Post job

Security architect jobs in Greenfield, WI

- 31 jobs
All
Security Architect
Cyber Security Engineer
Senior Security Architect
Information Security Director
Information Security Analyst
Information Technology Security Manager
Senior Information Security Consultant
Security Engineer
Senior Security Engineer
Security System Engineer
Cyber Security Specialist
  • Senior Cyber Security Engineer - 4825

    Tier4 Group

    Security architect job in Milwaukee, WI

    About the Role Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale. Key Responsibilities Engineer Secure-by-Default E5 Data Protection Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams. Develop and maintain Sensitivity Label taxonomy with automated enforcement paths. Build Policy-as-Code Pipelines Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments. Integrate Security Telemetry Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection. Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios. Develop Automations & Guardrails Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners. Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.). Operate and Continuously Improve Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks. Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations. Collaborate Across Teams Partner with Privacy and Compliance for audit-ready controls and evidence processes. Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows. Provide technical leadership and mentorship for engineers and analysts implementing new E5 features. Required Qualifications 5+ years of experience in enterprise security or platform engineering. Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell. Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot. Preferred Qualifications Strong background in data protection for regulated data (PII/PHI) and insider-risk detection. Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches). Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies. Knowledge of HIPAA/PHI audit support and exception governance workflows. Success Metrics (First 6-12 Months) Improved DLP policy efficacy and reduced unauthorized data movement. Increased label coverage and accuracy for sensitive content. End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk. Secure-by-default adoption and Copilot controls baselined. Audit readiness with complete evidence and exception closure rates. Tools & Technologies Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
    $81k-110k yearly est. 1d ago
  • Manager - Security Architect

    EY 4.7company rating

    Security architect job in Milwaukee, WI

    At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. **Manager - Security Architect** **The opportunity** We're hiring an experienced Security Architect that is an expert in the modern security threat and mitigation environment. Knowledge of the use of security in the development of applications (threat model development) best practices for security in the design architecture of applications. The use of AI in SEIM/MDR/MXDR and/or the analysis of behavioral threats. The successful candidate should have experience in the emerging area of AI based attack vectors and be able to devise successful mitigation. The candidate should thrive in fast-paced environments and are passionate about enabling scalable AI solutions. **Your key responsibilities** + Develop effective security designs for implementation into enterprise applications and internal EY platforms. + Support security tool selection and verification. + Develop best practices for security design patterns in AI native applications. + Execute security assessments based on experience and select AI and conventional code analysis tools. + Assess new proposed projects to insure they are leveraging best security practices architecture design and implementation. + Collaborate with other architectural experts in AI, Data and Infrastructure to insure balanced and practical outcomes. + Support strategic business development activities for emerging technology. **Skills and attributes for success** + Strong analytical and troubleshooting skills. + Ability to lead security architectural product functions and mentor junior engineers. + Comfortable working across cross-functional teams and managing competing priorities. + Build and manage strong internal and external partnerships by fostering trust, empathy, and mutual value. + Leverage emotional agility and hybrid collaboration to navigate diverse stakeholder needs and drive long-term engagement. + Use critical thinking and creative reasoning to address complex problems and exceed expectations. + Align cross-functional teams around shared goals, ensuring accountability and progress. Use emotional intelligence and hybrid collaboration to motivate others and deliver high-impact results. **T** **o qualify you must have** + 5-10+ years of experience in security engineering and architecture for products. + Understand security and safety in an AI environment (Guardrails, Adversarial attacks, output validation etc..) + Use of security tooling for application verification in Github Advance Security, Checkmarx JFrog, DAST, etc.. + Understand threat model development and verified implementation. + Familiarity with security certifications and appropriate use for best practices development OWASP etc.... + Expertise in the assessment of security best practices of agile development process + Expertise in the development and adoption of security first best practices. **Ideally, you'll also have** + Experience with large-scale cross functional software development projects. + Excellent communication and leadership abilities. **What we offer you** At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . + We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $125,500 to $230,200. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $150,700 to $261,600. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. + Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. + Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $150.7k-261.6k yearly 2d ago
  • Director, Client Security Engineering Architect

    KPMG 4.8company rating

    Security architect job in Milwaukee, WI

    Known for being a great place to work and build a career, KPMG provides audit, tax and advisory services for organizations in today's most important industries. Our growth is driven by delivering real results for our clients. It's also enabled by our culture, which encourages individual development, embraces an inclusive environment, rewards innovative excellence and supports our communities. With qualities like those, it's no wonder we're consistently ranked among the best companies to work for by Fortune Magazine, Consulting Magazine, Seramount, Fair360 and others. If you're as passionate about your future as we are, join our team. KPMG is currently seeking a Director, Tech Engineering to join our Tax Ignition Group. Responsibilities: * Lead the function of responding to clients' security inquires * Meet with clients to answer their security questions and negotiate compensating controls when there are gaps between client requirements and our product offerings * Drive innovation and improvement in the client security inquiry process such incorporating Artificial Intelligence into the process, creating additional collateral such as whitepapers, managing metrics, and improving the tooling and interactions with requestors * Partner with various groups within Tax's technology function and business teams to incorporate trends into product roadmaps; collaborate with other compliance teams, and raise awareness around client security requirements * Review and respond to client security questionnaires and assessments * Build and maintain a knowledge base of common client questions Qualifications: * Minimum ten years of recent experience in Information Technology (IT) security compliance, risk management or related IT security within a large IT organization, preferably within a professional services firm, software product, or other highly regulated environment * Bachelor's degree from an accredited college or university is preferred * Deep understanding of cloud architecture, modern software development, and technical security controls is required; Azure experience is preferred * Strong executive presence, negotiation, presentation, and communication skills are required; excellent analytical and problem-solving skills to assess complex security issues and develop effective solutions; capability to work effectively in a global environment, understanding diverse cultural perspectives and international client needs * Proven experience in client-facing roles, particularly in handling security inquiries, negotiations, and managing client relationships; demonstrated ability to drive innovation and continuous process improvement, particularly in integrating new technologies and methodologies into existing processes * Demonstrated knowledge of industry authoritative sources such as COBIT, NIST, ISO standards; CISM, CISA, ISO 27001 Auditor, LSS Green Belt, CRISC, CIPP, CGEIT or ITIL preferred * Must be authorized to work in the U.S. without the need for employment-based visa sponsorship now or in the future. KPMG LLP will not sponsor applicants for U.S. work visa status for this opportunity (no sponsorship is available for H-1B, L-1, TN, O-1, E-3, H-1B1, F-1, J-1, OPT, CPT or any other employment-based visa KPMG LLP and its affiliates and subsidiaries ("KPMG") complies with all local/state regulations regarding displaying salary ranges. If required, the ranges displayed below or via the URL below are specifically for those potential hires who will work in the location(s) listed. Any offered salary is determined based on relevant factors such as applicant's skills, job responsibilities, prior relevant experience, certain degrees and certifications and market considerations. In addition, KPMG is proud to offer a comprehensive, competitive benefits package, with options designed to help you make the best decisions for yourself, your family, and your lifestyle. Available benefits are based on eligibility. Our Total Rewards package includes a variety of medical and dental plans, vision coverage, disability and life insurance, 401(k) plans, and a robust suite of personal well-being benefits to support your mental health. Depending on job classification, standard work hours, and years of service, KPMG provides Personal Time Off per fiscal year. Additionally, each year KPMG publishes a calendar of holidays to be observed during the year and provides eligible employees two breaks each year where employees will not be required to use Personal Time Off; one is at year end and the other is around the July 4th holiday. Additional details about our benefits can be found towards the bottom of our KPMG US Careers site at Benefits & How We Work. Follow this link to obtain salary ranges by city outside of CA: ********************************************************************** KPMG offers a comprehensive compensation and benefits package. KPMG is an equal opportunity employer. KPMG complies with all applicable federal, state and local laws regarding recruitment and hiring. All qualified applicants are considered for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, citizenship status, disability, protected veteran status, or any other category protected by applicable federal, state or local laws. The attached link contains further information regarding KPMG's compliance with federal, state and local recruitment and hiring laws. No phone calls or agencies please. KPMG recruits on a rolling basis. Candidates are considered as they apply, until the opportunity is filled. Candidates are encouraged to apply expeditiously to any role(s) for which they are qualified that is also of interest to them. Los Angeles County applicants: Material job duties for this position are listed above. Criminal history may have a direct, adverse, and negative relationship with some of the material job duties of this position. These include the duties and responsibilities listed above, as well as the abilities to adhere to company policies, exercise sound judgment, effectively manage stress and work safely and respectfully with others, exhibit trustworthiness, and safeguard business operations and company reputation. Pursuant to the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers, Fair Chance Initiative for Hiring Ordinance, and San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
    $79k-110k yearly est. 60d+ ago
  • Lead AI Security Architect

    Rockwell Automation 4.4company rating

    Security architect job in Milwaukee, WI

    Rockwell Automation is a global technology leader focused on helping the world's manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better. We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that's you we would love to have you join us! Position Summary: The Lead AI Security Architect defines and inspires the security architecture strategy for artificial intelligence (AI) and machine learning (ML) systems across the enterprise. You will design the security of AI-enabled platforms, data pipelines, and models with corporate cybersecurity, privacy, and compliance frameworks in mind. You will be an expert, ensuring AI projects meet secure-by-design principles, while mitigating risks associated with generative AI, large language models (LLMs), and autonomous systems. You will balance innovation in AI with risk. You influence secure development of AI systems and ensure responsible adoption of advanced technologies across the enterprise. Your Responsibilities: Strategy & Architecture Develop the enterprise AI security architecture. Align it with our goals, AI governance frameworks (e.g., NIST AI RMF, ISO/IEC 42001), and cybersecurity standards (e.g., NIST CSF, ISO 27001, IEC 62443). Define secure architectures for AI/ML model development, deployment, and integration with enterprise data and cloud platforms. Establish security reference architectures for GenAI, LLMOps, MLOps, and AI-driven automation. Risk Management & Governance Conduct AI threat modeling, risk assessments, and red teaming for AI/ML systems. Find and address AI-specific risks such as model inversion, prompt injection, data poisoning, and adversarial attacks. Support compliance with the latest AI security and ethics regulations (e.g., EU AI Act, U.S. Executive Orders on AI, sector-specific standards). Technical Leadership Guide data scientists and developers on implementing secure model training, validation, and inference pipelines. Partner with enterprise architects to integrate AI trust controls (authenticity, traceability, explainability, and accountability) into platforms and services. Evaluate and deploy AI security tools for model protection, data governance, and AI behavior monitoring. Collaboration & Enablement Collaborate with product security, DevSecOps, and data engineering teams to embed AI security into the SDLC and CI/CD pipelines. Work with legal, risk, and compliance teams to establish AI acceptable use, data residency, and model governance policies. Lead security reviews and architecture boards for AI-enabled projects. Innovation & Continuous Improvement Stay current on AI cybersecurity research, frameworks, and the latest AI threats. Develop best practices and strategies for responsible AI security and assurance. Mentor junior architects and engineers in AI and cybersecurity principles. Core Competencies Technical depth in both cybersecurity and AI domains. Ability to translate complex concepts to executives and technical teams both verbally and in writing. Expertise in emerging AI security trends and best practices. Collaborative and mentoring approach with cross-functional teams. The Essentials - You Will Have: Bachelor's Degree or equivalent years of relevant work experience. Legal authorization to work in the U.S. We will not sponsor individuals for employment visas, now or in the future, for this job opening. Ability to travel up to 10%. The Preferred - You Might Also Have: Typically requires 12+ years of relevant experience in cybersecurity architecture. 3+ years focused on AI/ML or data science security. Advanced degree in Computer Science, Engineering, Cybersecurity, or related field Experience with AI/ML pipelines, MLOps, Model Context Protocol (MPC), Agentic Identity, and cloud-native architectures (AWS SageMaker, Azure ML, GCP Vertex AI). Expertise in data protection, identity and access management, encryption, and secure software development. Knowledge of AI threat landscapes, adversarial machine learning, and model integrity protection. Experience with compliance frameworks such as NIST AI RMF, ISO/IEC 42001, and data privacy regulations (GDPR, CCPA). Professional certifications such as CISSP, CISM, CCSP and enterprise architecture certifications. AI/ML certifications (e.g., TensorFlow, AWS ML Specialty, Microsoft Azure AI Engineer). Hands-on experience with secure LLM deployments and GenAI security testing. Experience in OT or industrial AI environments (IEC 62443 knowledge). What We Offer: Health Insurance including Medical, Dental and Vision 401k Paid Time off Parental and Caregiver Leave Flexible Work Schedule where you will work with your manager to enjoy a work schedule that can be flexible with your personal life. To learn more about our benefits package, please visit at ******************** At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles. #LI-Hybrid #LI-LifeAtROK #LI-MG4 We are an Equal Opportunity Employer including disability and veterans. If you are an individual with a disability and you need assistance or a reasonable accommodation during the application process, please contact our services team at *****************. Rockwell Automation's hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
    $88k-115k yearly est. Auto-Apply 3d ago
  • Sr Principal Product Security Architect

    Dematic Corp 4.6company rating

    Security architect job in Wauwatosa, WI

    As a technical leader of Product Security architecture for Dematic you will be critical to the advancement of security throughout the company, enabling the success and growth of the business in an environment of increasing demands for comprehensive and robust product security. Under the Vice President of Global Product Security, you will provide strategic and expertly informed technical security guidance to the product development, execution, sales, and support organizations across Dematic. You will be assist in defining and implementing a broad and detailed technical strategy for security that encompasses all Dematic products, including next-gen software solutions, existing software solutions, and operational technology solutions. You will play a crucial role in ensuring the development of truly secure products and the operation of those products in a robustly secure environment by providing best-in-class architectural guidance and vision, while passionately pursuing personal and organizational excellence in the field of security. You will collaborate with technology leadership and engineering teams to both define and implement the vision and strategy of the Product Security organization. You will inspire, guide, and support our development, execution, and customer-facing teams as they continuously progress toward greater maturity with respect to security knowledge and practice. You will be relied upon as an essential resource to proactively and efficiently defend our systems and data from attack, while ensuring that the security of our products meets and exceeds all relevant regulatory requirements. As an invaluable member of a highly collaborative organization that is dedicated to serving with the utmost in excellence and integrity, you will be ever growing in technical expertise and the skills necessary to equip our team to protect our organization, our customers, and our communities. We offer: * Career Development * Competitive Compensation and Benefits * Pay Transparency * Global Opportunities Learn More Here: ********************************************************* Dematic provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. The base pay range for this role is estimated to be $131,250 - $201,250 at the time of posting. Final compensation will be determined by various factors such as work location, education, experience, knowledge, and skills. Tasks and Qualifications: What you will do in this role: * Provide strategic and expertly informed technical security guidance to globally distributed product development, execution, sales, and support organizations across Dematic. * Contribute to technical security strategy that encompasses all Dematic products, including next-gen software solutions, existing software solutions, and operational technology solutions. * Collaborate with leadership to both define and implement the vision and strategy of the Product Security organization. * Drive advancement of technical and operational capabilities necessary to implement a robust product security strategy - one that is worthy of the trust placed in us by our customers and business partners. * Provide guidance and leadership for all efforts to build security into every aspect of Dematic's product development lifecycle, for both software and operational technology. * Perform technical security risk assessments of internally developed as well as third-party products and systems. * Advise and educate development teams with respect to application, cloud, and product security best practices, security automation, and the proper use of third-party security products and services. * Build and maintain high-trust, highly collaborative relationships with teams and individuals in product development, product management, corporate security and compliance, and across the organization in general. * Mentor application, infrastructure, and operational technology security engineers, as well as security champions globally distributed throughout the company. * Provide guidance in response to product security incidents. * Continuously learn, keep abreast of, and evaluate industry trends/direction and technical developments in the product and cloud security domains, and deeply engage with industry leaders to inform and direct Dematic security technology strategy. * Perform research into and present on relevant security technology, practices, and threats. * Work closely with a team of security staff, in conjunction with product development, to ensure company products and services withstand all foreseen and reasonable attacks. * Engage with product management, customer sales/support, and other functions as needed to further business development from a security perspective. * Potentially engage with customers directly as required by project leadership. What we are looking for: * 10+ years hands-on experience in modern engineering environments, including at least 5 years as a hardware/software engineer and 5+ years in a security engineer/architect role. * Extensive experience working in software development, enterprise architecture, and security engineering in public cloud environments, including GCP, AWS, and/or Azure. * Strong development skills (both backend and frontend) in multiple languages, platforms, and frameworks, including Java, Python, C, C++, C#, JavaScript, TypeScript, Node, React, and Golang. * Deep knowledge of Operation Technology security and the associated regulatory frameworks. * Extensive experience with AppSec, OT security, and cloud security principles, patterns, and techniques, along with the ability to apply this knowledge to analyze complex software and hardware systems, architectures, and code to uncover weaknesses and vulnerabilities. * Deep understanding of public cloud security models, best practices, and compliance frameworks / regulations. * Expert understanding of the application of efficient zero trust security models to meet security and compliance requirements while providing the flexibility needed to enable the business to flourish. * Expert threat modeling skills. * Significant experience in infrastructure as code, compliance as code, container-based / Kubernetes deployments, serverless architectures, and DevSecOps continuous deployment environments. * Proficiency in applied cryptography, including the full spectrum of methods, algorithms, uses, and patterns. * Experience successfully mentoring and leading technical staff and small teams. * Proven ability to successfully lead in the face of complex risk environments. * Preference for and ability to thrive in highly collaborative work environments. * Passionate and quick learner. * Dedicated, highly motivated, energetic and relentless pursuer of quality and successful outcomes that benefit the broader team, organization, and community. * Open and direct communicator. * Outstanding written and spoken communication skills, including public speaking and communicating before engineering, business, and executive leadership. * Experience presenting persuasive arguments and complex information before technical and non-technical leadership. * Experience giving industry conference presentations a significant plus. * Bachelor's degree in computer science or other STEM discipline is required, however, equivalent experience may be substituted. * Graduate degree is a plus. * Technical security certifications (such as GIAC certifications or Offensive Security certifications) are highly desirable, especially in ICS, application security, and cloud security.
    $131.3k-201.3k yearly Auto-Apply 1d ago
  • Senior Security Architect - SAP

    Blue Star Partners LLC 4.5company rating

    Security architect job in Waukegan, IL

    Job Description Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting Scope of Services: The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy. This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape. Role, Responsibilities, and Deliverables: Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs. Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements. Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks. GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations. Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements. Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy. Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions. Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs. Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time. Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner. Experience & Skills: SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations. GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred. Security Tools: Proficiency in SAP Security, GRC, and SOD management. Leadership: Previous experience managing cross-functional teams and leading security projects. Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations. Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions. Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms. Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals. Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills. Education & Certifications: Degree: A degree in IT, Computer Science, Business, or a complementary field is required. Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.
    $85-100 hourly 20d ago
  • Sr Principal Product Security Architect

    KION Group 4.2company rating

    Security architect job in Wauwatosa, WI

    As a technical leader of Product Security architecture for Dematic you will be critical to the advancement of security throughout the company, enabling the success and growth of the business in an environment of increasing demands for comprehensive and robust product security. Under the Vice President of Global Product Security, you will provide strategic and expertly informed technical security guidance to the product development, execution, sales, and support organizations across Dematic. You will be assist in defining and implementing a broad and detailed technical strategy for security that encompasses all Dematic products, including next-gen software solutions, existing software solutions, and operational technology solutions. You will play a crucial role in ensuring the development of truly secure products and the operation of those products in a robustly secure environment by providing best-in-class architectural guidance and vision, while passionately pursuing personal and organizational excellence in the field of security. You will collaborate with technology leadership and engineering teams to both define and implement the vision and strategy of the Product Security organization. You will inspire, guide, and support our development, execution, and customer-facing teams as they continuously progress toward greater maturity with respect to security knowledge and practice. You will be relied upon as an essential resource to proactively and efficiently defend our systems and data from attack, while ensuring that the security of our products meets and exceeds all relevant regulatory requirements. As an invaluable member of a highly collaborative organization that is dedicated to serving with the utmost in excellence and integrity, you will be ever growing in technical expertise and the skills necessary to equip our team to protect our organization, our customers, and our communities. We offer: * Career Development * Competitive Compensation and Benefits * Pay Transparency * Global Opportunities Learn More Here: ********************************************************* Dematic provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. The base pay range for this role is estimated to be $131,250 - $201,250 at the time of posting. Final compensation will be determined by various factors such as work location, education, experience, knowledge, and skills. Tasks and Qualifications: What you will do in this role: * Provide strategic and expertly informed technical security guidance to globally distributed product development, execution, sales, and support organizations across Dematic. * Contribute to technical security strategy that encompasses all Dematic products, including next-gen software solutions, existing software solutions, and operational technology solutions. * Collaborate with leadership to both define and implement the vision and strategy of the Product Security organization. * Drive advancement of technical and operational capabilities necessary to implement a robust product security strategy - one that is worthy of the trust placed in us by our customers and business partners. * Provide guidance and leadership for all efforts to build security into every aspect of Dematic's product development lifecycle, for both software and operational technology. * Perform technical security risk assessments of internally developed as well as third-party products and systems. * Advise and educate development teams with respect to application, cloud, and product security best practices, security automation, and the proper use of third-party security products and services. * Build and maintain high-trust, highly collaborative relationships with teams and individuals in product development, product management, corporate security and compliance, and across the organization in general. * Mentor application, infrastructure, and operational technology security engineers, as well as security champions globally distributed throughout the company. * Provide guidance in response to product security incidents. * Continuously learn, keep abreast of, and evaluate industry trends/direction and technical developments in the product and cloud security domains, and deeply engage with industry leaders to inform and direct Dematic security technology strategy. * Perform research into and present on relevant security technology, practices, and threats. * Work closely with a team of security staff, in conjunction with product development, to ensure company products and services withstand all foreseen and reasonable attacks. * Engage with product management, customer sales/support, and other functions as needed to further business development from a security perspective. * Potentially engage with customers directly as required by project leadership. What we are looking for: * 10+ years hands-on experience in modern engineering environments, including at least 5 years as a hardware/software engineer and 5+ years in a security engineer/architect role. * Extensive experience working in software development, enterprise architecture, and security engineering in public cloud environments, including GCP, AWS, and/or Azure. * Strong development skills (both backend and frontend) in multiple languages, platforms, and frameworks, including Java, Python, C, C++, C#, JavaScript, TypeScript, Node, React, and Golang. * Deep knowledge of Operation Technology security and the associated regulatory frameworks. * Extensive experience with AppSec, OT security, and cloud security principles, patterns, and techniques, along with the ability to apply this knowledge to analyze complex software and hardware systems, architectures, and code to uncover weaknesses and vulnerabilities. * Deep understanding of public cloud security models, best practices, and compliance frameworks / regulations. * Expert understanding of the application of efficient zero trust security models to meet security and compliance requirements while providing the flexibility needed to enable the business to flourish. * Expert threat modeling skills. * Significant experience in infrastructure as code, compliance as code, container-based / Kubernetes deployments, serverless architectures, and DevSecOps continuous deployment environments. * Proficiency in applied cryptography, including the full spectrum of methods, algorithms, uses, and patterns. * Experience successfully mentoring and leading technical staff and small teams. * Proven ability to successfully lead in the face of complex risk environments. * Preference for and ability to thrive in highly collaborative work environments. * Passionate and quick learner. * Dedicated, highly motivated, energetic and relentless pursuer of quality and successful outcomes that benefit the broader team, organization, and community. * Open and direct communicator. * Outstanding written and spoken communication skills, including public speaking and communicating before engineering, business, and executive leadership. * Experience presenting persuasive arguments and complex information before technical and non-technical leadership. * Experience giving industry conference presentations a significant plus. * Bachelor's degree in computer science or other STEM discipline is required, however, equivalent experience may be substituted. * Graduate degree is a plus. * Technical security certifications (such as GIAC certifications or Offensive Security certifications) are highly desirable, especially in ICS, application security, and cloud security.
    $131.3k-201.3k yearly Auto-Apply 59d ago
  • Information Security Operations Director

    Brunswick Corp 4.5company rating

    Security architect job in Mettawa, IL

    Are you ready for what's next? Come explore opportunities within Brunswick, a global marine leader committed to challenging conventions and innovating next-generation technologies that transform experiences on the water and beyond. Brunswick believes "Next Never Rests," and we offer a variety of exciting careers and growth opportunities within united teams defining the future of marine recreation. We are seeking a strategic and hands-on Information Security Operations Director to lead and mature our global cybersecurity operations capabilities. This role will lead the Security Operations Center (SOC), Threat and Vulnerability Management, Cyber Incident Response, and Offensive Security functions. The Director will report directly to the Chief Information Security Officer (CISO) and serve as a key member of the Security Organization's Leadership Team, helping shape the future of cybersecurity across a complex manufacturing enterprise with over $6 billion in annual revenue. Key Responsibilities: Leadership & Strategy * Lead and develop a high-performing cybersecurity operations team across multiple domains. * Define and execute the strategic roadmap for SOC, threat detection, incident response, and offensive security. * Collaborate with IT, OT, and business stakeholders to align cybersecurity operations with enterprise risk management. Security Operations Center (SOC) * Oversee 24/7 monitoring, detection, and response operations. * Drive continuous improvement in threat detection capabilities, including SIEM tuning, use case development, and automation. * Ensure SOC KPIs and metrics are tracked and reported to leadership. Threat and Vulnerability Management * Manage enterprise-wide vulnerability scanning, assessment, and remediation programs. * Partner with infrastructure teams to prioritize and mitigate risks. * Monitor threat intelligence feeds and integrate actionable insights into operations. Cyber Incident Response * Lead the development and execution of the Brunswick Cyber Incident Response Program. * Act as Incident Commander and coordinate cross-functional response efforts during security incidents. * Conduct post-incident reviews and drive lessons learned into operational improvements. Offensive Security * Oversee penetration testing, red/purple team exercises, and adversary emulation activities. * Identify and exploit weaknesses in systems, applications, and processes to proactively improve defenses. * Collaborate with Security, Infrastructure, and Engineering teams to remediate findings. Qualifications: * Bachelor's degree; Master's preferred. * 10+ years of experience in cybersecurity, with 5+ years in leadership roles. * Proven experience managing Security Operations to include SOC, incident response, and vulnerability management programs. * Strong understanding of MITRE ATT&CK, NIST, and other cybersecurity frameworks. * Experience in manufacturing or industrial environments (IT/OT convergence) is highly desirable. Preferred Certifications: * CISSP - Certified Information Systems Security Professional * CISM - Certified Information Security Manager * GIAC - Global Information Assurance Certifications (e.g., GCIA, GCIH, GPEN) * OSCP - Offensive Security Certified Professional * CEH - Certified Ethical Hacker Key Competencies: * Strategic thinking with operational execution. * Strong communication and stakeholder engagement skills. * Ability to lead under pressure and make critical decisions during incidents. * Passion for innovation and continuous improvement in cybersecurity practices. The anticipated pay range for this position is $129,500 - $219,000 annually. The actual base pay offered will vary depending on multiple factors including job- related knowledge/skills, relevant experience, business needs, and geographic location. In addition to base pay, this position is eligible for an annual discretionary bonus. At Brunswick, it is not typical for an individual to be hired at or near the top end of the salary range for their role. Compensation decisions are dependent upon the specifics of the candidate's qualifications and the business context. This position is eligible to participate in Brunswick's comprehensive and high-quality benefits offerings, including medical, dental, vision, paid vacation, 401k (up to 4% match), Health Savings Account (with company contribution), well-being program, product purchase discounts and much more. Details about our benefits can be found here. Why Brunswick: Whatever tomorrow brings, we'll be at the leading edge. As the clear leader in the marine industry, we're committed to our values and supporting our exceptional people. We offer and encourage growth opportunities within and across our many brands. In addition, we're proud of being recognized for making a splash with numerous awards! About Brunswick: Brunswick Corporation is a leader in the marine industry, and we're looking for people just like you to take part in the movement towards better boating for all. We rely on the thoughtful input of people from all backgrounds to create compelling, innovative products for our customers around the globe. As such, diversity, equity, and inclusion are priorities in the enduring culture of our company. As a world leader in emerging recreational products and technologies, when you join our team, you become part of some of the most innovative, forward-looking brands in the marine industry today. Next is Now! We value growth and development, recognizing that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying. Brunswick is an Equal Opportunity Employer and considers all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status or any other characteristic protected by federal, state, or local law. Diversity of experience and skills combined with passion is key to innovation and inspiration and we encourage individuals from all backgrounds to apply. If you require accommodation during the application or interview process, please contact ****************************** for support. For more information about EEO laws, - click here Brunswick and Workday Privacy Policies Brunswick does not accept applications, inquiries or solicitations from unapproved staffing agencies or vendors. For help, please contact our support team at: ****************************** or ************. All job offers will come to you via the candidate portal you create when applying through a posted position through https:///************************** If you are ever unsure about what is being required of you during the application process or its source, please contact HR Shared Services at ************ or ******************************. #Brunswick Corporation
    $129.5k-219k yearly Auto-Apply 35d ago
  • Information Security Consultant / Senior Analyst

    Answerport

    Security architect job in Mequon, WI

    If you are looking for an opportunity where you can have an impact on critical business change and influence results while continuing your professional growth, Answerport, a Wisconsin-based Management & Technology consulting firm (with offices in Minnesota) may have an opportunity for you. Answerport consulting candidates ideally possess a blend of skills acquired through previous consulting and industry experience. Our clients trust that Answerport's consultants possess the insight and passion necessary to deliver results. We are currently looking for experienced individuals with strong information security experience including experience assessing, planning and implementing security solutions that include technical, process and policy. Project management and other IT experiences outside of security (e.g., infrastructure, applications, data) are also beneficial. We are filling roles at either a Senior Consultant or a Consulting Manager based on your experience level. The people we seek should possess: q 4-10 years of experience in information security and information technology with a majority of the following characteristics: o Minimum of 2+ years of management consulting firm experience o Minimum of 2+ years of project and or team leadership (security or other areas) o Experience working in mid-market businesses preferably in manufacturing, distribution and/or service industries o Experience with security programs and projects including implementation of various layers of security tools (perimeter, cloud, identity, endpoint, email, data, GRC, security operations, etc.) o Experience developing IT Security policies, procedures and other documentation o Experience with / knowledge of one or more industry security framework (e.g., NIST, CIS) o Experience assessing company security controls, identifying strengths and weaknesses and formulating pragmatic, company appropriate recommendations for improvement o Experience identifying vulnerabilities and working with technical teams to remediate o Experience evaluating and selecting security technology solutions in line with business requirements o Experience working directly with IT infrastructure teams (engineering, support) to collaboratively identify, design and implement security solutions. Experience with Managed Services Provider teams a plus. o Experience with merger & acquisition transition / integration efforts a plus. q Project management experience including ability to manage small/mid-sized assessment and remediation projects working with clients, internal teams and 3rd party providers q Excellent written and verbal communications skills including ability to communicate technical topics to non-technical clients q Personal drive and perseverance to achieve results in fast paced environments q Willingness to continue learning new techniques and technologies q Flexibility to travel based on client requirements q An ability to perform some work with remote teams (client and internal) q Degree in Engineering, Information Systems and/or security certifications (CISSP, CISM, CISA) This is a full-time position (contract-to-hire or direct hire). Individuals must be authorized to work in the United States. No visa sponsorships are available for this position. While this position does require travel, individuals will be based out of either our Mequon, WI headquarters or our St. Paul, MN office. No relocation assistance is available for this position. We have a hybrid schedule and require three days per week in the office unless traveling.
    $87k-120k yearly est. 60d+ ago
  • HPC System Security Engineer

    University of Chicago 4.7company rating

    Security architect job in Park City, IL

    Department Provost Research Computing Center About the Department The University of Chicago Research Computing Center (RCC), a unit in the Office of Research, provides high-end research computing resources to researchers at the University of Chicago. It is dedicated to enabling research by providing access to centrally managed High-Performance Computing (HPC), storage, and visualization resources. These resources include hardware, software, high-level scientific and technical user support, and the education and training required to help researchers make full use of modern HPC technology and local and national supercomputing resources. The Office of Research oversees the conduct of sponsored research, research program development, and contract management functions. Job Summary The job participates in the design of automated, scalable, and rapidly deployable solutions to systems infrastructure and server configuration. Installs, configures, and maintains operating systems, monitoring and alerting systems, utility software, and firewalls. Plans and executes hands-on maintenance for production servers as well as Windows and Linux servers. The University of Chicago is seeking a highly qualified HPC Systems Security Engineer to join the HPC Systems and Operations team that builds and manages RCC's HPC infrastructure. The individual in this position will be involved in the operation, maintenance, security, and compliance of large-scale complex HPC systems primarily used for research. Responsibilities Design, deploy, configure, and administer HPC clusters, including management and compute nodes, storage infrastructure, interconnects (e.g., InfiniBand), and related systems. Develop, maintain, and enforce security procedures and system documentation for operational and compliance purposes. Implement infrastructure and security monitoring and detection systems to identify failures, unusual activity and respond to automated alerts. Tune, secure, and maintain the HPC job scheduling environment, including fair-sharing, accounting, and policy enforcement. Troubleshoot and resolve operational, performance, and security-related issues across HPC hardware and software stacks. Coordinate with hardware and software vendors to address defects, vulnerabilities, and performance issues. Assist Computational Scientists team with user support and helpdesk tickets, including elevated support for security-protected environments. Implement and maintain secure and reliable backup, archival, disaster-recovery, and restore capabilities for systems and research data. Perform vulnerability scanning, patch management, system and firmware updates across the infrastructure. Maintain complex system and network administration functions. Works with moderated guidance to administer simple systems and assists in the administration of larger systems. Maintains all supporting documentation for comprehensive operating system, hardware and software configuration. Monitors primary responses for information technology related security incidents and violations. Keeps current with new security and network monitoring technologies, applicable laws and regulations. Performs other related work as needed. Minimum Qualifications Education: Minimum requirements include a college or university degree in related field. Work Experience: Minimum requirements include knowledge and skills developed through 2-5 years of work experience in a related job discipline. Certifications: --- Preferred Qualifications Experience: Linux system administration experience in a large, distributed computing environment. Demonstrated experience and knowledge of system security and best practices. Technical Skills or Knowledge: Knowledge of Linux administration required, RHEL. Experience and advanced skills in scripting with Python or Bash. Experience installing, configuring, and managing job schedulers (e.g., Slurm, Torque, PBS, LSF). Experience with automation tools such as Ansible, Puppet, Chef, Salt. Experience with provisioning tools (e.g., xCAT, Confluent, Warewulf). Experience implementing monitoring tools (e.g., CheckMK, Zabbix, Nagios). Knowledge of frameworks and federal regulations to protect regulated systems and data (e.g., HIPAA, FISMA, NIST CSF). Experience working, documenting and enforcing controls required to protect controlled unclassified information (e.g., NIST 800-53, NIST 800-171, NIST SP 800-223, FIPS). Knowledge of at least one distributed storage system (e.g., Storage Scale, Lustre, Gluster, BeeGFS, Ceph) and practical experience. Experience with InfiniBand (must at least be able to demonstrate a working knowledge of concepts) Experience in writing precise and concise documentation, standard operating procedures. Preferred Competencies Understand and translate researchers' scientific goals into computational requirements. Work well with faculty and researchers. Identify and gain expertise in appropriate new technologies and/or software tools. Function as part of an interactive team while demonstrating self-initiative to achieve project's goals and Research Computing Center's mission. Strong analytical skills and problem-solving ability. Application Documents Resume or C/V (required) Cover letter (preferred) When applying, the document(s) MUST be uploaded via the My Experience page, in the section titled Application Documents of the application. Job Family Information Technology Role Impact Individual Contributor Scheduled Weekly Hours 37.5 Drug Test Required No Health Screen Required No Motor Vehicle Record Inquiry Required No Pay Rate Type Salary FLSA Status Exempt Pay Range $91,800.00 - $116,000.00 The included pay rate or range represents the University's good faith estimate of the possible compensation offer for this role at the time of posting. Benefits Eligible Yes The University of Chicago offers a wide range of benefits programs and resources for eligible employees, including health, retirement, and paid time off. Information about the benefit offerings can be found in the Benefits Guidebook. Posting Statement The University of Chicago is an equal opportunity employer and does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender, gender identity, or expression, national or ethnic origin, shared ancestry, age, status as an individual with a disability, military or veteran status, genetic information, or other protected classes under the law. For additional information please see the University's Notice of Nondiscrimination. Job seekers in need of a reasonable accommodation to complete the application process should call ************ or submit a request via Applicant Inquiry Form. All offers of employment are contingent upon a background check that includes a review of conviction history. A conviction does not automatically preclude University employment. Rather, the University considers conviction information on a case-by-case basis and assesses the nature of the offense, the circumstances surrounding it, the proximity in time of the conviction, and its relevance to the position. The University of Chicago's Annual Security & Fire Safety Report (Report) provides information about University offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: *********************************** Paper copies of the Report are available, upon request, from the University of Chicago Police Department, 850 E. 61st Street, Chicago, IL 60637.
    $91.8k-116k yearly Auto-Apply 15d ago
  • Cloud Security Engineer

    Fiserv 4.4company rating

    Security architect job in Milwaukee, WI

    Calling all innovators - find your future at Fiserv. We're Fiserv, a global leader in Fintech and payments, and we move money and information in a way that moves the world. We connect financial institutions, corporations, merchants, and consumers to one another millions of times a day - quickly, reliably, and securely. Any time you swipe your credit card, pay through a mobile app, or withdraw money from the bank, we're involved. If you want to make an impact on a global scale, come make a difference at Fiserv. Job Title Cloud Security Engineer About your role: As a Cyber Engineering - Advisor I, you will be at the forefront of protecting sensitive data and safeguarding our clients' information by implementing advanced cybersecurity measures. Your role will be crucial in defending our systems, data, and infrastructure from potential threats. Joining our dedicated cybersecurity team, you will collaborate with experts to design, develop, and deploy security solutions that ensure the highest levels of protection and compliance. What you'll do: Leverage your cybersecurity expertise to design and implement advanced security solutions. Assess security vulnerabilities and recommend appropriate mitigation strategies. Collaborate with cross-functional teams to integrate security practices across all phases of the development lifecycle. Conduct regular security assessments and audits to ensure compliance with industry standards and regulations. Review security data and tool outputs to identify control gaps, policy deviations, and threats to continuously enhance security controls. Develop and maintain comprehensive documentation of security processes and protocols. Responsibilities listed are not intended to be all-inclusive and may be modified as necessary. Experience you'll need to have: 6+ years of experience in cybersecurity 3+ years of experience with PAM and IAM principles and technologies, including CyberArk 3+ years of experience with systems and network administration in Windows and Unix/Linux 3+ years of experience with authentication tools and protocols such as SAML and PingID 3+ years of experience with DLP tools like Forcepoint or Broadcom 3+ years of experience with endpoint management tools like CrowdStrike or Tanium 3+ years of experience with encryption tools like PKWARE 6+ years of an equivalent combination of educational background, related experience, and/or military experience Experience that would be great to have: Experience in the financial services industry CISA, CISM, CISSP, CCSP, or similar certifications This role is not eligible to be performed in Colorado, California, District of Columbia, Hawaii, Illinois, Maryland, Minnesota, New Jersey, New York, Nevada, Rhode Island or Washington. It is unlawful to discriminate against a prospective employee due to the individual's status as a veteran. Please note that salary ranges provided for this role on external job boards are salary estimates made by outside parties and may not be accurate. Thank you for considering employment with Fiserv. Please: Apply using your legal name Complete the step-by-step profile and attach your resume (either is acceptable, both are preferable). Our commitment to Equal Opportunity: Fiserv is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, gender, gender identity, sexual orientation, age, disability, protected veteran status, or any other category protected by law. If you have a disability and require a reasonable accommodation in completing a job application or otherwise participating in the overall hiring process, please contact *******************. Please note our AskHR representatives do not have visibility to your application status. Current associates who require a workplace accommodation should refer to Fiserv's Disability Accommodation Policy for additional information. Note to agencies: Fiserv does not accept resume submissions from agencies outside of existing agreements. Please do not send resumes to Fiserv associates. Fiserv is not responsible for any fees associated with unsolicited resume submissions. Warning about fake job posts: Please be aware of fraudulent job postings that are not affiliated with Fiserv. Fraudulent job postings may be used by cyber criminals to target your personally identifiable information and/or to steal money or financial information. Any communications from a Fiserv representative will come from a legitimate Fiserv email address.
    $74k-93k yearly est. Auto-Apply 3d ago
  • Cyber Security Training

    Agap Technologies

    Security architect job in Milwaukee, WI

    We at Agap Technologies Inc. help our clients build successful businesses by enabling them to synergize state-of-the-art technology with exceptional talent. We offer a full suite of IT solutions and services, from custom software development to staffing. Our multidisciplinary team of experts in areas like data analysis, automation, personnel development and management, and project management helps us offer a unique set of tech-driven solutions and services that allow our clients to achieve their business objectives in the most efficient way possible. Our technical competence is further built upon by our high standards of professionalism, diligence, and ethics, which has enabled us to deliver top-notch services to our clients and exceed expectations every time. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-112k yearly est. 15h ago
  • Cyber Security Engineer

    Robert Half 4.5company rating

    Security architect job in Milwaukee, WI

    We are looking for a skilled and motivated Cyber Security Engineer to join our team in Milwaukee, Wisconsin. In this role, you will play a pivotal part in safeguarding our organization's IT infrastructure and ensuring compliance with cybersecurity standards. The ideal candidate will possess strong technical expertise, excellent communication skills, and a collaborative mindset to effectively contribute to our innovative and supportive work environment. The role is hybrid to Milwaukee and applicants must be eligible to work in the U.S., no third-party candidates will be considered. Responsibilities: - Develop, implement, and maintain cybersecurity policies and procedures to protect digital assets. - Conduct regular cybersecurity audits and address findings to enhance security and ensure compliance with industry standards. - Collaborate with cross-functional teams to support IT initiatives and foster a cohesive working environment. - Communicate effectively with stakeholders, team members, and vendors to ensure alignment on project goals. - Identify and resolve cybersecurity and infrastructure issues using analytical and problem-solving skills. - Manage cybersecurity projects from planning to execution, ensuring deadlines and budgets are met. - Build and maintain strong relationships with vendors to guarantee high-quality service delivery. - Provide expertise in managing IT infrastructure, including networks, servers, and cloud services. - Monitor and configure firewall technologies, including Checkpoint and Cisco ASA, to enhance network security. - Administer Office 365 and Azure platforms while ensuring their security and functionality. Requirements - Proven experience in IT infrastructure management, including networks, servers, and cloud services. - Strong knowledge of cybersecurity strategies, best practices, and vulnerability assessments. - Proficiency in Windows Server and Client operating systems. - Expertise in networking concepts and terminology, as well as hardware management. - Hands-on experience with Office 365 and Azure administration. - Ability to lead long-term projects with guidance from senior IT staff. - Excellent verbal and written communication skills to convey technical concepts to non-technical stakeholders. - Strong collaboration and problem-solving abilities with a proactive approach to addressing challenges. Technology Doesn't Change the World, People Do. Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles. Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information. © 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
    $85k-117k yearly est. 16d ago
  • Information System Epic Security Analyst

    CWI Landholdings 3.0company rating

    Security architect job in Milwaukee, WI

    At Children's Wisconsin, we believe kids deserve the best. Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country. We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today. Please follow this link for a closer look at what it's like to work at Children's Wisconsin: *********************************** Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team! Location: Remote but must be local to Milwaukee What you will do: The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required. Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations. ESSENTIAL FUNCTIONS: Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers. Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric. Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required. Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization. Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions. Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary. Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate. Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security. Recommends policies and procedures for controlling remote access by employees, non-employees and vendors. Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration. Keeps current on security issues through seminars, publications and self-education on an on-going basis. MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED: Requires bachelor's degree in computer science or related technology field. Master's degree preferred. Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management. Epic Security certification is a requirement. Professional certification (e.g. CISA, CISM or CISSP) preferred. Thorough understanding of risk analysis, disaster recovery and audit tracking. Familiarity with current common paradigms for violating system integrity. Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel. Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts. Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law. Certifications/Licenses:
    $74k-107k yearly est. Auto-Apply 60d+ ago
  • Information Security Engineering & Operations Analyst

    Johnson Financial Group 3.9company rating

    Security architect job in Racine, WI

    The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role. This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.) KEY RESPONSIBILITIES: * Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment. * Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies. * Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities. * Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting. * Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting). * Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access. * Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards. * Assist with maintaining the Cybersecurity Incident Response Plan. * Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks). * Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress. JOB REQUIREMENTS: * Associates degree in Information Security, Cybersecurity preferred * 0-2 years' experience * Types of certification preferred: Security+, CEH, SSCP * Experience with Python and PowerShell scripting languages for automation preferred * Good report writing and communication skills * Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments Come as you are. Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
    $71k-87k yearly est. Auto-Apply 24d ago
  • Cyber Security Engineer

    GE Healthcare 4.8company rating

    Security architect job in Waukesha, WI

    The Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters. **Job Description** **Responsibilities** + Drive tailored SDL practice into specific engineering- + Engage in application, platform and domain-specific threat modeling and attack surfaceanalysis/reduction + Work closely with cross-functional teams in requirements gathering and security-focused software design + Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). + Develop and design innovative cyber security solutions for unique and complex technologies. + Work in partnership with government agencies, leading industry experts, and academia. + Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. + Assess and investigate specific threats to an information system in terms of severity and impact. + Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. + Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. + Interacting with global teams to promote consistency and maximize synergies across common software platforms + Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. + Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. + Support process improvements which guide development, sustaining & support activities + Drive world-class quality in the development and support of products + Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques + Understand performance parameters and assess application performance + Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness **Required Qualifications** + Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience + Certification in Privacy, Security & Regulatory domain or related certification + Experience in object-oriented design methodology and various programming languages such as C/C++ Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... + Experience in working with Windows API and application programming. + Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. + Good skills in knowing how to debug software issues. + Experience with multicore and multi-threaded software design and computing environment. **Desired Characteristics** Technical Expertise: + Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. + Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. + Hands-on experience working with Windows and Linux based systems. + Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). + Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. + Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. + Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. + Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. + Strong problem-solving abilities and capable of articulating specific technical topics or assignments. + Expert in breaking down problems and estimate time for development tasks. + Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. + Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. + Good understanding of workflow in the healthcare industry. + Demonstrated experience with development of medical device software + Ultrasound SW development experience + Knowledge of ultrasound or demonstrated experience with development of medical device software **Other** + Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin + Self-starter, energizing, results oriented and able to multi-task; tenacious and organize + Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates + Ability to influence and build consensus with other scrum teams and leadership + Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities + Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. **Additional Information** GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer (****************************************************************************************** . Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. **Relocation Assistance Provided:** No
    $85k-109k yearly est. 7d ago
  • Cyber Security Engineer

    GE Healthcare Technologies Inc. 4.2company rating

    Security architect job in Waukesha, WI

    The Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters. Job Description Responsibilities * Drive tailored SDL practice into specific engineering- * Engage in application, platform and domain-specific threat modeling and attack surface analysis/reduction * Work closely with cross-functional teams in requirements gathering and security-focused software design * Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). * Develop and design innovative cyber security solutions for unique and complex technologies. * Work in partnership with government agencies, leading industry experts, and academia. * Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. * Assess and investigate specific threats to an information system in terms of severity and impact. * Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. * Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. * Interacting with global teams to promote consistency and maximize synergies across common software platforms * Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. * Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. * Support process improvements which guide development, sustaining & support activities * Drive world-class quality in the development and support of products * Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques * Understand performance parameters and assess application performance * Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness Required Qualifications * Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience * Certification in Privacy, Security & Regulatory domain or related certification * Experience in object-oriented design methodology and various programming languages such as C/C++ * Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... * Experience in working with Windows API and application programming. * Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. * Good skills in knowing how to debug software issues. * Experience with multicore and multi-threaded software design and computing environment. Desired Characteristics Technical Expertise: * Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. * Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. * Hands-on experience working with Windows and Linux based systems. * Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). * Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. * Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. * Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. * Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. * Strong problem-solving abilities and capable of articulating specific technical topics or assignments. * Expert in breaking down problems and estimate time for development tasks. * Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. * Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. * Good understanding of workflow in the healthcare industry. * Demonstrated experience with development of medical device software * Ultrasound SW development experience * Knowledge of ultrasound or demonstrated experience with development of medical device software Other * Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin * Self-starter, energizing, results oriented and able to multi-task; tenacious and organize * Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates * Ability to influence and build consensus with other scrum teams and leadership * Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities * Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. Additional Information GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. Relocation Assistance Provided: No
    $87k-111k yearly est. 7d ago
  • Cyber Security Engineer

    Gehc

    Security architect job in Waukesha, WI

    SummaryThe Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters.Job DescriptionResponsibilities Drive tailored SDL practice into specific engineering- Engage in application, platform and domain-specific threat modeling and attack surface analysis/reduction Work closely with cross-functional teams in requirements gathering and security-focused software design Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). Develop and design innovative cyber security solutions for unique and complex technologies. Work in partnership with government agencies, leading industry experts, and academia. Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. Assess and investigate specific threats to an information system in terms of severity and impact. Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. Interacting with global teams to promote consistency and maximize synergies across common software platforms Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. Support process improvements which guide development, sustaining & support activities Drive world-class quality in the development and support of products Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques Understand performance parameters and assess application performance Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness Required Qualifications Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience Certification in Privacy, Security & Regulatory domain or related certification Experience in object-oriented design methodology and various programming languages such as C/C++ Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... Experience in working with Windows API and application programming. Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. Good skills in knowing how to debug software issues. Experience with multicore and multi-threaded software design and computing environment. Desired Characteristics Technical Expertise: Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. Hands-on experience working with Windows and Linux based systems. Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. Strong problem-solving abilities and capable of articulating specific technical topics or assignments. Expert in breaking down problems and estimate time for development tasks. Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. Good understanding of workflow in the healthcare industry. Demonstrated experience with development of medical device software Ultrasound SW development experience Knowledge of ultrasound or demonstrated experience with development of medical device software Other Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin Self-starter, energizing, results oriented and able to multi-task; tenacious and organize Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates Ability to influence and build consensus with other scrum teams and leadership Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. Additional Information GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. Relocation Assistance Provided: No
    $81k-110k yearly est. Auto-Apply 8d ago
  • IT Security Project Manager with GIS (Geographic information system) expertise

    Sa Technologies Inc. 4.6company rating

    Security architect job in Racine, WI

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. All SA Technologies requirements are Direct Client Requirements from IT Hiring Managers. We guarantee you the best rate for your skills and performance. Job: IT Security Project Manager with GIS (Geographic information system) expertise Location: Racine, WI Employment Type: Contract Rate: TBD Job Description : • Act as the main liaison between GIS and the Project Team • Using the GIS intake form ensure that all GIS activities are accounted for and propose any changes to the Project Manager incorporating them in the overall project plan • Identify all GIS resources in the Project Plan and ensure that sufficient lead time is provided to GIS tower leads to onboard resources. • Aid the Project Manager in identifying and scheduling GIS activities across all GIS towers • Raise Project Change Requests where necessary to ensure that original scope is adhered to • Ensure that all GIS activities are completed prior to entering a stage gate and steward project deliverables through GIS and Project stage gates • Periodically report project milestones, progress, issues and risk to Project Manager and GIS • Provide feedback and improvements to the GIS Operating Model including process and deliverables Qualifications include: • Experience in Information Security Risk Advisory, Risk Management, Architecture and Operations • Familiarity with the GIS Operating Model and Deliverables • Working knowledge of project planning, scope management and resource forecasting • Proven ability to work on many priorities at any given time • Ability to work in a matrixed team environment and influence and guide key decision makers Additional Information Shibu Thomas ************
    $79k-104k yearly est. 16h ago
  • Senior Security Architect - SAP

    Blue Star Partners 4.5company rating

    Security architect job in Waukegan, IL

    Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting Scope of Services: The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy. This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape. Role, Responsibilities, and Deliverables: Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs. Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements. Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks. GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations. Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements. Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy. Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions. Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs. Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time. Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner. Experience & Skills: SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations. GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred. Security Tools: Proficiency in SAP Security, GRC, and SOD management. Leadership: Previous experience managing cross-functional teams and leading security projects. Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations. Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions. Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms. Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals. Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills. Education & Certifications: Degree: A degree in IT, Computer Science, Business, or a complementary field is required. Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.
    $85-100 hourly 60d+ ago

Learn more about security architect jobs

How much does a security architect earn in Greenfield, WI?

The average security architect in Greenfield, WI earns between $76,000 and $158,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Greenfield, WI

$109,000

What are the biggest employers of Security Architects in Greenfield, WI?

The biggest employers of Security Architects in Greenfield, WI are:
  1. Ernst & Young
  2. KPMG
  3. Rockwell Automation
Job type you want
Full Time
Part Time
Internship
Temporary