Detection & Response Security Engineer, Threat Intelligence
Security architect job in Topeka, KS
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Senior IT Security Analyst
Security architect job in Oklahoma City, OK
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplySenior Security Architect - Oklahoma
Security architect job in Oklahoma City, OK
CyberOne is hiring! We hire smart, talented and high-performing professionals to push our organization forward and provide superior service to our customers. We each take accountability for our work, strive to make each other better, and genuinely love what we do. If you value learning new things, being innovative, and working in a supportive, collaborative environment, CyberOne may be the place for you.
If you are ready to raise the bar for your career and be part of our exciting journey, we would like to hear from you!
The Presales Senior Security Architect partners closely with Account Managers, Professional Services, and partner resources to design and deliver tailored cybersecurity solutions that address customer needs. Acting as a trusted advisor, this role combines deep technical expertise with strong communication skills to build confidence and drive successful outcomes. The Senior Security Architect will primarily support customers in the Oklahoma region, while providing additional support to other regions as needed.
This position requires the candidate to reside in Oklahoma in order to effectively serve the assigned region.Essential Functions
Build strong customer relationships and serve as a trusted technical advisor, helping them achieve their business and security goals.
Work in close partnership with Account Managers, Professional Services, and vendor partners.
Continuously expand and update knowledge of cybersecurity use cases, leading partner technologies, and CyberOne's Professional Services offerings to align with customer needs.
Maintain a strong understanding of the broader cybersecurity ecosystem with deep knowledge of key verticals (e.g., network, cloud, OT, application security).
Provide training and knowledge sharing to sales teams on vendor products, cybersecurity trends, and market insights.
Perform assessments and consulting services to help customers identify risks within their environments.
Lead strategic conversations with enterprise customers on industry trends and emerging technologies.
Act as the customer's advocate for technical issues, ensuring timely follow-up and resolution.
Travel as needed to participate in customer meetings, workshops, and strategic discussions.
Education/Experience
7+ years of experience designing and implementing security solutions in large environments.
Experience leading and recommending technology selection processes within or for enterprise organizations.
Proven experience as a senior or lead technical resource/architect (cybersecurity, network, cloud, etc.) within a large organization, reseller, or systems integrator.
Effectively lead and support customer demonstrations with Systems Engineers to highlight CyberOne's value proposition.
Certification/License Requirements
Industry-recognized certifications (e.g., CISSP, CCSP, SANS, Open CA) preferred.
Vendor/technology certifications (e.g., AWS, Palo Alto Networks, Tenable) preferred.
Core Skills/Abilities
Excellent relationship-building skills with the ability to engage clients confidently in person and virtually.
Strong organizational skills with the ability to manage multiple priorities in a fast-paced environment.
Strong presentation, written, and oral communication skills across all organizational levels, from senior leadership to peers and team members.
Proficiency with standard office equipment such as laptops and smartphones.
Work Environment
Ability to travel up to 50% within the Oklahoma territory and occasionally to the Plano, TX headquarters.
Ability to navigate client environments, including walking, stairs, and carrying light materials (up to 25 lbs).
Prolonged periods of sitting or standing while working remotely or attending meetings.
Operates a laptop and standard office equipment for prolonged periods.
Participates in virtual meetings and occasional in-person training or company events.
Strong verbal, visual, and auditory capabilities to effectively present, communicate, and engage with clients and internal teams.
If you are passionate, driven and ready to take your career to the next level, we invite you to apply today!
CyberOne is a proud Equal Opportunity and Affirmative Action Employer. All qualified applicants, regardless of race, color, genetic information, national origin, religion or belief, sex, affectional or sexual orientation, gender identity or expression, immigration status, ancestry, age, marital status, disability, or protected veteran status, are encouraged to apply and will receive equal consideration based on merit, qualifications, and business need.
Recruitment Agencies Please Note:
"In accordance with our recruitment policy, CyberOne strictly prohibits any form of solicitation of our employees by external agencies or third parties. Any candidate information that may be received from such agencies or third parties shall be deemed as a voluntary gift and shall become the exclusive property of CyberOne. Exceptions to this policy apply only when an Agency/Third Party is an Authorized Vendor of CyberOne, holding a valid and current contract that has been duly signed by our People Services Manager or CFO of CyberOne. Under no circumstances will any payment be made to any Agency/Third Party unless they are an Authorized Vendor or possess written approval from the CyberOne People Services Manager or CFO, granting them explicit permission to engage in recruitment efforts on behalf of CyberOne."
Auto-ApplyPrincipal Security Engineer
Security architect job in Kansas
Our vision for the future is based on the idea that transforming financial lives starts by giving our people the freedom to transform their own. We have a flexible work environment, and fluid career paths. We not only encourage but celebrate internal mobility. We also recognize the importance of purpose, well-being, and work-life balance. Within Empower and our communities, we work hard to create a welcoming and inclusive environment, and our associates dedicate thousands of hours to volunteering for causes that matter most to them.
Chart your own path and grow your career while helping more customers achieve financial freedom. Empower Yourself.
***Applicants must be authorized to work for any employer in the U.S. We are unable to sponsor or take over sponsorship of an employment visa at this time, including CPT/OPT.***
The Information Security Principal Engineer is responsible for contributing to, and strengthening, the corporate Information Security program. This is a technical position that requires knowledge of security industry standards, the ability to establish and audit security operational functions, and the ability to provide technical security recommendations and/or solutions. This position develops, updates, documents, and maintains security standards and policies for the organization. This position assists in ensuring that secure computing practices are established and communicated throughout the organization, and that the business is conducted in accordance with established guidelines and regulatory requirements. This position also contributes to security due diligence assessments on current and prospective vendors and products
What you will do:
Lead major cybersecurity incidents from detection through containment, eradication, recovery, and post-incident review; including participating in on-call rotation.
Serve as the top escalation point for complex, high-severity incidents, ensuring rapid and effective resolution.
Develop, maintain, and optimize incident response playbooks, runbooks, and escalation procedures.
Oversee enterprise-wide monitoring of networks, cloud, and endpoints for threats, vulnerabilities, and anomalous activity.
Advance detection capabilities using EDR, SIEM, and behavioral analytics aligned with MITRE ATT&CK. Act as subject matter expert on EDR and SIEM.
Design and implement automation frameworks (Python, PowerShell, AWS Lambda) to streamline response workflows and reduce manual effort.
Integrate AI/ML models into security monitoring and response processes for enhanced detection accuracy and prioritization.
Conduct forensic investigations and threat hunting to identify root causes and emerging threat patterns.
Collaborate cross-functionally with infrastructure, application, and network teams to enforce secure configurations and compliance.
Mentor and guide incident response analysts, fostering technical growth and operational excellence.
Communicate effectively with executives and technical teams during and after incidents, producing clear reports and recommendations.
Drive continuous improvement in detection, response, and prevention strategies to strengthen enterprise security posture.
What you will bring:
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field
Must have CISSP Certification (Current and active)
6+ years of experience in the realms of enterprise cybersecurity at scale
5+ years of experience with EDR, SIEM, email and network security
3+ years of experience with cloud environment security, scripting/coding
Extensive knowledge of the incident response process and lifecycle, ability to contribute to policy and procedure.
Ability to respond to security alerts/incidents and drive the process start to finish
Ability to use generative AI in day-to-day operations as a force multiplier
Strong technical written and verbal communication skills, ability to document and present details on incidents
Strong analytic skills, able to analyze security incidents for root cause, resolution, lessons learned, and improvements
Excellent communication and leadership skills, with the ability to influence across technical and executive teams
What will set you apart:
Additional certifications (SANS, GIAC, CCSP, AWS, CEH, OSCP, etc)
Experience in a DevSecOps environment (Infrastructure as code, Terraform, Git)
Experience developing automation frameworks leveraging scripting languages (Python, PowerShell, Bash) and serverless technologies (e.g., AWS Lambda) to accelerate response workflows and reduce manual effort.
Experience automating repetitive tasks such as enrichment, correlation, containment.
Ability to integrate AI and machine learning models into security monitoring and response workflows to improve detection accuracy, reduce false positives, and prioritize threats.
Ability to create AI-driven anomaly detection, behavioral analysis, and natural language processing for log analysis, phishing detection, and threat intelligence enrichment.
Strong Linux, Windows, Network, Database skills
Experience with technical leadership
Experience as a security specialist in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI
This is not intended to be an exhaustive list of all duties, responsibilities and qualifications of the job. The employer has the right to revise this at any time. You will be evaluated in part based on your performance of the responsibilities and/or tasks listed in this . You may be required perform other duties that are not included on this . The job description is not a contract for employment, and either you or the employer may terminate employment at any time, for any reason.
What we offer you
We offer an array of diverse and inclusive benefits regardless of where you are in your career. We believe that providing our employees with the means to lead healthy balanced lives results in the best possible work performance.
Medical, dental, vision and life insurance
Retirement savings - 401(k) plan with generous company matching contributions (up to 6%), financial advisory services, potential company discretionary contribution, and a broad investment lineup
Tuition reimbursement up to $5,250/year
Business-casual environment that includes the option to wear jeans
Generous paid time off upon hire - including a paid time off program plus ten paid company holidays and three floating holidays each calendar year
Paid volunteer time - 16 hours per calendar year
Leave of absence programs - including paid parental leave, paid short- and long-term disability, and Family and Medical Leave (FMLA)
Business Resource Groups (BRGs) - BRGs facilitate inclusion and collaboration across our business internally and throughout the communities where we live, work and play. BRGs are open to all.
Base Salary Range
$135,300.00 - $196,125.00
The salary range above shows the typical minimum to maximum base salary range for this position in the location listed. Non-sales positions have the opportunity to participate in a bonus program. Sales positions are eligible for sales incentives, and in some instances a bonus plan, whereby total compensation may far exceed base salary depending on individual performance. Actual compensation offered may vary from posted hiring range based upon geographic location, work experience, education, licensure requirements and/or skill level and will be finalized at the time of offer.
Equal opportunity employer
•
Drug-free workplace
We are an equal opportunity employer with a commitment to diversity. All individuals, regardless of personal characteristics, are encouraged to apply. All qualified applicants will receive consideration for employment without regard to age (40 and over), race, color, national origin, ancestry, sex, sexual orientation, gender, gender identity, gender expression, marital status, pregnancy, religion, physical or mental disability, military or veteran status, genetic information, or any other status protected by applicable state or local law.
***For remote and hybrid positions you will be required to provide reliable high-speed internet with a wired connection as well as a place in your home to work with limited disruption. You must have reliable connectivity from an internet service provider that is fiber, cable or DSL internet. Other necessary computer equipment, will be provided. You may be required to work in the office if you do not have an adequate home work environment and the required internet connection.***
Job Posting End Date at 12:01 am on:
12-13-2025
Want the latest money news and views shaping how we live, work and play? Sign up for Empower's free newsletter and check out The Currency.
Auto-ApplyChief Information Security Officer (CISO)
Security architect job in Stillwater, OK
Oklahoma State University
Chief Information Security Officer
Oklahoma State University invites nominations and applications for the position of Chief Information Security Officer. This position reports directly to the Chief Information Officer.
Oklahoma State University (OSU) is a modern land-grant university, fostering student success through a blend of tradition and innovation.
OSU's goal is to become the preeminent land-grant institution in the country through its university strategy. Through leadership and service, we are preparing students for a bright future and building a brighter world for all. As a Very High Research Activity institution, OSU improves the lives of people in Oklahoma, the nation, and the world through integrated, high-quality teaching, research, and outreach. OSU has more than 35,000 students across its five-campus system and more than 26,000 on its combined Stillwater and Tulsa campuses, with students from all 50 states and more than 100 nations. Established in 1890, OSU has graduated more than 290,000 students.
The Chief Information Security Officer (CISO) provides strategic leadership for the university's comprehensive information security and cybersecurity programs. This position is responsible for protecting the institution's digital assets, research data, student information, and technology infrastructure while enabling academic excellence and research innovation. The CISO reports directly to the Chief Information Officer and serves as a key collaborator to the senior leadership team.
Minimum Qualifications:
Bachelor's degree and seven years of information security work experience from one or a combination of security architecture and design, security engineering, auditing and compliance, incident response and forensics, security awareness training, and the management of an IT security department. Demonstrated experience managing enterprise-wide security programs in complex distributed environments. Familiarity with Zero Trust architecture principles and enterprise identity governance. Experience in conducting security tabletop exercises or cyber incident simulations; use of cybersecurity maturity models such as NIST CSF Tiers or CMMC. Professional security certifications required (CISSP, CISM, CISA, or equivalent). Excellent written and verbal communication skills with ability to present complex technical concepts to non-technical audiences. Strong leadership and team management capabilities. Knowledge of emerging technologies in higher education (cloud computing, IoT, AI/ML security implications).
Preferred Qualifications:
Bachelor's degree in computer science, management information systems, computer engineering, or related area. Higher education experience. Deep knowledge of information security frameworks (NIST Cybersecurity Framework, ISO 27001/27002, CIS Controls). Experience with security technologies including SIEM, endpoint protection, network security tools, and cloud security platforms. Knowledge of research security requirements and federal compliance mandates. Experience with security program maturity ssessments and continuous improvement initiatives.
While applications and nominations will be accepted until a successful candidate has been appointed, interested parties are encouraged to submit their materials by September 5, 2025 to receive optimal consideration. Applications (letter of interest addressing the qualifications and responsibilities listed above, current resume, and the names, email addresses and telephone numbers of five references) must be submitted to jobs.okstate.edu, req #
492963. For questions, please contact Martin Baker and Chelsie Whitelock at Buffkin/Baker as indicated below:
Martin M. Baker, Managing Partner Buffkin/Baker
Chelsie Whitelock, Associate Partner
************************
Oklahoma State University (OSU) strives to provide a safe study, work, and living environment for its faculty, staff, volunteers and students. To support this environment and comply with applicable laws and regulations, OSU conducts pre-employment background checks on final candidates. Offers of employment are contingent upon the successful completion of a background check. The type of background check conducted varies by position and can include, but is not limited to, criminal (felony and misdemeanor) history, sex offender registry, motor vehicle history, financial history, and/or education verification. Background checks will be conducted when required by law or contract and when, in the discretion of the university, it is reasonable and prudent to do so.
Oklahoma State University, as an equal opportunity employer, complies with all applicable federal and state laws regarding non-discrimination. Oklahoma State University is committed to a policy of equal opportunity for all individuals and does not discriminate based on race, religion, age, sex, color, national origin, marital status, disability, or veteran status with regard to employment, educational programs and activities, and/or admissions. For more information, visit eeo.okstate.edu.
To Request Full Profile, Click here.
Easy ApplyManager Information Security
Security architect job in Oklahoma City, OK
We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector.
The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan.
Major Activities:
* Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program.
* Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats.
* Organizes and conducts cybersecurity simulation exercises.
* Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit.
* Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated.
* Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied.
* Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned.
* Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials.
* Support technology/systems that enable all vendor management activities by administering the Tandem platform.
* Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities.
* Maintain, develop, update, and test WEOKIE's Business Continuity Plan.
* Write reports to summarize testing activities, including results and recommendations.
* Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented.
Critical Results:
* WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs.
* Information Security risks and threats are clearly identified, measured and remediated timely.
* The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts.
* Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities.
* WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources.
* WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders.
* Risk assessments are completed annually and deficiency are quickly addressed and/or remediated.
* Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented.
* New quality control activities are developed and presented to leadership that correspond to the information security program.
* Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately.
* Vendor Management is collaboratively managed with fellow team members.
* Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures.
* WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident.
Qualifications:
* Specialized or Technical Knowledge and Skills: The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of information security concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact.
* A bachelor's degree is required, preferably in Information Technology or Computer Science.
* A minimum of three years of experience in the information security field.
* A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM) are preferred.
* Demonstrated experience in managing and working with third party vendors.
* Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels.
* In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them.
B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position.
* Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values.
* Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members.
* Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements.
* Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad.
* Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position:
* Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations.
* Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans.
* Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others.
* Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges.
* Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile.
* Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace.
* Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis.
* Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality.
C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus.
D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate.
WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
C2ISR Information System Security Officer
Security architect job in Oklahoma City, OK
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Officer (ISSO) will provide cybersecurity support to Joint Theater Air-to-Ground Simulation Systems (JTAGGS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSO is responsible for ensuring the appropriate operational security posture for information systems and must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include implementation of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. Duties also include physical and environmental protection, personnel security, and incident handling. Coordinate and synchronize security policy guidance with PLEXSYS Facility Security Officer and C2ISR Information System Security Manager (ISSM) and work in close coordination with Partner/Government ISSO/ISSM.
Duties & Responsibilities
Execute on-site information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems
Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
Develop, implement and maintain security emergency action plans
Provide security education and training to local employees
Maintain administrative security records and documents for local employees
Conduct self-inspections to ensure current security measures and policies are effective
Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
May assist in the development and updating of required Authority to Operate (ATO) artifacts
Conduct system audits in accordance with System Security Plan requirements
May be required to conduct maintenance on the networks, systems, and hardware
May be required to perform software upgrades on networks, systems, and hardware
Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements
Other duties as assigned
REQUIREMENTS
Bachelor's degree in related field or 2 years' experience in related field
Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Linux operating systems
Specialized computer training in networking and active directory
Experience with security audits for information systems
Strong communication and problem-solving skill
Ability to work in both a Team environment as well as independently
Must be organized and detail orientated
Current DoD 8570 IAT Level II and IAM Level I or higher certification (i.e. Security + or equivalent certification)
DESIRABLE
Experience with DoD Security Regulations and Policies
Experience with Type 1 and/or Type 2 virtualization platforms
Experience managing system security in an enterprise environment
Strong system documentation skills
Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS)
AUTHORITY
Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
Medical/Vision/Prescription/Dental Benefits
Life, AD&D and Long Term Disability Coverage
Paid Holidays, Military Leave, and Paid Time Off
401k Plan with eligibility from first day of employment
Education reimbursement for job-related courses for full-time employees
PriceClub/COSTCO/Sam's Club annual membership
PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Engineer, Information Security and Risk
Security architect job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer
Security architect job in Overland Park, KS
Job Description
Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply!
What You'll Do:
As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include:
Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services.
General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively.
Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments.
Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments.
Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives.
Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams.
Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends.
Who You Are:
Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats.
Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies.
Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to:
Google Cloud Security Command Center (SCC)
Google Security Operations
Google Threat Intelligence
Cloud Logging and Monitoring for security
Google Cloud Identity and Access Management (IAM)
Google Cloud Armor
Certifications: Possess one or more security certifications such as:
CompTIA Security+
(ISC)² SSCP or CISSP (Associate of (ISC)²)
Google Cloud Professional Cloud Security Engineer (highly preferred)
Other relevant cloud security certifications
Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences.
Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail.
Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
Engineer, Information Security
Security architect job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplySecurity Engineer
Security architect job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyInformation Security Officer
Security architect job in Shawnee, KS
Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team!
Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position.
E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Office of Information Technology Services
About the Position:
* Who can apply: Anyone
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule.
Compensation:
* Annual Salary/Hourly Rate: $85,000 - 95,000/Annually
Note: Salary can vary depending upon education, experience, or qualifications.
Position Summary:
The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch.
Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF).
Key Responsibilities:
* Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53).
* Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure.
* Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs.
* Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others.
* Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects.
* Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans.
* Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices.
Required skills:
* Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53.
* Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences.
* Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders.
* Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment.
* Ability to assess regulatory requirements and determine whether existing controls meet those requirements.
* Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems.
Minimum Qualifications:
* Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security.
Preferred:
* One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year.
* Familiarity with government and public sector environments
* Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075.
Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment.
Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor).
Employment Benefits:
In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
* This benefits package represents additional annual compensation.
Visit the Employee Benefits page for more information…
Recruiter Contact Information:
* Name: Brenda Cripps
* Email: OITS_******************
* Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents."
Job Application Process
* First Sign in or register as a New User
* Complete or update your contact information on the:
* Careers> My Contact Information page
* NOTE: This information is included on all your job applications
* Upload required documents listed above for the Careers> My Job Applications page
* NOTE: This information is included on all your job applications
* Start your draft job application, upload other required documents, and submit when it is complete.
* Manage your draft and submitted applications on the Careers> My Job Applications page.
* Check your email and My Job Notifications for written communications from the Recruiter
* Email - sent to the Preferred email on the My Contact Information page
* Notifications - view the Careers> My Job Notifications page
Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions."
How to Claim Veterans Preference
Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference:
Disability Hiring Preference | Kansas Department of Administration (ks.gov)
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
Security Systems Field Engineer
Security architect job in Oklahoma City, OK
Digi Security Systems is an industry leader in the design, installation and support of custom video surveillance, electronic access control, and intrusion detection solutions for public and private partners. We've built our reputation on innovation and reliable service, and we're known as the industry's experts.
Position Overview
We are seeking an experienced Field Engineer to join our operations in the Oklahoma City, OK area. Salary for this position is dependent on experience, but the budgeted range is from $80,000+ / year. This person will be responsible for performing the most skilled security technician work in the service, troubleshooting, alternation and programming of all security related systems. Field Engineers, also known as Elite Resource Technicians, are service providers who support Digi's internal and external operations by providing custom programming, training, and technical advisement. This individual must have a expert background in installing and servicing Access Control, CCTV, and Burglar/Intrusion Alarm Systems and at least seven (7) years of experience working in the commercial security systems field.
Main Responsibilities:
Service: Responsible for the professional service of access control, CCTV, and burglar/intrusion alarm systems.
Programming: Ensures project systems are programmed to the highest standard and organized to work well for the client. Often includes customized programming to meet specific Partner needs.
Networking: Complete high level integration and programming of systems, using both networks and servers.
Quality Control: Complete internal audits of Digi's projects, and ensures that highest standard of installation is upheld. Write course content and provide technical expertise for Digi's internal learning and development initiatives.
Leadership: Provide on-the-job training and mentoring on-site to technicians on their team. Collaborate with other Elite Resources to create standard operating procedures, work exemplars, and training sessions.
Communication: Respectfully communicates with all local Partner and internal staff on daily progress and all necessary information on any service call or project.
Documentation: Completes project close out documentation, including as-built drawings, head end and installation quality pictures. Documents installation quality and completes all required close out documents.
Benefits:
2 weeks vacation accrual rate and included paid sick time
3 weeks vacation accrual rate after first year of employment
7 company-wide paid holidays throughout the year
On-call bonuses
401k plan w/corporate matching structure
Full health benefits offered - medical, dental and vision
Included life insurance, additional available for purchase
Accident/critical illness insurance available for purchase
Full set of Hilti tools
All hand tools and consumables paid for by company
Required training/licensing paid for by company
Voluntary professional development opportunities
Company laptop, company phone, uniforms and gear
Company vehicle or personal vehicle allowance
Yearly stipend for steel-toed boots and work pants
Great opportunities for bonus pay
Physical Requirements:
Ability to lift/move equipment and tools weighing up to 50 lbs.
Ability to work from ladders or man lifts at extended heights.
Must be able to differentiate colors.
Must be comfortable standing for long periods of time and complete overhead work for long periods of time.
Must have a current, valid driver's license in the state of which you are applying and have the ability to meet our company driving standards.
Disclaimer: This job description is not all encompassing of job responsibilities and is not in any way a binding document. It does not affect the at will nature of employment at Digi Security Systems.
#LI-TW1
Architect - Mid Level
Security architect job in Kansas
Gensler Kansas City is quickly growing and we're seeking entrepreneurial and like-minded creatives who share a desire to have an imprint on shaping the future of our city and beyond. Ideally, we are looking for talented individuals whose experience may include mixed-use, hospitality, sports, workplace interiors, and education. Our culture is centered around a belief that great design matters. We also believe doing great work should be fun and rewarding. Whether you're into sketching new ideas, hacking a building or growing client relationships and if you want to join a rapidly emerging design-centered practice in KC, we should talk!
Your Role
As a Gensler Architect, you will collaborate with our design team to develop innovative design solutions as well as coordinate the design through the construction documentation phase of a project. You will be successful because you already know how to translate an architect's sketches and documents into realized 2D/3D models and images and can research artistic and/or technical issues when they arise. You will leverage your technical acumen and Revit skills to drive client projects from concept through build in a collaborative team. Your role is critical in the design and delivery of world-class projects. Your work ethic and dedication to problem-solving, combined with our commitment to collaboration and mentoring, make Gensler the perfect place to further your career.
What You Will Do
Manage communication between the project team, client, vendors, contractors, and consultants
Resolve complex technical and design issues with the team to produce innovative technical/constructible solutions
Direct production of drawings, specifications, and construction administration tasks
Responsible for oversight and delivery of documents with design intent and top-notch technical quality
Resolves complex technical/design issues and detailing and provides guidance and mentorship to team
Maintain and oversee the project manual and specifications
Conduct on-site observations and document site reviews
Interface with building and permitting officials during the permitting and construction phases of the project
Actively participate and contribute to the financial performance of the project
Review and contribute to proposals and contracts with the Project Manager
Ensure projects conform to the contract
Actively leading teams for the successful delivery of projects
Managing client expectations, team communication, and oversight of consultant coordination
Contribute to office activities, initiatives and learning programs
Establish and maintain ongoing, productive client relationships
Your Qualifications
Registered Architect required
A bachelor's degree in Architecture from an accredited program
5+ years of architecture experience
Proficiency in Revit, AutoCAD, BIM360, Enscape, SketchUp, and Adobe Creative Suite (Illustrator, Photoshop, InDesign).
Full knowledge of architectural principles/practices
Working knowledge of building codes, standards, and building structures
Experience with the entire project lifecycle and design process through post-occupancy
Flexibility to focus on concurrent projects in various stages of development
A quick learner with an ability to thrive in a fast-paced work environment
Excellent written + verbal communication and management skills to include leadership, organization, and client relationship management skills
Well-rounded, strategic thinker with an integrated approach to design, management, and technical project resolution who can help shape a vision for the future
TO BE CONSIDERED, PLEASE SUBMIT A CURRENT PORTFOLIO AND/OR WORK SAMPLES IN PDF FORMAT
This position is in-person. Successful candidates will be located in the Kansas City, Missouri area. If you're open to relocating to the area, please apply! Non-local candidates are welcome. Take a look at U.S. News & World Report's 2025-2026 study on what it's like living in Kansas City!
Life at Gensler
As a people-first organization, we are as committed to enjoying life as we are to delivering best-in-class design. From curated art exhibits to internal design competitions to “Well-being Week,” our offices reflect our people's diverse interests.
We encourage every person at Gensler to lead a healthy and balanced life. Our comprehensive benefits include medical, dental, vision, disability, wellness programs, flex spending, paid holidays, and paid time off. We also offer a 401k, profit sharing, employee stock ownership, and twice-annual bonus opportunities. Our annual base salary range has been established based on local markets.
As part of the firm's commitment to licensure and professional development, Gensler offers reimbursement for certain professional licenses and associated renewals and exam fees. In addition, we reimburse tuition for certain eligible programs or classes. We view our professional development programs as strategic investments in our future.
Auto-ApplyEXECUTIVE DIRECTOR FOR INFORMATION SECURITY & CHIEF INFORMATION SECURITY OFFICER
Security architect job in Emporia, KS
Developing, and implementing secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Educating and managing information and technology risk in collaboration with business leaders.Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets. Maintain Professional Knowledgebase; keep apprised of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to ESU.Continuously evaluating and managing the cyber and technology risk posture of the organization.Implementing and managing the cyber governance, risk, and compliance process. Developing, justifying, and evaluating cybersecurity investments. Developing and implementing ongoing security awareness training and education for users. In coordination with the CIO and emergency management team, implementing disaster recovery protocols and business continuity plans with business resilience in mind.
QUALIFICATIONS:
Minimum Qualifications:
* Bachelor's degree; preference for advanced degree.
* Minimum of five years' experience in information security or equivalent.
* Strong commitment to customer-focused and team-oriented management.
* Proven leadership abilities with a history of advancing roles in security management.
* Proficiency in project planning, implementation, and management.
* Demonstrated capability in collaborating with diverse populations.
* Experience handling sensitive and confidential information in compliance with federal and state laws.
* Skilled in presenting complex security concepts to various audiences (e.g., end-user training, executive-level briefings).
* Up-to-date knowledge of emerging information security technologies and strategies.
* Availability for off-hours support when necessary.
COMPENSATION:
* Annual salary range is $130,000-$160,000
* Salary will be commensurate with experience and qualifications.
BENEFITS:
Base pay is one component of Emporia State University's total rewards package. We are dedicated to supporting the needs of the "whole you" with our holistic approach to employee benefits by offering comprehensive well-being benefits for you and your family that include:
* Health Insurance
* Free Dental insurance for employees
* Retirement through the Kansas Board of Regents
* Paid parental leave
* Up to 31 days paid vacation and holiday days
* Tuition reduction and tuition assistance
* Dependent tuition waiver
* For full details about our benefit plan offerings, please visit here.
APPLY:
Please upload a cover letter, resume, and contact information of three references here.
Consideration of applications will begin immediately, and will continue until the position is filled.
A background check is required prior to hire.
For more information
Human Resources
******************
**************
Emporia State University is an equal opportunity and affirmative action employer. All qualified applicants will receive consideration for
Easy ApplySecurity Engineer
Security architect job in Topeka, KS
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.
**Required Skills:**
Security Engineer Responsibilities:
1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices.
2. Build machine attestation and secure certificate storage solutions to enable strong client trust.
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices.
4. Develop, validate, and enforce our client security policies.
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services.
6. Advise and collaborate with other teams.
7. Telecommuting from anywhere in the U.S. allowed.
**Minimum Qualifications:**
Minimum Qualifications:
8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation
9. Requires 12 months of experience involving the following:
10. PHP, Golang, Python, C/C++, Rush, or Ruby
11. Designing and deploying security infrastructure such as PKI, key management, and certificate management
12. Endpoint Security & Management
13. Certificate Lifecycle
14. Devices & OS hardening and security policies
15. Identity & Access Management (Authentication & Authorization, SSO)
16. Network Security and
17. Programming and Code Review
**Public Compensation:**
$178,041/year to $200,200/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Senior IT Security Analyst
Security architect job in Wichita, KS
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyEngineer, Information Security and Risk
Security architect job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Systems Field Engineer
Security architect job in Oklahoma City, OK
Digi Security Systems is an industry leader in the design, installation and support of custom video surveillance, electronic access control, and intrusion detection solutions for public and private partners. We've built our reputation on innovation and reliable service, and we're known as the industry's experts.
Position Overview
We are seeking an experienced Field Engineer to join our operations in the Oklahoma City, OK area. Salary for this position is dependent on experience, but the budgeted range is from $80,000+ / year. This person will be responsible for performing the most skilled security technician work in the service, troubleshooting, alternation and programming of all security related systems. Field Engineers, also known as Elite Resource Technicians, are service providers who support Digi's internal and external operations by providing custom programming, training, and technical advisement. This individual must have a expert background in installing and servicing Access Control, CCTV, and Burglar/Intrusion Alarm Systems and at least seven (7) years of experience working in the commercial security systems field.
Main Responsibilities:
Service: Responsible for the professional service of access control, CCTV, and burglar/intrusion alarm systems.
Programming: Ensures project systems are programmed to the highest standard and organized to work well for the client. Often includes customized programming to meet specific Partner needs.
Networking: Complete high level integration and programming of systems, using both networks and servers.
Quality Control: Complete internal audits of Digi's projects, and ensures that highest standard of installation is upheld. Write course content and provide technical expertise for Digi's internal learning and development initiatives.
Leadership: Provide on-the-job training and mentoring on-site to technicians on their team. Collaborate with other Elite Resources to create standard operating procedures, work exemplars, and training sessions.
Communication: Respectfully communicates with all local Partner and internal staff on daily progress and all necessary information on any service call or project.
Documentation: Completes project close out documentation, including as-built drawings, head end and installation quality pictures. Documents installation quality and completes all required close out documents.
Benefits:
2 weeks vacation accrual rate and included paid sick time
3 weeks vacation accrual rate after first year of employment
7 company-wide paid holidays throughout the year
On-call bonuses
401k plan w/corporate matching structure
Full health benefits offered - medical, dental and vision
Included life insurance, additional available for purchase
Accident/critical illness insurance available for purchase
Full set of Hilti tools
All hand tools and consumables paid for by company
Required training/licensing paid for by company
Voluntary professional development opportunities
Company laptop, company phone, uniforms and gear
Company vehicle or personal vehicle allowance
Yearly stipend for steel-toed boots and work pants
Great opportunities for bonus pay
Physical Requirements:
Ability to lift/move equipment and tools weighing up to 50 lbs.
Ability to work from ladders or man lifts at extended heights.
Must be able to differentiate colors.
Must be comfortable standing for long periods of time and complete overhead work for long periods of time.
Must have a current, valid driver's license in the state of which you are applying and have the ability to meet our company driving standards.
Disclaimer: This job description is not all encompassing of job responsibilities and is not in any way a binding document. It does not affect the at will nature of employment at Digi Security Systems.
#LI-TW1
Auto-ApplyArchitect - Critical Facilities
Security architect job in Kansas
Your Role
Gensler's Kansas City office is seeking an Architect to join our team of design thinkers and doers for our Critical Facilities practice.
What You Will Do
Manage communication between the project team, client, vendors, contractors, and consultants
Resolve complex technical and design issues with the team to produce innovative technical/constructible solutions
Direct production of drawings, specifications, and construction administration tasks
Responsible for oversight and delivery of documents with design intent and top-notch technical quality
Resolves complex technical/design issues and detailing and provides guidance and mentorship to team
Maintain and oversee the project manual and specifications
Conduct on-site observations and document site reviews
Interface with building and permitting officials during the permitting and construction phases of the project
Actively participate and contribute to the financial performance of the project
Review and contribute to proposals and contracts with the Project Manager
Ensure projects conform to the contract
Actively leading teams for the successful delivery of projects
Managing client expectations, team communication, and oversight of consultant coordination
Contribute to office activities, initiatives and learning programs
Establish and maintain ongoing, productive client relationships
Your Qualifications
Registered Architect required
A bachelor's degree in Architecture from an accredited school required
6+ years of related experience, including demonstrated success as a project architect on a range of project types
Revit experience required
Full knowledge of architectural principles/practices
Working knowledge of building codes, standards, and building structures
Experience with the entire project lifecycle and design process through post-occupancy
Flexibility to focus on concurrent projects in various stages of development
A quick learner with an ability to thrive in a fast-paced work environment
Excellent written + verbal communication and management skills to include leadership, organization, and client relationship management skills
Well-rounded, strategic thinker with an integrated approach to design, management, and technical project resolution who can help shape a vision for the future
This position requires you to be in the Kansas City office 5 days per week. If you're open to relocating to the Kansas City area, please apply!
Life at Gensler
As a people-first organization, we are as committed to enjoying life as we are to delivering best-in-class design. From curated art exhibits to internal design competitions to “Well-being Week,” our offices reflect our people's diverse interests.
We encourage every person at Gensler to lead a healthy and balanced life. Our comprehensive benefits include medical, dental, vision, disability, wellness programs, flex spending, paid holidays, and paid time off. We also offer a 401k, profit sharing, employee stock ownership, and twice annual bonus opportunities. Our annual base salary range has been established based on local markets.
As part of the firm's commitment to licensure and professional development, Gensler offers reimbursement for certain professional licenses and associated renewals and exam fees. In addition, we reimburse tuition for certain eligible programs or classes. We view our professional development programs as strategic investments in our future.
At Gensler, the value of our work stems from its positive impact on the human experience. We are a dynamic and collaborative design firm uniting creativity, research, and innovation to solve complex problems for our clients. Our work challenges conventional ideas about architecture and the built environment. We aren't just designing buildings - we are reimagining cities and places that make a difference in people's lives.
#LI-TP1
Auto-Apply