Post Job

Security Architect Jobs in Excelsior Springs, MO

- 114 Jobs
All
Security Architect
Security Engineer
SAP Security Consultant
Information Security Analyst
Network Security Consultant
Senior Security Engineer
Information Security Manager
Information Security Director
Information Security Engineer
Senior Security Architect
  • Information Security Architect

    Hallmark 4.4company rating

    Security Architect Job 23 miles from Excelsior Springs

    WHO WE ARE The Security Architecture Team links the Information Security divisional programs and processes to multiple architectural models or views that show how the current security needs of the organization will be met in an efficient, sustainable, agile, and adaptable manner. Various analysis disciplines are required within this role including, but not limited to, business, data, technology, application, and services. WHAT YOUR ROLE ENTAILS AND HOW YOU'LL CONTRIBUTE The Information Security Architect is responsible for designing, implementing, and managing the security infrastructure of an organization's IT systems. This role involves developing security standards and best practices, ensuring compliance with regulations, and actively protecting the organization's data and networks from security breaches. The ideal candidate will have a deep understanding of information security concepts, experience with security technologies, and the ability to think strategically about the evolving threat landscape. BASIC QUALIFICATIONS * Minimum of 5 years of experience in information security, network security, or a related field * Experience with Cloud computing technologies (Ex: EC2 virtual machines, Virtual Networks, Direct Connect, Firewalls, IAM) * Hands-on experience building multi-AZ/Region cloud environments * Network communications experience (TCP/IP, Routing, DNS) * Experience collaborating with, educating, and developing security architectures PREFERRED QUALIFICATIONS * Certifications: CISSP, CISM, GCP Associate/Professional, CCSK, OSCP * Knowledge of NIST Cyber Security Framework * CIS Security Framework * ISO 27001/27002 Framework * GDPR, HIPAA, PII, PCI * Knowledge of Cloud Governance * Ability to develop automation scripts * Cryptography knowledge of encryption algorithms, key management, and secure communication protocols * Conduct risk assessments, vulnerability analyses, and threat modeling * DLP - Data loss protection methods and technologies * Cyber Threat Intelligence with the collection, analysis, and dissemination of information about cyber threats and actors. * Security Engineering best practices * Privileged access Management technologies * Linux or UNIX-based operating systems, including command line interfaces * Enterprise security software vendor assessments * Hands-on-keyboard experience conducting penetration testing * Hands-on-keyboard experience conducting vulnerability scans * Coding skills including any of the following: C#, HTML, Shell, Python, PowerShell * Strong problem-solving and troubleshooting skills with experience exercising experienced judgment * Advanced administration skills for Windows and/or Unix systems * Strong understanding of Red Team, Blue Team and Purple Team testing * Strong understanding of threat vectors and Cyber-attack patterns * Familiarity with open source, custom or proprietary software * Detail oriented * Meticulous approach to identifying potential vulnerabilities and ensuring compliance ADDITIONAL DETAILS * This position is hybrid, working onsite at our headquarters in Kansas City, MO as needed. Some relocation assistance is available. Now's your chance to embrace a future with Hallmark-just follow the instructions below to apply. You must show how you meet the basic qualifications in a resume or document you upload, or by completing the work experience and education application fields. Accepted file types are DOCX and PDF. In compliance with the Immigration Reform and Control Act of 1986, Hallmark Cards, Inc. and its subsidiary companies will hire only individuals lawfully authorized to work in the United States. Hallmark does not generally provide sponsorship for employment. Employment by Hallmark is contingent upon the signing of the Employment Agreement, signing of an agreement to arbitrate in connection with the Hallmark Dispute Resolution Program, completing Form I-9 Employment Eligibility Verification, passing the urinalysis drug screen, education verification and satisfactory reference and background checks. Hallmark is an equal opportunity employer. All qualified applicants will be considered for employment without regard to race, color, religion, sex, age, pregnancy, national origin, physical or mental disability, genetics, sexual orientation, gender identity, veteran status, or any other legally-protected status. Principals only please. HALLMARK - Because Connecting With Each Other Has Never Been More Important For more than a century, Hallmark has been bringing people together and improving the relationships that matter most. That's why millions of people all over the world connect with the Hallmark brand. It has always been a mission so much bigger than any one of us who work here. Today, we need empathetic learners, strategic thinkers, and enthusiastic visionaries with diverse experiences and skills to help us create the rest of Hallmark's second century as we shift to a more digitally savvy, unified approach that combines the best of brick-and-mortar retail with the efficiency of dot-com spaces. Help us imagine what our next hundred years could look like! When you join Hallmark, we will go out of our way to make you feel like part of the team. In the day-to-day, we'll make the best use of the skills and talents you already have. We'll also give you leadership opportunities and show you multiple potential pathways to future success. Our culture of care for our consumers and for one another shows in the way we embrace different backgrounds, identities, and working styles, deliberately seeking out ways to be more inclusive both internally among our work groups and externally through the things we make and sell to our retail partners and consumers. We believe that a broadly inclusive, equitable approach is also our best path to future success. We're seeking out those who can bring a fresh perspective to our business and would love your input as someone new to our team! We can only change and grow when we intentionally include new perspectives-like yours.
    $96k-135k yearly est. 53d ago
  • Cyber Security Architect (Individual Contributor IX)

    Johnson County (Ks 4.7company rating

    Security Architect Job 45 miles from Excelsior Springs

    A career with Johnson County Government is more than just a job, it is an opportunity to serve a diverse and expanding community in meaningful ways. We challenge ourselves to be a different kind of government because we care deeply about our community and each other. Committed to our shared values, we provide excellent public service, seeking always to improve ourselves and our organization. We offer wonderful benefits, retirement plans, wellness incentives, a great organizational culture, and much more! If you're searching for something more than just a job, something akin to a calling, then consider the challenge and opportunity of being a member of Johnson County Government! Job Description The Johnson County Department of Technology and Innovation is looking to fill the position of Cyber Security Architect. This position is responsible for designing, implementing, and maintaining the County's security architecture to protect systems, networks, and data from cyber threats. This position conducts risk assessments, develops security solutions, ensures compliance with regulatory requirements, and collaborates with teams to embed security best practices across the organization, thereby enhancing the County's overall cybersecurity posture and resilience. In addition, this position will provide oversight, and direction for all large Johnson County IT projects. First review of applications will be on February 18, 2025. Additional duties include: Design and Oversight of Security Architectures * Lead the design, implementation, and ongoing maintenance of comprehensive security frameworks and systems to safeguard County operations. * Ensure alignment with and adherence to regulatory standards, including HIPAA, PCI, and CJIS, while proactively addressing compliance challenges. Strategic Risk Management and Mitigation * Direct the execution of advanced risk assessments to identify vulnerabilities, assess potential impacts, and design robust mitigation strategies. * Develop and oversee the implementation of comprehensive incident response plans, ensuring rapid recovery and minimal disruption. Leadership in Collaboration and Training * Act as a strategic advisor to IT teams, integrating security best practices into system design and operations across the County. * Design and deliver advanced training programs to elevate the security capabilities and awareness of staff at all levels. Incident Response Leadership * Serve as a key leader during security incidents, coordinating cross-functional efforts with the Security Manager and other stakeholders to manage responses effectively. * Analyze security incidents to identify root causes, implement preventive measures, and refine response protocols. Innovation and Integration of Emerging Security Trends * Continuously evaluate the evolving cybersecurity landscape to identify and incorporate innovative technologies and methodologies into County operations. * Drive the adoption and integration of new security solutions, ensuring alignment with strategic objectives and organizational needs. Job Requirements Bachelor's Degree in Information Technology, Cybersecurity or relevant field; Eight (8) years experience in security design, architecture, and operations. Master's Degree in Information Technology, Cybersecurity or relevant field, three (3) years of experience in project management, one (1) year leading, directing, coordinating, or supervising the work of others and experience supporting cybersecurity education, architecture, tools and services within a government setting preferred. Experience can substitute for education. Education can substitute for experience. Johnson County Government requires reference/background screening for all positions. Specified criteria may vary by Department/Agency. Physical, Environmental, and Special Working Conditions: * All County employees may be called upon to assist other departments/agencies in a declared emergency situation.
    $55k-84k yearly est. 3d ago
  • Product Security Architect

    Garmin International, Inc. 4.5company rating

    Security Architect Job 45 miles from Excelsior Springs

    We are seeking a full-time Security Architect for our Product Security team in our Olathe, KS location. We welcome self-motivated, passionate, and creative individuals who are well-versed in cyber security and software engineering. Come work with us to protect Garmin's customers by securing our products and development lifecycle. This role guides, develops, and supports customer-facing, product-specific security objectives within Garmin's engineering teams. Essential Functions * Security Technical Leadership: Perform security reviews/threat analysis and propose mitigations. Develop and enforce security policies and standards. * Global Collaboration: Leverage expertise to clearly convey complex technical topics across leadership and engineering. * Vulnerability & Incident Management: Lead the incident response, contain/mitigate security threats, and remediate vulnerabilities * Software Development: Design, implement, and maintain product security libraries and security enhancing tools (ex. Encryption libraries and automated static/dynamic analysis) Basic Qualifications * Bachelor's Degree in Computer Science, Electrical Engineering, Computer Engineering, Software Engineering, Aerospace Engineering, Math, Physics or related field AND a minimum of 5 years relevant experience OR an equivalent combination of education and experience * Excellent academics (cumulative GPA greater than or equal to 3.0 as a general rule) * Demonstrated expertise and understanding of security techniques and processes, including security control frameworks, threat modeling, security measure design, and vulnerability assessment. * Demonstrated proficiency with at least one modern language such as C++ or Python * Demonstrated proficiency with software engineering methodologies such as peer reviews and continuous integration Desired Qualifications * Experience and/or knowledge of industry regulations and standards (NIST, ISO, CIS, EU RED, etc) * Demonstrated proficiency with embedded systems development * Demonstrated proficiency in Product Security Penetration Testing * Outstanding academics (cumulative GPA greater than or equal to 3.5) Garmin International is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, veteran's status, age or disability. This position is eligible for Garmin's benefit program. Details can be found here: Garmin Benefits
    $79k-115k yearly est. 14d ago
  • SAP Cyber Security

    Herdt Consulting 3.7company rating

    Security Architect Job 23 miles from Excelsior Springs

    We are seeking a highly skilled System Integration partner to migrate a highly customized PeopleSoft ERP to an SAP S/4HANA ERP solution on RISE that will provide integrated finance, supply chain, and planning functionality; interfacing with external manufacturing-related ERPs. Responsibilities include but are not limited to: In this role, the individual is responsible for leading and supporting cybersecurity compliance and awareness efforts, and tracking the implementation of key cybersecurity alignment projects across the enterprise Responsible for design, implementation, and optimization of SAP Analytics Cloud (SAC). Responsible for assisting in assuring compliance and reducing cyber risk across the enterprise. Manage and enforce to ensure technical infrastructure architecture satisfy all applicable cyber security requirements for defined / mandated. Basic Qualifications: Five (5) or more years of Cybersecurity compliance. Five (5) or more years of experience showing domain and expert technical knowledge. Five (5) or more years of experience in a Cybersecurity or Information Security role Two (2) or more years of experience in directing and controlling activities for customer, having overall responsibility for financial management, methods, and staffing to ensure that technical requirements are met. DOE Approved Certifications (e.g., IAT Level II or above Security Certification (e.g., Security+CE, IAT Level II or CISSP, IAT Level III). Nice to have skills: DOE experience desired S/4HANA experience Local to Kansas City SAP Certification Shows initiative and goes above and beyond to assist others as needed Requirements and Qualifications: Must be a U.S. Citizen and be able to obtain a favorable government clearance investigation for an SSBI. Security Clearance: SSBI or eligible Travel: Onsite/Remote - Preferred local to Kansas City, Missouri Position Requirements: In order to be considered for this position you must complete the job questionnaire that is part of the online application process. All applicants must pass a background check where their citizenship status will be confirmed. What We Can Offer You: The chance to be part of a company that has a reputation for excellence in task execution Full-time associates receive 3 weeks of paid vacation each year 11 federal holidays We offer competitive benefits Medical (Blue Cross Blue Shield) Secondary Insurance Dental Vision Voluntary Life and AD&D Insurance 401K program with Fidelity that offers a company match Flexible Spending Account (FSA) Short Term and Long Term Disability at no cost to the associate Pay: $100,000 - $245,000 USD
    $100k-245k yearly 60d+ ago
  • SAP Platform Security Consultant

    Accenture 4.7company rating

    Security Architect Job 40 miles from Excelsior Springs

    We are a global collective of innovators applying the "New" every day to improve the way the world works and lives. Help us show the world what's possible as you partner with clients to unlock hidden value and deliver innovative solutions. Empowered with innovative tools, continuous learning, and a global community of diverse talent and perspectives, we drive success in a new business architecture that disrupts conventional practices. Our expertise spans 40+ industries across 120+ countries and impacts millions of lives every day. We turn ideas into reality. We Are: Platform Security professionals develop and deliver solutions - including the design and implementation of SAP application Security Roles, implementation of SAP Access and Process Control, Segregation of Duties Analysis Rules, Security Role Provisioning solutions, Security Analytics, Automated External Application Scanning, and Automated Source Code Analysis - that minimize the impact of internal and external manipulation of applications to access, steal, modify, or delete sensitive data. You Are: A Security and Risk professional developing and delivering solutions that protect SAP systems and data by establishing policies, practices, and tools that prevent unauthorized access, use, disclosure, modification, or disruption. SAP Platform Security professionals develop and deliver solutions - including design and implementation of SAP Security Roles, Segregation of Duties Analysis Rules, Security Role Provisioning solutions, Security Workflow, Business Process Controls, Security Analytics, Enterprise GRC Solutions, Automated External Application Scanning, and Automated Source Code Analysis. A professional at this position level within Accenture has the following responsibilities: * Adapts existing methods and procedures to create possible alternative solutions to moderately complex problems. * Understands the strategic direction set by senior management as it relates to team goals. * Uses considerable judgment to determine solutions and seeks guidance on complex problems. Primary upward interaction is with the direct supervisor. May interact with peers and/or management levels at a client and/or within Accenture. * Determines methods and procedures on new assignments with guidance. Decisions often impact the team in which they reside. * Manages small teams and/or work efforts (if in an individual contributor role) at a client or within Accenture. The Work (Role Responsibility): * Contribute to a strong client relationship through interactions with client personnel• * Understand engagements as they relate to client's business * Configure security and associated solutions in SAP S/4 to meet unique client security requirements * Demonstrate knowledge in some areas of industry or functional specialty * Communicate client expectations to the engagement team * Conduct security assessments * Assume responsibility for small components of engagements. May have a greater role in small engagements * Contribute to engagement planning and verify that deliverables meet contract and work plan objectives. * Deliver services that meet Accenture Project Manager specifications * Recognize and communicate opportunities to sell "add-on" work to client * Strong understanding of information security management principles, SAP application security implementation methodologies, role-based access controls, distributed systems administration, and distributed system recovery. * Demonstrate experience 1) independently completing complex security-related tasks (ex. An upgrade to S/4HANA); 2) making major contributions in assuring deliverables meet contract and work plan objectives and; 3) taking on tasks of increased complexity * Ability to take a broad view of the position and take initiative to communicate, interact, and cooperate with others to ensure that all aspects of a task are addressed * Ability to independently create written deliverables and participate in presentations * On-site, regular client travel will be required for this position Qualification Here's What You Need (Basic Qualifications): * Minimum 3 years of experience in SAP S/4 HANA, with a focus on implementation * Minimum 3 years of experience creating technical documentation * Minimum 3 years of experience with SAP Fiori and HANA DB security experience * Bachelor's degree or equivalent (minimum 12 years) work experience. (If Associate's Degree, must have minimum 6 years work experience) * Travel may be required for this role. The amount of travel will vary from 0 to 100% depending on business need and client requirements. Bonus Points If You Have (Preferred Skills): * Prior experience working in a consultant/advisory capacity. Big Four experience preferred * Knowledge of internal controls, with relation to SAP Security and SAP Access/Process Controls * Proven ability to work creatively and analytically in a problem-solving environment * Proven success in contributing to a team-oriented environment * Desire to work in an environment fostering teamwork and camaraderie * Excellent leadership, communication (written and oral), and interpersonal skills Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired in California, Colorado, District of Columbia, Illinois, Maryland, Minnesota, New York or Washington as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply. Information on benefits is here. Role Location Annual Salary Range California $63,800 to $196,000 Colorado $63,800 to $169,300 District of Columbia $68,000 to $180,300 Illinois $59,100 to $169,300 Minnesota $63,800 to $169,300 Maryland $59,100 to $156,800 New York $59,100 to $196,000 Washington $68,000 to $180,300 #LI-NA Locations
    $68k-180.3k yearly 18d ago
  • Security Architect

    Massachusetts Bay Transportation Authority 4.8company rating

    Security Architect Job 23 miles from Excelsior Springs

    The MBTA IT Department's Security Architect will assist the office of the CISO with operationalization of a portfolio of programs, projects, and activities as directed to include information security program management, risk management, and GRC-related projects and activities. The Security Architect will review and evaluate current security solutions while providing recommendations and support to strengthen IT infrastructure. * Provide Information Security and Risk Program Management Support. * Ensure Information Security, Risk, and Privacy Documentation is accurate, current, and relevant to the MBTA in support of the Information Security Portfolio. * Evaluate and enhance alignment of procedures to ensure alignment with the Office of the Executive Office of Technology Services and Security (EOTSS). * Advise on the implementation of security technologies to strengthen IT architecture. * Work with system owners to ensure that appropriate security controls are designed and implemented. * Document and maintain a log of security risks associated with projects and production support. * Identify security design gaps in existing and proposed architectures and recommend changes or enhancements. * Advise on the remediation or patching of vulnerabilities. * Evaluate and provide recommendations for planned changes and transformation of hybrid and cloud hosting environments. * Provide security architecture and engineering recommendations for enterprise infrastructure and applications, SaaS services, Secure Dev Ops, Operational Technologies, and asset management strategies. * Review security and deployment configurations for server and end-user devices including mobile, emerging BYOT (Bring Your Own Technology) strategies, and encompassing threat detection and response solutions. * Ensure that the MBTA vendor ecosystem is properly evaluated, assessed, and managed to minimize risk exposure and risk impacts to the organization. * Utilize the MBTA NIST-based Security and Privacy controls framework, Regulatory environment, and both Commonwealth and MBTA Information Security policy when providing risk-based recommendations. * Perform all other duties and projects that may be assigned. Physical Demands and Working Conditions * The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. * Available to work all shifts and locations as assigned or directed. * Available to work as per assignment by the MBTA twenty-four (24) hours per day, seven (7) days per week as directed by supervisory staff for severe weather conditions, emergencies or any other circumstances that may potentially impact service or the safety of service. * Have the ability to work any and all shifts and/or locations assigned or directed. Supervision Supervises data and security consultants.Minimum Education Bachelor's degree from an accredited institution in Computer Science, Information Technology, Cybersecurity, or a related field. Minimum Experience and Required Skills * Five (5) years of experience in information security, with a focus on security architecture. * Proven experience in providing security architecture and engineering recommendations for enterprise infrastructure and applications, SaaS services, Secure Dev Ops, Operational Technologies, and asset management strategies. * Experience in application architecture and development patterns. * Strong Understanding of Regulatory Compliance Requirements relevant to the transit industry. * Expertise in Risk Management and Governance, Risk Management, and Compliance (GRC). * Proficiency in Designing and Implementing Security Solutions for IT infrastructure. * In-depth Knowledge of SaaS Technologies: Experience with assessing, implementing, and securing various SaaS solutions. * Experienced in Assessment, Mitigation, and Remediation of Security Vulnerabilities: Ability to identify and address security weaknesses effectively. * Server Experience: Familiarity with server configurations, security, and management. * BYOT (Bring Your Own Technology) Strategy Knowledge: Understanding the security implications and management of BYOT environments. * Network Infrastructure Experience: Proficient in designing and securing network infrastructures, including understanding of network protocols and hardware. * Security Audit Logging and Monitoring: Experience in implementing and managing security log systems, and the ability to analyze and respond to security incidents. * Ability to Evaluate and Recommend Security Architecture and Engineering Solutions. * Familiarity with Vendor Risk Management. * Excellent Communication Skills, both written and verbal. * Strong Interpersonal and Collaborative Skills. * A High School Diploma or GED with an additional seven (7) years of Computer Science, Information Technology, Cybersecurity, or a related field experience substitutes for the bachelor's degree requirement. * An associate degree from an accredited institution an additional three (3) years of Computer Science, Information Technology, Cybersecurity, or a related field substitutes for the bachelor's degree requirement. * A master's degree in a related subject substitutes for two (2) years of general experience. * A nationally recognized certification, or statewide/professional certification in a related field substitutes for one year of experience.
    $88k-145k yearly est. 9d ago
  • Director, Senior Cloud Security Architect

    KPMG 4.8company rating

    Security Architect Job 23 miles from Excelsior Springs

    Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team. KPMG is currently seeking a Director, Senior Cloud Security Architect to join our Global Information Solution Group which is part of KPMG International. Responsibilities: * Engage with key stakeholders to understand the current state of application security, contributing to the security program to address gaps * Collaborate with cross-functional teams to ensure systemic and holistic approach to security * Conduct threat modelling exercises to identify potential security threats and risks in applications * Perform code reviews, static and dynamic analysis to ensure the security of application codebase * Work closely with development teams to prioritize and address identified threats Qualifications: * Minimum ten years of recent experience such as security architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security * Bachelor's degree from an accredited college or university in computer science or related field, or equivalent work experience * Advanced knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security * Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Azure Cybersecurity Expert, or equivalent are highly desirable * Strong knowledge of cloud platforms such as Azure, Amazon Web Services (AWS), and Google Cloud and their security features * In-depth understanding of cloud security principles, best practices, and industry frameworks such as Cloud Security Alliance (CSA), Center for Internet Security (CIS), National Institute of Standards and Technology (NIST), and International Organization for Standardization (ISO) * Must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa) KPMG complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, the firm is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year the firm publishes a calendar of holidays to be observed during the year and provides two firmwide breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at "Benefits & How We Work". Follow this link to obtain salary ranges by city outside of CA: ********************************************************************** KPMG LLP (the U.S. member firm of KPMG International) offers a comprehensive compensation and benefits package. KPMG is an affirmative action-equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding the firm's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please. KPMG does not currently require partners or employees to be fully vaccinated or test negative for COVID-19 in order to go to KPMG offices, client sites or KPMG events, except when mandated by federal, state or local law. In some circumstances, clients also may require proof of vaccination or testing (e.g., to go to the client site). KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them. Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
    $92k-121k yearly est. 53d ago
  • Director of Research Information Security Strategy

    KUMC University of Kansas Medical Center

    Security Architect Job 31 miles from Excelsior Springs

    Department:Information Security Administration ----- Information Security Engineering and OperationsPosition Title:Director of Research Information Security StrategyJob Family Group: Professional Staff Summary:The Director of Research Information Security Strategfy reports to the Chief Information Security Officer, while collaborating closely with IT Governance and Research Leadership to ensure project milestones are appropriately prioritized and met. The Director provides strategic leadership in aligning research technology initiatives with the university's broader information security and risk management goals. This position acts as a key advisor and liaison between research teams and IT services (KITS), ensuring that all technology integration solutions are both compliant and supportive of the university's research mission. The Director will drive initiatives to enhance research-related cybersecurity and risk governance, while also facilitating clear communication between technical teams and researchers. This role requires a professional with a deep understanding of both IT infrastructure and information security principles, coupled with excellent communication and relationship-building skills. This individual will work closely with researchers to understand their unique needs, translate those needs into technical requirements, and collaborate with the KITS teams to develop solutions that are secure, compliant, and effective. This position requires being on-site three or more days a week and does not have any direct reports.:Job Responsibilities: Consultation & Communication: Engage with university researchers to understand their specific technology onboarding needs including the IT and IS needs for deployment. Clearly and effectively communicate the technical and security needs of emerging researcher technologies to KITS teams Act as a primary contact of communication with technology vendors to collect all necessary documentation to support a full, robust risk analysis and integration discussion with the Information Security, Systems Integration, Software Support, Hardware Support, Customer Support, Networking, and other KITS teams as needed. Work directly with vendors to describe any technology limitations that may emerge from the proposed integration solution. Serve as the primary point of contact between researchers and KITS teams for projects, ensuring both sides are aligned on expectations and requirements. Coordinate with Enterprise Project Management as needed to ensure project alignment. Solution Development & Implementation: Collaborate with KITS teams to design and implement solutions that meet the researchers' needs while adhering to regulations, state and university policies, industry best practices, and compliance requirements. Evaluate existing IT and security solutions and propose enhancements or alternatives that better align with the needs of the research community. Drive technology deployment solutions to completion addressing challenges timely which would otherwise lead to a failure of deployment. Translation of Technical Solutions: Translate complex IT and security solutions into language that is understandable for non-technical individuals. Ensure researchers are fully aware of any limitations, boundaries, or requirements associated with the implemented solutions. Relationship Building & Management: Foster strong, positive relationships with researchers and KITS personnel Act as a trusted advisor and advocate for researchers within the KITS teams. Facilitate open lines of communication to ensure ongoing alignment and satisfaction among all stakeholders. Training & Support: Provide ongoing training and support to researchers on the use of IT systems which support compliant and desirable solutions. Develop and deliver workshops or informational sessions tailored to the research community's needs. Responsible for coordinating rounding tours with researchers for routine technology health checks, documenting findings and working with KITS teams to appropriately route workstreams for follow up and implementation. Compliance & Risk Management: Ensure that all IT solutions comply with policies, as well as applicable regulatory and legal requirements including data security and retention policies. Assist researchers in understanding and adhering to information security protocols to protect sensitive data and research outputs. This may require developing or implementing strategies which are responsive to a variety of types of data and policy standards. Continuous Improvement: Gather feedback from researchers on the effectiveness of IT and security solutions, and work with KITS teams to make necessary adjustments Stay up to date with the latest trends and advancements in IT and IS, particularly as they relate to academic research. Stay up to date with emerging technologies across the life science research domains. Participate in the development of a long-term security roadmap for research-related IT systems. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. It is only a summary of the typical functions of the job, not an exhaustive list of all possible job responsibilities, tasks, duties, and assignments. Furthermore, job duties, responsibilities and activities may change at any time with or without notice. Required Qualifications: Education: Bachelor's degree in information technology, computer science, or a related field OR bachelor's degree in biology or related science with lab experience and demonstrated knowledge of computer science or information technology Work Experience: 10+ years of combined experience in information technology (IT), information security (IS) and highly technical research laboratory roles Background in IT infrastructure and information security, with a focus on compliance, risk management, or technology integration Proven experience in project management and cross-functional multidisciplinary collaboration Experience with IS Risk Management (ISRM) 3+ years in a leadership role within research or IT disciplines Experience leading cross-functional teams, driving strategic initiatives. Experience managing multiple projects with varying timelines, stakeholders, and information streams simultaneously. Preferred Qualifications: Education: Master's degree in information technology, computer science, or other scientific field ITIL, PMP, Security+, CISA, SSCP, CISSP, CISM, CRISC or other relevant certifications Work Experience: 3+ years in an academic research environment Proven track record of deploying various types of research technologies in a secure, compliant fashion. Experience with relevant regulations and standards (e.g., NIST 800-53 & 171, HIPAA, NSPM-33) Research laboratory experience including primary data collection, analysis, sharing and dissemination including high performance computing across a variety of technology platforms. Experience using with research methodologies, data analysis tools, and laboratory information management systems (LIMS) Skills: Problem solving and organizational skills. Interpersonal and communication skills. Time and project management skills. Required Documents: Resume/CV Cover Letter If selected as a final candidate for this position, you may be required to complete the Association of American of Universities Representations and Warranties document and sign a release of records that will allow the University of Kansas Medical Center to conduct a further background check with former employers. A copy of the Representations and Warranties document can be found here. Comprehensive Benefits Package: Coverage begins on day one for health, dental, and vision insurance and includes health expense accounts with generous employer contributions if the employee participates in a qualifying health plan. Employer-paid life insurance, long-term disability insurance, and various additional voluntary insurance plans are available. Paid time off, including vacation and sick, begins accruing upon hire, plus ten paid holidays. One paid discretionary day is available after six months of employment, and paid time off for bereavement, jury duty, military service, and parental leave is available after 12 months of employment. A retirement program with a generous employer contribution and additional voluntary retirement programs (457 or 403b) are available. ************************************************** Employee Type: RegularTime Type: Full time Rate Type: Salary Compensation Statement: The pay range listed for this position is determined by our compensation program using market data and salary benchmarking. A combination of factors is considered in making compensation decisions including, but not limited to, education, experience and training, qualifications relative to the requirements of the position, and funding. At the University of Kansas Medical Center, a reasonable estimate for the starting pay range will be the minimum to midpoint of the posted range, taking into account the combination of factors listed above. Pay Range:$96,000.00 - $152,000.00 Minimum $96,000.00 Midpoint $124,000.00 Maximum $152,000.00
    $96k-152k yearly 12d ago
  • Sr. SQL Engineer Secure Release II

    Contact Government Services

    Security Architect Job 31 miles from Excelsior Springs

    Employment Type: Full Time, Senior-level Department: Information Technology CGS is seeking a Sr. SQL Engineer Secure Release to join our team supporting a wide-ranging technical support initiative for a large Federal agency. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities. Skills and attributes for success: * Web Development on the Microsoft.NET technology with experience in at least one JavaScript UI framework. * Very Strong Relational Database technologies such as Microsoft SQL server. * Data Warehousing using SQL Server Integration Services (SSIS), including significant experience with Extract, Transform, and Load (ETL) operations. Qualifications: * Microsoft SQL Server Integration Services (SSIS), MySQL, Oracle, Nuix, Relativity. * At least 7 years of professional software development experience. * At least 7 years of web development experience, preferably on a Microsoft development stack. * At least 7 years of experience with development against enterprise-grade RDBMS platforms such as MS SQL Server, Oracle, MySQL, etc. and the ability to write complex database queries. * Must be eligible to obtain US government security clearance. * A bachelor's degree. Ideally, you will also have: * Experience with eDiscovery tools such as Relativity, IPRO, NUIX, LAW, etc. * Domain experience with eDiscovery, FOIA Processing, Litigation Support, or Federal Government. Our Commitment: Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems. For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work. Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come. We care about our employees. Therefore, we offer a comprehensive benefits package. * Health, Dental, and Vision * Life Insurance * 401k * Flexible Spending Account (Health, Dependent Care, and Commuter) * Paid Time Off and Observance of State/Federal Holidays Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Join our team and become part of government innovation! Explore additional job opportunities with CGS on our Job Board: ************************************* For more information about CGS please visit: ************************** or contact: Email: ******************* $149,760 - $216,320 a year
    $149.8k-216.3k yearly Easy Apply 60d+ ago
  • Manager of Information Security

    Polsinelli 4.8company rating

    Security Architect Job 23 miles from Excelsior Springs

    At Polsinelli, What a Law firm Should Be , is not just our tagline, it is what we live every day. We strive to create an environment where our team members are encouraged to bring their creativity and professional passions into the workplace so they can thrive. Are you a people person who has a keen eye for detail, thrives in a professional environment and wants to be part of a dynamic team? We have the perfect role for an engaging professional like you! Polsinelli is seeking a Manager Information Security. Reporting to the Director of Security, this role can be hired as remote or hybrid, provided the candidate is in a state/jurisdiction wherein we practice. CORE RESPONSIBILITIES Takes a leadership role in training/mentoring junior members of the team. Takes a leadership role in helping the Firm maintain its ISO 27001 information security and ISO 27701 privacy certifications. Leads the Outside Counsel Guidelines, client security questionnaires processes and client audits. Performs the annual business impact assessment and business continuity planning. Assumes a leadership role in continuing to maintain our incident response readiness. Collects and documents evidence of compliance with applicable policies, procedures, and regulations. Maintains policies and procedures to ensure risks are identified and mitigated as the technology environment changes. Collaborates with key stakeholders to document technology processes and controls. Tests, reviews, analyzes, and recommends updates to controls in technology procedures. Evaluates security plans and procedures for technical and non-technical sufficiency. Facilitates external audits by collecting requested evidence, analyzing requirements, and coordinating overall response. Identifies improvements that will strengthen the efficiency and effectiveness of compliance initiatives. Maintains documentation of, and reports on, status of compliance activities. Analyzes business impact/exposure of emerging security threats, vulnerabilities and risks. Articulates the security agenda as a member of project teams. Participates in third-party risk assessment and management processes. Coordinates with IT staff as necessary to implement security procedures to mitigate risks. Monitors information security controls and processes for effectiveness. Documents and reviews information security requirements. Reviews and classifies security events in accordance with established procedures. Assumes additional information security responsibilities as assigned. Manages the Third-Party Risk Management Program. Develop documentation for standard operating procedures. Knowledge of security frameworks like: CSF, ISO, MITRE and NIST. Experience with establishing a zero-trust environment. Data Protection and Data Privacy Assists with the development of data protection and data privacy policies and procedures. Assists management and attorneys in identifying and containing risks relating to data protection and data privacy. Assists management with responses to partner requests and other internal and external requests relating to data protection and data privacy. Data and Records Lifecycle Management Researches and assists with the implementation of new and existing records retention periods. Proposes new and improved workflows for client and administrative records retention review. Ensures proper information security controls are in place for client and firm data. Maintains current and accurate recordkeeping of user and management requests and approvals, and business justifications for approved user exceptions. Perform access/identity audits Experience Experience with the following technologies is expected: Azure/AD Beyond Trust Cloud storage solutions CrowdStrike Intapp Terms Microsoft Mimecast SCCM Lansweeper Tenable Certifications Any of the following certifications would be plus: CISSP, CISM, CISA, Security+ Technical and Skill Requirements: Excellent communication, collaboration, and customer service skills Excellent time management and organization skills Motivated by curiosity, ingenuity, and a desire to learn and grow. At least 5 - 10 years of experience in Information Security Polsinelli PC is an Equal Opportunity Employer, and all qualified applicants will receive consideration for employment without regard to gender identity and expression, race, color, religion, sex, national origin, sexual orientation, age, disability, ancestry, marital status, military or veteran status, or any other characteristic protected by law. The budgeted salary range for this position is $135,000 - $165,000. As part of full-time employment associated with this position, Polsinelli PC offers the following benefits: Paid time off, sick time off, a referral program, medical insurance and benefits, dental insurance, vision insurance, life insurance, AD&D insurance, ID Theft insurance, long-term disability benefits, short-term disability benefits, Parking/Transit reimbursement (varies depending on location), 401(k) benefits, and employee assistance benefits.
    $135k-165k yearly 58d ago
  • Project Based - Cloud Security Engineer- Global Technology Strategy Team

    Slalom 4.6company rating

    Security Architect Job 23 miles from Excelsior Springs

    Job Title: Project Employee Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. Our Global Technology Strategy Team is seeking a project based cloud security engineer for a 12-month project with a client. This role can be based within any one of our locations in the US. In this role you will be responsible for designing, implementing, and managing robust security measures for our cloud-based systems. You will work closely with cross-functional teams to ensure the confidentiality, integrity, and availability of our cloud environments. Your expertise will be pivotal in identifying and mitigating security risks, enabling our organization to operate securely in the cloud. What You'll Do * Analyze and review cloud architecture diagrams to identify potential security vulnerabilities and ensure secure design practices. * Perform threat modeling to anticipate and mitigate potential security threats to our cloud systems. * Execute static code reviews, both automated and manual, to identify and address security vulnerabilities in the codebase. * Assess the privacy readiness plan to ensure compliance with data protection regulations and best practices. * Evaluate the incident response plan to ensure effective handling and mitigation of security incidents. * Offer expert guidance and coaching on each logged remediation effort, and monitor progress to ensure timely resolution. * Lead organized, structured, and proactive communication efforts, providing status updates upwards and towards the owning developer(s) to ensure alignment and transparency. * Collaborate with DevOps, engineering, and other cross-functional teams to integrate security tools and practices into workflows. What You'll Bring * Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience. * Proven experience as a Cloud Security Engineer or in a similar role with hands-on experience securing cloud environments. * Strong knowledge of cloud platforms such as AWS, Azure, or Google Cloud Platform, and their security offerings. * Experience with security frameworks and standards such as NIST, ISO 27001, or CIS. * Proficiency in scripting languages (e.g., Python, Bash) for automation and security tool integration. * Familiarity with security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection. * Excellent problem-solving skills and the ability to work independently and collaboratively. * Familiarity with NIST, ITAR, CUI and Privacy data and related obligations, cyber architecture solutions / approaches About Us Slalom is a purpose-led, global business and technology consulting company. From strategy to implementation, our approach is fiercely human. In six countries and 43 markets, we deeply understand our customers-and their customers-to deliver practical, end-to-end solutions that drive meaningful impact. Backed by close partnerships with over 400 leading technology providers, our 13,000+ strong team helps people and organizations dream bigger, move faster, and build better tomorrows for all. We're honored to be consistently recognized as a great place to work, including being one of Fortune's 100 Best Companies to Work For seven years running. Learn more at slalom.com. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this position, the hourly rate is $100-115/hr. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. We will accept applications on an ongoing basis until January 17th, 2025.
    $100-115 hourly 21d ago
  • IT Security Engineer

    State of Kansas

    Security Architect Job 33 miles from Excelsior Springs

    Job Posting Important Recruitment Information for this vacancy Kansas Bureau of Investigation The Kansas Bureau of Investigation is the premier criminal investigative agency in the state of Kansas. The KBI is committed to its critical mission of preventing crime and enhancing public safety in Kansas. We employ individuals who exemplify the highest standards of integrity, service, and dedication. Come feel like you're part of something bigger at the KBI. E-Verify: The Kansas Bureau of Investigation (KBI) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here. Kansas Bureau of Investigation About the Position: * Who can apply: Anyone (External) * Classified/Unclassified Service: Unclassified * Full/Part-time: Full-Time * Regular/Temporary: Regular * Work Schedule: M-F 8am-5pm * Eligible to Receive Benefits: Yes * Veterans' Preference Eligible: Yes * Search Keywords: KBI, Topeka, IT Security Compensation: * Hourly Pay Range: $43.44-$54.30 Note: Salary can vary depending upon education, experience, or qualifications. Employment Benefits: * Comprehensive medical, mental, dental, vision, and additional coverage * Sick & Vacation leave * Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave * Paid State Holidays * Fitness Centers in select locations * Employee discounts with the STAR Program * Retirement and deferred compensation programs Visit the Employee Benefits page for more information… Position Summary & Responsibilities: Position Summary: The KBI is accepting applications to fill an IT Security Engineer position. This position supports both the KBI and the Kansas Criminal Justice Information System (KCJIS). The IT Security Engineer plays a pivotal role in developing, implementing, and maintaining the organization's information security and networking systems. Collaborating closely with the IT Security Architect and other cross-functional teams, the ITSE ensures the confidentiality, integrity, and availability of KBI and KCJIS assets through the deployment and maintenance of security and network technologies. The regular work schedule for this position is Monday thru Friday - 8:00 AM to 5:00 PM. However, this position may be required to work hours outside of the regular working schedule and be on a rotational on-call schedule as necessary. Job Responsibilities may include but are not limited to the following: * Implement and maintain information security and networking solutions for the KBI and KCJIS. * Assist in the implementation and maintenance of information security and networking standards, procedures, and guidelines. * Collaborate with other departments and units to integrate security and network controls into systems and processes. * Ensure compliance with applicable policies and governance requirements (ex. SoK ITEC, KCJIS). * Monitor security controls, systems, and networks for potential security incidents and take appropriate action to respond to and mitigate threats. Analyze log files to identify possible threats to organizational information systems. * Support the implementation and management of security and network technologies, including firewalls, intrusion detection/prevention systems, endpoint protection, encryption, logging, identity and access management solutions, switches, routers, and wireless networks. * Stay current with emerging threats, vulnerabilities, security, and networking technologies through continuous learning. * Contribute to the development and maintenance of security documentation and procedures. * Provide technical support and guidance to internal and external stakeholders on security-related matters. * Perform other duties as assigned. Qualifications: Minimum Qualifications * Associate's or Bachelor's degree from an accredited college or university, (preferably in computer science, information security, or related field). * A minimum 5 years of information security work experience and at least one industry advanced cybersecurity certification in good standing (e.g., CISSP or CISM). * Relevant experience should include all of the following: * At least 3 years of Check Point and/or Palo Alto firewall administration. * Security log/event analysis and incident response (preferably Splunk). * Systems security and administration of Windows and/or Linux server operating systems. * Configuring, tuning, and managing security systems and controls, such as: VPNs, IDS/IPS, endpoint security, content filters, email security, vulnerability management systems, and mobile device management systems. * Configuring, tuning, and managing network systems and controls, such as: routers, switches, and wireless LANs. * Extensive computer, network, and security troubleshooting experience. * Mastery of core security concepts. * Strong communication, teamwork, leadership, and problem-solving skills. * Ability to research, interpret, and understand advanced technical information. * Basic understanding of project management concepts and principles. Preferred Qualifications * Additional industry standard certifications such as: Network+, Security+, SSCP, CCNA, CCNP, CCSA/CCSE/CCSM, or similar. * Experience with cloud security (e.g., Azure or AWS). * Experience with implementing or administering Microsoft 365. * Experience with VMware virtual infrastructure (ESXi, vSphere/vCenter). * Experience with federated authentication technologies, such as SAML and OAuth/OIDC. * Experience with penetration testing. Post-Offer, Pre-employment Requirements * As a condition of employment, you will be subject to a pre-employment process to include a polygraph examination, fingerprint based records check, and comprehensive background investigation, including reference check of past and present employers. The pre-employment process will be waived for current KBI personnel who have previously completed the screening requirements Recruiter Contact Information: * Name: Luci Zieman * Email: ************************* * Phone: ************ * Mailing Address: 1620 SW Tyler; Topeka, KS 66612 Required documents for this application to be complete: * On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed. * Tax Clearance Certificate, valid * Transcripts * DD214 (if you are claiming Veteran's Preference) * Inside your Job Application upload these documents: * Resume (or choose existing if you have one) * Cover Letter Kansas Tax Clearance Certificate Required: Each applicant (even non-residents) applying for a State of Kansas job vacancy must obtain a valid Kansas Certificate of Tax Clearance by accessing the Kansas Department of Revenue's website. A Tax Clearance is a comprehensive tax account review to determine and ensure that an individual's account is compliant with all primary Kansas Tax Laws. A Tax Clearance expires every 90 days. All applicants, including current state employees, are responsible for submitting a valid certificate with all other application materials to the hiring agency. This is in accordance with Executive Order 2004-03. If you need assistance with the tax clearance, please contact ************. Visit the Tax Clearance site for more information and where to obtain this Kansas Department of Revenue document. Job Application Process * Sign in to your existing account or Register for a new one to apply. * Complete or review your contact information on the My Contact Information page. * Upload documents listed in the Required Documents section of the job posting to the appropriate location. * Check your email and My Job Notifications for written communications from the Recruiter. * Email - sent to the preferred email listed on the My Contact Information page * Notifications - view the Careers - My Job Notifications page To assist in completing your application, please see helpful links below: * Instructions: * Job Search * Registration & User Account * Application * Frequently Asked Questions How to Claim Veterans Preference * Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager. Learn more about claiming Veteran's Preference How to Claim Disability Hiring Preference Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager. Learn more about claiming Disability Hiring Preference PLEASE NOTE: The documentation verifying a person's eligibility for use of this preference should not be sent along with other application materials to the hiring agency but should be sent directly to OPS. These documents should be sent either by fax to *************, or scanned and emailed to *************************, or can be mailed/delivered in person to: ATTN: Disability Hiring Preference Coordinator Office of Personnel Services Landon State Office Building 900 SW Jackson, Rm 401 Topeka, KS 66612 Equal Employment Opportunity The State of Kansas is an Equal Opportunity Employer. We value diversity, equity, and inclusion as essential elements that create and foster a welcoming workplace. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability or any other factor unrelated to the essential functions of the job. If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the recruiter.
    $43.4-54.3 hourly 9d ago
  • Cloud Security Engineer

    Epiq Systems 4.8company rating

    Security Architect Job 40 miles from Excelsior Springs

    Epiq's cloud journey has brought us some exciting new products and technologies. To keep pace, our cybersecurity team is looking to add additional cloud security expertise to our team. The cloud security engineer will report to our Director of Business Information Security (BISO) and be responsible for helping develop and implement security standards across our Azure and AWS environments. The ideal person for this role will have strong background in native technologies in AWS and or Azure. In particular, this role will need to understand cloud configuration management processes and tools and how those integrate into a mature DevSecOps pipeline. Job Responsibilities Work collaboratively with the Cloud Steering Committee to recommend, understand, and implement security standards and configurations in Epiq's Cloud Environment Provide support to software development and IT infrastructure teams in implementing security controls across cloud environments that achieve the requirements set forth in Epiq's cloud security policies and standards Assess the efficacy of current security controls and identify improvements that will add additional security capability, cost savings, and/or automation efficiency. Consult with software developers on design strategies and approaches to common security controls within their cloud applications. Report back to cybersecurity leadership on challenges, obstacles, and needs across the cloud environment where the cybersecurity program can be adapted to provide greater support and coverage. Track and report metrics to measure the success of cloud security initiatives Support efforts of the Cloud Security Posture Management program to identify, assess, and report on security controls implementation across critical cloud assets Job Requirements 5+ years of experience working in a corporate cloud infrastructure environments Proven mastery of native technologies in Azure or AWS (ideally but preference given to AWS skillsets). Understanding of Secure Cloud practices in hybrid environments using traditional and cloud native technologies Proven ability to adapt and apply existing cloud technology experience to understand and build competence in new or unfamiliar technologies. Knowledge of common cloud security frameworks and guidance such as the NIST 800-144, 800-210, OWASP Cloud-Native Application Top 10, etc. Demonstrated ability to build collaboration and credibility with resources across the organization who have different or potentially conflicting goals and priorities Demonstrated ability to define and report against critical metrics and key performance indicators Demonstrated ability to communicate, present and influence credibly and effectively to peers and members of the leadership team Demonstrated ability to provide technical leadership and effectively explain deeply technical concepts to individuals without background in those knowledge areas #LI-TP1 Candidates based in California, Colorado, Hawaii, New York, Vermont, Washington or Washington, DC: The Compensation range for this role is 91,922.40 - 183,844.80 USD annually and may be eligible for an annual bonus. Actual compensation within that range will be dependent upon the individual's location, skills, experience and qualifications. Click here to learn about Epiq's Benefits. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us! It is Epiq's policy to comply with all applicable equal employment opportunity laws by making all employment decisions without unlawful regard or consideration of any individual's race, religion, ethnicity, color, sex, sexual orientation, gender identity or expressions, transgender status, sexual and other reproductive health decisions, marital status, age, national origin, genetic information, ancestry, citizenship, physical or mental disability, veteran or family status or any other basis protected by applicable national, federal, state, provincial or local law. Epiq's policy prohibits unlawful discrimination based on any of these impermissible bases, as well as any bases or grounds protected by applicable law in each jurisdiction. In addition Epiq will take affirmative action for minorities, women, covered veterans and individuals with disabilities. If you need assistance or an accommodation during the application process because of a disability, it is available upon request. Epiq is pleased to provide such assistance and no applicant will be penalized as a result of such a request. Pursuant to relevant law, where applicable, Epiq will consider for employment qualified applicants with arrest and conviction records.
    $78k-108k yearly est. 2d ago
  • Senior Security Engineer

    Jedunn 4.6company rating

    Security Architect Job 23 miles from Excelsior Springs

    Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years. Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection. Role Summary The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn. * Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor. * Career Path: Security Architect Key Role Responsibilities - Core KEY ROLE RESPONSIBILITIES SECURITY ENGINEER FAMILY - CORE * Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices. * Mentors team members on technical and security methodology characteristics. * Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness. * Acts as primary technical resource for design and implementation projects. * Drafts and recommends operating procedures and changes to information security practices and solutions. * Trains and engages operations and support personnel on security solutions. * Advise on trends, threats, and emerging security risks, relevant to the organization. * Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements. * May be a subject matter expert for a variety of security related systems or applications. * Communicates with operational groups for collaboration of security program management. * Advocates secure culture and provides education throughout the appropriate client group. * Improves maturity capability of processes, procedures, and operations of the security program. * Communicates intelligence and program effectiveness reports to supervision. Key Role Responsibilities - Additional Core SENIOR SECURITY ENGINEER In addition, this position will be responsible for the following: * Designs and implements security solutions for various platforms * Conducts comprehensive security assessments and audits to determine the effectiveness of security controls * Assists operations as needed in incident response and contribute to post-incident analysis * Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements * Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level * Implements and maintains access control system for any type of new enhancement opportunities * Collaborates with development teams to ensure secure software development practices * Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working * Designs and implements robust security ensuring alignment with industry best practices and organization configurations * Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration * May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks * Builds security automation scripts and tools to streamline security operations and improve efficiency * Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle * Plays an active role in contributing ideas for security innovations * Assists in the design and execution of incident response as it pertains to security engineering * Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program * Implements security technologies with full understanding on accountability and ownership for full deployment Knowledge, Skills & Abilities * * Ability to perform work accurately and completely, and in a timely manner * Communication skills, verbal and written - Intermediate * Ability to lead technical projects once assigned * Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX * Ability to solve technical issues - Advanced * Demonstrated expert knowledge of information security practices * Substantial knowledge of Python and Powershell scripting languages * Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers * Proficient with multiple cloud platforms * Technical writing and documentation skills * Organizational skills * Ability to quickly and effectively solve complex problems * Ability to deliver quality through attention to detail * Ability to work in team and independently * Ability to work a flexible schedule - might be on call in the evenings and weekends * Ability to build relationships and collaborate within a team, internally and externally Education * * Bachelor's degree in information security or related field (Preferred) * In lieu of the above requirements, equivalent relevant experience will be considered Experience * 5+ Years information security experience (Preferred) Working Environment * Must be able to lift up to 25 pounds * May require periods of overnight travel * Normal office environment * Frequent activity: Sitting, Viewing Computer Screen * Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling Benefits Information The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details. Click here for benefits details. JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace. JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to accommodations@jedunn.com JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails. Why People Work Here At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them Building on our rich history, our employee owners are shaping the future of JE Dunn. In our team-focused environment we do life together and are generously rewarded for our efforts About JE Dunn For more information on who we are, click here. EEO NOTICES Know Your Rights: Workplace Discrimination is Illegal Pay Transparency California Privacy Policy E-Verify JE Dunn participates in the Electronic Employment Eligibility Verification Program. E-Verify Participation (English and Spanish) Right to Work (English) Right to Work (Spanish)
    $74k-96k yearly est. 9d ago
  • Security Engineer

    CGI Group Inc. 4.5company rating

    Security Architect Job 40 miles from Excelsior Springs

    We are seeking a Security Engineer who has experience administering Qualys and Splunk SIEM services, and experience with NIST Security Standards especially 800-53, and OWASP to join our team. This is a full-time career opportunity to work on a highly visible transformation (Infrastructure services) projects for one of our long-standing government clients! This role applies deep technical expertise to the design, implementation, testing, and ongoing support of AWS services. This position can be located remotely anywhere in the US; however, the preferred locations are one of our Onshore Delivery Centers: Troy, AL; Lafayette, LA; Wausau, WI; Knoxville, TN; Mobile, AL; Belton, TX; or Lebanon, VA. This role is to be completed in a hybrid capacity. CGI anticipates accepting applications for this position through March 21, 2025. How we're transforming Government We use technical expertise and secure solutions to help government reinvent the ways of working to improve citizen services and increase efficiency. Our work helps civil entities provide services transparently and with fewer resources. Your future duties and responsibilities: How you'll make an impact * Responsible for all aspects of security engineering and DevSecOps in the AWS environment * Acts as a subject matter expert (SME) for security tools, applications, and processes, including Qualys and Splunk SIEM * Implements security architectures for cloud/hybrid solutions * Serves as technical lead for security administration activities, both performing hands-on security administration and guiding other team members in the execution of security administration and related tasks * Works with peers to review and analyze security tool reports and establish remediation plans * Serves as technical lead for security incident remediation activities * Works with Information Security Officer to design security solutions in support of policy and operational requirements * Thoroughly documents implementations, via technical documentation, diagrams, and run-books * Serves as a member of the Security Incident Response Team to address issues across development, testing, and production environments in both on-premise and cloud environments * Works with Infrastructure Architects on issues related to security design and architecture, and assists with proof-of-concept design and testing * Supports the development of change requests, white papers, and proposals with security service components * Works with peers within and beyond the infrastructure team to define and characterize complex technology or process problems and develop & implement new solutions Required qualifications to be successful in this role: What you'll bring * 5 plus years of experience in security engineering * Experience administering Qualys and Splunk SIEM services, as well as other security technologies. * Experience with NIST Security Standards especially 800-53, and OWASP * Understanding of secure-cloud configuration, cloud-security technologies (VPC, CloudTrail, AWS Config, CloudChekr, Security Groups, etc.), and cloud-permission systems (IAM) * Ability to exercise independent judgment in driving technical problems to resolution * Ability to work across organizations (CGI, Client, Partners, Vendors) to drive issues to resolution * Strong written, verbal, and interpersonal communication skills * Ability to communicate complex technical information to less technical staff (e.g. CGI management and client staff) * Strong understanding of broader technology context (e.g. cloud services, server, and storage technologies) DESIRED QUALIFICATIONS/NON-ESSENTIAL SKILLS: * Bachelor's degree in Information Science / Information Technology, Data Science, Computer Science, or a related field OR equivalent experience in a technical position OR equivalent military experience * Ability to mentor other team members in areas of technical expertise * Experience working in an outsourced/managed services environment with some client-facing responsibilities (e.g. technical discussions with the client) #LI-SG2 #CSG-TMC-F25 "CGI is required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and certifications. To support the ability to reward for merit-based performance, CGI typically does not hire individuals at or near the top of the range for their role. Compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range for this role in the U.S. is $88,200 - $154,300." At CGI we call our professionals " CGI Partners" to reinforce that all who join our team are, as owners, empowered to participate in the challenges and rewards that come from building a world-class company. CGI's benefits include: Competitive base salaries Eligibility to participate in an attractive Share Purchase Plan (SPP) in which the company matches dollar-for-dollar contributions made by eligible employees, up to a maximum, for their job category 401(k) Plan and Profit Participation for eligible CGI Partners Generous holidays, vacation, and sick leave plans Comprehensive insurance plans that include, among other benefits, medical, dental, vision, life, disability, out-of-county emergency coverage in all countries of employment; Back-up child care, Pet insurance, a CGI Partner Assistance Program, a 529 college savings program, a personal financial management tool, lifestyle management programs and more CGI's benefits are offered to eligible professionals on their first day of employment to include: * Competitive compensation * Comprehensive insurance options * Matching contributions through the 401(k) plan and the share purchase plan * Paid time off for vacation, holidays, and sick time * Paid parental leave * Learning opportunities and tuition assistance * Wellness and Well-being programs For more detailed information about our benefits offerings visit Benefits | CGI Careers Please note that the benefits listed above are subject to change based on the specific terms and conditions of the contract being supported. Skills: * Network Security * Splunk What you can expect from us: Together, as owners, let's turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you'll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That's why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company's strategy and direction. Your work creates value. You'll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You'll shape your career by joining a company built to grow and last. You'll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team-one of the largest IT and business consulting services firms in the world. Qualified applicants will receive consideration for employment without regard to their race, ethnicity, ancestry, color, sex, religion, creed, age, national origin, citizenship status, disability, pregnancy, medical condition, military and veteran status, marital status, sexual orientation or perceived sexual orientation, gender, gender identity, and gender expression, familial status or responsibilities, reproductive health decisions, political affiliation, genetic information, height, weight, or any other legally protected status or characteristics. CGI provides reasonable accommodations to qualified individuals with disabilities. If you need an accommodation to apply for a job in the U.S., please email the CGI U.S. Employment Compliance mailbox at US_Employment_******************. You will need to reference the Position ID of the position in which you are interested. Your message will be routed to the appropriate recruiter who will assist you. Please note, this email address is only to be used for those individuals who need an accommodation to apply for a job. Emails for any other reason or those that do not include a Position ID will not be returned. We make it easy to translate military experience and skills! Click here to be directed to our site that is dedicated to veterans and transitioning service members. All CGI offers of employment in the U.S. are contingent upon the ability to successfully complete a background investigation. Background investigation components can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security clearance requirements, and in accordance with applicable laws, some background investigations may include a credit check. CGI will consider for employment qualified applicants with arrests and conviction records in accordance with all local regulations and ordinances. CGI will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with CGI's legal duty to furnish information.
    $88.2k-154.3k yearly 4d ago
  • Information Security Analyst II

    Clinical Reference Laboratory, Inc. 4.2company rating

    Security Architect Job 38 miles from Excelsior Springs

    GENERAL STATEMENT OF RESPONSIBILITY: Support the confidentiality, integrity, and availability of information under CRL's control by developing, documenting, assessing, and executing security controls in partnership with system and network administrators under the standards set in CRL's Corporate Compliance program. Essential Functions: * Responsible for access management administration and support of multiple complex computer applications, directories and domains that encompass user lifecycle management (onboarding, transfers, offboarding, access reviews) and access to IT resources. * Remote access management, administration and configuration. * Train new hires and seasoned employees on security best practices, policies and procedures. * Configure and administer Privileged User Management system. * Promote awareness of applicable security standards, policy, and best practices across the enterprise. * Use a teaching/education approach to help users understand their risks and better protect information and systems. * Maintain relationship with badge access vendor, manage door access for employees and maintain systems to support campus access; including data center access. * Perform security assessments and vendor audits and complete documentation necessary to validate compliance with security requirements. * Use systems to monitor password compliance and address concerns when identified. Review and take appropriate action on EDR detections and incidents. * Analyze Microsoft Azure and M365 security and compliance findings and perform resolution planning. * Assist in User Behavior Analytics and File System Integrity monitoring and provide determinations of risk and steps to improve user and file security. * Analyze Application Vulnerabilities and perform resolution planning. * Utilize Environment Vulnerability System for analysis of new and existing vulnerabilities, compliance findings and perform resolution planning. * Perform DLP Analysis and provide recommendations for policy changes. * Assist with communication, implementation, and analysis of compliance to security policies, standards, and procedures. * Incident Response and event management, including Incident remediation, lessons learned, and process improvement. * Develop and run tabletop exercises to promote readiness of incident response. * Internal customer service related to access requests, troubleshooting, and problem resolution. * Administer and maintain Emergency Notification System. * Continuously improve skills and remain current on job-specific technical knowledge, and department projects through research, training courses, workshops, and other available training resources. * Maintain and protect the confidentiality of all CRL, CRL subsidiaries, legal entities and client information. * Be able to comply with all applicable federal, state, and local safety and health regulations that would apply to this job. * Keep work area neat and clean. Other duties as assigned. Job Qualifications: Education: Bachelor's Degree in Information Systems, Computer Science, Information Security or a related technical discipline, or the equivalent combination of education, professional training or work experience. Experience: * 3 years of IT security or information security experience with ability to engage with internal customers and management. Skills & Abilities: * Knowledge of regulatory/legal compliance procedures, industry best practices and frameworks related to HIPAA. * Experience with antivirus, detection and response systems. * Exposure to Microsoft Azure and M365 Security and Compliance. * Experience working with vulnerability monitoring platforms and understanding environment security and stability risks when proposing resolutions. * Experience with Application vulnerability monitoring. * Understanding of DLP systems and policies. * Strong work ethic, problem solving skills, customer service orientation, and proven dependability. * Good communication skills; well-developed interpersonal skills, teamwork, and collaboration attributes. * Creative problem-solving, analytical, and organizational skills. * Self-motivation and ability to successfully complete projects and provide support with little supervision. * Assist in drafting and revising deliverables including reports, correspondence, presentations, policies, and procedures. * Excellent writing and editing skills with the ability to construct well-founded, clear, and concise analyses and recommendations. * Strong attention to detail and analytical skills. * Ability to interpret complex information, solve problems, and manage multiple tasks. * Ability to be at work and on time * Ability and judgment to interact and communicate appropriately with other employees, clients and management PHYSICAL REQUIREMENTS: The physical demands described here are representative of those that must be met to successfully perform the essential functions of this job. Reasonable accommodations may be available to enable qualified individuals with disabilities to perform the essential functions. The following physical attributes are required for this position: * Sitting for extended lengths of time * Close vision requirements due to computer work * Repetitive use of hands, fingers, wrists, and elbows for operating a computer and telephone * Light lifting, up to 10 pounds EQUIPMENT: Personal computers, midrange systems, and communications equipment. OTHER: Overtime and weekend work as necessary according to workload and/or projects; occasional travel is required; this is an "on-call" position requiring the use of wireless phone for after-hours contact. The employer shall, in its discretion, modify or adjust this position to meet the company's changing needs. This job description is not a contract and may be adjusted as deemed appropriate in the employer's sole discretion. * denotes essential job function An Equal Opportunity Employer Pay Range: $55,000 - $120,000 Benefits for Full Time Employees: * Medical, Dental, Vision * Life/AD&D * Supplemental Life/AD&D * Section 125 FSA Plan * 401(k) * Short and Long-Term Disability * Paid Time Off * Holidays * Tuition Reimbursement
    $55k-120k yearly 35d ago
  • Information Security Analyst II

    Form Fox

    Security Architect Job 38 miles from Excelsior Springs

    GENERAL STATEMENT OF RESPONSIBILITY: Support the confidentiality, integrity, and availability of information under CRL's control by developing, documenting, assessing, and executing security controls in partnership with system and network administrators under the standards set in CRL's Corporate Compliance program. Essential Functions: * Responsible for access management administration and support of multiple complex computer applications, directories and domains that encompass user lifecycle management (onboarding, transfers, offboarding, access reviews) and access to IT resources. * Remote access management, administration and configuration. * Train new hires and seasoned employees on security best practices, policies and procedures. * Configure and administer Privileged User Management system. * Promote awareness of applicable security standards, policy, and best practices across the enterprise. * Use a teaching/education approach to help users understand their risks and better protect information and systems. * Maintain relationship with badge access vendor, manage door access for employees and maintain systems to support campus access; including data center access. * Perform security assessments and vendor audits and complete documentation necessary to validate compliance with security requirements. * Use systems to monitor password compliance and address concerns when identified. Review and take appropriate action on EDR detections and incidents. * Analyze Microsoft Azure and M365 security and compliance findings and perform resolution planning. * Assist in User Behavior Analytics and File System Integrity monitoring and provide determinations of risk and steps to improve user and file security. * Analyze Application Vulnerabilities and perform resolution planning. * Utilize Environment Vulnerability System for analysis of new and existing vulnerabilities, compliance findings and perform resolution planning. * Perform DLP Analysis and provide recommendations for policy changes. * Assist with communication, implementation, and analysis of compliance to security policies, standards, and procedures. * Incident Response and event management, including Incident remediation, lessons learned, and process improvement. * Develop and run tabletop exercises to promote readiness of incident response. * Internal customer service related to access requests, troubleshooting, and problem resolution. * Administer and maintain Emergency Notification System. * Continuously improve skills and remain current on job-specific technical knowledge, and department projects through research, training courses, workshops, and other available training resources. * Maintain and protect the confidentiality of all CRL, CRL subsidiaries, legal entities and client information. * Be able to comply with all applicable federal, state, and local safety and health regulations that would apply to this job. * Keep work area neat and clean. Other duties as assigned. Job Qualifications: Education: Bachelor's Degree in Information Systems, Computer Science, Information Security or a related technical discipline, or the equivalent combination of education, professional training or work experience. Experience: * 3 years of IT security or information security experience with ability to engage with internal customers and management. Skills & Abilities: * Knowledge of regulatory/legal compliance procedures, industry best practices and frameworks related to HIPAA. * Experience with antivirus, detection and response systems. * Exposure to Microsoft Azure and M365 Security and Compliance. * Experience working with vulnerability monitoring platforms and understanding environment security and stability risks when proposing resolutions. * Experience with Application vulnerability monitoring. * Understanding of DLP systems and policies. * Strong work ethic, problem solving skills, customer service orientation, and proven dependability. * Good communication skills; well-developed interpersonal skills, teamwork, and collaboration attributes. * Creative problem-solving, analytical, and organizational skills. * Self-motivation and ability to successfully complete projects and provide support with little supervision. * Assist in drafting and revising deliverables including reports, correspondence, presentations, policies, and procedures. * Excellent writing and editing skills with the ability to construct well-founded, clear, and concise analyses and recommendations. * Strong attention to detail and analytical skills. * Ability to interpret complex information, solve problems, and manage multiple tasks. * Ability to be at work and on time * Ability and judgment to interact and communicate appropriately with other employees, clients and management PHYSICAL REQUIREMENTS: The physical demands described here are representative of those that must be met to successfully perform the essential functions of this job. Reasonable accommodations may be available to enable qualified individuals with disabilities to perform the essential functions. The following physical attributes are required for this position: * Sitting for extended lengths of time * Close vision requirements due to computer work * Repetitive use of hands, fingers, wrists, and elbows for operating a computer and telephone * Light lifting, up to 10 pounds EQUIPMENT: Personal computers, midrange systems, and communications equipment. OTHER: Overtime and weekend work as necessary according to workload and/or projects; occasional travel is required; this is an "on-call" position requiring the use of wireless phone for after-hours contact. The employer shall, in its discretion, modify or adjust this position to meet the company's changing needs. This job description is not a contract and may be adjusted as deemed appropriate in the employer's sole discretion. * denotes essential job function An Equal Opportunity Employer Pay Range: $55,000 - $120,000 Benefits for Full Time Employees: * Medical, Dental, Vision * Life/AD&D * Supplemental Life/AD&D * Section 125 FSA Plan * 401(k) * Short and Long-Term Disability * Paid Time Off * Holidays * Tuition Reimbursement
    $55k-120k yearly 33d ago
  • Information Security Specialist - Flexible Hybrid (Chicago, IL, Lenexa, KS or London)

    Chicago Board Options Exchange

    Security Architect Job 38 miles from Excelsior Springs

    Building trusted markets - powered by our people. At Cboe, we inspire our people to solve complex challenges together because what we do matters. We provide the financial infrastructure that powers the global economy. As a leading provider of market infrastructure and tradable products, Cboe delivers cutting-edge trading, clearing and investment solutions to market participants around the world. We're building inclusive ways to support professional and personal development while strengthening the trust we've earned as a global market leader. Our teams are empowered to share ideas, actively pursue them and bring on a challenge. As champions of internal mobility and access to opportunity, we encourage our people to "go for it" and equip our managers with the training to coach their teams to the next level. Our Associate Resource Groups champion diversity, equity and inclusion, giving employees a safe space to network, share ideas and create opportunities. Sound like the place for you? Join us! The Global Cyber Governance Center is hiring for an Information Security Specialist. The Information Security Specialist at Cboe will focus on cyber risks management strategies across the organization. The position requires an individual with an IT and controls-related background, proficiency in security standards, deep understanding of cyber risk management, and the ability to recommend the implementation of robust security controls. The Information Security Specialist will play a critical role in safeguarding our digital assets and ensuring the integrity and security of our information systems. In addition, the Security Specialist will be responsible for assisting in the overall Security Governance efforts and may be required to assist with Internal Audit and external regulatory compliance remediation. Responsibilities * Conduct comprehensive risk assessments to identify potential threats and vulnerabilities in the organization's IT infrastructure, networks, and physical locations. * Evaluate the effectiveness of existing security measures and recommend improvements. * Utilize risk assessment methodologies and tools to evaluate security posture. * Collaborate with IT and other departments to implement effective security controls and measures. * Develop and maintain security policies, procedures, and guidelines according to industry best practices and regulatory requirements. * Develop comprehensive security strategies and plans to address identified risks, including preventive, detective, and corrective controls. * Conduct regular security controls testing to identify weaknesses in current security systems and procedures and recommend improvements. * Prepare and present regular reports on the organization's cyber risk posture to senior management. * Ensure compliance with relevant industry standards and regulations (e.g., DORA, CFTC, Reg-SCI, etc.). * Assist with regulatory exams by obtaining documentation, drafting responses to regulator inquiries, and helping develop security action plans. * Stay current with the latest cybersecurity trends, threats, and technologies, and provide recommendations for improvement. Qualifications * Bachelor's degree in Information Security, Cybersecurity, Computer Science, Assurance, or a related field. * Minimum of 5 years of experience in information security, assurance, or cyber risk management. * Professional certifications such as CISSP, CISM, CRISC, or equivalent is desirable * Strong knowledge of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, COBIT). * Experience in developing and implementing security policies, procedures, guidelines, and conducting risk assessments. * Working knowledge of security tools and technologies, such as SIEM, IDS/IPS, firewalls, cloud services and endpoint protection. * Strong analytical and problem-solving skills. * Exceptional communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Benefits and Perks We value the total wellbeing of our people - including health, financial, personal and social wellness. We believe standard benefits like health insurance and fair pay are a given at any organization. Still, you should know we offer: * Fair and competitive salary and incentive compensation packages with an upside for overachievement * Generous paid time off, including vacation, personal days, sick days and annual community service days * Flexible, hybrid work environment * Health, dental and vision benefits, including access to telemedicine and mental health services * 2:1 401(k) match, up to 8% match immediately upon hire * Discounted Employee Stock Purchase Plan * Tax Savings Accounts for health, dependent and transportation * Employee referral bonus program * Volunteer opportunities to help you give back to your communities Some of our employees' favorite benefits and perks include: * Complimentary lunch, snacks and coffee in any Cboe office * Paid Tuition assistance and education opportunities * Generous charitable giving company match * Paid parental leave and fertility benefits #LI-CP2 #LI-Hybrid More About Cboe We're reimagining the future of the workplace by focusing on what matters most, our people. Our journey is an inclusive one. We're investing deeply in leadership programs and career development initiatives that ensure everyone has an equal chance to succeed. We celebrate the diversity in our communities, inside and out, and welcome new perspectives with equity, inclusion and belonging. We work with purpose, solving problems with ingenuity, collaboration, and a lot of passion. We're an engaged and excited team connecting markets across borders and embracing growth in all its forms to achieve incredible outcomes. Learn more about life at Cboe on our website and LinkedIn. Equal Employment Opportunity We're proud to be an equal opportunity employer - and celebrate our employees' differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. Our pay ranges are determined by a number of factors, including, but not limited to, role, experience, level, and location. The national new hire base pay range for this job in the United States is $85,000-$105,000. This range represents the minimum and maximum base pay the company expects to offer for new hires working in the position full time. If you live in one of the following areas or if you work in a Cboe office in the following areas, the range may be higher according to the geographic differentials listed below: US Geographic Differentials: * 110%: Austin TX, Chicago IL, Denver CO, San Diego CA * 115%: Los Angeles CA, Seattle WA * 120%: Boston MA, Washington DC * 125%: New York City NY * 130%: San Francisco CA Within the range, individual pay is determined by a number of factors, including, but not limited to, work location, job-related skills, experience, and relevant education or training. In addition to base pay, our total rewards program includes an annual variable pay program and benefits including healthcare (medical, dental and vision), 401 (k) with a generous company match, life and disability insurance, paid time off, market-leading tuition assistance, and much more! Your recruiter will provide more details about the total compensation package, including variable pay and benefits, during the hiring process. For further information on our total rewards program, visit TOTAL REWARDS @CBOE. Any communication from Cboe regarding this position will only come from a Cboe recruiter who has *********** email or via LinkedIn Recruiter. Cboe does not use any other third party communication tools for recruiting purposes.
    $85k-105k yearly Easy Apply 48d ago
  • Information Security Architect

    Hallmark 4.4company rating

    Security Architect Job 23 miles from Excelsior Springs

    WHO WE ARE The Security Architecture Team links the Information Security divisional programs and processes to multiple architectural models or views that show how the current security needs of the organization will be met in an efficient, sustainable, agile, and adaptable manner. Various analysis disciplines are required within this role including, but not limited to, business, data, technology, application, and services. WHAT YOUR ROLE ENTAILS AND HOW YOU'LL CONTRIBUTE The Information Security Architect is responsible for designing, implementing, and managing the security infrastructure of an organization's IT systems. This role involves developing security standards and best practices, ensuring compliance with regulations, and actively protecting the organization's data and networks from security breaches. The ideal candidate will have a deep understanding of information security concepts, experience with security technologies, and the ability to think strategically about the evolving threat landscape. BASIC QUALIFICATIONS + Minimum of 5 years of experience in information security, network security, or a related field + Experience with Cloud computing technologies (Ex: EC2 virtual machines, Virtual Networks, Direct Connect, Firewalls, IAM) + Hands-on experience building multi-AZ/Region cloud environments + Network communications experience (TCP/IP, Routing, DNS) + Experience collaborating with, educating, and developing security architectures PREFERRED QUALIFICATIONS + Certifications: CISSP, CISM, GCP Associate/Professional, CCSK, OSCP + Knowledge of NIST Cyber Security Framework + CIS Security Framework + ISO 27001/27002 Framework + GDPR, HIPAA, PII, PCI + Knowledge of Cloud Governance + Ability to develop automation scripts + Cryptography knowledge of encryption algorithms, key management, and secure communication protocols + Conduct risk assessments, vulnerability analyses, and threat modeling + DLP - Data loss protection methods and technologies + Cyber Threat Intelligence with the collection, analysis, and dissemination of information about cyber threats and actors. + Security Engineering best practices + Privileged access Management technologies + Linux or UNIX-based operating systems, including command line interfaces + Enterprise security software vendor assessments + Hands-on-keyboard experience conducting penetration testing + Hands-on-keyboard experience conducting vulnerability scans + Coding skills including any of the following: C#, HTML, Shell, Python, PowerShell + Strong problem-solving and troubleshooting skills with experience exercising experienced judgment + Advanced administration skills for Windows and/or Unix systems + Strong understanding of Red Team, Blue Team and Purple Team testing + Strong understanding of threat vectors and Cyber-attack patterns + Familiarity with open source, custom or proprietary software + Detail oriented + Meticulous approach to identifying potential vulnerabilities and ensuring compliance ADDITIONAL DETAILS + This position is hybrid, working onsite at our headquarters in Kansas City, MO as needed. Some relocation assistance is available. Now's your chance to embrace a future with Hallmark-just follow the instructions below to apply. You must show how you meet the basic qualifications in a resume or document you upload, or by completing the work experience and education application fields. Accepted file types are DOCX and PDF. In compliance with the Immigration Reform and Control Act of 1986, Hallmark Cards, Inc. and its subsidiary companies will hire only individuals lawfully authorized to work in the United States. Hallmark does not generally provide sponsorship for employment. Employment by Hallmark is contingent upon the signing of the Employment Agreement, signing of an agreement to arbitrate in connection with the Hallmark Dispute Resolution Program, completing Form I-9 Employment Eligibility Verification, passing the urinalysis drug screen, education verification and satisfactory reference and background checks. Hallmark is an equal opportunity employer. All qualified applicants will be considered for employment without regard to race, color, religion, sex, age, pregnancy, national origin, physical or mental disability, genetics, sexual orientation, gender identity, veteran status, or any other legally-protected status. Principals only please. HALLMARK - Because Connecting With Each Other Has Never Been More Important For more than a century, Hallmark has been bringing people together and improving the relationships that matter most. That's why millions of people all over the world connect with the Hallmark brand (************************** . It has always been a mission so much bigger than any one of us who work here. Today, we need empathetic learners, strategic thinkers, and enthusiastic visionaries with diverse experiences and skills to help us create the rest of Hallmark's second century as we shift to a more digitally savvy, unified approach that combines the best of brick-and-mortar retail with the efficiency of dot-com spaces. Help us imagine what our next hundred years could look like! When you join Hallmark, we will go out of our way to make you feel like part of the team. In the day-to-day, we'll make the best use of the skills and talents you already have. We'll also give you leadership opportunities and show you multiple potential pathways to future success. Our culture (******************************************************** of care for our consumers and for one another shows in the way we embrace different backgrounds, identities, and working styles, deliberately seeking out ways to be more inclusive both internally among our work groups and externally through the things we make and sell to our retail partners and consumers. We believe that a broadly inclusive, equitable approach is also our best path to future success. We're seeking out those who can bring a fresh perspective to our business and would love your input as someone new to our team! We can only change and grow when we intentionally include new perspectives-like yours. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $96k-135k yearly est. 60d+ ago
  • SAP Platform Security Consultant

    Accenture 4.7company rating

    Security Architect Job 40 miles from Excelsior Springs

    We are a global collective of innovators applying the "New" every day to improve the way the world works and lives. Help us show the world what's possible as you partner with clients to unlock hidden value and deliver innovative solutions. Empowered with innovative tools, continuous learning, and a global community of diverse talent and perspectives, we drive success in a new business architecture that disrupts conventional practices. Our expertise spans 40+ industries across 120+ countries and impacts millions of lives every day. We turn ideas into reality. We Are: Platform Security professionals develop and deliver solutions - including the design and implementation of SAP application Security Roles, implementation of SAP Access and Process Control, Segregation of Duties Analysis Rules, Security Role Provisioning solutions, Security Analytics, Automated External Application Scanning, and Automated Source Code Analysis - that minimize the impact of internal and external manipulation of applications to access, steal, modify, or delete sensitive data. You Are: A Security and Risk professional developing and delivering solutions that protect SAP systems and data by establishing policies, practices, and tools that prevent unauthorized access, use, disclosure, modification, or disruption. SAP Platform Security professionals develop and deliver solutions - including design and implementation of SAP Security Roles, Segregation of Duties Analysis Rules, Security Role Provisioning solutions, Security Workflow, Business Process Controls, Security Analytics, Enterprise GRC Solutions, Automated External Application Scanning, and Automated Source Code Analysis. A professional at this position level within Accenture has the following responsibilities: + Adapts existing methods and procedures to create possible alternative solutions to moderately complex problems. + Understands the strategic direction set by senior management as it relates to team goals. + Uses considerable judgment to determine solutions and seeks guidance on complex problems. Primary upward interaction is with the direct supervisor. May interact with peers and/or management levels at a client and/or within Accenture. + Determines methods and procedures on new assignments with guidance. Decisions often impact the team in which they reside. + Manages small teams and/or work efforts (if in an individual contributor role) at a client or within Accenture. The Work (Role Responsibility): + Contribute to a strong client relationship through interactions with client personnel- + Understand engagements as they relate to client's business + Configure security and associated solutions in SAP S/4 to meet unique client security requirements + Demonstrate knowledge in some areas of industry or functional specialty + Communicate client expectations to the engagement team + Conduct security assessments + Assume responsibility for small components of engagements. May have a greater role in small engagements + Contribute to engagement planning and verify that deliverables meet contract and work plan objectives. + Deliver services that meet Accenture Project Manager specifications + Recognize and communicate opportunities to sell "add-on" work to client + Strong understanding of information security management principles, SAP application security implementation methodologies, role-based access controls, distributed systems administration, and distributed system recovery. + Demonstrate experience 1) independently completing complex security-related tasks (ex. An upgrade to S/4HANA); 2) making major contributions in assuring deliverables meet contract and work plan objectives and; 3) taking on tasks of increased complexity + Ability to take a broad view of the position and take initiative to communicate, interact, and cooperate with others to ensure that all aspects of a task are addressed + Ability to independently create written deliverables and participate in presentations + On-site, regular client travel will be required for this position Here's What You Need (Basic Qualifications): - Minimum 3 years of experience in SAP S/4 HANA, with a focus on implementation - Minimum 3 years of experience creating technical documentation - Minimum 3 years of experience with SAP Fiori and HANA DB security experience - Bachelor's degree or equivalent (minimum 12 years) work experience. (If Associate's Degree, must have minimum 6 years work experience) - Travel may be required for this role. The amount of travel will vary from 0 to 100% depending on business need and client requirements. Bonus Points If You Have (Preferred Skills): - Prior experience working in a consultant/advisory capacity. Big Four experience preferred - Knowledge of internal controls, with relation to SAP Security and SAP Access/Process Controls - Proven ability to work creatively and analytically in a problem-solving environment - Proven success in contributing to a team-oriented environment + Desire to work in an environment fostering teamwork and camaraderie + Excellent leadership, communication (written and oral), and interpersonal skills Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired in California, Colorado, District of Columbia, Illinois, Maryland, Minnesota, New York or Washington as set forth below.We accept applications on an on-going basis and there is no fixed deadline to apply. Information on benefits is here. (************************************************************ Role Location Annual Salary Range California $63,800 to $196,000 Colorado $63,800 to $169,300 District of Columbia $68,000 to $180,300 Illinois $59,100 to $169,300 Minnesota $63,800 to $169,300 Maryland $59,100 to $156,800 New York $59,100 to $196,000 Washington $68,000 to $180,300 #LI-NA What We Believe We have an unwavering commitment to diversity with the aim that every one of our people has a full sense of belonging within our organization. As a business imperative, every person at Accenture has the responsibility to create and sustain an inclusive environment. Inclusion and diversity are fundamental to our culture and core values. Our rich diversity makes us more innovative and more creative, which helps us better serve our clients and our communities. Read more here (*********************************************************************** Equal Employment Opportunity Statement Accenture is an Equal Opportunity Employer. We believe that no one should be discriminated against because of their differences, such as age, disability, ethnicity, gender, gender identity and expression, religion or sexual orientation. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Accenture is committed to providing veteran employment opportunities to our service men and women. For details, view a copy of the Accenture Equal Employment Opportunity and Affirmative Action Policy Statement (********************************************************************************************************************************************** . Requesting An Accommodation Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired. If you would like to be considered for employment opportunities with Accenture and have accommodation needs for a disability or religious observance, please call us toll free at ****************, send us an email (************************************************* or speak with your recruiter. Other Employment Statements Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States. Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration. Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
    $68k-180.3k yearly 18d ago

Learn More About Security Architect Jobs

How much does a Security Architect earn in Excelsior Springs, MO?

The average security architect in Excelsior Springs, MO earns between $78,000 and $160,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average Security Architect Salary In Excelsior Springs, MO

$112,000
Job type you want
Full Time
Part Time
Internship
Temporary