Senior Network Security Architect
Security architect job in Phoenix, AZ
Our client seeks a motivated Senior Network Security Architect with a focus on Google Cloud Platform (GCP) to join their engineering team. If you excel in dynamic environments and are committed to skill enhancement, this role offers an exciting opportunity.
Job Type: Contract (12 months with possibility for extension)
Location:
Hybrid in the following locations
- Phoenix, AZ; Palo Alto, CA; Salt Lake City, UT; Sunrise, FL; New York, NY
This position is not eligible for visa sponsorship.
Responsibilities
Contribute to the design, build, and maintenance of modern on-prem cloud platforms.
Review existing tools, applications, and processes to strengthen current capabilities and identify areas for improvement.
Assist in providing technical recommendations, documentation, and reporting to support leadership, business, and technology teams.
Ensure reliable and predictable deployment and maintenance of distributed systems adhering to security best practices.
Responsible for the stability and performance of critical business services.
Operate efficiently within a highly skilled and agile engineering team.
Participate in production support and on-call rotations.
Skills and Experience
Minimum of 5 years of experience designing and implementing cloud-based enterprise architecture.
Proficiency working with cloud providers including GCP, AWS, Azure, OCI, Alibaba, Digital Ocean, Vultr, Linode.
Proven ability to create highly professional, accurate, and comprehensive solutions documentation representing solution architecture, design, implementation planning or other solution lifecycle events.
Experience in the design and maintenance of modern on-prem cloud platforms.
Knowledge of reliable and predictable deployment and maintenance of distributed systems following security best practices.
Demonstrable understanding of technology standards and standards organizations and their relationship to enterprise information security postures.
Experience implementing, configuring, and managing Physical/Virtual Firewalls, IDS/IPS, IAM, DDoS mitigation, and NIST standards.
Experience with automation tools such as Terraform, Ansible, Puppet, GIT, Jenkins, and Bash scripting.
Familiarity with Agile / Sprint based lifecycle and related ceremonies.
Preferred:
Proficiency in Global Data Centers, Corporate office, Public/Private Cloud, and Hybrid Multi-Cloud/On-Prem architectures.
Proficiency in Internet, VPN, LAN, WAN, SD-WAN, MPLS, Firewalls, Load Balancers, Routing, Switching, Wireless, VoIP, CDN, OTT, IPSec.
Familiarity with Cisco, Arista, Juniper, Brocade, Palo Alto, F5, A10, Silver Peak vendors.
Understanding of Well Architected Framework principles, Commercial regions, GovCloud, and Multi-Cloud Interconnectivity.
Experience with cloud services such as VPC, EC2, ELB, VGW, Direct Connect, Direct Connect Gateway, Transit Gateway, Peering, SiteLink, MegaPort, Marketplace solutions, Compute (Linux/Windows), Virtualization, and Containerization.
CISSP, CISA, CISM, or other related certification.
Sr. Security Engineer
Security architect job in Scottsdale, AZ
My client seeking a Security Engineer with deep experience in Azure cloud environments and Fortinet security technologies. This role is responsible for strengthening the organization's cloud security posture, supporting defensive and offensive security initiatives, and ensuring ongoing compliance with SOC2 and GDPR requirements.
The ideal candidate has a strong foundation in Azure security architecture, hands-on experience deploying and managing FortiGate solutions in cloud environments, and a practical understanding of both blue-team and red-team methodologies.
This is a highly collaborative position in a fast-moving, multi-tenant environment, requiring strong technical judgment, attention to detail, and the ability to design secure solutions at scale.
Details:
$120k - $130k
Full-Time, Permanent Position
Scottsdale, AZ | 5 Days On-Site
Key Responsibilities:
Design, implement, and maintain security controls across Azure workloads, identities, networks, and data services.
Manage Azure security posture using Microsoft Defender for Cloud, Azure Policy, and associated tooling.
Ensure proper network segmentation, firewall enforcement, and secure connectivity across cloud environments.
Deploy, configure, and manage Fortinet technologies within Azure, including FortiGate firewalls and related services.
Optimize firewall rules, routing, logging, and monitoring to enhance threat visibility and reduce attack surface.
Support offensive-focused initiatives by identifying misconfigurations, modeling potential attack paths, and validating risks.
Support SOC2 control implementation, evidence collection, access reviews, and continuous compliance efforts.
Contribute to the development, documentation, and enforcement of security policies and procedures.
Support secure deployment pipelines, identity governance practices, and operational security improvements.
Participate in security architecture reviews for new systems and integrations.
Required Qualifications
5-7 years of experience in cloud security or cloud engineering roles.
5+ years of Azure experience, including networking, identity, governance, and security services
5+ years of experience with Fortinet, ideally FortiGate firewalls deployed in Azure.
Practical understanding of both defensive (blue team) and offensive (red team) security concepts.
Experience working within or supporting SOC2 programs.
Proficiency with scripting/automation (PowerShell or C#)
Good-to-Haves:
Exposure to DevSecOps practices, CI/CD pipeline hardening, or IaC security scanning.
Certifications such as AZ-500, SC-200, SC-300, Fortinet NSE certifications, or similar.
Exposure to GDBR
Oscar Associates Limited (US) is acting as an Employment Agency in relation to this vacancy.
Information Security Engineer
Security architect job in Phoenix, AZ
We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect.
🔐 Key Responsibilities
Support endpoint and access security across Windows and mac OS environments.
Review and validate privileged access requests using least-privilege principles.
Assist in developing and implementing security policies, elevation rules, and device configurations.
Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM.
Participate in compliance and governance initiatives, including secure analytics and data protection efforts.
Prepare clear documentation, meeting updates, and stakeholder communications.
Contribute to continuous improvements in cyber engineering and endpoint security.
💡 Ideal Candidate
Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM).
Strong understanding of access control, least-privilege frameworks, and security best practices.
Ability to collaborate with cross-functional teams and communicate effectively.
Curious, proactive, and ready to solve complex security problems.
Information Security Engineer 3 - Contingent
Security architect job in Chandler, AZ
This candidate will provide tuning support for Security AI for structured and unstructured scanning to executes data classification efficacy validation strategy.
This position will require that the candidate apply accurate feedback and prevent cascading misclassifications across thousands of columns.
Monitor tuning impact and ensure compliance alignment.
Maintain governance integrity and audit readiness.
Without this role, misclassifications could propagate unchecked, leading to compliance risks and poor data quality.
Key skills include data classification and semantic similarity of enterprise data, analytics and governance and platform technical awareness.
In this contingent resource assignment, candidate may:
Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables.
Review and analyze moderately complex Information Security Engineering challenges that require an in-depth evaluation of variable factors.
Contribute to the resolution of moderately complex issues and consult with others to meet Information Security Engineering deliverables while leveraging solid understanding of the function, policies, procedures, and compliance requirements.
Collaborate with client personnel in Information Security Engineering.
Required Qualifications:
4 plus years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education.
Pay Range: $55-60$
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Information Security Architect
Security architect job in Phoenix, AZ
Job Description
We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices.
This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
To be Successful in this Role
Develop an architectural vision to support the continued growth of the product suite
Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use
Experience with privacy-enhancing technologies and encryption techniques.
Working knowledge of cloud security architecture strategies, frameworks, and reference models
Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives
Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management
Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc.
Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure
Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design.
Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture
Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward.
Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans.
Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally
Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security.
Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment.
Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives.
Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs
Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components.
You Will Have
8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture
Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.)
Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations.
Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics.
Hands-on experience with Cloud Technologies AWS, Azure & GCP
Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks
Experience in managing and contributing to incident response
Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation.
Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
Application Security Architect
Security architect job in Tempe, AZ
Summary of This Role Responsibilities range from auditing code, architecture and databases used in custom-developed web and cloud applications, to testing for common application level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening.
Applicant must possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses and vulnerability analysis. Candidate should have experience securing web and mobile applications, APIs, micro-services, containers, cloud and cloud-hybrid architectures.
Responsibilities include:
• Working with application development and QA teams across multiple products to: Review, evaluate and prioritize vulnerability findings
• Provide SME support on secure code implementation, design and architecture.
• Threat-modeling & risk analysis
• Training
• Participate in providing annual OWASP & PCI training for developers
• Helps maintain updated Secure Coding Best Practices
• Common application level vulnerabilities
• Risk Management
• Findings/vulnerability prioritization
• Mitigation strategy
• Controls Evaluation - Review, validate, recommend and create standards
• Review of open-source development libraries for security risks
• Web application firewall (WAF) rule development and implementation
• Security technologies review and recommendations
REQUIREMENTS
• Qualifications: Bachelors of Computer Science or similar - 6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development.
• Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews -
• Experience with the Top 10 OWASP (Open Web Application Security Project) vulnerabilities (most critical web vulnerabilities) and how to identify and remediate them - Solid understanding of Information Security in general and the specific behaviors that would secure TSYS information assets -
• Ability to translate Information Security policies and procedures into language that a business and/or technical person can understand; and ability to effectively communicate with both non-technical and technical people -
• Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges - Ability to work well inside and outside the team.
******Please be inform that at this time all the positions do not have any relocation package, or the flexibility to work remotely, and do not offer any work permit, all the candidates must have their own authorization paper work.
Interested! Send your updated CV and answer the questions below:
1) Have you ever worked or applied to this company before?
2) How far are you from the location? Where are you located?
3) What are your salary expectations for this position?
4) Are you a US citizen or a green card holder? (the company will not provide any work visa, they must have their own)
5) How many years of experience do you have in this industry?
6) Why are you looking for a new opportunity
Google Cloud Security Architect
Security architect job in Phoenix, AZ
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies
As a Consultant or Senior Consultant, you will collaborate with cross-functional teams, including IT, security, and business units, to design and implement Google Cloud-based application innovation solutions. You will work alongside experienced cloud architects, data scientists, and other specialists, ensuring the successful delivery of scalable, cloud-native applications and AI-powered solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this position the base salary pay ranges are listed below. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
East Bay, San Francisco, Silicon Valley:
* Consultant: $120,000-$177,000
* Senior Consultant: $140,000-$203,000
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Consultant: $110,000-$162,000
* Senior Consultant: $130,000-$186,000
All other locations:
* Consultant: $105,000-$148,000
* Senior Consultant: $115,000-$171,000
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
We are accepting applications until 12/31.
F-35 Information System Security Officer - (Mid-Career)
Security architect job in Yuma, AZ
What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected.
The Work:
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Yuma. Typical ISSO responsibilities include but are not limited to:
Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems.
Supporting the development and maintenance of cybersecurity related plans and procedures.
Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks.
Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions.
Creating, collecting and retaining data to meet reporting requirements.
Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance.
Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties.
Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media.
Conducting self-inspections and preparing for customer inspections.
Interacting professionally during the enforcement of security policy and procedures.
Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned.
Who we are:
Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems.
Why Join Us:
Your Health, Your Wealth, Your Life
With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future!
Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program.
Ability to obtain and maintain Special Access Program (SAP) access.
Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements.
Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP
Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP
Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks.
Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems.
Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series).
Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs).
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
Bank Information Security Governance Senior
Security architect job in Phoenix, AZ
Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
* Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
* Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
* Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
* Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
* Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
* Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
* Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
* Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
* Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
* Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
* Mentors junior members of the IS governance team, providing guidance and support in their professional development.
* Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
* Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
* Prepares metrics reporting and participates in the metrics refresh process.
* Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
* Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
* Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
* 6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
* In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
* Experience working on and implementing IT and/or IS policies, standards, and procedures.
* Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
* A strong understanding of regulatory and compliance requirements applicable to the organization.
* Ability to interpret complex IT/IS environments and detect early warning signals.
* Experience in identifying potential failure points and simulating risk scenarios.
* Proficiency in using data to identify trends, anomalies, and emerging risks.
* Understanding of cloud, cybersecurity, and digital transformation risks.
* Ability to articulate risk insights and influence stakeholders to take preventive actions.
* Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
* Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
* Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
* Work experience in highly regulated work environments including other large financial institutions
* Experience with data-driven analysis using AI tools and collaborating to drive process innovation
* Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
* Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Senior IT Security Analyst
Security architect job in Phoenix, AZ
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplySAP GRC/Security Consultant
Security architect job in Phoenix, AZ
Job Title: SAP GRC/Security Consultant Company: Turnkey Consulting
Turnkey Consulting is a leading advisory and implementation organization with deep expertise in risk management, governance, and compliance & security. Having the ability to provide end-to-end solutions that integrate technology, process, and people. Our business started within the SAP ecosystem, however expansion into being an agnostic partner, now gives us a wider range of solutions to support our customers, while securing their wider estate. Turnkey Consulting helps businesses optimize their risk management, security and compliance programs, protect against Cyber threats, reduce costs, and improve their operational efficiency. With a team of seasoned risk professionals and a commitment to excellence, we empower businesses to proactively protect their critical assets and stay ahead of evolving threats.
Job Summary
The candidate will play a key role in handling client engagements, as well as utilizing strong technical experience to find solutions that best fit our clients' needs. We are looking for a team-player and strong all-rounder with at least 2 implementations and 2 years of practical experience in the following areas
Detailed understanding of the SAP authorization concept in one or more of the following areas: ECC, SAP S/4 HANA, HCM, CRM, SRM, BW, BI, BPC, SAP HANA
Experience of designing, building and implementing SAP security and authorization solutions
Exposure to various system user interfaces (UI), including SAP but also other relevant SaaS products
Detailed understanding of SAP GRC suite of applications, with a demonstrable specialism in core modules contained within (ideally v12 onward)
Experience of IDM solutions, either SAP's IDM solution, or non-SAP, such as SailPoint or Saviynt would be of advantage.
Experience of third-party solutions to secure SAP estates also an advantage
Experience of SAP Fiori catalogs, groups, pages and spaces
Experience of SAP IAG solutions would be an advantage, both IAS and IPS
Our experienced consultants are a key driver of our success as one of the most trusted names in the end-to-end security arena and we are committed to delivering to a consistently high standard. Key responsibilities of the role are:
Task management of large / complex implementations, especially in Application security or enterprise risk/identity projects
Implementation of GRC technology and supporting modules
Work with clients to understand "why" they're in need of such solutions, define requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving relevant application systems and processes
Advise clients on controls in their enterprise systems relating to regulatory or legislative compliance
Review and advise on security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are looking ideally for someone with the following attributes:
The ability to troubleshoot and diagnose problems / issues and provide prompt, robust resolution
An enquiring mind to discover "why" clients need to introduce the controlling measures.
The ability to manage projects within varied client engagements and lead reviews and implementations
Knowledge of corporate business processes and their control points
Good understanding of various IT regulations and standards, including: Sarbanes Oxley, COBIT, ISO series & the GDPR
Bachelor's degree
Professional certification (e.g. CISA, M.Inst.ISP, CISSP, ISO)
SAP certification (Security, GRC)
Consulting background
Strong written and verbal communication skills
Integration experience
Ability to act as an SME to install, design, engineer and configure security solutions to meet client needs
Ability to effectively manage own time and priorities effectively and to work both as part of a team and individually.
Able to communicate technical and functional requirements to both the business and IT
Key responsibilities of the role will include:
Project manage large / complex SAP Security implementations, especially for S/4 HANA projects
Implementation of GRC Access Controls and supporting modules
Work with clients to understand requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving SAP systems
Advise clients on controls in SAP relating to regulatory or legislative compliance
Review and advise on SAP security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.
Engineer, Information Security and Risk
Security architect job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Senior Information Systems Security Officer (ISSO) II - Tucson, AZ
Security architect job in Tucson, AZ
**Country:** United States of America ** Onsite **U.S. Citizen, U.S. Person, or Immigration Status Requirements:** Active and transferable U.S. government issued security clearance is required prior to start date.
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
**Security Clearance:**
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a **Senior Information Systems Security Officer (ISSO) II** to support our team **100% onsite** at our facility in **Tucson, Arizona.**
The ISSO is responsible for compliance oversight, assessment, and operations of systems under their purview. They may be assigned to a single large-scale program or oversee multiple programs. Although you will not have direct reports, you will mentor a team of ISSO's to provide support and advice pertaining to day-to-day occurrences or issues.
You will conduct recurring Cybersecurity reviews on information systems in accordance with DoD Manuals, NIST Special Publications, customer directives, and company policies as applicable.
You'll serve as subject matter experts (SME) on a broad range of Cybersecurity topics. You may represent the Cybersecurity organization and business unit to external Cybersecurity counterparts. You are responsible for providing guidance and technical training to ISSOs across the organization.
**What You Will Do**
+ Reviewing and approving (within authority) configuration management requests
+ Conducting technical and administrative assessments
+ Integrating new Cybersecurity processes, procedures and tools
+ Support ISSOs and Cybersecurity Managers in the creation, review and update of Cybersecurity documentation and other technical writing
+ Oversee ISSO's to ensure implementation of policies and procedures as outlined within the Cybersecurity artifacts and governing documentation
+ Intermittent travel to other Raytheon locations (10-20%)
**Qualifications You Must Have**
+ Typically requires a Bachelor's degree and a minimum 8 years prior relevant experience, _or a_ n Advanced Degree in a related field and minimum 5 years experience.
+ IAM Level I certification (Security+ or other)
+ Relevant Experience Considered in any combination:
+ Cybersecurity, systems security or hardening
+ Information Technology
+ Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
+ Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
+ Physical security/security, policework/criminal justice, investigations, or Border Patrol
+ Project or program management, office management, senior administration, or account management
**Qualifications We Prefer**
+ Experience working in DoD classified operating and/or laboratory environments
+ Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
+ Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry
+ Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF)
+ Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT)
+ Familiarity with large multi-facility networks including complex components, including Windows and Linux environments
+ Experience interpreting, implementing, and assessing DISA STIGs.
+ Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication
**What We Offer**
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
**Please consider the following role type definition as you apply for this role:**
+ Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
We are RTX (****************************************
\#LI-Onsite
**_As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote._**
The salary range for this role is 101,000 USD - 203,000 USD. The salary range provided is a good faith estimate representative of all experience levels.
RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
_RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act._
**Privacy Policy and Terms:**
Click on this link (******************************************************** to read the Policy and Terms
Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
Senior Information Systems Security Officer (ISSO) - Tucson, AZ
Security architect job in Tucson, AZ
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
Secret - CurrentAt Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Tucson, Arizona. The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence with NIST Special Publications, customer directives, and company policies as applicable all NISPOM Chapter 8, DAAPM, JSIG policies.
What You Will Do
Assessing and monitoring system compliance, auditing, security plan development and delivering information systems security education and awareness.
Investigating information system security violations and help prepare reports specifying corrective and preventative actions.
Reviewing and approving (within authority) configuration management requests.
Conducting technical and administrative assessments.
Integrating new cybersecurity processes, procedures, and tools.
Support the creation, review and update of cybersecurity documentation and other technical writing.
Qualifications You Must Have
Typically requires a University Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience.
Current IAM Level I certification (Security+ or other).
Relevant Experience Considered in any combination:
Cybersecurity, systems security or hardening
Information Technology
Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
Physical security/security, policework/criminal justice, investigations, or Border Patrol
Project or program management, office management, senior administration, or account management
Qualifications We Prefer
Experience working in DoD classified operating and/or laboratory environments.
Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry.
Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF).
Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT).
Familiarity with large multi-facility networks including various complex components, including Windows and Linux environments.
Experience interpreting, implementing, and assessing DISA STIGs.
Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication.
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Please consider the following role type definition as you apply for this role:
Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
We are RTX
#LI-Onsite
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplySecurity Engineer
Security architect job in Phoenix, AZ
Job Title: Security Engineer Job Summary: This is not a passive, monitor-the-dashboard role - it is designed for a builder. The Security Engineer at RevSpring will lead efforts to secure infrastructure by owning, integrating, and optimizing the full lifecycle of security tools. From SIEM and CSPM to EDR and SOAR, each control will be made actionable, automated, and aligned to risk. Collaboration across teams will be essential to embed security into systems and processes, driving measurable maturity and delivering real protection - not just checklists. The role also supports compliance initiatives, leads risk assessments, manages security frameworks (NIST, HITRUST, ISO 27001), and responds to emerging threats with a solid understanding of both offensive and defensive security practices. Positioned at the intersection of security engineering, architecture, and strategy, this is a high-impact opportunity. This position is part of a high-impact team focused on building the security backbone for an organization that enables critical communications in healthcare, finance, and beyond. The work contributes directly to securing the ways millions of people connect with the services they depend on - confidently and securely. For professionals who view security maturity not as a project, but as an ongoing discipline, this role offers the ideal environment to thrive. Essential Functions: Tool Ownership & Security Architecture
Own the lifecycle of security platforms including EDR/XDR, SIEM, SOAR, CSPM, IAM, and vulnerability management.
Integrate and automate security tools and workflows across IT, cloud, and SOC environments.
Continuously tune alerting, dashboards, and policies to reduce noise and improve signal quality.
Maintain security control maps and maturity metrics.
Security Maturity & Measurement
Build and maintain RevSpring's Security Tool Maturity Roadmap.
Track and report key performance indicators (KPIs) and return on investment (ROI) for all tools.
Map control capabilities to frameworks such as NIST CSF, HITRUST, ISO 27001, and CIS Controls.
Identify coverage gaps and eliminate redundant tools.
Security Engineering & Compliance
Conduct regular security risk assessments and audits across systems, applications, and networks.
Design and implement new security solutions, collaborating closely with infrastructure, cloud, and AppSec teams.
Support and maintain compliance with HIPAA, HITRUST, PCI-DSS, SOX, NIST, and GLBA.
Formulate and manage IT security incident response strategies.
Automation & Enablement
Develop scripts and integrations using Python, PowerShell, Bash, and REST APIs to automate security operations.
Embed security controls into CI/CD pipelines and infrastructure as code.
Maintain documentation, runbooks, and diagrams to support repeatable security improvements.
Governance & Cross-Functional Collaboration
Partner with procurement, risk, and compliance teams to manage tool renewals, licensing, and governance.
Communicate security tool performance, maturity, and improvements to leadership in clear, data-driven ways.
Translate complex technical issues into business-relevant language.
Minimum Requirements: Specific Job Skills:
Strong understanding of at least three areas of the modern security stack: SIEM, EDR/XDR, SOAR, CSPM, IAM, or vulnerability management.
Experience in cloud security (AWS, Azure, or GCP) and implementing security controls across cloud platforms.
Experience with security assessments, architecture design, and risk-based security implementation.
Familiarity with standards/frameworks: NIST CSF, HITRUST, ISO 27001/27002, COBIT, ITIL, CIS.
Proficient in scripting/automation (e.g., Python, PowerShell) and integrating APIs.
Experience with penetration testing, ethical hacking, or advanced threat detection tools.
Ability to support compliance requirements and perform security reviews for internal and external stakeholders.
Experience building or managing a security tool governance or maturity framework.
Certifications such as GDSA, GCIA, AWS Security Specialty, CISSP, CISM, or similar.
Familiarity with MITRE ATT&CK, secure coding practices, and modern DevSecOps workflows.
Strong project management, reporting, and stakeholder communication skills.
Analytical mindset with the ability to break down complex problems.
Strong written and verbal communication skills - technical and non-technical audiences.
Proven ability to work independently and as part of a team.
Flexible and adaptable to evolving business and technical priorities.
Passion for continuous learning and measurable security outcomes.
Education: N/A Experience: 3-7 years of hands-on experience in Security Engineering, SOC Engineering, or DevSecOps. Supervision: N/A Certifications: N/A Language Skills: Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations. Ability to write reports, business correspondence and procedure manuals. Ability to effectively present information and respond to questions from a variety of both internal and external sources. Physical Capabilities: Standard categories The physical capabilities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee is occasionally required to stand and walk. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision, distance vision, color vision, peripheral vision, depth perception, and ability to adjust focus. RevSpring is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status. Note: This may not describe all of the job responsibilities and standards assigned to this position. The duties may change from time to time. RevSpring does not discriminate against any group in hiring or employment practices. Nothing in this job description constitutes a contract for employment.
Security Engineer
Security architect job in Tempe, AZ
As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do.
At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America.
Job Summary
As a Security Engineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy.
Key Responsibilities
1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls.
2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks.
3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices.
4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly.
5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications.
6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans.
7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations.
8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews.
Minimum Job Requirements
1. Ability to work independently and manage multiple tasks in a fast-paced environment.
2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience.
3. Excellent problem-solving skills and attention to detail.
4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration.
5. Minimum of 3-5 years of experience in cybersecurity or a related field.
6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint.
7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred.
8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams.
9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002).
Note: Job Description is subject to change at any time and may include other duties as assigned.
Physical Requirements
1. May stoop, kneel, or bend, on an occasional basis
2. Must be able to comply with all safety standards and procedures
3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis
4. Will interact with people and technology frequently during a shift/work day
5. Will lift, push or pull objects up to 50Ibs on an occasional basis.
6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day.
7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors
Safety Level
Non-Safety Sensitive
Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials.
Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws.
Benefit list:
Market Competitive Salary (paid weekly)
Bonus Eligibility based on company, group, and individual performance
Employee Stock Ownership Plan & 401K
Industry Leading Health Coverage Starting Your First Day
Flexible Time Off (FTO)
Medical, Health Savings, and Wellness credits
Flexible Spending Accounts
Employee Assistance Program
Workplace Wellness Programs
Mental Health Program
Life and Disability Insurance
Employee-Owner Perks
Educational Assistance
Sundt Foundation - Charitable Employee-Owner's program
Auto-ApplySenior Security Analyst (L2)
Security architect job in Scottsdale, AZ
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Auto-ApplySenior Information Security Analyst
Security architect job in Phoenix, AZ
ARIZONA DEPARTMENT OF HOMELAND SECURITY
The Arizona Department of Homeland Security was established in 2006 by the Arizona State Legislature to support the mission of providing strategic direction and access to federal homeland security grant program resources that will further enable the stakeholders' collective goals to prevent, protect, mitigate, respond to and recover from terrorist attacks and other critical hazards that affect the safety, well-being and economic security of Arizona.
SENIOR INFORMATION SECURITY ANALYST *This is a hybrid position consisting of remote & in-office requirments*
Job Location:
16232 North 28th Avenue Phoenix, Arizona 85053
Posting Details:
Annual Salary Range: $68,000 - $90,000
Grade: 24
This position will close on Decemder 19, 2025
Job Summary:
This position plays an essential role in protecting the confidentiality, integrity and availability of State information systems and data through the identification of security and privacy protection risks, and ensuring the compliance of systems and organizations with existing Statewide policies and regulatory requirements.
This position ensures that the appropriate proactive analysis and auditing of security controls and processes are in place and effective to help the State withstand and/or recover from issues caused by known and unknown internal or external threats.
Job Duties:
• Ensures organization compliance to Statewide Information Security policies, NIST, ISO, PCI, HIPAA and other security standards by providing information security and privacy protection compliance reviews and proactive assessments. Assists with the development and implementation of enterprise-wide information security and privacy policies and standards
• Identify information security and privacy protection risks across the state and direct agencies to adopt risk mitigation strategies, methods and procedures to minimize the risks in accordance with established risk management policies and procedures. Assists with data breach and privacy incident investigations
• Participates in projects by evaluating systems security plans and implemented security controls for security and privacy compliance of technology infrastructure and applications to reduce security risk and enhance overall security posture
• Support the statewide information security and privacy protection awareness and training programs
• Leads or participates with all internal and external security and privacy audits and assessments
• Other duties as assigned as related to the position
Knowledge, Skills & Abilities (KSAs):
Knowledge:
• This role demands a comprehensive expertise in information security technologies, with a focus on industry trends, best practices, and the implementation of robust security measures across various domains. The candidate must have a solid understanding of key information protection standards, including NIST, HIPAA, PCI, and IRS, and demonstrate proficiency in assessing and managing risks, ensuring compliance, and addressing vulnerabilities within an organization's infrastructure
• In addition, the candidate should possess deep knowledge of cybersecurity workforce dynamics, virtual learning environments, and the development and enforcement of cybersecurity operation policies and procedures. They should be well-versed in the principles and practices of risk management, business continuity, and disaster recovery, with an ability to apply these concepts to real-world scenarios
• Expertise in privacy laws and regulations, cybersecurity threats and vulnerabilities, and the use of advanced cyber defense tools and techniques is essential. The ideal candidate will also have experience with enterprise cybersecurity architecture, identity and access management, and the evaluation and validation of security controls. Familiarity with emerging technologies, insider threat management, and supply chain risk management is crucial, as is knowledge of industry models and frameworks for cybersecurity and data protection. Overall, this role requires a strategic thinker capable of integrating a broad spectrum of cybersecurity knowledge into cohesive and effective security strategies
Skills:
• This role requires strong customer service skills, along with excellent interpersonal, written, and oral communication abilities to effectively interact with clients and stakeholders. The ideal candidate should possess a robust skill set in identifying gaps in technical capabilities, applying security controls, and interfacing with customers to address their needs. Proficiency in assessing security system designs, applying secure coding techniques, and performing root cause analysis is crucial for maintaining and enhancing system security
• Additionally, the candidate must be adept at processing and verifying data for follow-on analysis, as well as deriving evaluative conclusions to support informed decision-making. The ability to communicate complex concepts both verbally and in writing, facilitate group discussions, and create technical documentation is essential. Expertise in developing security assessments, instructional materials, and policy plans is also required. The candidate should be skilled in maintaining standard operating procedures, evaluating laws, regulations, and policies, and analyzing processes to ensure compliance with procedural requirements
• Critical thinking and collaboration are key skills for this role, especially in dynamic, fast-paced environments. The ability to analyze large data sets, identify target vulnerabilities, and align privacy and cybersecurity objectives is vital. The candidate should also be proficient in risk assessment, identifying system vulnerabilities, and applying policies that meet system security objectives. Additional skills include performing technical writing, negotiating vendor agreements, and building relationships with internal and external stakeholders to effectively manage and mitigate cybersecurity risks
Ability:
• The tasks associated with this job involve ensuring the effectiveness and compliance of an organization's cybersecurity and privacy programs. This includes assessing and managing the effectiveness of security controls, correlating training efforts to business or mission needs, and managing accreditation packages to maintain compliance. Establishing and maintaining privacy audit programs is essential for continuous monitoring and mitigation of privacy risks. The role also involves determining the legal and operational impacts of cybersecurity incidents and identifying critical technology procurement needs
• Additional responsibilities include researching new vulnerabilities, advising senior management on risk levels and cybersecurity posture, and developing risk profiles. The role requires conducting privacy impact assessments, identifying vulnerabilities, and recommending remediation strategies. There is a strong focus on developing, implementing, and auditing cybersecurity policies, training programs, and compliance processes. Ensuring that contracts and procurement efforts meet legal, funding, and security requirements is also crucial, as is advising on risk management and overseeing cybersecurity audits. Finally, the role includes developing and delivering training, promoting awareness, and ensuring alignment of cybersecurity and privacy practices with organizational goals
Selective Preference(s):
• Bachelor's degree plus 2 years of extensive experience in information security controls and regulatory compliance (or equivalent experience)
• Certified Information Security Systems Professional preferred
Pre-Employment Requirements:
• Required to drive on State business; must possess a valid Arizona driver's license
• Proof of U.S. Citizenship required (due to security clearance)
If this position requires driving or the use of a vehicle as an essential function of the job to conduct State business, then the following requirements apply: Driver's License Requirements.
Benefits:
The State of Arizona offers a comprehensive benefits package to include:
• Optional employee benefits include short-term disability insurance, deferred compensation plans, and supplemental life insurance
• Life insurance and long-term disability insurance
• Vacation with 10 paid holidays per year
• Health and dental insurance
• Retirement plan
• Sick leave
Learn more about the Paid Parental Leave pilot program here. For a complete list of benefits provided by The State of Arizona, please visit our benefits page
Retirement:
• Positions in this classification participate in the Arizona State Retirement System (ASRS)
• Please note that enrollment eligibility will become effective after 27 weeks of employment
Contact Us:
• If you have any questions please feel free to contact Alexis Pagel at ***************** for assistance
Senior Information Systems Security Officer (ISSO) II - Tucson, AZ
Security architect job in Tucson, AZ
Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a Senior Information Systems Security Officer (ISSO) II to support our team 100% onsite at our facility in Tucson, Arizona.
The ISSO is responsible for compliance oversight, assessment, and operations of systems under their purview. They may be assigned to a single large-scale program or oversee multiple programs. Although you will not have direct reports, you will mentor a team of ISSO's to provide support and advice pertaining to day-to-day occurrences or issues.
You will conduct recurring Cybersecurity reviews on information systems in accordance with DoD Manuals, NIST Special Publications, customer directives, and company policies as applicable.
You'll serve as subject matter experts (SME) on a broad range of Cybersecurity topics. You may represent the Cybersecurity organization and business unit to external Cybersecurity counterparts. You are responsible for providing guidance and technical training to ISSOs across the organization.
What You Will Do
* Reviewing and approving (within authority) configuration management requests
* Conducting technical and administrative assessments
* Integrating new Cybersecurity processes, procedures and tools
* Support ISSOs and Cybersecurity Managers in the creation, review and update of Cybersecurity documentation and other technical writing
* Oversee ISSO's to ensure implementation of policies and procedures as outlined within the Cybersecurity artifacts and governing documentation
* Intermittent travel to other Raytheon locations (10-20%)
Qualifications You Must Have
* Typically requires a Bachelor's degree and a minimum 8 years prior relevant experience, or an Advanced Degree in a related field and minimum 5 years experience.
* IAM Level I certification (Security+ or other)
* Relevant Experience Considered in any combination:
* Cybersecurity, systems security or hardening
* Information Technology
* Compliance-based auditing using the Risk Management Framework (RMF), DCSA Assessment and Authorization Process Manual (DAAPM), Joint SAP Implementation Guide (JSIG), National Industrial Security Program Operating Manual (NISPOM), and/or non-defense regulations such as FAA, Payment Card Industry (PCI), ISO 9001 Quality Management standards, or HIPPA
* Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
* Physical security/security, policework/criminal justice, investigations, or Border Patrol
* Project or program management, office management, senior administration, or account management
Qualifications We Prefer
* Experience working in DoD classified operating and/or laboratory environments
* Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti, Tenable, ACAS, HBSS, etc.
* Familiarity with implementation of Government directives and policies derived from NIST, CNSSI, DoD, or other Government Regulatory compliance standards within a professional industry
* Experience in the execution of the Assessment & Authorization processes, as defined within the Risk Managed Framework (RMF)
* Experience providing technical security consultation for complex, cross-domain, heterogeneous classified networked environments in collaboration with internal/external Customers, Information Technology (IT)
* Familiarity with large multi-facility networks including complex components, including Windows and Linux environments
* Experience interpreting, implementing, and assessing DISA STIGs.
* Familiarity with the execution and management of cyber incident response; preservation, containment, and eradication
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Please consider the following role type definition as you apply for this role:
* Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
We are RTX
#LI-Onsite
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 101,000 USD - 203,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplySenior Security Analyst (L2)
Security architect job in Scottsdale, AZ
Job Description
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Powered by JazzHR
6oXedfgOJk