Cyber Security Analyst
Security architect job in Detroit, MI
Security Governance, Risk & Compliance Analyst (GRC Analyst)
Direct Hire
Detroit (hybrid after 30-days) --> LOCAL candidates will only be considered
US or Green Card may only be considered
We're seeking an experienced Information Security Governance, Risk & Compliance Analyst to strengthen our IT Security program. This role is ideal for a proven GRC professional with hands-on expertise in regulatory compliance, risk assessments, and enterprise security frameworks.
Ideal Profile Highlights:
10+ years in Information Security GRC across regulated industries
Expertise in NIST, ISO 27001, SOX, GLBA, GDPR, and audit coordination
Strong operational experience with Azure, O365, CrowdStrike, Mimecast, ZenGRC, Archer, KnowBe4
Proven leader with excellent technical writing and cross-functional collaboration skills
Certifications: CIPP/US, CIPM, CDPSE, ISO 27001 Internal Auditor
Key Responsibilities:
Monitor regulatory changes and ensure compliance alignment
Conduct enterprise risk assessments and manage remediation
Support audit readiness and evidence documentation
Develop and enhance governance policies and incident response plans
Deliver GRC reporting to IT & business leadership
✅ Hybrid schedule after 30 days
Cyber Security Analyst (Rif. 2025-127)
Security architect job in Grand Rapids, MI
aizo On, a technology consulting company, is looking for Cybersecurity Analyst.
AIZOON USA is expanding its Cybersecurity Division and seeks skilled Cybersecurity Analysts to operate and manage cyber security platforms. In this critical role, you'll be responsible for security threat monitoring, incident response, risk assessment, and client advisory services.
Key Responsibilities:
Operate cybersecurity monitoring platforms and conduct threat analysis
Respond to security incidents with defined escalation procedures
Conduct risk assessments and support compliance regulatory standards
Provide client support and continuous cybersecurity advisory services
Qualifications:
Experience with SOC operations, incident response, and threat intelligence
Familiarity with cybersecurity frameworks (NIST, ISO27001)
Strong analytical and problem-solving skills
aizo On is an equal opportunity employer.
Architect
Security architect job in Detroit, MI
Detroit, Michigan
$100,000 - $120,000 + Progression to Partner + Annual Bonus + Opportunity to Build and Lead a Team
Are you a architect, looking to work on high value commercial projects, with a rapidly expanding company offering a great opportunity to become a partner at the company?
This is an excellent opportunity to manage a team of junior architects whilst overseeing exciting commercial design projects with the opportunity to progress into partner.
This is a great time to join this rapidly expanding design build firm who have exciting expansion plans with their new office opening in December. They are looking for someone to step up in to a leadership position to help take on more projects and grow the business even further.
This position is office based. You will be tasked with overseeing a team of architects, working on designs and plans for commercial projects, meeting with clients, and attending leadership and sub meetings.
This role would suit someone with a civil PE license, looking to lead a team, progress your career and play a pivotal role In growing a business.
The Role:
•Architect
•Office based role
•Manage a team of junior architects
•Meeting with clients
The Person:
•Ambition to grow a team
•Experience with Revit
•Desire to work in a fast-paced environment
Associate Security Architect (Cloud & Enterprise)
Security architect job in Traverse City, MI
At SCP Health, what you do matters
As part of the SCP Health team, you have an opportunity to make a difference. At our core, we work to bring hospitals and healers together in the pursuit of clinical effectiveness. With a portfolio of over 8 million patients, 7500 providers, 30 states, and 400 healthcare facilities, SCP Health is a leader in clinical practice management spanning the entire continuum of care, including emergency medicine, hospital medicine, wellness, telemedicine, intensive care, and ambulatory care.
Why you will love working here:
- Strong track record of providing excellent work/life balance.
- Comprehensive benefits package and competitive compensation.
- Commitment to fostering an inclusive culture of belonging and empowerment through our core values - collaboration, courage, agility, and respect.
Responsibilities:
Architecture & Design
Define security requirements, best practices, and reference architectures for hybrid multi-cloud (AWS, Azure) and on-premises environments.
Design and implement security controls for DevSecOps and CI/CD pipelines.
Establish best practices for Cloud Security Posture Management (CSPM) and secure Infrastructure-as-Code (IaC).
Apply SaaS Security Posture Management (SSPM) standards for enterprise SaaS applications.
Support architecture and security reviews to identify vulnerabilities and recommend mitigation strategies.
Evaluate and integrate emerging security technologies and practices across cloud and enterprise systems.
Enterprise Security Enablement
Support enterprise IAM and PAM strategies, including MFA, SSO, certificate, and secrets management.
Ensure security for enterprise platforms, including network, endpoint, and data security.
Contribute to compliance, governance, and audit readiness efforts (HIPAA, HITRUST, SOC 2, SOX, ISO 27001, NIST CSF).
Align security initiatives with enterprise IT roadmaps and transformation programs.
Collaboration & Culture
Partner with IT, DevOps, Data, and Application teams to embed security throughout the development, testing, and deployment lifecycle.
Provide security mentorship, training, and guidance across technical teams.
Advocate for a security-first culture and serve as a bridge between technical staff, business stakeholders, and leadership.
Engage with auditors, regulators, and executives to communicate security posture, risks, and remediation strategies.
Knowledge, Skills, and Abilities:
Frameworks & Standards: NIST CSF, ISO 27001, HIPAA, HITRUST, SOX, SOC 2, CIS Controls.
Cloud Security: AWS Security Hub, Azure Security Center, IAM, encryption, monitoring.
Enterprise Security: Network segmentation, endpoint security, DLP, vulnerability management.
Application Security: OWASP Top 10, secure SDLC, CI/CD security, DevSecOps.
Data Security & Privacy: Encryption, DLP, data classification, GDPR, CCPA compliance.
Identity & Access Management: IAM, PAM, MFA, SSO, certificate/secrets management.
Automation & Tooling: Terraform, Python, PowerShell, security orchestration.
Soft Skills: Strategic thinking, strong communication, collaboration, and mentoring abilities.
EDUCATION (Required and/or Preferred):
Bachelor's degree in Computer Science, Information Security, Cybersecurity, or related field.
Master's degree in Computer Science or related field, preferred
FIELD OF STUDY:
Computer Science
Information Security
Cyber Security
Information Technology
WORK EXPERIENCE/QUALIFICATIONS:
5+ years in cybersecurity, with at least 2+ years in architecture or engineering roles spanning both cloud and enterprise environments.
Hands-on experience designing and implementing security controls for AWS and/or Azure.
Familiarity with hybrid infrastructure security, IAM, PAM, and enterprise platforms.
Experience with compliance frameworks (HIPAA, HITRUST, SOC 2, NIST CSF, ISO 27001, CIS).
Proficiency in threat modeling, risk assessment, and security control design.
Experience with CSPM, SSPM, and secure DevOps practices.
Strong Microsoft Excel and Visio/Lucid skills.
Experience in healthcare security and regulatory environments, preferred
Knowledge of container security (Kubernetes, Docker) and cloud-native security, preferred
Experience with security automation, scripting, and orchestration, preferred
CERTIFICATES AND LICENSES:
Certifications such as CISSP, CISM, CCSP, Azure Security Engineer, AWS Security Specialty, GIAC (GCSA, GSEC, GPEN, etc.), preferred
PRIMARY LOCATION:
Atlanta, GA
Dallas, TX
Lafayette, LA
Traverse City, MI
SECONDARY LOCATION(S):
US-based Hybrid
#LI-PM1
Auto-ApplyApp Security Architect.
Security architect job in Michigan
Length of Contract: 24+ months. Long-term assignment.
Description:
The Application Security Architect will report to the Application Security Architect Lead and will be responsible for assuring that IT application software and infrastructure is designed, implemented, and operated in accordance with applicable security standards and practices. Primary responsibilities include applications security, risk assessment, validation of security pen test results, problem resolution, system documentation, and system security management and support.
Position Responsibilities:
• Serve as primary information security interface to the assigned projects to collaborate with business representatives, systems development and business users for establishing business requirements, information security functional requirements, security solution options and implementation plans
• Good understanding of the architecture and the various web application tier and database tier components: underlying objects, schemas/products, database objects, file system structure, tables, views, packages, procedures, sequences, indexes, and constraints
• Conduct information security threat analyses on new and changed application development initiatives towards design, review, and incident response planning.
• Identify security requirements for applications, services and supporting infrastructure and effectively communicate requirements to application development teams and business owners
• Review application source code for vulnerabilities, using both manual and automated code scanning techniques aka Whitebox Testing.
• Identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options.
• Determine and clearly communicate quantitatively where possible the information security risks to the application development teams.
• Identify threats and risks to the confidentiality, integrity and availability of all data residing on information systems platforms.
• Recommend appropriate security solutions and review remediation activities for completeness.
• Assure compliance to security policies, standards, and procedures, including HIPPA, SOX, and CMS compliance.
• Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft.
• Initiate and promote activities to foster information security awareness and education among application development.
• Work with Information security peers and manager to assure standards compliance on various platforms (e.g., OSs, databases, networks, etc.) upon which application development group relies for the operation of its applications.
• Knowledge of operating systems (Windows, Unix) and common COTS products used to deliver web services, including IIS, Apache, Tomcat, Oracle Application Server, WebSphere, etc.
Top 3 Skills/Experience:
1. Skilled to identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options.
2. Ability to be the primary information security interface to the assigned projects, and collaborate with business representatives, systems development and business users for establishing business requirements, information security functional requirements, security solution options and implementation plans
3. Skilled to determine and clearly communicate quantitatively where possible the information security risks to the application development teams.
Required Skills/Experience:
o Advanced written and verbal communications skills
o Experience with a variety of information security processes and technologies such as:
• Common operating systems, network protocols, web services and databases
• Risk assessment and management
• Identity management and authentication
• Directory services
• Application security and systems development life cycle
• Data and systems integrity controls
• Encryption technology
• Business requirements development and technical architecture development
• Change control and release management
• Network and application security assessment and ethical hacking
• System planning and integration
o Ability to adjust to changing priorities while multitasking effectively
o Ability to design, evaluate and document processes and lead teams in accomplishing process review and improvement
o Ability to interact with technical managers and development teams to articulate requirements and processes while collaborating on design options, implementation, testing and user acceptance
o Experience in project management, change management and release management
o Demonstrated ability to develop metrics, perform critical analysis and develop executive decision support content
o Knowledge of database applications, spreadsheet design, and report writing software
o Minimum 2 years experience in a security or related IT function
Preferred Skills/Experience:
• CISSP, CCNA, CCENT, CCNP, GSEC, MCSA, CISM certifications are preferred
Educational Requirements:
• Bachelors degree in Computer Science, Information Systems, Engineering or related major
Security Architect
Security architect job in Farmington Hills, MI
Job Details Farmington Hills Office - Farmington Hills, MI HybridDescription
The role of the Security Architect at MDT is to ensure that security requirements necessary to protect MDT's mission, vision and business processes are adequately addressed. The Security Architect is responsible for designing and implementing comprehensive security solutions and strategies. This role serves as a key security and technical advisor and strategist, partnering with technology, development, and business teams to ensure secure-by-design solutions across the organization's technology landscape.
DUTIES & RESPONSIBILITIES
Design and implement security controls for cloud, on-premises, and hybrid environments (e.g., AWS, Azure, GCP).
Monitor and review cloud service provider security policies to help ensure compliance with organizational requirements.
Partner with Enterprise Architects and Development teams to ensure security best practices and principles are embedded in their workflows.
Conduct security assessments and risk analysis to identify vulnerabilities and propose mitigation strategies within the Zero Trust framework.
Design and implement Zero Trust principles and frameworks to enhance the security posture of our systems and networks.
Design and maintain robust CI/CD pipelines with integrated security checks to "shift security left," ensuring vulnerabilities are identified early in the development process.
Collaborate with cross-functional teams to define access policies, user authentication mechanisms, and secure connectivity across various environments.
Design and collaborate with cross-functional teams to deploy secure SSO solutions with identity providers (IdPs), directory services, and third-party applications for seamless and centralized authentication and authorization across multiple applications and systems.
Collaborate with stakeholders to understand business requirements and translate them into effective security controls and solutions.
Make recommendations to reduce risks.
Supports administration of the enterprise security infrastructure including, but not limited to, the systems supporting: network security monitoring, two-factor authentication, web application firewalls, vulnerability management, endpoint detection and response, data loss prevention, and enterprise logging.
Supports incident response processes.
Compiles metrics for leadership.
Assists in installing, implementing, and maintaining security software.
Maintains the availability, patching, and operational functionality of assigned security systems.
Evaluates new security tools, products, and solutions for applicability to security needs.
Makes recommendations regarding purchase of security products.
Ensures MDT's reputation is maintained internally and externally.
Ensures appropriate levels of security and confidentiality are always maintained.
Acts as a representative of MDT with business and professional organizations and external IT contacts.
Keeps management informed of area activities and any significant concerns.
Attends and participates in meetings as required.
Completes accurate tickets, reports, records, and other documentation as necessary.
Stay up to date with industry trends, emerging technologies, and security best practices to proactively identify potential threats and vulnerabilities.
Responsible for working with the security team and other departments to ensure work is flowing effectively and timely throughout the organization.
Assists in setting department and company standard practices and procedures.
Responsible for working with company vendors to ensure the delivery of products or services is successful.
Acts as a subject matter expert for co-workers and fosters a culture of continuous learning and cross-training.
Assigned to the on-call rotation to support security operations.
Stays informed of trends and changes in the information security field.
Completes special projects and research studies as required.
Keeps work area clean, secure, and well maintained
EDUCATION & EXPERIENCE REQUIREMENTS
Bachelor's degree in Computer Science or a related field, or an equivalent combination of training and experience in Computer Science.
Professional certifications such as CISSP, CISM, CCSK, or CCSP are highly desirable.
Ten years of experience as a Security Architect or similar role, with a focus on cloud security and Zero Trust architecture.
REQUIRED KNOWLEDGE
Strong knowledge of cloud platforms (e.g., AWS, Azure, Google Cloud) and associated security controls.
Experience designing and implementing Zero Trust architectures, including network segmentation, secure access controls, and strong authentication mechanisms.
Experience with designing and implementing Secure Access Service Edge (SASE) and Software-Defined Wide Area Network (SD-WAN).
Experience with the design and integration of security into the SDLC by implementing secure coding standards, automated security testing (SAST, DAST), and vulnerability scanning.
In-depth understanding of SSO protocols and standards (e.g., SAML, OAuth, OpenID Connect) and their implementation.
Technical understanding of threat actor attack techniques.
Familiarity with security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO 27001, CIS Controls).
Excellent analytical and problem-solving skills, with the ability to assess complex security requirements and recommend appropriate solutions.
Effective communication and interpersonal skills to collaborate with cross-functional teams and communicate security concepts to non-technical stakeholders.
Self-motivated and ability to meet deadlines with minimal supervision.
Well organized and attentive to detail.
Strong leadership abilities.
Project management skills.
Ability to maintain confidentiality.
WORKING CONDITIONS
Special
No hazardous or significantly unpleasant conditions (such as in a typical office).
Additional hours, including on-call with Saturday/Sunday support, as required.
Long duration of computer workstation usage.
INTENT AND FUNCTION OF S
s assist organizations in ensuring that the hiring process is fairly administered and that qualified employees are selected. They are also essential to an effective appraisal system and related promotion, transfer, layoff, and termination decisions. Well-constructed job descriptions are an integral part of any effective compensation system.
All descriptions have been reviewed to ensure that only essential functions and basic duties have been included. Peripheral tasks, only incidentally related to each position, have been excluded. Requirements, skills, and abilities included have been determined to be the minimal standards required to successfully perform the positions. In no instance, however, should the duties, responsibilities, and requirements delineated be interpreted as all inclusive. Additional functions and requirements may be assigned by supervisors as deemed appropriate.
In accordance with the Americans with Disabilities Act, it is possible that requirements may be modified to reasonably accommodate disabled individuals. However, no accommodations will be made which may pose serious health or safety risks to the employee or others or which impose undue hardships on the organization.
Security Architect (Identity & Access Management)
Security architect job in Saline, MI
Collabera is the largest minority-owned Information Technology (IT) staffing firm in the U.S., with more than $525 million in sales revenue and a global presence that represents approximately 10,000 professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but we are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for four consecutive years since 2012. With over forty offices globally and a presence in seven countries, Collabera provides staff augmentation, managed services and direct placement services to Global 2000 Corporations. Collabera is ranked amongst the top 10 IT staffing firms in the U.S., and for the past 24 years we have continued to grow rapidly year after year.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings.
Awards and Recognitions
--Staffing Industry Analysts: Best Staffing Firm to Work For (2015, 2014, 2013, 2012)
--Staffing Industry Analysts: Largest U.S. Staffing Firms (2015, 2014, 2013)
--Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
BS or BA degree in computer science, business administration, or related technical field or equivalent experience is required
· Minimum of 8 years of security application architecture, data security and code review experience.
· Must have expert level knowledge of a wide variety of information security architectures, concepts and techniques, as well as supporting security tools
· Exemplary general IT knowledge (applications development, testing, deployment, operations, documentation, standards, best practices, security, hardware, networking, OS, DBMS, middleware, etc.)
· Experience with secure application architecture, application intrusion and vulnerability penetration testing, secure coding practices, J2EE/.NET/Web Services Architecture and code review
· Experience with pattern oriented design and architecture of high-volume transactional systems
· Experience in identifying and validating application vulnerabilities at both an architectural and source code level.
· Must have strong skills in networking (TCP/IP, topology & security), operating systems (Windows, UNIX, Linux, Citrix, Midrange and Mainframe), databases, application security, web operations (internet security), and secure remote access capabilities
· Extensive knowledge of information security best practices, regulatory concerns and security standards including COBIT, ISO, ITIL, CMM, and Sarbanes-Oxley
· Effective project management skills, including the ability to plan, organize, prioritize, and balance multiple tasks and/or projects to ensure target dates and goals are achieved
· Ability to coordinate the efforts of multiple internal and external cross-functional teams to perform thorough audit processes
· Must have excellent analytical abilities
· Excellent written and verbal communication skills with the ability to work independently or as part of a team
Qualifications
Technical Skills: Oracle Identity Manager, Oracle Unified Directory, Oracle Access Manager, Workday, Active Directory, Azure, ADFS, SPML, Linux, MSSQL, LDAP, XML, Oracle DB, SQL Server, Weblogic, REST
Additional Information
To know more about this position, please contact:
Sreeni
************
sreenivasulu. ************************
Easy ApplySenior Manager, Information Security Office Consultant
Security architect job in Grand Rapids, MI
Jobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description
201 Third Street (61049), United States of America, San Francisco, California
Senior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber Technical
San Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the
Capital One Careers website
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.
No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at
[email protected]
. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
[email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Information Security Manager
Security architect job in Detroit, MI
Computech Corporation provides IT and consulting services to various customers across the globe. We are a Minority Certified Company with over 15 years of industry experience. Our global delivery model and proven track record enable companies to realize improved business efficiency and increased profitability.
Job Description
As an Information Security Product Manager, you will work with highly skilled engineers, key business decision makers, and IT leadership. You will define the future direction for our technical security services and bring about the realization of that vision. You will work with vendors and the ecosystem, to help us stay abreast in new security technologies and to identify what capabilities to invest in.
Qualifications
Top 3 Skills required
• Design, architecture, and implementation of centralized security technology solutions at large enterprises - 5 years
• Operations experience in identity management, key management, or other security domains - 3 years
• Leadership role in the development or delivery of information security services - 3 years
Background Required
• In depth knowledge of key information security domains, including authentication, authorization, access control, and encryption
• Demonstrated experience in designing and implementing enterprise class security solutions
• Familiarity with agile and waterfall development methodologies
• Ability to translate the information security domain to IT and business domains, as well as communicate complex technologies in a clear and concise manner
Preferences
• Security operations experience, such as identity management or key management.
• Previous leadership experience, either through leading teams and/or initiatives
• Success in large corporate environments
Role and Responsibilities
• Internalize the team's mission and strategies, including key initiatives
• Distill the technical vision for the team, including the future state for our centralized security technologies. This will span authentication, authorization, encryption, and other related services
• Understand our customers; leverage feedback and learning to guide improvements to the information security customer experience
• Gather, understand, and prioritize the business needs for centralized, shared security technology. This will be a comprehensive and ongoing exercise.
• Build and maintain relationships with service customers and key stakeholders. This includes
o representing the team with stakeholders, communicating on behalf of stakeholders within the team, and being the team's inbound/outbound point of contact
o communicate evangelizing our mission and the value our services deliver
o gather feedback from customers and stakeholders to ensure on-going suitability of service features
o communicating regularly with senior IT leadership on key security metrics and service development successes
• Facilitate and govern the full life-cycle of technical security service components, including
o guiding the technical security control architecture
o approving service life-cycle transitions
• Prioritize and launch service development initiatives,
o interfacing with business and technical stakeholders to define scope
o establishing success criteria
o estimating work efforts
o securing funding
• Seek new business opportunities that are enabled by our services
• Identify potential areas for service improvements, including through
o new technologies and vendor relationships. This also means Influencing selection of security technologies and managing relationships with vendor partners
o partnering with information security research, service development, and security delivery teams
• Assisting in planning for skill, methodology, technology, and facility needs for future services and capabilities
Qualifications - Education and/or experience
• Bachelors degree
• Minimum 7 years of experience in information security architecture or engineering
Qualifications - Other skills and abilities [soft skills]
• Excellent verbal and written communication skills
• Ability to influence and motivate people across a wide range of functional areas
• Strong customer service skills
• Capable in managing conflict and driving win-win outcomes
• Highly organized; prepared to juggle multiple tasks while keeping focus on priorities
• Comfortable switching from big picture to detail oriented activities
• Passionate learner; able to rapidly digest, analyze, and apply new knowledge
Additional Information
All your information will be kept confidential according to EEO guidelines.
Global Physical Security Systems Engineer
Security architect job in Zeeland, MI
Why join us?
Our purpose is design for the good of humankind. It's the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.
GENERAL PURPOSE
Responsible for supporting Physical Security Systems hardware and software technology throughout the enterprise. Independently conducts field work, oversees contractor labor, and troubleshoots service issues according to department guidelines utilizing Milestone, Lenel, Bosch and other systems.
ESSENTIAL FUNCTIONS
Coordinates contract install/service labor and reviews work for commissioning. May lead small projects.
Advises and assists in annual security systems budgeting process.
Coordinates with external relationships to ensure the viability of all physical security systems, legacy and new, with the goal of minimal business disruption as the result of failed or improperly configured systems.
Ensures the coordination, installation, upgrade and conversion or servicing of alarm systems, access controls, video cameras, burglary, radio systems and all other types of physical security equipment.
Maintains an in-depth knowledge of the state-of-the-art security equipment standards and technology encompassing all physical security products. Suggests system solutions to specific security concerns identified through customer request and security audits.
Perform additional responsibilities as requested to achieve business objectives.
Performs annual audits for various access control systems.
Provides product research, feasibility studies, project planning, tracking and quality assurance and overall vendor communication and management.
Reviews physical security system standards, policies, required upgrades, maintenance and day-to-day management of all security systems through system integrators or internal resources.
With guidance, plans and recommends to management the physical security systems and service requirements for the company.
Identifies errors, troubleshoots, and determines corrective action in existing systems.
Creates scope of work and requests for proposal for installation projects.
Interprets CAD/technical blueprints for construction design.
Coordinates vendor/installer technicians for project installs and service calls.
Administers infrastructure upgrades, implementations and integrations.
Anticipates technology solutions to solve current and future business needs.
Independently programs access control, intrusion detection, and camera equipment.
Independently installs and wires security system components
Tests and commissions new security equipment installations.
Determines the appropriate physical security techniques in balance with MillerKnoll practices to accomplish objectives.
Suggests technology solutions aligned with corporate security strategy and budget guidelines.
Performs additional responsibilities as requested to achieve business objectives.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education/Experience
High school diploma or equivalent
Two years' experience hands-on with physical security systems and related software with basic DC electrical and networking experience or an equivalent combination of education, training and experience.
Electrician's Trade License or associate's degree in computer science related field and demonstrated relevant work experience, preferred.
Licenses and Certifications
Lenel Certification or equivalent experience preferred
Milestone Certification or equivalent experience preferred
Bosch RPS Programming Experience Preferred
Basic knowledge of Network design and function
Ability to learn and integrate new technologies as business needs change.
Skills and Abilities
Must be able to lift 50 lbs., bend, walk and twist.
Ability to travel up to 20% or as needed to achieve business objectives.
Strong problem solving, critical thinking, and interpersonal communication skills.
Strong customer focus.
Ability to effectively use office automation, communication, software and tools currently used in the HMI office environment.
Applies advanced problem-solving skills and executes solutions to complex problems independently
With guidance, plans and recommends to management the physical security systems and service requirements for the company.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Must be able to perform all essential functions of the position with or without accommodations.
Who We Hire?
Simply put, we hire qualified applicants representing a wide range of backgrounds and abilities. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We're committed to equal opportunity employment, including veterans and people with disabilities.
This organization participates in E-Verify Employment Eligibility Verification. In general, MillerKnoll positions are closed within 45 days and are open for applications for a minimum of 5 days. We encourage our prospective candidates to submit their application(s) expediently so as not to miss out on our opportunities. We frequently post new opportunities and encourage prospective candidates to check back often for new postings.
MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at careers_********************.
Auto-ApplyGlobal Physical Security Systems Engineer
Security architect job in Zeeland, MI
Why join us? Our purpose is design for the good of humankind. It's the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.
GENERAL PURPOSE
Responsible for supporting Physical Security Systems hardware and software technology throughout the enterprise. Independently conducts field work, oversees contractor labor, and troubleshoots service issues according to department guidelines utilizing Milestone, Lenel, Bosch and other systems.
ESSENTIAL FUNCTIONS
* Coordinates contract install/service labor and reviews work for commissioning. May lead small projects.
* Advises and assists in annual security systems budgeting process.
* Coordinates with external relationships to ensure the viability of all physical security systems, legacy and new, with the goal of minimal business disruption as the result of failed or improperly configured systems.
* Ensures the coordination, installation, upgrade and conversion or servicing of alarm systems, access controls, video cameras, burglary, radio systems and all other types of physical security equipment.
* Maintains an in-depth knowledge of the state-of-the-art security equipment standards and technology encompassing all physical security products. Suggests system solutions to specific security concerns identified through customer request and security audits.
* Perform additional responsibilities as requested to achieve business objectives.
* Performs annual audits for various access control systems.
* Provides product research, feasibility studies, project planning, tracking and quality assurance and overall vendor communication and management.
* Reviews physical security system standards, policies, required upgrades, maintenance and day-to-day management of all security systems through system integrators or internal resources.
* With guidance, plans and recommends to management the physical security systems and service requirements for the company.
* Identifies errors, troubleshoots, and determines corrective action in existing systems.
* Creates scope of work and requests for proposal for installation projects.
* Interprets CAD/technical blueprints for construction design.
* Coordinates vendor/installer technicians for project installs and service calls.
* Administers infrastructure upgrades, implementations and integrations.
* Anticipates technology solutions to solve current and future business needs.
* Independently programs access control, intrusion detection, and camera equipment.
* Independently installs and wires security system components
* Tests and commissions new security equipment installations.
* Determines the appropriate physical security techniques in balance with MillerKnoll practices to accomplish objectives.
* Suggests technology solutions aligned with corporate security strategy and budget guidelines.
* Performs additional responsibilities as requested to achieve business objectives.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education/Experience
* High school diploma or equivalent
* Two years' experience hands-on with physical security systems and related software with basic DC electrical and networking experience or an equivalent combination of education, training and experience.
* Electrician's Trade License or associate's degree in computer science related field and demonstrated relevant work experience, preferred.
Licenses and Certifications
* Lenel Certification or equivalent experience preferred
* Milestone Certification or equivalent experience preferred
* Bosch RPS Programming Experience Preferred
* Basic knowledge of Network design and function
* Ability to learn and integrate new technologies as business needs change.
Skills and Abilities
* Must be able to lift 50 lbs., bend, walk and twist.
* Ability to travel up to 20% or as needed to achieve business objectives.
* Strong problem solving, critical thinking, and interpersonal communication skills.
* Strong customer focus.
* Ability to effectively use office automation, communication, software and tools currently used in the HMI office environment.
* Applies advanced problem-solving skills and executes solutions to complex problems independently
* With guidance, plans and recommends to management the physical security systems and service requirements for the company.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Must be able to perform all essential functions of the position with or without accommodations.
Who We Hire?
Simply put, we hire qualified applicants representing a wide range of backgrounds and abilities. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We're committed to equal opportunity employment, including veterans and people with disabilities.
This organization participates in E-Verify Employment Eligibility Verification. In general, MillerKnoll positions are closed within 45 days and are open for applications for a minimum of 5 days. We encourage our prospective candidates to submit their application(s) expediently so as not to miss out on our opportunities. We frequently post new opportunities and encourage prospective candidates to check back often for new postings.
MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at careers_********************.
Auto-ApplyAssociate Security Systems Engineer - Access Control & CCTV
Security architect job in Plymouth, MI
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities.
Responsibilities
Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries.
Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors
On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements.
Qualifications
Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry.
An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted.
Experience in the design and planning of MEP systems.
Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems.
Ability to manage time and multiple tasks without supervision.
Strong organizational skills and attention to detail.
Excellent analytical and problem-solving skills.
Exceptional presentation, writing, verbal, and written customer communication skills.
Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
#JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
Auto-ApplyLegal Counsel, Data Privacy Manager and Information Security Officer
Security architect job in Auburn Hills, MI
WHAT WE ARE LOOKING FOR The Legal Counsel, Data Privacy Manager and Information Security Officer will be an integral part of the North American Legal, Compliance and Information Security team. The Legal Counsel, Data Privacy Manager and Information Security Officer responsibility on the one hand is to preview, negotiate and draft commercial contracts. On the other hand, data privacy and information security is a relevant part of the responsibility. The Legal Counsel, Data Privacy Manager and Information Security Officer will also provide day-to-day advice and guidance to help each business unit meets its objectives by developing a deep understanding of the laws and regulations applicable to data privacy. In addition, the Legal Counsel, Data Privacy Manager and Information Security Officer, will also be responsible for implementation and support of data protection activities (Data Privacy Management System) as part of the business, as well as Information Security activities (Information Security Management System). RESPONSIBILITIES include the following. Other duties may be assigned. •Draft, review and negotiate broad range of commercial agreements with our customers and suppliers, including but not limited to, Non-Disclosure Agreements, OEM terms and conditions, Master Services Agreements, subcontractor agreements, Full and Final Releases, licensing agreements etc. •Provide support in defending the organization in lawsuits/legal claims as well as in the prosecution of lawsuits on behalf of the organization against others. •Conduct, research and provide interpretations, opinions and recommendations on business operations issues and on legislation and regulations that may affect the organization. •Enforce adherence to legal guidelines and in-house policies to maintain the company's legality and business ethics. •Support legal entities in the United States and Mexico complying with applicable laws and following Rheinmetall's international requirements related to compliance, especially anti-corruption. •Assess local data protection requirements and activities, e.g. advice all levels of management and employees on data privacy matters and evaluate and advise as to data privacy risk. Maintain and further develop the Data Privacy Management System in close alignment with the Divisional responsible and business. •Data breach management. Attends to general inquiries from supervisory data protection authorities as a first responder. •Provide data protection-related advice and support of business departments. This includes the introduction of new or change of existing processes and/or assets (especially IT solutions). •Develop and enforce the organization's information security policies, standards, and procedures. •Conduct risk assessments to identify and mitigate information security vulnerabilities. •Oversee the implementation of security technologies, including firewalls, intrusion detection systems, and encryption tools. •Lead the response to information security incidents, including investigations and post-incident reviews. •Primary contact with the corresponding legal entity for Rheinmetall's data privacy organization. Primary data protection counterpart for the management and employees within the legal entity. •Nominated as the Data Privacy Regional Manager and Information Security Officer. •Perform other duties that may be assigned.
WHAT QUALIFICATIONS YOU SHOULD HAVE
EDUCATION and/or EXPERIENCE The candidate must be a graduate of an accredited law school with three (3) to six (6) years of related experience and be admitted to the state bar. The candidate should also possess the following: •In-depth knowledge of global data protection regulations and frameworks (e.g. GDPR, CCPA). •Strong understanding of information security principles, practices, and technologies. •Excellent analytical and problem-solving skills. •Certifications such as CIPP/E, CIPM, CISSP, CISM, or equivalent are highly desirable. •Strong communication and interpersonal skills to interact with all levels of the organization. •Ability to manage multiple projects and priorities simultaneously. •High level of integrity and strong commitment to maintaining confidentiality.
chief information security officer (WEBCAM INTERVIEW)
Security architect job in Lansing, MI
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
Skill Required/Desired Amount
Multi-disciplined IT background Required 10
Experience as CISO or equivalent position for medium sized organizations Required 4
Degree(s) in Computer Science, Business, Engineering or Information Systems Highly desired 1
Current certifications such as CISSP, CISA, and/or others as relevant will be preferred Nice to have 1
Professional IT process / methodology certifications (e.g., ITIL, CobIT, LEAN, Six Sigma) with experience implementing processes and methodologies. Nice to have 3
Experience as a business or IT consultant Highly desired 4
Strong knowledge and experience in managing complex project plans with interdependencies Required 5
Qualifications
Skill Required/Desired Amount
Multi-disciplined IT background Required 10
Experience as CISO or equivalent position for medium sized organizations Required 4
Degree(s) in Computer Science, Business, Engineering or Information Systems Highly desired 1
Current certifications such as CISSP, CISA, and/or others as relevant will be preferred Nice to have 1
Professional IT process / methodology certifications (e.g., ITIL, CobIT, LEAN, Six Sigma) with experience implementing processes and methodologies. Nice to have 3
Experience as a business or IT consultant Highly desired 4
Strong knowledge and experience in managing complex project plans with interdependencies Required 5
Additional Information
Thanks and Regards,
Karan Sharma
510-254-3300 ext. 150
Principal Security Engineer - IAM
Security architect job in Waterford, MI
We are Lennar
Lennar is one of the nation's leading homebuilders, dedicated to making an impact and creating an extraordinary experience for their Homeowners, Communities, and Associates by building quality homes and providing exceptional customer service, giving back to the communities in which we work and live in, and fostering a culture of opportunity and growth for our Associates throughout their career. Lennar has been recognized as a Fortune 500 company and consistently ranked among the top homebuilders in the United States.
Join a Company that Empowers you to Build your Future
The Principal Security Engineer is the highest technical position within the security engineering team, responsible for driving the overall security strategy of the organization. This role is focused on designing cutting-edge security solutions, with a strong emphasis on cloud security, and leading the organization's response to the most complex security challenges.
A career with purpose.
A career built on making dreams come true.
A career built on building zero defect homes, cost management, and adherence to schedules.
Your Responsibilities on the Team
Define and lead the implementation of the organization's security strategy, with a focus on Cloud Security, Identity Access Management, and all other aspects of Cybersecurity
Architect and oversee the deployment of IAM solutions across both on-premise and cloud environments, ensuring they meet the highest standards of security.
Lead the most complex security assessments, including threat modeling, red teaming, and cloud security reviews.
Collaborate with executive leadership to ensure that security initiatives align with the organization's strategic goals and risk appetite.
Act as the technical lead for large-scale security projects, coordinating cross-functional teams to ensure successful delivery.
Architect and implement solutions across workforce IAM, PAM, and customer IAM ecosystems.
Provide thought leadership in adopting passwordless authentication, passkeys, adaptive MFA, and AI-driven access orchestration strategies
Engineer integrations with Agentic AI tools for intelligent decisioning, policy enforcement, and autonomous identity lifecycle operations.
Develop and implement automated provisioning/deprovisioning workflows
Ensure integration of IAM with cloud platforms (Azure, AWS, GCP) and SaaS applications.
Mentor and develop the skills of senior security engineers, fostering a culture of continuous improvement and innovation.
Requirements
Education: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline; Master's degree is highly preferred.
Professional Experience: Minimum of 10 years in security engineering, with significant expertise in Identity and Access Management (IAM).
Project Leadership: Demonstrated success in leading large-scale IAM initiatives and formulating security strategies for complex organizations.
IAM Solutions: Design and hands-on engineering across IAM:
Identity Providers (such as Microsoft Entra ID, Okta, Ping, ForgeRock),
Identity Governance & Administration (SailPoint, Saviynt),
Privileged Access Management (CyberArk, Delinea, HashiCorp Vault), and
Customer IAM (Auth0, PingOne-preferred).
Protocols & APIs: Deep understanding of federation protocols (SAML, OAuth2.0, OIDC), SCIM, and RESTful APIs.
Directory Services & Cloud IAM: Hands-on experience with Active Directory, LDAP, and cloud IAM solutions (Azure, AWS, GCP).
Security Frameworks: Solid foundation in Zero Trust architecture and contemporary security standards.
Automation: Proficient in scripting and automation using PowerShell, Python, Java, or RESTful APIs.
Recognized industry certifications such as CISSP, CCSP, AWS Certified Security - Specialty, or equivalent credentials.
Exceptional leadership and communication abilities, capable of influencing executive decision-makers and directing cross-functional teams.
Physical & Office/Site Presence Requirements
This is primarily a sedentary office position which requires the incumbent to have the ability to operate computer equipment, speak, hear, bend, stoop, reach, lift, and move and carry up to 25 lbs. Finger dexterity is necessary.
This description outlines the basic responsibilities and requirements for the position noted. This is not a comprehensive listing of all job duties of the Associates. Duties, responsibilities and activities may change at any time with or without notice.
Life at Lennar
At Lennar, we are committed to fostering a supportive and enriching environment for our Associates, offering a comprehensive array of benefits designed to enhance their well-being and professional growth. Our Associates have access to robust health insurance plans, including Medical, Dental, and Vision coverage, ensuring their health needs are well taken care of. Our 401(k) Retirement Plan, complete with a $1 for $1 Company Match up to 5%, helps secure their financial future, while Paid Parental Leave and an Associate Assistance Plan provide essential support during life's critical moments. To further support our Associates, we provide an Education Assistance Program and up to $30,000 in Adoption Assistance, underscoring our commitment to their diverse needs and aspirations. From the moment of hire, they can enjoy up to three weeks of vacation annually, alongside generous Holiday, Sick Leave, and Personal Day policies. Additionally, we offer a New Hire Referral Bonus Program, significant Home Purchase Discounts, and unique opportunities such as the Everyone's Included Day. At Lennar, we believe in investing in our Associates, empowering them to thrive both personally and professionally. Lennar Associates will have access to these benefits as outlined by Lennar's policies and applicable plan terms. Visit Lennartotalrewards.com to view our suite of benefits.
Join the fun and follow us on social media to see what's happening at our company, and don't forget to connect with us on Lennar: Overview | LinkedIn for the latest job opportunities.
Lennar is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws.
Auto-ApplyInformation Systems Security Officer (ISSO)
Security architect job in Detroit, MI
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyVehicle Cyber Security Systems Engineer
Security architect job in Dearborn, MI
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
As a key member of our Information Technology group, you'll play a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are!
The Vehicle Cyber Security Systems Engineer will serve a key role in shaping the future of product development security for vehicles (e.g. Connected Vehicle, Autonomous Vehicle, Electric Vehicle, Ford Smart Mobility, and V2X Security). The engineer will work within cross functional team to do/support the following:
You'll have...
Bachelor's degree in Electrical Engineering, Computer Engineering, Software Engineering, Computer Science, or Cybersecurity OR a combination of education and experience
5+ years of experience with embedded and/or automotive systems
3+ years of experience with in-vehicle network architecture, modules, and protocols (CAN, etc.)
Ability to develop and maintain engineering documentation including requirements, specifications, test plans, etc.
Ability to work independently and collaboratively
Strong communication and analytical skills
Even better, you may have...
Experience with Hardware Security Module (HSM) and Secure Hardware Extension (SHE)
Experience with coding (i.e., C, C++, C# Python, Java, CAPL, JQL) Experience with JIRA and Kanban boards for project management
Familiar with vehicle system (i.e., capabilities of ECUs on a vehicle)
Familiar with automotive standards (i.e., ISO 14229-1, ISO 21434)
Familiar with quality tools and methodologies (i.e., FMEA, DVP)
Able to work following an agile methodology
Knowledge of Ford's internal engineering systems and requirements
Comfortable working in a fast-paced and innovative environment where problems are not always well-defined.
Experience advocating and driving adoption of industry standard methodologies.
Project management skills, including identifying and scheduling process steps, determining resources and staff required to successfully complete research projects.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:
• Immediate medical, dental, vision and prescription drug coverage
• Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
• Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
• Vehicle discount program for employees and family members and management leases
• Tuition assistance
• Established and active employee resource groups
• Paid time off for individual and team community service
• A generous schedule of paid holidays, including the week between Christmas and New Year's Day
• Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
#LI-Hybrid
What you'll do...
Perform product Cyber Security assessments on projects of multiple Ford product lines
Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols.
Have the ability to review technical documentation to assess compliance.
Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables
Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception
Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments
Develop and utilize global supplier expertise to meet cyber security expectations
Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency.
Provide presentations to management (program milestones, security governance board, etc.)
Auto-ApplyInformation System Security Officer (ISSO)
Security architect job in Warren, MI
Job Details Experienced Warren - DEVCOM - GVSC - Warren, MI Full Time 4 Year DegreeDescription
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.
Overview of position:
FEDITC is seeking an Information System Security Officer (ISSO) to work in Warren, MI. A United States Citizenship and an active Secret DoD Security Clearance is required to be considered for this position.
The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO) / Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense (DoD) policies. In almost all cases, ISSOs will be called on to provide guidance, oversight, and expertise, but they may or may not develop security documents or actually implement any security controls. While ISSOs will not actually perform all functions, they will have to coordinate, facilitate, or otherwise ensure certain activities are being performed. As a result, it is important for ISSOs to build relationships with the SO, technical staff, and other stakeholders.
Responsibilities:
The goal of information security is to help the business process owner accomplish the mission in a secure manner. To be successful, ISSOs need to know and understand the following:
Coordinates with the ISO to ensure the appropriate operations security posture is maintained for the Information system
Servers as principal advisor on all matters involving the security of an Information System
Manage day-to-day security operations of the system
Monitors information system and environment
Manages and controls changes to the system
Handles incidents
Assists in the development of the: Security policies and procedures, Development and ongoing maintenance of the System Security Plan, Security Impact Analysis, Mission and business functions of the Information System
How the system supports the organization's mission - System details, including:
Architecture
System components (hardware, software, peripherals, etc.)
Location of each system component
Data flow
Interconnections (internal and external)
Security categorization, Security requirements, Configuration management processes and procedures
Qualifications
Certifications Required:
CompTIA Security +, ISC2 Certified Accreditation Professional (CAP)
Clearance:
Active Secret clearance is required.
Must be a US Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC'S Client(s)/Customer(s)/Prime contractor(s).
FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran. FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates.
Information System Security Officer (Information Assurance)
Security architect job in Sterling Heights, MI
Company Information: General Dynamics is a successful Fortune 100, global aerospace and defense company, with over 90,000 employees world-wide. General Dynamics Land Systems, a business unit of General Dynamics, has a strong foundation of delivering core engineering and manufacturing capabilities to our clients for military vehicles. Our team is focused on continuous process and productivity improvements that reduce product costs, while increasing troop safety and effectiveness. Land Systems continues to work with the US Armed Forces and its Allies to ensure these vehicles remain survivable, relevant, flexible, affordable and capable of addressing a dynamic threat environment.
About the Role:
As a member of the IT Security Team, you will be joining a dynamic group of Information Technology and Information Assurance professionals responsible for the operation, maintenance, and compliance of classified information systems, and its userbase, in support of a Next Generation Vehicle Program. The ISSO will participate in activities covering information assurance lifecycles and user account support.
Due to the nature of the work, this role requires on-site presence up to 100%.
What We Offer:
Whether starting your career or are already an experience professional, we offer a Total Rewards package that is Impactful and built for you.
* Healthcare including medical, dental, vision, HSA and Flex Spending
* Competitive base pay and incentive pay that rewards individual and team performance, and comprehensive benefits.
* 401k Match (6%)
* Educational assistance
* 9-80 Work Schedule (This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off)
* Ongoing learning opportunities within a diverse, inclusive and rewarding work environment
* Onsite cafeteria, fitness center, and outdoor fitness track
Responsibilities to Anticipate/Expect:
* Leads as IT Liaison between GDLS Users and United States Government personnel for Government Cloud Accounts
* Generates, tracks and escalates IT Trouble Tickets to U.S. Government personnel for GDLS-cloud account / application issues
* Issues, tracks, and enforces account training and compliance requirements to GDLS users of unclassified and classified systems
* Designs account workflow and process streamlining with the Information System Security Manager (ISSM)
* Coordinates with System Administrators to create, enable, or disable classified system accounts
* Assists in the creation, implementation, and presentation of Cyber Awareness Campaigns
* Participates in system accreditation documentation reviews in accordance with existing processes and procedures
* Assists the ISSM and Program Protection Officer with need-to-know and verification processes
* Participates in assessments, inspections, and continuous monitoring of classified systems and user compliance
* Perform other duties as assigned
Minimum Qualifications:
* Must possess or be able to obtain and maintain a U.S. Government SECRET or higher clearance.
* MUST be a United States citizen
* 1-3 year minimum of experience in a government/industrial security career field.
* 3-5 year minimum of experience in a compliance and/or account administration role.
* Bachelor of Science degree majoring in Computer Science, Information Science and Technology, Information Assurance, Risk Management, or Cybersecurity required. Equivalent alternates considered.
* Must have one of the following certifications (more advanced certificates considered):
o Security+ CE
o GIAC
o CISA
o CRISC
Additional Information:
* Must have very good written and verbal communication skills.
* Must be detail-oriented, independent and organized.
* Must have experience with Microsoft Office products: Word, Excel, and PowerPoint.
* Must have experience with SCAP Compliance Checker, STIG Viewer, and IAVMs.
* Preferred experience with certification/authorization/compliance requirements as outlined in the NISPOM and DAAPM/DAAG.
* Limited travel may be required.
GDLS considers factors such as, scope/responsibilities of the position, candidate experience and education/training background, in addition to local market comparable and business considerations when extending an offer.
Headquartered in Reston, Virginia, General Dynamics is a global aerospace and defense company offering a broad portfolio of products and services in business aviation; ship construction and repair; land combat vehicles, weapons systems and munitions; and technology products and services. General Dynamics employs more than 100,000 people across 65 countries worldwide and in all 50 U.S. states, more information is available at *********** General Dynamics Land Systems, is a business unit of General Dynamics, and is an innovative leader of ground combat systems' equipment and software for our clients. Our performance-driven team partners with the U.S. Army, U.S. Marine Corp and other militaries across the Globe to ensure that next generation ground combat vehicles are ready to protect our fighting men and women in uniform. General Dynamics Lands Systems provides a competitive compensation package, site specific flexible work schedules, 401(k) with Company Match; Bonus Eligibility, Employee Development Opportunities, Tuition Reimbursement, On-site Amenities, and comprehensive Medical/Dental/Vision Insurance.
As an Equal Opportunity Employer, General Dynamics Land Systems ("GDLS") provides all persons with equal opportunity and access to all aspects of employment process, without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, marital status, age, disability, status as a protected veteran, or membership in any group protected by federal, state, or local anti-discrimination laws. GDLS also is committed to providing reasonable accommodations to individuals with disabilities and disabled veterans.. If, due to a disability, you need an accommodation to search or apply for an opportunity with GDLS, please call ************ or send an e-mail to ***************** for assistance and let us know the nature of your request and your contact information.
Share: mail Tweetshare to twitter Share on Facebookshare to facebook Share on LinkedInshare to linkedin
Apply Now
Similar Jobs
Interested in working for Land Systems? Join our Talent Network Today!
Join our Talent Network
* Search Jobs
* Saved Jobs
* Careers Home
facebook twitter linkedin youtube instagram
2025 General Dynamics US. All rights reserved.
Information Systems Security Officer (ISSO)
Security architect job in Sterling Heights, MI
Insight Global is seeking a highly skilled Information Systems Security Officer (ISSO) to support a Department of Defense (DoD) customer in Warren, MI. This role is ideal for a cybersecurity professional with a strong background in risk management and system security who thrives in a collaborative, mission-driven environment.
As an ISSO, you will report directly to the Information Systems Security Manager (ISSM) and the Information System Owner (ISO), operating with minimal supervision. You'll play a critical role in maintaining and enhancing the security posture of DoD information systems, ensuring compliance with federal standards and frameworks.
$30/hr to $60/hr : Exact compensation may vary based on several factors, including skills, experience, and education.
Benefit packages while on contract for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- 3+ years of experience as a ISSO
- Strong understanding of RMF, NIST standards, and DoD security protocols
- Bachelors Degree in Cybersecurity, Engineering, or related field
- Ability to obtain a DoD Secret Clearance - Active interim or secret clearance