Information Security Analyst - W2 Only (NO 3rd Party)
Security architect job in Indianapolis, IN
Role: Information Security Analyst
Duration: 6 - 12 months, possible extensions
Pay rate: W2 Only (NO Third Party)
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems.
Required skills:
Experience developing and maintaining information security standards
Network administration
Familiarity with cybersecurity framework (NIST, ISO, SOC, CIS, Cobit, etc)
Computer security compliance and auditing experience
IRS, SSA computer security compliance
Security certification
Bachelor's degree in information security or technology
Please send resume ASAP.
Advisor-Enterprise Security Architect
Security architect job in Indianapolis, IN
The Information Security Architecture (ISA) organization is tasked with ensuring that technology initiatives demonstrate a responsible, risk-based approach to managing information and information risks in accordance with the expectations of its shareholders, regulators and corporate policies. Within the ISA organization, the cloud and application security identity architect is responsible for working closely with stakeholders in infrastructure, applications, business, and security teams to develop the security roadmap for cloud and applications, advising projects and initiatives on cloud and application security practices, and creating the cloud and application lifecycle components of the secure enterprise reference architecture. Along with peers in the ISA organization, the cloud and application security architect will partner with various teams in cloud services, application development, procurement, identity management, and threat monitoring functions to deploy a suite of technologies that support goals for cloud adoption and application development and lifecycle management.The information security cloud and applications architect is responsible for the overall technical security roadmap for cloud services, including infrastructure, platform, software, and business process as a service offerings. The information security cloud and applications architect is also responsible for the overall technical security roadmap for application lifecycle management, including secure development lifecycle and vended software security. Key responsibilities include managing the existing portfolio, identifying gaps, selecting new technologies, designing implementation and operations plans, and ensuring that the portfolio over time represents exceptional value to deliver world-class security capabilities.
The Information security cloud and applications architect is recognized as the enterprise SME for both cloud & application security and participates in strategic projects, providing consultative direction to multiple stakeholders in technical and management roles. In addition to providing enterprise strategy and direction for cloud and application security, the architect will execute a solutions architect role, planning and deploying key security technologies for the Cirrus organization. The information security identity architect will report directly to the Senior Director, security architecture. Primary Responsibilities• Design a world-class cloud security architecture that includes detect and response capabilities and ensures controls parity between on-and offsite applications• Design a leading application security program highlighting critical security activities throughout the application lifecycle that ensure appropriate controls for sensitive information in alignment with business objectives• Work with multiple teams to collect use cases, requirements, and workflow.• Design comprehensive cloud and application solutions using IAM technologies, SIEM and security monitoring, behavioral analytics, user profiling technologies, application scanning, penetration testing, and other technical means as appropriate• Maintain awareness of industry trends; participate in industry forums, events, and conferences; and develop strategies and process for rapidly integrating critical features into the enterprise.• Lead and perform proof of concept evaluations of vendor technologies.• Develop reference architectures for monitoring and response capabilities across a range of cloud and on-premises technologies
Qualifications
Basic Qualifications • Bachelor of Science Degree in a discipline related to information security, or High School Diploma/GED with 10 years Information Security work experience• Qualified candidates must be legally authorized to be employed in the United States. does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) for this employment position.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Senior Security Operations Engineer
Security architect job in Indiana
SES's Senior Security Operations Engineer focuses on advancing SES's Information Security threat and compliance program by security monitoring, threat & vulnerability management, and delivering professional reports including findings and recommendations. The Senior Security Operations Engineer is expected to be fully aware of the enterprise's security goals as established by its stated policies, procedures, and guidelines and to actively work towards upholding those goals.
PRIMARY RESPONSIBILITIES / KEY RESULT AREAS
* Lead incident response in response to security events and incidents.
* Correlation and trend analysis of security logs, network traffic, security alerts, events, and incidents. Perform in-depth root cause analysis and diligently gather information prior to escalation for future root cause analysis. Event and incident handling consistent with applicable plans and processes.
* Analyzing, triaging, aggregating, escalating, and reporting on security events including investigation of anomalous network activity, and responds to cyber incidents within the network environment.
* Continuous & persistent monitoring of security technologies/tool data and network traffic which result in security alerts generated, parsed, triggered, or observed on the in-scope networks, systems, or security technologies.
* Rapidly assess network traffic, detect data anomalies, and provide detailed reporting on the same.
* Correlation and trend analysis of security logs, network traffic, security alerts, events, and incidents. Perform in-depth root cause analysis and diligently gather information prior to escalation for future root cause analysis.
* Event and incident handling consistent with applicable plans and processes. Integration of activities with standard reports, such as security metrics reports.
* Lead team/project meetings and technical meetings appropriate for the content.
* Ensures assigned tasks and projects are completed on schedule.
COMPETENCIES
* Strong organizational skills and ability to stay focused while managing multiple tasks concurrently.
* Understanding of current attack tools, tactics, procedures, and how to detect and/or mitigate them.
* Strong critical thinking/analytical skills, creativity, and a proven drive for quality
QUALIFICATIONS & EXPERIENCE
* Must Have
* Four Year college degree in a technical field of study or equivalent work experience
* Technical knowledge and aptitude in the areas of networks, network topologies, remote network access, servers, applicable software and troubleshooting techniques required.
* Experience working in a SOC or similar environment.
* Experience with reviewing IDS/IPS, EDR, Firewall and other security/audit logs
* Experience monitoring and analyzing a Security Information and Event Management (SIEM) to identify security issues for remediation, and rules fine tuning.
* Consolidate and conduct comprehensive analysis of threat data obtained from proprietary, and open-source threat intelligence resources for potential and known threats and acting on identified indicators.
* Nice to Have
* Participates in the planning, design, and implementation of enterprise security architecture.
* Experience with threat and vulnerability management, penetration testing, vulnerability assessments, and vulnerability mitigation
* One or more of the following security certifications: Security+, CEH, CYSA+, GCIA, GSEC, GCIA, GMON and GCDA
* Experience as a shift lead or supervisor role.
SES and its Affiliated Companies are committed to providing fair and equal employment opportunities to all. We are an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law.
For more information on SES, click here.
Product Security Engineer, Instagram
Security architect job in Indianapolis, IN
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Snr Info Security Analyst - M&R-DLP
Security architect job in Indiana
Apply now Work Type: Office Working Employment Type: Permanent Job Description: Key Responsibilities Cyber Security Incident Management Operations:
* Monitor, detect & respond to any potential security threats and risks to the organisation, using the available technology toolset
* Correlate and consolidate the alerts, reports, anomalies and other intelligence sources, put the threat/risk in context, and determine event/incident urgency and priority, and initiate an appropriate response
* Continuously improve the accuracy and relevance of the Bank's detection tools and capabilities to keep pace with changing environments and regulatory/compliance requirements
* Adhere to the defined security monitoring processes and procedures, and initiate improvements to them, driving maturity and relevance
* Track and report the remediation of cybersecurity threats and risks, and provide domain expertise during remediation to the appropriate support groups
* Track and document cybersecurity incidents from initial detection through final resolution
* Operate within established standard operating procedures to handle security incidents
* Research trends and countermeasures in computer/network vulnerabilities, exploits, and malicious activity
* Support senior incident handlers during cybersecurity incident response activities
* Perform root cause analyses and present findings to relevant stakeholders for remediation
* Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture
Strategy
* Monitor, detect & respond to any potential security threats across the Bank to ensure all events are acted on in a timely manner.
Business
* Support senior incident handlers during cybersecurity incident response activities.
* Work closely with the other support groups to assess risk and provide recommendations for improving the Bank's security posture.
* Identify opportunities to improve detection and response capabilities of the team
* Work with content engineering team to monitor and tune alerts.
* Conduct research on attack patterns, techniques, and develop creative solutions to detect/prevent adversarial tools, techniques and procedures.
* Collaborate with key stakeholders to continuously enhance playbooks as new products, logs, and capabilities are introduced to the organization.
* Collaborate with key stakeholders in improving the Bank's detection posture.
Processes
* Ensure adherence to all internal and external policies, procedures and regulations.
Risk Management
* Be aware of, identify and escalate all risk issues and concentrations in accordance to the firm's Group Information and Cyber Security Policy. Where appropriate, direct remedial action and/or ensure adequate reporting to Risk Committees.
Governance
* Promote an environment where compliance with internal control functions and the external regulatory framework is a central priority of the service.
Regulatory & Business Conduct:
* Display exemplary conduct and live by the Group's Values and Code of Conduct.
* Take personal responsibility for embedding the highest standards of ethics, including regulatory and business conduct, across Standard Chartered Bank. This includes understanding and ensuring compliance with, in letter and spirit, all applicable laws, regulations, guidelines and the Group Code of Conduct.
* Effectively and collaboratively identify, escalate, mitigate and resolve risk, conduct and compliance matters.
Key stakeholders
* Tech, Transform and Ops
* Cyber Security
* Cyber Defence & Ops Technology
* Cyber Defence Centre
* Security Monitoring & Analytics
* Group Threat Management
Other Responsibilities:
* Work within a 24x7 shift model
* Provide after-hours rotational coverage when required
Skills and Experience
* Well-versed in Cybersecurity Incident Analysis and Response and Cybersecurity Defensive Operations (Blue Team)
* Strong understanding of core Enterprise Information Technology and Computer Networking concepts (Desktop/Laptop, Mobile Device, Server, Network Device, LAN and WAN)
* Basic knowledge of selected IT Service Management (ITSM) processes (Event Management, Incident Management, Change Management, Service Assets and Configuration Management, Service Level Management)
* Exposure to Security Information and Event Management solutions, preferably Splunk ES. User Behaviour Analytics (UBA) exposure is desirable
* Exposure to Endpoint Security and/or Endpoint Detection and Response tools, preferably Symantec
* Demonstrated ability to work with a diverse, geographically-dispersed team
Qualifications
* Diploma or higher educational qualification in Engineering, Computer Science/Information Technology or an equivalent qualification in a relevant discipline
* The following certifications are desirable but not mandatory: EC Council Certified Ethical Hacker (CEH), EC Council Certified Security Analyst (ECSA), SANS GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), Axelos Information Technology Infrastructure Library (ITIL) v3 Foundation
About Standard Chartered
We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us.
Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion.
Together we:
* Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do
* Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well
* Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term
What we offer
In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing.
* Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations.
* Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum.
* Flexible working options based around home and office locations, with flexible working patterns.
* Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits
* A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning.
* Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential.
Apply now
Information at a Glance
*
*
*
*
*
Senior IT Security Analyst
Security architect job in Carmel, IN
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyEngineer, Information Security and Risk
Security architect job in Indianapolis, IN
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
SP28 Senior Information Systems Security Officer (ISSO)
Security architect job in Crane, IN
Amentum is looking for a Sr. Information System Security Officer (ISSO) to support Program Offices within Department of Defense Strategic Systems Programs (SSP). The ISSO will support non-enterprise information systems of large-scaled programs of record (POR), as well as multiple Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected to travel regularly to SPHQ or Field Activities.
The System ISSO is responsible for ensuring that the appropriate operational Cybersecurity posture is maintained for the systems under their purview. They ensure that the applicable system level security objectives are defined for implementation and assist in creating the security authorization package.
Job Duties and Responsibilities:
Ensure systems are accredited, and the standard operating procedures include required security procedures.
Ensure that the systems are operated and maintained such that they stay within the accepted level of residual Cybersecurity risk.
Ensure that Cybersecurity documentation is developed, maintained, and updated as required.
Implement SSP responses to DoD IAVAs and IAVBs.
Initiate investigative procedures for security events, and institute protective or corrective measures when a security incident or vulnerability is discovered.
Report in conjunction with the User Representative (UR) to the branch ISSM on Cybersecurity incidents.
Work with the URs to ensure that incident response plans and contingency plans are developed and tested prior to system operation and annually thereafter, and results documented in the Security Authorization Package.
Participate in all engineering reviews for systems under their cognizance.
In alignment with the Risk Management Framework (RMF), implement security controls, document security measures, and oversee the security posture of information systems operating under Interim Authorization to Test (IATT), preparing authorization packages, and working with various stakeholders to ensure the system's security.
Collaborate with System Administrators to ensure security configurations, patches, and access controls are implemented and maintained during testing.
Develop requirements for large-scale or service specific pilot projects.
Support (prepare, review, and present) the Program Office's DoD Acquisition process in the development of the Objective Quality Evidence (OQE) (i.e. Cyber Security Strategy, GAO responses, Clinger Cohen Act, Cyber Test & Evaluation Strategy, etc.) for multiple programs, in compliance with SSP Regulations.
Support the Program Office Technical Lead as needed identifying issues and action items, document OQE, and participating in ISSO discussions.
Provide customer interactions with Program Offices and associated contractors/subcontractors. Customer interactions will be a combination of teleconferences and on-site meetings.
Interface with the SSP Functional Authorizing Official (FAO, formerly AODR)
Coordinate and collaborate with the stakeholders, including SSP representativ.es and contractors/subcontractors through assessments, subject matter expert input to proposals, technical interchange meetings, status teleconferences, email correspondence, and other meetings as required.
Support development of technical presentations and provide comments on the technical content.
Develop System Security Plans detailing the security controls implemented for each information system.
Work with SSP programs to develop and maintain lifecycle plans.
Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner.
Evaluate performer deliverables and presentations.
Required Qualifications:
Bachelor of Science Degree in Cybersecurity, Computer Science, Computer Engineering or equivalent
5+ years of relevant experience
Must be able to obtain and maintain a US Government Top Secret/Critical Nuclear Weapons Design Information Clearance OR a TS/SCI Clearance. Interim Top-Secret Clearance is required to begin work. Please note US Citizenship is required to obtain and maintain a Top-Secret Clearance.
CompTIA Security+ or equivalent certification
Ability to collaborate with large and highly competent technical teams.
Strategic high-level thinking
Ability/experience with planning an initiative involving large-scale, networked systems.
Must be a United States citizen to obtain clearance.
Willing and able to travel 40% or more.
Preferred Qualifications:
10+ years of relevant experience
Graduate degree in Cybersecurity, Certified Information Systems Security Professional (CISSP) certification, or Certified Information Security Manager (CISM) certification
Active Top Secret Clearance
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.
Auto-ApplySenior Manager, Information Security Office Consultant
Security architect job in Valparaiso, IN
Company DescriptionJobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description201 Third Street (61049), United States of America, San Francisco, CaliforniaSenior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber TechnicalSan Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the Capital One Careers website. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at [email protected]. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to [email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Information Security Executive Advisor (Business Information Security Officer- BISO)
Security architect job in Indianapolis, IN
Location: This role requires associates to be in-office 1 day per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Ideal candidates will be able to report to one of our Pulse Point locations in Indianapolis, IN or Nashville, TN. Alternate locations may be considered if candidates reside within a commuting distance from an office.
Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law.
The Information Security Executive Advisor (Business Information Security Officer- BISO) develops strategic and tactical plans for a comprehensive enterprise-wide information security program. Leads the development of policies, technical standards, guidelines, procedures, and other elements of an infrastructure necessary to support information security in compliance with established company policies, regulatory requirements, and generally accepted information security controls. Responsible for the selection and delivery of strategic network security, access control and secure transaction/messaging solutions.
How you will make an impact:
* Establishes architecture oversight and planning for information and network security technologies.
* Leads development of an information security risk management program that includes business, regulatory, industry practices and technical environment considerations.
* Establishes strategic vendor relationships for security products and services.
* Develops Enterprise-wide security incident response plans and strategies that includes integration with business, compliance, privacy, and legal constituents and requirements.
* Provides advanced level engineering design functions.
* Provides trouble resolution and serves as point of technical escalation on complex problems.
* Creates presentations and seeks IT and business management approval and acceptance of significant replacements or reconfigurations of major security technologies serving the Enterprise.
* Provides technical guidance and leadership to the technical engineers within the organization.
* Participates in the design of the Enterprise architecture.
* Proposes opportunities to improve results based on targeted or continuous assessment.
* Researches relevant trends and activities in healthcare, business, competition and regulatory environments.
* Recommends strategy adjustments.
* Participates in Enterprise planning activity, including vendor assessment, technology platform selection and retirement, prioritization and integration.
* Serves as a technical merger and acquisition lead.
* Acts as a subject matter expert for executive management.
* Provides top-tier support for 6 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
Minimum Requirements:
Requires BS/BA in Information Technology or related field of study and a minimum of 10 years of experience in systems administration and security aspects of information systems, access management and network security technologies, network communications, computer networking, telecommunications, systems development and management, hardware, software, data, and people; experience with multiple technical and business disciplines required; or any combination of education and experience, which would provide an equivalent background.
Preferred Skills, Capabilities and Experiences:
* Previous experience leading large security projects for individual business units highly preferred.
* Expert Business Information Security Liaison experience highly preferred.
* Ability to operate with ambiguous data to create a strategy and plan preferred.
* Broad-based experience to plan and design highly complex systems preferred.
* Expert knowledge and understanding of industry-accepted data processing controls and concepts preferred.
* Security Certifications such as CISSP and other advanced technical security certifications (e.g. Information Systems Security Architecture Professional, Information Systems Security Engineering Professional, Certification and Accreditation or equivalent certifications) preferred.
Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health.
Who We Are
Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve.
How We Work
At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business.
We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few.
Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process.
The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws.
Elevance Health is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact ******************************************** for assistance.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
Auto-ApplyPrincipal Security Engineer
Security architect job in Indianapolis, IN
What's the role?
In this role you will:
Lead a team of 2 SOC analysts/engineers covering the APAC region for a follow-the-sun SOC Operations.
Oversee and actively participate in Detection/Monitoring activities, continuously monitoring network traffic and security alerts for potential threats and vulnerabilities.
Develop and implement robust incident response plans, ensuring the team is well-prepared to address cyber incidents promptly and effectively.
Conduct forensic analysis of security incidents to identify the root causes and extent of breaches, enabling the organization to take appropriate remediation actions.
Stay current with emerging cyber threats and trends, proactively adapting and enhancing security measures to mitigate potential risks.
Mentor and train team members to improve their skills and knowledge in cyber defense, fostering professional growth within the team.
Who are you?
You are a team leader focused on Security Incident Response and Forensics. Further you have the following qualifications:
Degree in Computer Science, Engineering or relevant work experience
Minimum 10 years in cybersecurity engineering roles
Sound knowledge of cyber incident response process and incident handling, GCIH/GCIA/GNFA/GREM/GCFA or equivalent certifications a plus
Malware Analysis - Ability to reverse engineer and analyze behavior of malware to be able to assess impact and suggest remediation actions to address malware infections in multiple environments - Linux, Windows, Mac OSX
Forensics evidence collection - Good understanding of activities required for forensics evidence collection and analysis following legal requirements and industry best practices
Security knowledge -Good knowledge of modern attack vectors, attack execution patterns and exploitation techniques
Communications skills - Ability to clearly communicate things required to be executed by other members of incident response team.
What we offer
HERE offers an opportunity to work in a cutting-edge technology environment with challenging problems to solve! You can make a direct impact on delivery of company´s strategic goals and the freedom to decide how to perform your work. We will support you in delivering your day-to-day tasks and achieving your personal goals and developing your skills. Personal development is highly encouraged at HERE. You can take different courses and training at our online Learning Campus and join cross-functional team projects within our Talent Platform.
HERE is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, age, gender identity, sexual orientation, marital status, parental status, religion, sex, national origin, disability, veteran status, and other legally protected characteristics.
Who are we?
HERE Technologies is a location data and technology platform company. We empower our customers to achieve better outcomes - from helping a city manage its infrastructure or a business optimize its assets to guiding drivers to their destination safely. At HERE we take it upon ourselves to be the change we wish to see. We create solutions that fuel innovation, provide opportunity and foster inclusion to improve people's lives. If you are inspired by an open world and driven to create positive change. Join us. Learn more about us. Watch video
You will join a global Security Operations Center (SOC) and Incident Response team operating across multiple regions, with a primary focus on leading and managing our team in India. In this role, you'll collaborate with some of the brightest minds in cybersecurity to protect our organization from evolving threats. The SOC's mission is to proactively identify, detect, and respond to security incidents within the HERE environment, performing in-depth forensic analysis to prevent future occurrences. We adhere to industry best practices throughout the incident response lifecycle while leveraging innovative approaches to tackle the most complex security challenges.
Auto-ApplySystems Engineer - Physical Security
Security architect job in Carmel, IN
People Driven Technology, Inc is a fast-growing, family-owned technology integrator delivering innovative IT outcomes across the Midwest. With decades of combined experience in business, technology, and engineering, we focus on creating simple, scalable outcomes for our customers. Guided by values of integrity, passion, and teamwork, we prioritize the success of our customers over revenue, building lasting relationships with both customers and strategic partners.
The Systems Engineer - Physical Security will be responsible for working alongside project management and enterprise architects to install, commission and test various physical security systems in a variety of environments. Candidates need to be proactive, customer-focused, and resourceful with a strong understanding of how physical security technology protects business assets. The Physical Security Engineer will be involved in the entire project delivery cycle, including leading projects implementation, commissioning, and maintenance. Ideal candidate will be located near West Lafayette area.
What You Would Do
Deploy access control and video management systems based on industry best practice standards
Install low-voltage wire and hardware for access control and video surveillance systems
Setup, program, and configure network appliances and related software
Commission and test newly installed access control and video surveillance systems
Review, interpret and properly execute project plans: drawings, specifications, project data
Participate in project meetings with stakeholders, both internal and external
Create training documents and instruct end-users in the use of systems
Maintain accurate installation and service records and create precise as-built documentation
Provide subject matter expertise related to access control and video surveillance systems
Respond to phone, email, voicemail, and verbal inquiries and collaborate closely with vendors to inspect, troubleshoot, and assure timely resolution of service issues
Safely operate and maintain assigned company vehicle
Obtain and maintain industry certifications and licenses
Perform other related duties as assigned
What We Are Looking For
High School Diploma/GED or Bachelor's degree or equivalent experience
Certification in one or more of the following: Genetec, Avigilion, and Milestone
Previous access control and/or video surveillance system installation experience preferred
Demonstrated ability to build and maintain strong customer relationships; will serve as the primary point of contact for a high-touch customer
Mechanically inclined and resourceful
Analytical and critical thinker
Proficient with Microsoft Office Suite
Self-starter that is excited to be part of the initial group of employees for a high-growth company
Excellent verbal and written communication skills with the ability to effectively interact with all stakeholders
Comfortable managing multiple and changing priorities, and meeting deadlines in an entrepreneurial environment
What We Would Offer You
Comprehensive medical, dental, and vision plans for you and your dependents.
401(k) Retirement Plan with Employer Match, Health Savings Account, Life Insurance, and Long-Term Disability.
Competitive compensation.
Collaborative and welcoming office culture.
Work-life balance and unlimited paid time off.
Company vehicle and necessary equipment.
Recruitment Agency Notification
People Driven Technology, Inc does not accept unsolicited agency resumes. Do not forward resumes to our careers email address, People Driven employees, or any other company location. People Driven Technology, Inc is not responsible for any fees related to unsolicited resumes.
Equal Opportunity Employer
People Driven Technology, Inc is proud to be an equal opportunity workplace and is an affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. All hiring decisions are based on merit, qualifications, and our business needs.
People Driven Technology, Inc is dedicated to working with and providing reasonable accommodations to individuals with disabilities. If you need reasonable accommodations because of a disability for any part of the employment process, please contact the recruiter and let us know the nature of your request and your contact information.
Information Security Analyst (W2 Contract)
Security architect job in Indianapolis, IN
Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS-IT) under the guidance of the Security Manager.
The essential functions of this role are as follows:
Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement;
Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment.
Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits.
Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53).
Develops Standard Operating Procedures (SOP) for implementing security polices;
Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems;
Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data;
Develops and implements procedures for use of information security management software;
Proposes information security software enhancements;
Performs periodic audits to assure security policies and standards are being followed and are effective.
Develops recommendations for enhancements and generates reports where necessary;
Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security;
Mentors and provides guidance to new or other staff as needed;
Performs related duties as assigned.
Assist on other task as assigned.
Thorough knowledge of information security management tools, policies, and standards of information security procedures;
Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy;
Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation;
Familiarity with domain structures, user authentication, and digital signatures;
Ability to develop and maintain information security standards;
Ability to understand and apply complex computer logic to work;
Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management;
Experience in assessing security needs of teams and assist in their security training.
Ability to communicate effectively both orally and in writing;
Ability to be a team member as well as a team leader depending on the situation;
Degree in information security or technology preferred;
Security certification preferred (e.g. CISSP).
Network Admin experience preferred.
Advisor-Enterprise Security Architect
Security architect job in Indianapolis, IN
The Information Security Architecture (ISA) organization is tasked with ensuring that technology initiatives demonstrate a responsible, risk-based approach to managing information and information risks in accordance with the expectations of its shareholders, regulators and corporate policies. Within the ISA organization, the cloud and application security identity architect is responsible for working closely with stakeholders in infrastructure, applications, business, and security teams to develop the security roadmap for cloud and applications, advising projects and initiatives on cloud and application security practices, and creating the cloud and application lifecycle components of the secure enterprise reference architecture. Along with peers in the ISA organization, the cloud and application security architect will partner with various teams in cloud services, application development, procurement, identity management, and threat monitoring functions to deploy a suite of technologies that support goals for cloud adoption and application development and lifecycle management.The information security cloud and applications architect is responsible for the overall technical security roadmap for cloud services, including infrastructure, platform, software, and business process as a service offerings. The information security cloud and applications architect is also responsible for the overall technical security roadmap for application lifecycle management, including secure development lifecycle and vended software security. Key responsibilities include managing the existing portfolio, identifying gaps, selecting new technologies, designing implementation and operations plans, and ensuring that the portfolio over time represents exceptional value to deliver world-class security capabilities.
The Information security cloud and applications architect is recognized as the enterprise SME for both cloud & application security and participates in strategic projects, providing consultative direction to multiple stakeholders in technical and management roles. In addition to providing enterprise strategy and direction for cloud and application security, the architect will execute a solutions architect role, planning and deploying key security technologies for the Cirrus organization. The information security identity architect will report directly to the Senior Director, security architecture. Primary Responsibilities• Design a world-class cloud security architecture that includes detect and response capabilities and ensures controls parity between on-and offsite applications• Design a leading application security program highlighting critical security activities throughout the application lifecycle that ensure appropriate controls for sensitive information in alignment with business objectives• Work with multiple teams to collect use cases, requirements, and workflow.• Design comprehensive cloud and application solutions using IAM technologies, SIEM and security monitoring, behavioral analytics, user profiling technologies, application scanning, penetration testing, and other technical means as appropriate• Maintain awareness of industry trends; participate in industry forums, events, and conferences; and develop strategies and process for rapidly integrating critical features into the enterprise.• Lead and perform proof of concept evaluations of vendor technologies.• Develop reference architectures for monitoring and response capabilities across a range of cloud and on-premises technologies
Qualifications
Basic Qualifications • Bachelor of Science Degree in a discipline related to information security, or High School Diploma/GED with 10 years Information Security work experience• Qualified candidates must be legally authorized to be employed in the United States. does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) for this employment position.
Additional Information
All your information will be kept confidential according to EEO guidelines.
Detection & Response Security Engineer, Threat Intelligence
Security architect job in Indianapolis, IN
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Senior Security Engineer
Security architect job in Indiana
Apply now Work Type: Office Working Employment Type: Permanent : We are seeking a highly motivated and experienced Cloud Security Hands-On Engineer to join SCB. The Cloud Security Hands-on Engineer will be responsible for designing, implementing, and maintaining our cloud-based security infrastructure. This will include developing a deep understanding of our cloud architecture, identifying and mitigating potential security threats and vulnerabilities, and collaborating with other teams to ensure our security measures are effective.
At least six years' experience with:
* 4+ years of Information Security or engineering experience.
* 2+ years of direct experience in at least one Public Cloud (AWS or Azure).
* Work closely with Product Security, Engineering, Operations, and Corporate Security to define security strategy and execute on it. Implementing automation to enable developers to easily consume security services.
* Improve the accessibility of security through automation, continuous integration pipelines, and other means. Designing a secure application-release automation process to make security an integral part of the CI/CD pipelines.
* Experience in ML Engineering / Applied AI / Data Science with production deployments.
* Enforce standard methodologies, processes and tools and ensure compliance to enterprise architecture, global information security policies and engineering strategy.
* Validate adherence to AWS and Azure governance standards for policy definitions, role-based access controls, ARM Templates, resource groups and Azure Blueprints.
* Identify security tools and lead operationalization of solutions from POC to Production, e.g. API Threat Protection, Container Security, etc. Streamline POC processes.
* Work with SRE and Engineering to implement a chaos-testing methodology and toolkit. Integrating security tools issue tracking with Jira.
* Implement automation to investigation and response workflows for Automated Incident Response.
* Interview, hire, and create on-boarding plans for new or transferred employees.
* Encourage others to seek opportunities for different and innovative approaches to addressing problems; facilitate the implementation and acceptance of change.
* Produce and streamline audit evidence.
* Stay current on threats, vulnerabilities, and controls.
* Familiarity with SecOps processes i.e., detection, monitoring, alerting and threat intelligence.
* Hands-On Proficiency in scripting and coding using Bash, Python, IaC (Terraform, Cloud formation, Azure ARM).
* Participate in the entire lifecycle of software development, including requirements analysis, design, development, testing, deployment, and maintenance. (Tools like Junit, Postman, Burp, Terratest, Sentinel, Misconfig test, OPA,etc.,)
* Hands on experience in infrastructure provisioning, configuration of provisioned infrastructure. deployment of application and Plugins such as TFLint, Checkov, Docker Linter, docker-vulnerability-extension, Security Scan, Contrast Security, etc.,
* Extensive knowledge in analyzing the contents and the build process of a container image in order to detect security issues, vulnerabilities or potential risks. Open-source tools such as Dagda, Clair, Trivy, Anchore, etc., can be leveraged for container image analysis.
* Familiar with Open-source tools such as Jenkins, etc., can be leveraged to build the CI/CD pipelines, and DefectDojo and OWASP Glue can help in tying the checks together and visualizing the check results in a single dashboard.
* Hands-On experience in Open-source tools such as truffle Hog, git-secrets, GitGuardian and similar can be utilized to detect such vulnerable management of secrets.
* Expert knowledge with integrating crucial security tasks into CI/CD pipelines.
* Strong knowledge of software development methodologies and the software development lifecycle.
* Strong knowledge of container security and secrets management.
* Working experience with configuration management.
* Experience with Azure technologies in general, such as Service Fabric, Application Service Environment, Azure Kubernetes Service, Azure DevOps, Azure Monitor, Azure Sentinel, Azure Defender Suite, Azure SQL, Cosmos, Azure APIM, Azure AD, Azure OMS/Application Insights, Global Traffic Manager, etc.
* Experience with AWS technologies, such as CodePipeline, CodeBuild, CodeDeploy, CodeStar, Guardrails, Amazon ECS, AWS Lambda, etc.
Key Responsibilities
Strategy
Responsibilities that are related to the development and implementation of a strategy, for example, Awareness and understanding of the Group's business strategy and model appropriate to the role.
Business
Responsibilities related to the delivery of business and/or financial objectives, for example, Awareness and understanding of the wider business, economic and market environment in which the Group operates
Processes
Reference the processes for which the Role Holder is responsible, as per the Operational Risk Framework definition of first / second line, for example, Responsible for executing and supervising the Budget process
People & Talent
Reference all responsibilities related to people and talent matters, for example:
* Lead through example and build the appropriate culture and values. Set appropriate tone and expectations from their team and work in collaboration with risk and control partners.
* Ensure the provision of ongoing training and development of people and ensure that holders of all critical functions are suitably skilled and qualified for their roles ensuring that they have effective supervision in place to mitigate any risks.
* Employ, engage and retain high quality people, with succession planning for critical roles.
* Responsibility to review team structure/capacity plans.
* Set and monitor job descriptions and objectives for direct reports and provide feedback and rewards in line with their performance against those responsibilities and objectives.
Risk Management
Responsibilities relating to identifying, assessing, monitoring, controlling and mitigating risks to the Group, as well as an awareness and understanding of the main risks facing the Group and the role the individual plays in managing them. For example - The ability to interpret the Group's financial information, identify key issues based on this information and put in place appropriate controls and measures
Governance
Responsibilities relating to the direction, planning, structure, frameworks (e.g. processes and policies) and oversight. For example, Responsible for assessing the effectiveness of the Group's arrangements to deliver effective governance, oversight and controls in the business and, if necessary, oversee changes in these areas; Awareness and understanding of the regulatory framework, in which the Group operates, and the regulatory requirements and expectations relevant to the role
Key stakeholders
list all responsibilities associated with the management of stakeholders e.g. Application Development Community, DevOps Engineering, Security Architecture, Security Engineering, Control Owners
Qualifications
Training, licenses, memberships and certifications
* Experience with scripting and orchestration including Terraform
* Experience with Python, Go, Java, or Ruby
* Experience in ML Engineering / Applied AI / Data Science with production deployments.
* Strong programming skills in Python (Pandas, NumPy, Scikit-learn, TensorFlow/PyTorch, spa Cy/Transformers).
* Experience working with DevOps tools, for ex. Bitbucket, Jenkins and Artifactory
* Experience in DevSecOps pipeline security tools, for ex. OPA, Sentinel
* Experience with Public Cloud platforms, for ex. AWS, Azure or GCP
* Experience in API layer like security, custom analytics, throttling, caching, logging, monetization, request and response modifications etc.
* Experience with Container platforms, for ex. Kubernetes, OpenShift, EKS, AKS or GKE
* Experience in Security automation using Cloud services, like AWS Lambda or Step Function
* Experience creating Splunk use cases (SIEM) and Splunk query language
* Cloud or Container Certifications like CKA, AWS SA, AZ-500, TF Associate
* Cyber Security Certification like CISSP, CCSP, CCSK
* Good understanding of software development methodologies, such as Agile and running Scrum
* Strong analytical and problem-solving skills
* Excellent communication and collaboration skills
* Ability to work effectively in a fast-paced environment
Skills and Experience
* Public Cloud Engineering and Architecture
* API Frameworks
* IAM (RBAC, ABAC) and Secrets Management
* Threat Modeling (Manual / Automation)
* Threat Modeling Framework STRIDE, MITRE
* Azure / AWS Public Cloud
* Python, Go Lang, Java / .NET
* Infrastructure as Code
* PowerShell, Azure CLI
* DevSecOps Capabilities (SAST, DAST, SCA, CodeSign)
About Standard Chartered
We're an international bank, nimble enough to act, big enough for impact. For more than 170 years, we've worked to make a positive difference for our clients, communities, and each other. We question the status quo, love a challenge and enjoy finding new opportunities to grow and do better than before. If you're looking for a career with purpose and you want to work for a bank making a difference, we want to hear from you. You can count on us to celebrate your unique talents and we can't wait to see the talents you can bring us.
Our purpose, to drive commerce and prosperity through our unique diversity, together with our brand promise, to be here for good are achieved by how we each live our valued behaviours. When you work with us, you'll see how we value difference and advocate inclusion.
Together we:
* Do the right thing and are assertive, challenge one another, and live with integrity, while putting the client at the heart of what we do
* Never settle, continuously striving to improve and innovate, keeping things simple and learning from doing well, and not so well
* Are better together, we can be ourselves, be inclusive, see more good in others, and work collectively to build for the long term
What we offer
In line with our Fair Pay Charter, we offer a competitive salary and benefits to support your mental, physical, financial and social wellbeing.
* Core bank funding for retirement savings, medical and life insurance, with flexible and voluntary benefits available in some locations.
* Time-off including annual leave, parental/maternity (20 weeks), sabbatical (12 months maximum) and volunteering leave (3 days), along with minimum global standards for annual and public holiday, which is combined to 30 days minimum.
* Flexible working options based around home and office locations, with flexible working patterns.
* Proactive wellbeing support through Unmind, a market-leading digital wellbeing platform, development courses for resilience and other human skills, global Employee Assistance Programme, sick leave, mental health first-aiders and all sorts of self-help toolkits
* A continuous learning culture to support your growth, with opportunities to reskill and upskill and access to physical, virtual and digital learning.
* Being part of an inclusive and values driven organisation, one that embraces and celebrates our unique diversity, across our teams, business functions and geographies - everyone feels respected and can realise their full potential.
Apply now
Information at a Glance
*
*
*
*
*
Engineer, Information Security and Risk
Security architect job in Indianapolis, IN
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
SP28 Senior Information Systems Security Officer (ISSO)
Security architect job in Crane, IN
Amentum is looking for a Sr. Information System Security Officer (ISSO) to support Program Offices within Department of Defense Strategic Systems Programs (SSP). The ISSO will support non-enterprise information systems of large-scaled programs of record (POR), as well as multiple Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected to travel regularly to SPHQ or Field Activities.
The System ISSO is responsible for ensuring that the appropriate operational Cybersecurity posture is maintained for the systems under their purview. They ensure that the applicable system level security objectives are defined for implementation and assist in creating the security authorization package.
**Job Duties and Responsibilities:**
+ Ensure systems are accredited, and the standard operating procedures include required security procedures.
+ Ensure that the systems are operated and maintained such that they stay within the accepted level of residual Cybersecurity risk.
+ Ensure that Cybersecurity documentation is developed, maintained, and updated as required.
+ Implement SSP responses to DoD IAVAs and IAVBs.
+ Initiate investigative procedures for security events, and institute protective or corrective measures when a security incident or vulnerability is discovered.
+ Report in conjunction with the User Representative (UR) to the branch ISSM on Cybersecurity incidents.
+ Work with the URs to ensure that incident response plans and contingency plans are developed and tested prior to system operation and annually thereafter, and results documented in the Security Authorization Package.
+ Participate in all engineering reviews for systems under their cognizance.
+ In alignment with the Risk Management Framework (RMF), implement security controls, document security measures, and oversee the security posture of information systems operating under Interim Authorization to Test (IATT), preparing authorization packages, and working with various stakeholders to ensure the system's security.
+ Collaborate with System Administrators to ensure security configurations, patches, and access controls are implemented and maintained during testing.
+ Develop requirements for large-scale or service specific pilot projects.
+ Support (prepare, review, and present) the Program Office's DoD Acquisition process in the development of the Objective Quality Evidence (OQE) (i.e. Cyber Security Strategy, GAO responses, Clinger Cohen Act, Cyber Test & Evaluation Strategy, etc.) for multiple programs, in compliance with SSP Regulations.
+ Support the Program Office Technical Lead as needed identifying issues and action items, document OQE, and participating in ISSO discussions.
+ Provide customer interactions with Program Offices and associated contractors/subcontractors. Customer interactions will be a combination of teleconferences and on-site meetings.
+ Interface with the SSP Functional Authorizing Official (FAO, formerly AODR)
+ Coordinate and collaborate with the stakeholders, including SSP representativ.es and contractors/subcontractors through assessments, subject matter expert input to proposals, technical interchange meetings, status teleconferences, email correspondence, and other meetings as required.
+ Support development of technical presentations and provide comments on the technical content.
+ Develop System Security Plans detailing the security controls implemented for each information system.
+ Work with SSP programs to develop and maintain lifecycle plans.
+ Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner.
+ Evaluate performer deliverables and presentations.
**Required Qualifications:**
+ Bachelor of Science Degree in Cybersecurity, Computer Science, Computer Engineering or equivalent
+ 5+ years of relevant experience
+ Must be able to obtain and maintain a US Government Top Secret/Critical Nuclear Weapons Design Information Clearance OR a TS/SCI Clearance. Interim Top-Secret Clearance is required to begin work. Please note US Citizenship is required to obtain and maintain a Top-Secret Clearance.
+ CompTIA Security+ or equivalent certification
+ Ability to collaborate with large and highly competent technical teams.
+ Strategic high-level thinking
+ Ability/experience with planning an initiative involving large-scale, networked systems.
+ Must be a United States citizen to obtain clearance.
+ Willing and able to travel 40% or more.
**Preferred Qualifications:**
+ 10+ years of relevant experience
+ Graduate degree in Cybersecurity, Certified Information Systems Security Professional (CISSP) certification, or Certified Information Security Manager (CISM) certification
+ Active Top Secret Clearance
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters (********************************* SkbztPuAwwxfs) .
Systems Engineer - Physical Security
Security architect job in Carmel, IN
Job Description
People Driven Technology, Inc is a fast-growing, family-owned technology integrator delivering innovative IT outcomes across the Midwest. With decades of combined experience in business, technology, and engineering, we focus on creating simple, scalable outcomes for our customers. Guided by values of integrity, passion, and teamwork, we prioritize the success of our customers over revenue, building lasting relationships with both customers and strategic partners.
The Systems Engineer - Physical Security will be responsible for working alongside project management and enterprise architects to install, commission and test various physical security systems in a variety of environments. Candidates need to be proactive, customer-focused, and resourceful with a strong understanding of how physical security technology protects business assets. The Physical Security Engineer will be involved in the entire project delivery cycle, including leading projects implementation, commissioning, and maintenance. Ideal candidate will be located near West Lafayette area.
What You Would Do
Deploy access control and video management systems based on industry best practice standards
Install low-voltage wire and hardware for access control and video surveillance systems
Setup, program, and configure network appliances and related software
Commission and test newly installed access control and video surveillance systems
Review, interpret and properly execute project plans: drawings, specifications, project data
Participate in project meetings with stakeholders, both internal and external
Create training documents and instruct end-users in the use of systems
Maintain accurate installation and service records and create precise as-built documentation
Provide subject matter expertise related to access control and video surveillance systems
Respond to phone, email, voicemail, and verbal inquiries and collaborate closely with vendors to inspect, troubleshoot, and assure timely resolution of service issues
Safely operate and maintain assigned company vehicle
Obtain and maintain industry certifications and licenses
Perform other related duties as assigned
What We Are Looking For
High School Diploma/GED or Bachelor's degree or equivalent experience
Certification in one or more of the following: Genetec, Avigilion, and Milestone
Previous access control and/or video surveillance system installation experience preferred
Demonstrated ability to build and maintain strong customer relationships; will serve as the primary point of contact for a high-touch customer
Mechanically inclined and resourceful
Analytical and critical thinker
Proficient with Microsoft Office Suite
Self-starter that is excited to be part of the initial group of employees for a high-growth company
Excellent verbal and written communication skills with the ability to effectively interact with all stakeholders
Comfortable managing multiple and changing priorities, and meeting deadlines in an entrepreneurial environment
What We Would Offer You
Comprehensive medical, dental, and vision plans for you and your dependents.
401(k) Retirement Plan with Employer Match, Health Savings Account, Life Insurance, and Long-Term Disability.
Competitive compensation.
Collaborative and welcoming office culture.
Work-life balance and unlimited paid time off.
Company vehicle and necessary equipment.
Recruitment Agency Notification
People Driven Technology, Inc does not accept unsolicited agency resumes. Do not forward resumes to our careers email address, People Driven employees, or any other company location. People Driven Technology, Inc is not responsible for any fees related to unsolicited resumes.
Equal Opportunity Employer
People Driven Technology, Inc is proud to be an equal opportunity workplace and is an affirmative action employer. We celebrate diversity and are committed to creating an inclusive environment for all employees. All hiring decisions are based on merit, qualifications, and our business needs.
People Driven Technology, Inc is dedicated to working with and providing reasonable accommodations to individuals with disabilities. If you need reasonable accommodations because of a disability for any part of the employment process, please contact the recruiter and let us know the nature of your request and your contact information.
SP28 Senior Information Systems Security Officer (ISSO)
Security architect job in Crane, IN
Amentum is looking for a Sr. Information System Security Officer (ISSO) to support Program Offices within Department of Defense Strategic Systems Programs (SSP). The ISSO will support non-enterprise information systems of large-scaled programs of record (POR), as well as multiple Science and Technology (S&T) programs. The System ISSO will provide direct support to the Program Office Technical Lead onsite at NSWC Crane and will be expected to travel regularly to SPHQ or Field Activities.
The System ISSO is responsible for ensuring that the appropriate operational Cybersecurity posture is maintained for the systems under their purview. They ensure that the applicable system level security objectives are defined for implementation and assist in creating the security authorization package.
Job Duties and Responsibilities:
* Ensure systems are accredited, and the standard operating procedures include required security procedures.
* Ensure that the systems are operated and maintained such that they stay within the accepted level of residual Cybersecurity risk.
* Ensure that Cybersecurity documentation is developed, maintained, and updated as required.
* Implement SSP responses to DoD IAVAs and IAVBs.
* Initiate investigative procedures for security events, and institute protective or corrective measures when a security incident or vulnerability is discovered.
* Report in conjunction with the User Representative (UR) to the branch ISSM on Cybersecurity incidents.
* Work with the URs to ensure that incident response plans and contingency plans are developed and tested prior to system operation and annually thereafter, and results documented in the Security Authorization Package.
* Participate in all engineering reviews for systems under their cognizance.
* In alignment with the Risk Management Framework (RMF), implement security controls, document security measures, and oversee the security posture of information systems operating under Interim Authorization to Test (IATT), preparing authorization packages, and working with various stakeholders to ensure the system's security.
* Collaborate with System Administrators to ensure security configurations, patches, and access controls are implemented and maintained during testing.
* Develop requirements for large-scale or service specific pilot projects.
* Support (prepare, review, and present) the Program Office's DoD Acquisition process in the development of the Objective Quality Evidence (OQE) (i.e. Cyber Security Strategy, GAO responses, Clinger Cohen Act, Cyber Test & Evaluation Strategy, etc.) for multiple programs, in compliance with SSP Regulations.
* Support the Program Office Technical Lead as needed identifying issues and action items, document OQE, and participating in ISSO discussions.
* Provide customer interactions with Program Offices and associated contractors/subcontractors. Customer interactions will be a combination of teleconferences and on-site meetings.
* Interface with the SSP Functional Authorizing Official (FAO, formerly AODR)
* Coordinate and collaborate with the stakeholders, including SSP representativ.es and contractors/subcontractors through assessments, subject matter expert input to proposals, technical interchange meetings, status teleconferences, email correspondence, and other meetings as required.
* Support development of technical presentations and provide comments on the technical content.
* Develop System Security Plans detailing the security controls implemented for each information system.
* Work with SSP programs to develop and maintain lifecycle plans.
* Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner.
* Evaluate performer deliverables and presentations.
Required Qualifications:
* Bachelor of Science Degree in Cybersecurity, Computer Science, Computer Engineering or equivalent
* 5+ years of relevant experience
* Must be able to obtain and maintain a US Government Top Secret/Critical Nuclear Weapons Design Information Clearance OR a TS/SCI Clearance. Interim Top-Secret Clearance is required to begin work. Please note US Citizenship is required to obtain and maintain a Top-Secret Clearance.
* CompTIA Security+ or equivalent certification
* Ability to collaborate with large and highly competent technical teams.
* Strategic high-level thinking
* Ability/experience with planning an initiative involving large-scale, networked systems.
* Must be a United States citizen to obtain clearance.
* Willing and able to travel 40% or more.
Preferred Qualifications:
* 10+ years of relevant experience
* Graduate degree in Cybersecurity, Certified Information Systems Security Professional (CISSP) certification, or Certified Information Security Manager (CISM) certification
* Active Top Secret Clearance
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, sex, sexual orientation, pregnancy (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, ancestry, United States military or veteran status, color, religion, creed, marital or domestic partner status, medical condition, genetic information, national origin, citizenship status, low-income status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal laws and supplemental language at Labor Laws Posters.