and in-house advisor on complex problems and issues. A Principal Information Security Specialist also: Works independently to initiate assignments and draws upon extensive professional knowledge and experience to make independent judgments regarding analysis, evaluation, development, and implementation of enterprise long-term solutions and operating initiatives to ensure that enterprise architectural objectives are aligned with organizational needs and strategic goals. Skills: Duties (cont'd): Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of HOSPITAL DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. Skills: Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store HOSPITAL information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information.
    $100k-144k yearly est. 5d ago
  • Cloud Security Engineer

    Motion Recruitment 4.5company rating

    Security architect job in Philadelphia, PA

    Our client is one of the largest Hospitals in the US. Based out of Philadelphia, they are looking to hire a Cloud Security Engineer on a Contract basis. Contract Duration: 6 Month Contract (Potential for extension or conversion) Required Skills & Experience At least twelve (12) years industry related experience, including experience in one to two IT disciplines (such as technical architecture, network management, application development, middleware, information analysis, database management or operations) in a multitier environment. CISSP Certification At least six (6) years experience with information security, regulatory compliance and risk management concepts. At least three (3) years experience with Identity and Access Management, user provisioning, Role Based Access Control, or control self-assessment methodologies and security awareness training. Experience with Cloud and/or Virtualization technologies. Demonstrates comprehensive knowledge and understanding of Information security principles, general and IT controls (e.g., access controls, risk management, change management, cloud security) and related information security policies and procedures. Exhibits knowledge of industry regulatory standards and accreditation requirements or control frameworks (HIPAA, PCI, Joint Commission, NIST, Red Flags, ISO 27000 series). Comprehensive knowledge of information security regulations, standards and leading practices, including understanding of EHR, cloud frameworks, identity access controls. Good knowledge of basic database query techniques & data mining to analyze data or other related database functionality. Knowledge of Microsoft Active Directory, UNIX, and Clinical Applications a plus. Experience implementing application level security in clinical and financial systems (e.g., Epic, Lawson). ERP experience a plus. General understanding of networking and communication techniques including WANs, LANs, Internet, Intranet, protocols, such as TCP/IP and their impact on security. Microsoft, UNIX, Lawson, and Clinical Applications, Experience with industry standard SDLC methodologies; hands-on experience in Project Server methodologies, PMO project management skills, including use of MS productivity tools (Access, Word, PowerPoint, Visio, Project). Experience with risk management frameworks. Information Security Requirements Understand and comply with all enterprise and IS departmental information security policies, procedures and standards. Support the integration of information security in the development, design, and implementation of Hospital Technology Resources that process, transmit, or store information. Support all compliance activities related to state, federal regulatory requirements, healthcare accreditation standards, and all other applicable regulations that govern the use and disclosure of patient, financial, or other confidential information. Daily Responsibilities Optimizes information management approaches through an understanding of evolving business needs and technology capabilities and ensures that projects do not duplicate functionality or diverge from each other and business and DTS strategies. Shapes, designs, and plans specific service lines in product area and manages the risks associated with information and DTS assets through appropriate standards and security policies. Functions as the Subject Matter Expert (SME) to maintain an understanding of DTS business and clinical applications and the relationship to InfoSec and compliance solutions; assist Hospital stakeholders in understanding information protection needs that support the Hospital's business. Works with other architects to provide a consensus based enterprise solution that is scalable, adaptable and in synchronization with ever changing business needs and takes ownership of a particular solution offering. Works with highly matrixed team of DTS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption). Support and/or lead activities around InfoSec standards for business continuity and change management activities (e.g., table tops and change review board) and educates DTS Hospital management on security issues (e.g., Identity and Access Management (IAM), Role Based Access Control (RBAC) models. You will receive the following benefits: Medical Insurance - Four medical plans to choose from for you and your family Dental & Orthodontia Benefits Vision Benefits Health Savings Account (HSA) Health and Dependent Care Flexible Spending Accounts Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance Hospital Indemnity Insurance 401(k) including match with pre and post-tax options Paid Sick Time Leave Legal and Identity Protection Plans Pre-tax Commuter Benefit 529 College Saver Plan Motion Recruitment Partners (MRP) is an Equal Opportunity Employer. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under MRP's Employment Accommodation policy. Applicants need to make their needs known in advance.
    $98k-137k yearly est. 6d ago
  • Information Security Engineer - Infrastructure & Compliance(Only w2)

    Astir It Solutions, Inc. 3.6company rating

    Security architect job in King of Prussia, PA

    Minimum Experience: 10+ Years Key Responsibilities Security & Compliance Serve as divisional lead for NIST 800-171 control alignment, tracking, and remediation. Partner with Internal Audit and Enterprise Security to review non-compliance findings and drive resolution. Maintain and improve Defender for Cloud posture management across Azure infrastructure. Identify, prioritize, and remediate vulnerabilities across infrastructure, networks, and systems. Develop and implement Linux patch management strategy and compliance reporting. Contribute to policy documentation and control evidence collection for SOX and NIST readiness. Infrastructure & Cloud Security Operations Work closely with Infrastructure, Cloud Ops, and Application teams to assess risk and prevent operational disruption. Integrate security best practices into Azure, network, and datacenter operations. Utilize Defender, Azure Security Center, and related tools to monitor and report on environment health. Coordinate with Cloud and Systems Engineers to validate patch success, compliance metrics, and configuration baselines. Automate recurring security validation and compliance tasks using scripting (PowerShell, Python, Bash). Governance, Reporting, and Training Maintain centralized tracking for security initiatives, audit remediations, and policy adherence. Partner with PMs to ensure remediation workstreams are integrated into project schedules. Support KnowBe4 phishing campaign analysis and contribute to security awareness reinforcement. Report key risk indicators (KRIs) and compliance metrics to leadership. Required Qualifications 8 years of experience in Information Security, Infrastructure Engineering, or Cloud Operations. Proven experience with Defender for Cloud, Azure Security Center, or equivalent platforms (e.g., Tanium, Nessus, Qualys). Working knowledge of NIST 800-171, NIST CSF, or ISO 27001 frameworks. Experience managing patching and vulnerability remediation across Windows and Linux environments. Proficiency with scripting or automation tools (PowerShell, Python, Bash). Familiarity with Active Directory, Azure AD, and network security principles. Preferred Qualifications Experience with Fortify or similar static code analysis tools. Familiarity with KnowBe4, VRX, or patch compliance tracking systems. Exposure to Azure DevOps, IaC, and configuration-as-code methodologies. Security or cloud certifications (e.g., AZ-500, Security+, CISSP, or equivalent). Success Measures Reduction in open audit findings and non-compliant controls. Establishment of measurable Linux and infrastructure patch compliance reporting. Defender for Cloud secure score improvement over baseline. Defined and repeatable NIST alignment process for divisional systems. Improved coordination between Infrastructure, Cloud, and Security teams during vulnerability remediation. If I missed your call ! Please drop me a mail. Thank you, Harish Accounts Manager/Talent Acquisition Astir IT Solutions, Inc - An E-Verified Company Email:******************* Direct : ***********788 50 Cragwood Rd. Suite # 219, South Plainfield, NJ 07080 ***************
    $84k-109k yearly est. 2d ago
  • ServiceNow Architect

    E&E It Consulting Services, Inc.

    Security architect job in Philadelphia, PA

    e&e is seeking a ServiceNow Architect for a hybrid contract opportunity in Harrisburg, PA! The Senior Integration Solution Architect is a highly experienced technologist responsible for driving technical strategy, architectural design, and end-to-end solution integration within the ServiceNow platform. This role provides deep expertise across ITSM, ITOM, ITBM, GRC, Security Operations, Service Portal, and Mobile. The Architect will lead complex integration initiatives, guide platform enhancements, and collaborate with cross-functional teams to ensure scalable, secure, and high-performing solutions. With strong communication, analytical, and problem-solving skills, this role serves as a key technical advisor and thought leader for enterprise-wide ServiceNow adoption and modernization efforts. Responsibilities: Architecture & Technical Leadership Lead architectural strategy, design, and implementation of ServiceNow platform solutions, ensuring alignment with enterprise standards and best practices. Drive deep architecture and design discussions across technology stacks, cloud integrations, and continuous deployment pipelines. Define and maintain architectural roadmaps for ServiceNow integrations, data flows, and application extensions. Serve as the technical SME for ITSM, ITOM (Discovery & Orchestration), ITBM, GRC, VRM, Security Incident Response, Service Portal, Mobile, and related modules. Integration & Development Architect, design, and oversee integrations using REST, SOAP, SAML, SSO, LDAP, JDBC, and ODBC. Ensure scalable and secure integration patterns across cloud-based platforms, SaaS, PaaS, and multi-tenant environments. Provide guidance and oversight for scripting (JavaScript, Angular, XML), configuration, and custom development. Review and optimize RDBMS designs for integrations involving PL/SQL, MySQL, or SQL Server. Collaboration & Stakeholder Engagement Communicate complex technical concepts to both technical and non-technical stakeholders. Work closely with product owners, project managers, and development teams to translate business requirements into technical solutions. Participate in Agile ceremonies and contribute to continuous improvement of processes and delivery methods. Governance & Process Improvement Ensure adherence to ITIL processes, architectural standards, and security best practices. Support platform governance, performance tuning, and quality assurance across implementations. Mentor technical staff and contribute to knowledge sharing across the organization. Requirements Professional & Soft Skills Strong problem-solving and analytical abilities for evaluating complex requirements and resolving integration challenges. Excellent written and verbal communication skills for stakeholder engagement and technical documentation. Experience with project and process management frameworks, including Agile and ITIL. Qualifications Bachelor's Degree in Computer Science, Information Systems, Engineering, or equivalent combination of education and experience. 10+ years of experience in application, infrastructure, database, networking, and distributed systems architecture. Experience with modern web technologies and cloud architecture principles, including SaaS, PaaS, multi-tenancy, and automation. ServiceNow platform development experience. ITIL Certification required. ServiceNow Administration Certification required. Expertise with ITSM, ITOM, ITBM, GRC, Service Portal, Mobile, VRM, and Security Incident Response modules. Technical & Platform Skills 4-8+ years of hands-on ServiceNow experience, including participation in at least two full-life-cycle implementations. Strong understanding of REST, SOAP, SAML, SSO, LDAP, JDBC, and ODBC integration methods. Proficiency in scripting languages including JavaScript, Angular, XML, and HTML/CSS. Solid RDBMS design experience across PL/SQL, MySQL, and SQL Server. Strong knowledge of cloud-based platforms and integration architectural principles.
    $70k-109k yearly est. 5d ago
  • Information Security Specialist

    Delta Information Systems, Inc. 3.8company rating

    Security architect job in Horsham, PA

    Delta Information Systems, Inc. is seeking a highly skilled Information Security Specialist to protect and secure critical systems, data, and intellectual property in a fast-paced Aerospace & Defense environment. This role is responsible for implementing and managing security controls, ensuring compliance with strict regulatory requirements, and defending against advanced cyber threats. The ideal candidate will bring deep technical knowledge, strong problem-solving skills, and the ability to work across teams to maintain the confidentiality, integrity, and availability of sensitive information that supports our national security mission. This is a fully onsite position located in Horsham, PA. Key Responsibilities Implement, monitor, and maintain security tools, including firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM platforms. Perform continuous monitoring, vulnerability assessments, penetration testing, and risk analysis of systems and networks. Ensure compliance with DoD, NIST 800-171, CMMC, ITAR, DFARS, and other regulatory frameworks. Champion the company's certification to CMMC Level 2. Develop, document, and enforce cybersecurity policies, procedures, and incident response plans. Support Government and customer security audits, preparing evidence and remediation plans as required. Investigate and respond to cybersecurity incidents, performing root-cause analysis and recommending corrective actions. Collaborate with IT, Engineering, Program Management, and Security teams to embed cybersecurity best practices into operations and product development. Provide cybersecurity awareness training to employees with a focus on handling sensitive defense-related data. Stay current on emerging cyber threats, nation-state tactics, and evolving compliance regulations impacting aerospace and defense. Qualifications Required: Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). 5+ years of experience in information security, IT security operations, or cybersecurity. Strong knowledge of NIST 800-171, CMMC, and DFARS cybersecurity requirements. Experience developing, implementing and achieving CMMC compliance. Experience supporting DoD or government contracts with cybersecurity compliance needs. Hands-on experience with security infrastructure: SIEM, IDS/IPS, endpoint security, and network monitoring tools. Strong understanding of Windows, Linux, and cloud environments (Microsoft Office 365, Deltek Costpoint). Excellent analytical, documentation, and communication skills. U.S. Citizenship (required due to defense industry regulations). Preferred: Active security clearance (Secret or higher), or ability to obtain one. Relevant certifications: CISSP, CISM, Security+, CEH, or GIAC. Experience with RMF (Risk Management Framework) and STIG compliance. Familiarity with secure software development, DevSecOps practices, or classified system security. Compensation Competitive salary Outstanding benefits package 100% Paid Coverage for Medical, Dental, and Vision 401(k) Employer Match Employee Stock Ownership Program (company funded) Life Insurance (company funded) Short-Term Disability (company funded) Long-Term Disability (company funded) Vacation & Sick Holidays: 11 days HealthCare FSA Dependent Care FSA What We Offer Opportunities for training, certifications, and career growth. A mission-driven culture where your work contributes to national security. Exposure to advanced technologies and programs critical to the aerospace and defense sector. About Delta Information Systems, Inc. Delta Information Systems (DIS) is an industry-leading supplier of high-quality aerospace telemetry products for Flight Test, Missile Test, Range Safety, Launch Support and Satellite Command and Control applications. Their products address the complete telemetry chain from Data Acquisition, Storage, Transport and Distribution to Telemetry Processing and Display. DIS customers include all DoD entities, all Major Primes, Integrators, Gov Labs, Aircraft & Missile Manufacturers, & Launch Facilities. In addition, Delta Information Systems (DIS) designs and develops sophisticated electronic equipment that is specifically designed to reliably operate in harsh environments. They deliver critical video communications capability for manned and unmanned Intelligence, Surveillance and Reconnaissance (ISR) programs.
    $74k-106k yearly est. 5d ago
  • GenAI/ML Architect

    Steel Point Opportunities

    Security architect job in Pittsburgh, PA

    Role GenAI/ML Architect Business Vertical: Life Sciences, Health Care, Energy, Resources and Utilities Responsibility: • Design and architect end-to-end AI/ML solutions, ensuring scalability, security, and efficiency. • Guide data scientists and engineers in developing, training, and deploying machine learning models. • Define best practices for MLOps, including model versioning, monitoring, and retraining strategies. • Develop AI frameworks and reusable components to accelerate AI adoption across the organization. • Collaborate with stakeholders to understand business requirements and align AI solutions accordingly. • Optimize data pipelines and AI infrastructure to support high-performance model training and inference. • Evaluate emerging AI technologies and recommend suitable tools, frameworks, and methodologies. • Ensure compliance with AI ethics, governance, and data privacy regulations. • Implement microservices architecture to build scalable and resilient software solutions. • Use Cloud platforms like AWS, Azure to deploy and run software applications. Key Skills: • 12+ years of experience in AI/ML engineering, including at least 3 years in an architectural role • Extensive experience in AI/ML model development, deployment, and lifecycle management. • Expertise in machine learning frameworks (TensorFlow, PyTorch, Scikit-learn) and cloud platforms (AWS, GCP, Azure). • Strong programming skills in Python, Java, or C++ • Proficiency in MLOps tools (Kubeflow, MLflow, Airflow, Docker, Kubernetes). • Deep understanding of distributed computing, big data technologies (Spark, Hadoop), and scalable data pipelines. • Experience with NLP, deep learning, reinforcement learning, generative AI • Experience in AI-driven business transformation and enterprise AI strategies. • Familiarity with edge AI, IoT, or real-time AI processing. • Knowledge of ethical AI frameworks and responsible AI principles. • Strong problem-solving skills and ability to mentor AI/ML teams. • Experience in agile development methodologies to deliver solutions and product features.
    $69k-108k yearly est. 60d+ ago
  • Principal Information Security Architect

    Lumen 3.4company rating

    Security architect job in Harrisburg, PA

    Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. **The Role** The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies. **The Main Responsibilities** + Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures. + Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process. + Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support. + Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed. + Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business. **What We Look For in a Candidate** Required: + Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or + Master's degree in computer science, engineering, or related field with 12+ years of relevant experience. + Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA. + Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR). + Software development experience. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges: $149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process. Learn more about Lumen's: + Benefits (**************************************************** + Bonus Structure \#LI-Remote **What to Expect Next** Requisition #: 340981 **Background Screening** If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. **Equal Employment Opportunities** We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. **Disclaimer** The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions. In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information. Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
    $164k-218.7k yearly 5d ago
  • Information Security Architect

    Forhyre

    Security architect job in Philadelphia, PA

    Job Description We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices. This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. To be Successful in this Role Develop an architectural vision to support the continued growth of the product suite Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use Experience with privacy-enhancing technologies and encryption techniques. Working knowledge of cloud security architecture strategies, frameworks, and reference models Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives Ability to build Risk Models and analyze security weaknesses in complex technology deployments. Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc. Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design. Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward. Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans. Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security. Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment. Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives. Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components. You Will Have 8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.) Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations. Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics. Hands-on experience with Cloud Technologies AWS, Azure & GCP Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks Experience in managing and contributing to incident response Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation. Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
    $120k-178k yearly est. 5d ago
  • Technical Security Architect

    Federated Hermes, Inc.

    Security architect job in Pittsburgh, PA

    * Bachelor degree or equivalent required; Bachelor degree in IT related field preferred * Seven to twelve years of experience in the development and implementation of information security systems required * Experience or detailed technical knowledge of securing applications, operating systems and networks required * Experience or detailed knowledge of security technology including: Next Generation Firewalls, Email Security, network monitoring, Identity Access Solutions and endpoint security devices required * Working knowledge of: risk assessment products; IS automated tools; various authentication schemes (including Active Directory); browser security functionality; policy development; data privacy; and common information security issues preferred MAJOR DUTIES: * Works across multiple technology teams to effectively identify our technology vision. * Ensures the overall environment continuously evolves to support the firm's objectives, across investment management, trading, IM operations, compliance, product development, marketing, sales, corporate management, etc. * Create an Information Security Strategy that works across the enterprise to enable the secure use of leading edge technology. * Assist in building a strategic roadmap that implements the strategy by properly sequencing people, process and technology solutions. * Execute the strategic roadmap by streamlining the overall suite of security tools, and making cost effective and optimized investment in emerging security technology. * Provide security expertise for security-relevant enterprise initiatives such as data governance, account administration, and governance processes. * Assists in establishing and maintaining standards and policies related to Information Security. HOURS/LOCATION: * 8:30 a.m. - 5:00 p.m. (over time as required) * Warrendale Location - Warrendale, PA 15086 (will be required to work at other Federated locations) EXPLANATORY COMMENTS * Strong oral and written communication skills * Effective people management and customer service skills * Demonstrates a cooperative attitude and effective interpersonal and communication skills with clients, coworkers and vendors. * Demonstrates flexibility and the ability to work as a member of a team * Possess the ability to facilitate technical discussions and negotiate resolutions when there are differing technical opinions
    $117k-174k yearly est. 38d ago
  • Enterprise Security Architect

    Excellerent Solutions

    Security architect job in Pittsburgh, PA

    Enterprise Security Architect Duration: Full Time Interview mode: Inperson Brand new role Serve as a member of the enterprise architecture team, providing technical security insight that aligns with business objectives and security requirements. Establish and evangelize the security architecture (principles, policies, standards and patterns) to development groups, business groups and other stakeholders; Govern adherence to the architecture golden rules. Analyze gaps between current and target security architecture and develops plans to close the gaps. Responsibilities: Works with IT departments, information security architects, technical architects, data custodians, and governance groups to develop and update Client security policies, standards, procedures, and solutions for secure application architecture. Ensures that security practices are aligned with Client's overall business strategies. Advises and drives the security maturity of the development lifecycle including secure coding and system security for operations. Recommends and implements changes in security procedures and practices using best-in-class information to ensure that Client is maintaining best-in-class security practices. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Conducts Penetration Test, Vulnerability, and Risk assessments to improve the security architecture and security product toolset. Prepares system security reports by collecting, analyzing, and summarizing data and trends. Executes validation by external vendors. Verifies security systems and network configurations by developing and implementing test scripts while monitoring adherence to standards in architecture, application design, development, and testing frameworks. Qualifications Qualifications: Bachelor degree with Master preferred. Security certification required. 7 to 10 years of experience operating in a cloud environment (e.g. Azure, AWS, Rackspace) along with at least 5 years working in a dedicated information security role with a focus on Security Architecture for at least 3 years. 7 to 10 years of experience with PaaS, IaaS, SaaS, and/or mobile architecture Solid experience with security hacking tools and techniques. Solid understanding in application architectures and technology including web applications, mobile technology, identity and access management, security event and incident management as well as web security controls (e.g. Web Application Firewall, Database Activity Monitor, Distributed Denial of Service controls, etc.) Extensive working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10. Experience with compliance standards such as HIPAA, CMS, SOX, GLBA; as well as security frameworks such as SANS 20 CSC, CoBIT, or NIST. Previous involvement with developing and/or maintaining an Enterprise Security Architecture. Familiarity with TOGAF is a plus Strong understanding and experience of software development methodologies and life cycles Excellent written and verbal communications skills required, with the ability to explain advanced concepts to audiences of varying levels Can be counted on to exceed goals successfully, very bottom-line orientated while steadfastly pushes self and others for results. Has working knowledge of web application security best practices to include, but not limited to, Cloud Security Alliance controls matrix, OWASP Top 10. Demonstrated ability to make sound decisions using a mixture of analysis, wisdom, experience, and judgement coupled with a strong ability to learn on the fly (quickly learns new tasks, open to change). Certifications, licenses or registrations: Security+, CISSP, CISA, CEH Proven ability to organize/manage multiple priorities coupled with the flexibility to quickly adapt to ever-changing business needs. Additional Information All your information will be kept confidential according to EEO guidelines.
    $117k-174k yearly est. 60d+ ago
  • Dir - IAM Cloud Product - Information Security

    MWI Animal Health

    Security architect job in Conshohocken, PA

    Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to deliver on that purpose. If you want to make a difference at the center of health, come join our innovative company and help us improve the lives of people and animals everywhere. Apply today! Job Details JOB PROFILE SUMMARY: The Director, IAM Cloud Product is responsible for leading the strategy, design, and delivery of cloud-native Identity & Access Management (IAM) capabilities across all service models-SaaS, IaaS, and PaaS-and cloud providers. This role drives the development of scalable, policy-driven IAM solutions that enable dynamic, just-in-time access to cloud resources, applications, and services. As a key contributor to the enterprise's digital transformation and cloud adoption strategy, the Director ensures IAM capabilities are embedded into cloud-native architectures, DevOps workflows, and CI/CD pipelines. They partner with cloud engineering, cybersecurity, application development, and infrastructure teams to deliver secure, frictionless identity services that support agility, compliance, and innovation. The Director leads a cross-functional team of product managers, architects, and engineers, and is accountable for defining the IAM cloud product roadmap, aligning with enterprise priorities, and delivering measurable outcomes. This role also evaluates emerging technologies, manages vendor relationships, and ensures IAM solutions meet regulatory and policy requirements.Our employee experience is a strategic priority for our company. Our leaders are accountable for leading with purpose, fairness, and equity. They are responsible for building and developing diverse teams, maintaining a safe and inclusive environment, setting clear priorities, and holding self and team accountable for executing with excellence. PRIMARY DUTIES AND RESPONSIBILITIES: Lead the strategy, design, and delivery of cloud-native IAM capabilities across SaaS, IaaS, and PaaS service models and providers, ensuring scalability, security, and alignment with enterprise architecture. Enable dynamic, just-in-time access to cloud resources through policy-driven controls, automation, and integration with enterprise identity platforms. Define and maintain the IAM cloud product roadmap, aligning with digital transformation, cloud adoption, and enterprise security strategies. Integrate IAM capabilities into cloud-native architectures, including support for federated identity, workload identity, secrets management, and entitlement management. Partner with cloud engineering, DevOps, and application development teams to embed IAM into CI/CD pipelines and cloud application development workflows. Evaluate and select IAM tools and platforms that support multi-cloud environments, including AWS, Azure, GCP, and SaaS ecosystems. Ensure IAM solutions meet regulatory, compliance, and policy requirements, including alignment with frameworks such as NIST, ISO 27001, and internal control standards. Manage vendor relationships and product lifecycle activities, including licensing, renewals, feature adoption, and roadmap alignment. Lead cross-functional teams of product managers, architects, and engineers to deliver IAM capabilities that support agility, innovation, and secure access. Define and track product KPIs and success metrics, ensuring IAM cloud products deliver measurable business and security outcomes. Contribute to enterprise IAM strategy, bringing deep expertise in cloud identity, access governance, and secure service integration. What Cencora offers We provide compensation, benefits, and resources that enable a highly inclusive culture and support our team members' ability to live with purpose every day. In addition to traditional offerings like medical, dental, and vision care, we also provide a comprehensive suite of benefits that focus on the physical, emotional, financial, and social aspects of wellness. This encompasses support for working families, which may include backup dependent care, adoption assistance, infertility coverage, family building support, behavioral health solutions, paid parental leave, and paid caregiver leave. To encourage your personal growth, we also offer a variety of training programs, professional development resources, and opportunities to participate in mentorship programs, employee resource groups, volunteer activities, and much more. For details, visit ************************************** Full time Salary Range*$156,300 - 241,010 *This Salary Range reflects a National Average for this job. The actual range may vary based on your locale. Ranges in Colorado/California/Washington/New York/Hawaii/Vermont/Minnesota/Massachusetts/Illinois State-specific locations may be up to 10% lower than the minimum salary range, and 12% higher than the maximum salary range. Equal Employment Opportunity Cencora is committed to providing equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status or membership in any other class protected by federal, state or local law. The company's continued success depends on the full and effective utilization of qualified individuals. Therefore, harassment is prohibited and all matters related to recruiting, training, compensation, benefits, promotions and transfers comply with equal opportunity principles and are non-discriminatory. Cencora is committed to providing reasonable accommodations to individuals with disabilities during the employment process which are consistent with legal requirements. If you wish to request an accommodation while seeking employment, please call ************ or email ****************. We will make accommodation determinations on a request-by-request basis. Messages and emails regarding anything other than accommodations requests will not be returned . Affiliated Companies:Affiliated Companies: AmerisourceBergen Services Corporation
    $156.3k-241k yearly Auto-Apply 13d ago
  • Senior Manager, Information Security Office Consultant

    Dev 4.2company rating

    Security architect job in Philadelphia, PA

    Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located. Company Name: Capital One Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates. What You'll Do: Act as a central Information Security point of contact for the Enterprise Platform team Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes Escalate and manage cyber security risk Provide ad hoc support on special Information Security hot topics for the business Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment Work with line of business leadership to anticipate their objectives and needs to better serve the line of business Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization Basic Qualifications: High School Diploma, GED or equivalent certification At least 8 years of experience working in cybersecurity or information technology At least 7 years of experience providing guidance and oversight of Security concepts At least 7 years of experience performing security risk assessments and security architecture reviews At least 7 years of experience with architecture, software design, networking, and cloud infrastructure At least 5 years of experience with cloud security engineering Preferred Qualifications: Bachelor's Degree 3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure) 4+ years of experience in IAM or related areas Experience building software utilizing public cloud (e.g. AWS, GCP, Azure) Familiarity with Cloud patch management practices such as system rehydration and image management Experience utilizing Agile methodologies Experience with Software Security Architecture Experience with Application Security Experience with Threat Modeling Experience with Penetration Testing or Vulnerability Management Experience with integrating SaaS products into an Enterprise Environment Experience with securing Container services Splunk-Fu / Enterprise Monitoring experience Financial services industry experience Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP) Experience in Offensive and Defensive Security techniques Experience in a regulated environment Strong conceptual thinking, influence and communication skills At this time, Capital One will not sponsor a new applicant for employment authorization for this position. The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked. New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter. Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level. This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations. For technical support or questions about Capital One's recruiting process, please send an email to [email protected] Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site. Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
    $243.8k-278.2k yearly 60d+ ago
  • Sr Security Analyst (SOC)

    Ivalua

    Security architect job in Pittsburgh, PA

    Pittsburgh, PA Founded in 2000, Ivalua is a leading global provider of cloud-based procurement solutions. At Ivalua we are a global community of exceptional professionals, who believe that digital transformation revolutionizes supply chain sustainability and resiliency to unlock the power of supplier collaboration. We achieve this through our leading cloud-based spend management platform that empowers hundreds of the world's most admired brands to effectively manage all categories of spend and all suppliers to increase profitability, improve ESG (environmental, social, and corporate governance) performance, lower risk, and improve productivity. Driven by our passions and fueled by our shared ambitions, we empower and challenge each other to create meaningful experiences for our colleagues, customers, partners, and communities. Learn more at *************** Follow us on LinkedIn THE OPPORTUNITY CONTEXT: Our growing international IT department (EMEA, AMER, APAC) is composed of over sixty experts responsible for the deployment and operation of the Ivalua Cloud, which hosts environments for our clients around the world. It is also responsible for internal IT infrastructure, IT applications and data, as well as IT support for our users. In this context of growth, we are looking for an experienced Security Analyst (SOC) to strengthen our global SOC team. ROLE: As part of the SOC (Security Operations Center) team, you will be responsible for developing and implementing the SOC strategy for our information systems. You will detect suspicious or malicious activities. You will contribute to the handling of confirmed security incidents in support of the InfoSec teams. Your experience will allow you to mentor more junior SOC analysts and act as a liaison between the SOC team and the company's IT and cybersecurity communities. As the highest-level technical officer of the SOC, you will be responsible for: The technical aspects of a SOC, ensuring that security measures are implemented and maintained to protect Ivalua's information assets Day-to-day operations, ensuring that security incidents are identified, analyzed, and addressed quickly and efficiently WHAT YOU WILL DO WITH US Be the technical point of contact for the SOC team, collaborating directly with the infrastructure, infosec, and cybersecurity solution management teams Serve as the highest escalation point for other SOC analysts Provide mentorship, share best practices, and lead security projects Provide technical advice and support to team members Be the driving force behind the continuous improvement of SOC processes and tools Contribute to standard SOC activities, including monitoring, incident management, and vulnerability management Participate in threat intelligence activities in direct collaboration with the infosec teams Guard SOC communication with other teams (Security, Infrastructure, Business IT, R&D, etc.) as well as senior IT management Participate in the studies, deployments, and development of cybersecurity solutions, particularly SOC tools Implement the necessary processes and reports to analyze logs to detect abnormal user and software behavior, using our SIEM tool and other security consoles. Define the event log collection strategy. Performs regular vulnerability assessments, prioritizes remediation, and tracks closure of security gaps. Manage the coordination, tracking, and remediation of incidents at the global level (EMEA, AMER, APAC). Contributes to ongoing monitoring of threats, vulnerabilities, and attack methods. Improve dashboards reporting on alert tracking and SOC KPIs. Maintain SOC procedures and tools, as well as documentation and knowledge bases. Ensures adherence to security policies, standards, and regulatory requirements (e.g., GDPR, HIPAA, SOC, FEDRAMP, etc. YOUR PROFILE If you have the below experience and strengths this role could be for you: Skills and Experience: Bachelor's degree in relevant field preferred with a minimum of 7 years of relevant professional experience, OR Master's degree in relevant field with a minimum of 5 years of relevant professional experience, OR Equivalent combination of education and experience Minimum of 7 years in the field of IT security, primarily in SOC (analyst, senior analyst, lead, etc.) Solid knowledge of Systems and Networks Knowledge of SIEM tools (MS Sentinel, ELK, Q-Radar, Splunk, AlienVault, etc.) Knowledge of EDR tools (Microsoft Defender, CrowdStrike, etc.) Knowledge of Rapid7 or other vulnerability scanning tools would be a plus Relevant certifications (e.g., CSA, CySA+, CISSP, GCIA,CEH) a plus Desired Qualities: Rigor, attention to detail, curiosity, autonomy, analytical thinking, adaptability, problem-solving Leadership & mentorship, continuous learning, ethical judgment Good communication and writing skills Motivation to thrive in a scale-up, international, dynamic, and fast-growing environment WHAT HAPPENS NEXT If your application fits this specific position's needs, our skilled Talent team will reach out to schedule an initial screening call. Get one step closer to achieving your goals - apply today! Our Talent team will guide you through every step of the interview process - from preparation to completion. They're here to support you! Our recruitment process is designed to assess your competencies through a series of personalized interviews with internal stakeholders relevant to the role. Interviews will be conducted virtually via video or on-site with face-to-face meetings. LIFE AT IVALUA Hybrid working model (3 days in the office per week) We're a team dedicated to pushing the boundaries of product innovation and technology Sustainable Growth, Privately Held A stable and cash-flow positive Company since 10 years Snacks and weekly lunches in the office Feel empowered to pursue your goals with improved team collaboration and increased creativity/productivity Unlock and unleash your full professional potential with our exceptional training and career development program Join a dynamic and international team of top-notch professionals who are experts in their respective fields. Collaborate with like-minded individuals who are deeply passionate and highly motivated about their work. Experience a truly diverse and inclusive work environment where your unique contributions are highly valued Regular social events, competitive outings, team running events, and musical activities, Comparably recognized Ivalua for the following (******************************************** : Powered by People - Powered by You! United by our values we embrace diversity and equity in the broadest possible sense to create an inclusive workplace. To help our customers make supply chains more efficient, sustainable and resilient, we rely on a global team with a variety of backgrounds, skills and views. We believe in equal opportunity and in diversity as a driver of innovation that cultivates a spirit of inclusiveness, creates a productive and fun place to work, and provides fulfilling career opportunities for all Ivaluans. ********************************************** One of Ivalua's core values is to Care & Grow People. We take matters like pay equity very seriously and strive to reward our employees appropriately and fairly for their talents. The salary range for this position is based upon careful and continual market compensation research. In addition to location, salary may also vary based upon job-related knowledge, skills, and experience. Title: Sr Security Analyst Base range minimum: $115,000 Base range maximum: $175,000 *Additional compensation / rewards: In addition to the base salary information above, Ivalua offers an uncapped commission plan as part of the competitive compensation package. Other compensation factors may also be considered. Ivalua also offers exceptional benefits including medical, dental, vision, retirement (with company match), and much more. #LI-SG1 #LI-HYBRID
    $115k-175k yearly Auto-Apply 60d+ ago
  • Information System Security Officer (ISSO) III

    Digital Consultants

    Security architect job in Philadelphia, PA

    Full-time Description Leading with our people, Digital Consultants' mission is to deliver the highest level of professional solutions while being a trusted partner and advisor to our customers. With a culture of practicality, opportunity, and creativity, we remain committed to upholding honesty, trust, respect, and ethical standards in all our endeavors. We are a certified SBA 8(a) small, disadvantaged business that supports multiple IT customers within the Federal, civilian, and private sectors. Digital Consultants also offer our employees growth opportunities, competitive wages, and a full benefits package. Our founding principles, Fairness and Common Sense, make working here more than a job; it's the Digital family. Digital Consultants seeks an Information System Security Officer (ISSO) III who provides cybersecurity support and oversight for Navy systems in accordance with DoD Risk Management Framework (RMF) and Navy Cybersecurity policies. The ISSO assists the ISSM in ensuring system compliance, maintains RMF package documentation, and supports vulnerability management and cybersecurity reporting in support of NSWCPD Code 104. Duties to include: Support the Information System Security Manager (ISSM) in all aspects of system cybersecurity compliance and accreditation. Develop, review, and maintain RMF accreditation packages, including System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), POA&Ms, and Continuous Monitoring strategies. Ensure implementation and validation of security controls in accordance with NIST SP 800-53, DoD 8510.01 (RMF), and Navy SCA business rules. Monitor systems for vulnerabilities, review STIG and SRG scan results, and track remediation in eMASS/VRAM. Conduct and document security incident response actions and report to the ISSM. Provide cybersecurity status reporting, technical risk analysis, and compliance metrics to leadership. Coordinate with system administrators, engineers, and Navy program offices to ensure security requirements are integrated into system lifecycle management. Requirements Clearance: Top Secret, US Citizen only Education: Bachelor's Degree in Computer Science, information technology, communications systems management, or an equivalent science, technology, engineering & mathematics (STEM) degree from an accredited college or university. Certifications: DoD 8570/8140 IAM Level II (CAP, CASP+ce, CISM, CISSP, GSLC, CCISO, HCISPP) OR IAT Level II baseline certification (CCNA-Security, CySA+, GICSP, GSEC, Security+ce, CND, SSCP) Experience: Minimum 7 years of cybersecurity or A&A experience, with at least 5 years as an ISSO or equivalent security role. Experience must include: Developing and maintaining RMF lifecycle documentation. Assessing and validating implementation of security controls. Conducting risk and vulnerability reviews, documenting results, and supporting system accreditation. Expert knowledge of DoD RMF, NIST SP 800-53, and Navy cybersecurity compliance processes. Proficiency in eMASS, ACAS, VRAM, and DISA STIG compliance tools. Ability to coordinate across engineering, operations, and program management teams to resolve cybersecurity issues. Ability to work on-site at NSWCPD Philadelphia and travel CONUS as required. The candidate must, with or without reasonable accommodation, be able to sit, stand, use computers and monitors, and perform duties in an office environment for extended periods. The candidate must be able to lift up to 40 lbs. on occasion (e.g., moving a case of paper or similar task) that may occur occasionally. Digital Consultants, an inclusive and welcoming company, is fully committed to hiring and retaining a diverse workforce without regard to race, color, religion, sex (including pregnancy, gender identity, and sexual orientation), genetic information, national origin, age (40 or older), disability, veteran status or any other protected characteristic. We provide reasonable accommodation to individuals who require assistance at any stage of the employment process. If you need assistance navigating Digital Consultants' job openings or applying for a position, please email ************************** or call ************. Please provide your contact information so we can assist you. Salary Description $130,000 - 170,000
    $130k-170k yearly 60d+ ago
  • Information Risk Consultant

    360 It Professionals 3.6company rating

    Security architect job in Pittsburgh, PA

    We are focused on imparting effective business staffing services through high level cost effective solutions. We have a strong foundation built on legacy and emerging technologies, including excellent track record of on-time delivery. We are leaders in providing additional custom IT Services with a proficient approach towards development of emerging mobile-based applications and web based application development. We are emerging as one of the largest private talent sourcing and management firms in the US. Our client- one of the leading ICT for development - ICT4D - organization, providing low cost solutions using ICT to tackle poverty and to overcome disadvantage, working closely with local communities seeks an accomplished IT Security Leader. Job Description Title: Information Risk Consultant Location: Pittsburgh PA Duration: 12+ months Responsible for providing support to technical professionals with regard to a variety of administrative, systems, and business operations problems, and participation in related system development projects of the most complex nature. Requires a seasoned expert on the integration of multiple systems or large-scale development projects. Responsibilities may include: determining and defining system specifications, process improvement, quality assurance, interaction with customers and technical staff, strong emphasis on problem resolution, and project-lead activities. Other Skills: Information Risk Governance/Information Security Additional Information I would love to talk to you if you think this position suits your interest. If you are looking for rewarding employment and a company that puts its employees first, we would like to work with you. We also offer group health insurance. NOTE: “Candidates that are offered a position are required to pass pre-employment drug and background screening”
    $106k-140k yearly est. 14h ago
  • Security Systems Engineer

    Dagostino Electronic Services 4.1company rating

    Security architect job in Pittsburgh, PA

    The Systems Engineer position is responsible for providing full cycle implementation and support of customer systems, while working across multiple company departments to ensure full client satisfaction. Under the direction of a manager or dispatcher, coordinates the design and maintenance of all access control, intrusion, and video surveillance systems. Incumbent receives and evaluates work orders and requests, investigates requests and troubleshoots problems where appropriate, establishes priorities and coordinates with contractors, when required. Requirements Essential functions and responsibilities: Assists with security systems integration, mapping and software updates and helps train personnel in the use of these systems. Assists on new projects in both existing areas and new construction helping with security assessments, vendor selection, technology upgrades, product selections, testing, field verification of systems and inspection of work in progress for compliance with standards Assess work sites, conditions, and logistics for each project; Develop Method of Procedure based on pre-project assessment. Design, develop and provide documentation of systems, configurations, and other pertinent information for the customer. Communicate with clients to resolve issues in a professional and confidential manner; Develop and execute client specific solutions. Manage the allocation of project resources, including software, hardware, tools, and related items specific to each customer and/or project. Direct the work responsibilities of union labor personnel based on specific project needs. Design and oversee training programs for new and existing customers; Determine which customers receive training. Collaborate with Customer Relationship Managers on demonstrations for new and potential clients. Perform installation, configuration, programming, and final commissioning of customer systems. Work collaboratively with installation, project management and engineering teams. Perform infrastructure services, including pulling cables, installing wall, and ceiling cabling, and installing surface mounted devices, as required. Perform system wiring and terminations services, as required. Deliver on-going remote and on-site technical support for existing customers and systems. Additional responsibilities may be required as necessary, including but not limited to: Provide internal support for basic trouble shooting. Organizes and manage parts stock and tools. Perform other duties as needed. Success factors/job competencies: Effectively communicate both in writing and verbally Work independently and prioritize multiple tasks and adapt to needed change Analysis Mechanical aptitude Comprehend technical language and read and interpret blueprints, wiring diagrams, and schematics Safety orientation Customer Focus Attention to Detail Teamwork/Collaboration Stay abreast of changes in security technology Physical demands and work environment: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Individual will be required to travel to customer sites as needed. While performing the duties of this job, the employee is occasionally exposed to moving mechanical parts. The employee is occasionally exposed to outside weather conditions and risk of electrical shock. Individual will regularly be required to lift, push, pull, and carry up to 50 pounds, and occasionally up to 75 pounds. Incumbent will be required to use a computer with keyboard, telephone, or handheld mobile device for extended periods of time, and office machinery as needed. Incumbent must be able to read, see, hear, and speak. Workdays and Shifts: Position works Monday-Friday, daylight hours, and additional time as needed to complete work. Education/Certification(s)/License(s) required: Bachelor's Degree in Electronics, Information Technology or related field, or equivalent experience. May be required to participate in safety trainings and/or certifications provided by the Company or customers. Valid driver's license, as employee will be required to travel to local and overnight client sites as needed. Manufacturer specific certifications, as required. Responsible to maintain active certifications and obtain new and updated certifications as required by the Company. Experience/Other required: Position requires two (2) to three (3) years of relevant experience in the electronic services. Strong knowledge of Microsoft Office. Strong computer skills with advanced software aptitude. Security systems to include, service and maintenance across a broad spectrum of access control, intrusion and video surveillance systems such as, Genetec, Milestone, Bosch, and DMP. Applicants must be currently authorized to work in the United States on a full-time basis. Visa sponsorship is not available for this position. This is a full-time, in-person position, and candidates must be able to work from our office located in Pittsburgh, Pennsylvania.
    $90k-127k yearly est. 60d+ ago
  • Information System Security Officer III

    Data Intelligence 4.5company rating

    Security architect job in Philadelphia, PA

    Data Intelligence, LLC (DI) is seeking a qualified and experienced Information Systems Security Officer III to support the Naval Surface Warfare Center (NSWC) in Philadelphia, PA. The successful candidate will be responsible for coordinating security efforts to ensure the safety and integrity of classified and unclassified information systems and assist in maintaining a secure operating environment. This position requires a strong understanding of cybersecurity protocols, as well as the ability to coordinate and implement security measures to meet the specific needs of the organization. **This position is contingent upon award of contract** Key Responsibilities: Collaborate with various levels of the organization to implement required security changes and ensure compliance with established security policies and standards. Conduct comprehensive cybersecurity vulnerability and threat assessments to identify and mitigate risks to information systems. Lead cyber-incident-response efforts, including isolating affected systems, conducting initial investigations, collecting relevant data, and providing status updates and reports to leadership. Provide guidance on best practices and recommend improvements to the organization's security posture. Perform risk assessments and develop mitigation strategies to protect sensitive data from internal and external threats. Support continuous monitoring of information systems and provide regular status reports on security compliance. Maintain up-to-date knowledge of emerging cybersecurity threats and industry best practices. Required Skills/Experience: Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or an equivalent science, technology, engineering, and mathematics (STEM) field. A minimum of 6 years of relevant experience in cybersecurity or information systems security. Prior experience supporting Navy programs. Current IAM Level II certification (or higher) in accordance with DoD 8570.01-M. At least a Secret-level security clearance is required, with the ability to obtain higher-level clearance if necessary. Proficiency in cybersecurity frameworks, risk management processes, and security controls. Strong analytical and problem-solving skills with attention to detail. Excellent communication and interpersonal skills, with the ability to work effectively with a diverse team. Preferred Qualifications: Experience with DoD security requirements and systems. Familiarity with NIST, RMF, and other relevant cybersecurity standards. Ability to work in a potentially remote environment with occasional on-site requirements. Why Work with Data Intelligence, LLC? At Data Intelligence, LLC, we are committed to delivering cutting-edge technology solutions and security expertise to our government clients. Our team members play an integral role in the development and protection of critical national security systems. Join our team and contribute to the defense of vital information assets while advancing your career in a collaborative and rewarding environment. About Us: Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status. Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $79k-108k yearly est. 60d+ ago
  • Information System Security Officer (ISSO III) - US Navy

    Tln Worldwide Enterprises, Inc.

    Security architect job in Philadelphia, PA

    Requirements Education: Bachelor's degree in Computer Science, Information Technology, Communications Systems Management, or other STEM discipline. Experience: Minimum 6 years of experience coordinating and enacting security changes within an organization. Experience with vulnerability and threat analysis, compliance enforcement, and incident response. Familiarity with DoD and Navy cybersecurity practices and reporting requirements. Skills & Knowledge: Proficiency in identifying, analyzing, and mitigating cybersecurity threats. Strong understanding of Risk Management Framework (RMF), system accreditation processes, and DoD cybersecurity directives. Excellent communication and reporting skills with the ability to provide clear, actionable recommendations. Certifications: Must hold a baseline certification as outlined in the Cybersecurity Workforce (CSWF) requirements (e.g., Security+ CE, CISSP, CISM, or equivalent). Security Clearance Requirements Active Secret clearance Salary Description 85,000 - 150,000
    $69k-94k yearly est. 47d ago
  • Information Security Systems Engineer-Ss

    McLaughlin Research Corporation 4.0company rating

    Security architect job in Philadelphia, PA

    McLaughlin Research has several openings (pending award) for Information Systems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division. The Information System Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's information systems and data assets. The ISSE III functions as a technical subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments. Requirements Key Responsibilities Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems. Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series. Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing automated scanning tools like ACAS and SCAP. Mentorship and Team Leadership: Guiding junior engineers and analysts and leading teams to achieve security goals. Cross-Functional Collaboration: Representing security engineering on technical teams and interfacing with stakeholders to translate requirements. Required Qualifications Education: BS in Computer Science or relevant field. Experience: 3-10 years in information security engineering, with specific experience potentially needed for DoD or SAP environments. Certifications: Must meet DoD 8570/8140 compliance (IASAE Level III, IAT Level III, or IAM Level III) and hold certifications such as CISSP, CASP+, CISM, CSSLP, or CISSP-ISSEP. Technical Skills: Expertise in RMF, NIST SP 800-53, DISA STIGs/SRGs, experience with security tools (e.g., eMASS, ACAS, Splunk), and knowledge of operating systems and networks (Windows, Linux, Cisco). Scripting proficiency is beneficial. Security Clearance: U.S. citizenship and eligibility to obtain an active security clearance. Equal Employment Opportunity Statement: McLaughlin Research Corporation is an Equal Opportunity and Affirmative Action Employer. It is our policy to recruit, hire, promote, and train for all positions without regard to age, race, creed, religion, national origin, gender identity, marital status, sexual orientation, family responsibilities, pregnancy, minorities, genetic information, status as a person with a disability, amnesty or status as a protected veteran, and to base all such decisions upon the individual's qualifications and ability to perform the work assigned, consistent with contractual requirements and all federal, state and, local laws. EEO is the Law: Applicants and employees are protected under Federal law from discrimination.
    $74k-100k yearly est. 60d+ ago

Learn more about security architect jobs

How much does a security architect earn in Altoona, PA?

The average security architect in Altoona, PA earns between $99,000 and $209,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Altoona, PA

$144,000
Job type you want
Full Time
Part Time
Internship
Temporary