Post job

Security architect jobs in Kettering, OH - 90 jobs

All
Security Architect
Information Systems Security Officer
Information Security Engineer
Information Security Officer
Senior Security Engineer
Network Security Architect
Information Security Manager
Senior Security Analyst
Information Security Analyst
Security Engineer
  • Information Security Analyst

    Belcan 4.6company rating

    Security architect job in Mason, OH

    Job Title: Information Security Analyst Zip Code: 45040 Duration: 6 months Pay Rate: $33.33/hr. Keyword's: #Masonjobs; #InformationSecurityAnalystjobs; The IS Application Security Analyst will support the execution, planning, and administration of the Vulnerability Management function within Information Security (IS). The Vulnerability Management Analyst executes core processes in the vulnerability management program focused on vulnerability assessments, penetration testing and social engineering. Additionally, they will support the remediation of vulnerabilities resident within systems to minimize the organizations" potential attack surface for exploitation. The Analyst will provide oversight, drive, facilitate and coordinate the management of vulnerabilities across the enterprise. The Analyst must understand underlying application code approaches in order to effectively review and respond to application security scans. While technical involvement is required, this role is not intended to perform direct remediation. The Analyst will support automated scans and may provide post-development testing assistance to validate that vulnerability remediation efforts are appropriately tested. MAJOR DUTIES AND RESPONSIBILITIES * Monitor and analyze vulnerability assessment data to identify and communicate technical risks to the organization * Support the identification and impact classification for new vulnerabilities identified in the environment * Execute and support vulnerability assessments, penetration testing and social engineering activities * Provide the Information Security and IT Security team information on the emerging cyber threat landscape, including threat actor tactics, techniques, and procedures * Review and interpret application security scan results with an understanding of underlying code structures to provide effective feedback * Provide post-development testing support to ensure vulnerability remediation items are validated and tested appropriately * Facilitate vulnerability management processes by tracking and coordinating remediation efforts across multiple teams * Ensure timely closure of security gaps by working with application, infrastructure, and operations teams * Support IS in achieving the vision and strategic objectives of the vulnerability program * Conduct analysis, aggregate and report on vulnerability data from various scanning tools and platforms * Manage and utilize IS tools such as DLP, Code scanner, external security profile, etc. to analyze gaps in security controls * Participate in the IT SDLC program to ensure that security is included in project by default and by design * Develop strong working relationships with other departments and potentially clients across the organization to ensure a high degree of security compliance client satisfaction * Assist with regulatory and compliance requirements, contributing to security audits, assessments, attestations, certifications and client vulnerability inquires * Brief IS leadership on vulnerability assessment results and potential risks * Support leadership to identify capability gaps in vulnerability management services * Collaborate with cross-functional teams to improve security posture and embed security into existing IT and operational workflows * Continue self-development of knowledge, skills and abilities to better support execution of the Information Security (IS) function BASIC QUALIFICATIONS * Bachelor"s degree computer science, IT or equivalent * 3+ years of experience in IT or IS or Compliance * Experience with major standards such as: SOC 1-2, ISO 27001/2, PCI DSS, HITRUST, SANS, NIST * Demonstrated experience in implementing compliance frameworks for financial services organization or organizations with similar information security needs and requirements * Familiarity and understanding of broad range of IT hardware and software products * Strong project management skills * Excellent presentation, verbal communication, and written skills * Excellent analytical and problem-solving skills * Experience managing typical enterprise security and intrusion detection systems * Ability to work in a collaborative environment across business and technology teams * Ability to interpret application structures and code approaches at a high level in order to review and respond to scan results PREFERRED QUALIFICATIONS * Certified Information Systems Security Profession (CISSP), PCI DSS, Certified HIPAA Privacy Security Expert (CHPSE), Certified Information Security manager (CISM), Global Information Assurance Certification (GIAC), or related. * Experience or knowledge with healthcare or health insurance * Knowledge of CMS and HIPAA related vendor requirements * Working knowledge of Security SDLC tools Belcan is an equal opportunity employer. Your application and candidacy will not be considered based on race, colour, sex, religion, creed, sexual orientation, gender identity, national origin, disability, genetic information, pregnancy, veteran status or any other characteristic protected by federal, state or local laws.
    $33.3 hourly 5d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cloud Security Architect

    Elevance Health

    Security architect job in Mason, OH

    Location: This role requires associates to be in-office 1 - 2 days per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Alternate locations may be considered if candidates reside within a commuting distance from an office. Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law. The Cloud Security Architect is responsible for enabling, maturing, and operationalizing cyber defense capabilities across Elevance Health's enterprise and subsidiary cloud environments. This role partners closely with Cloud Infrastructure, Application Engineering, Detection Engineering, and Security Operations to ensure cloud-native security telemetry, detection, and response capabilities are deployed, monitored, and continuously improved. How You Will Make an Impact: * Lead efforts to integrate cyber defense and security operations capabilities into enterprise and subsidiary cloud environments (AWS, Azure, GCP, and OCI), ensuring consistent visibility and detection coverage across platforms. * Partner with cloud infrastructure and application teams to ensure security controls, logging, and telemetry are properly enabled, validated, and operational for cloud services and workloads. * Work with app, platform and engineering teams to ensure the appropriate level of logging is enabled within their respective environments. * Define roadmap and strategy for the future of cloud cyber defense, including CSPM, threat detection, logging pipelines, and incident response integration. Develop an approach that is tailored to the organization and keeps us out in front of developing threats. * Propose and develop cloud threat monitoring use cases. Train SOC analysts on how to properly triage, investigate and remediate alerts based on those use cases. * Collaborate with security operations and incident response teams to investigate complex cloud security events (e.g. threat detection events, misconfigurations, exposed resources) and support remediation efforts. * Infuse automation and AI-driven capabilities into cloud threat management operations. * Work with vendors to evaluate, select, and onboard technologies. Partner with vendor contacts to ensure product roadmaps address evolving business and technical requirements. * Support pursuit of new business by designing new cloud architectures that are compliant with FedRAMP or other regulatory requirements. * Participate in and contribute to governance review for new cloud services, AI-enabled platforms, and SaaS offerings, ensuring security requirements, logging, and guardrails are defined before approval. * Act as Subject Matter Expert in all aspects of cloud cyber defense. Advise executive leadership on matters relating to cloud security. Train and mentor junior team members. * Draft business-level presentations that garner executive and stakeholder support for cloud cyber defense initiatives. * Develop policies, technical standards and other foundational documentation. * Support regulatory and audit initiatives by validating cloud security controls, evidence collection, and alignment with frameworks such as SOC2, PCI, HITRUST, and FedRAMP. Minimum Requirements: Requires BS/BA in Information Technology or related field of study and a minimum of 10 years experience in systems administration and security aspects of information systems, access management and network security technologies, network communications, computer networking, telecommunications, systems development and management, hardware, software, data, and people; experience with multiple technical and business disciplines required; or any combination of education and experience, which would provide an equivalent background. Preferred Skills, Capabilities & Experiences: * Fluency with all 3 major cloud service providers: AWS, Azure & Google Cloud Platform. * Experience designing, implementing or operating cloud security programs in an enterprise environment. * Cloud security certifications such as CCSP or CSP-specific security certifications . * Experience with Oracle Cloud Infrastructure. Job Level: Non-Management Exempt Workshift: 1st Shift (United States of America) Job Family: IFT > IT Security & Compliance Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health. Who We Are Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve. How We Work At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business. We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few. Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process. The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws. Elevance Health is an Equal Employment Opportunity employer, and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact ******************************************** for assistance. Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
    $99k-146k yearly est. 6d ago
  • Vice President & Chief Information Security Officer (CISO)

    Hillenbrand 4.8company rating

    Security architect job in Cincinnati, OH

    Reports to: Chief Information Officer (CIO) Company: Global Industrial Manufacturing ($3B Revenue) Team: 12 global employees (USA, Germany, India) Budget: $3M Opex The Vice President & Chief Information Security Officer (CISO) is the senior-most leader responsible for the global Information Security program. This role sets the strategy, establishes governance, oversees execution of technical and operational controls, and ensures the protection of the company's data, systems, and digital assets across a complex global manufacturing environment. The CISO leads a distributed team across the U.S., Germany, and India, and partners closely with IT, Legal, Compliance, and business leadership to manage cyber risk, secure new technologies, and meet regulatory and customer expectations. This role presents quarterly to the Audit Committee and Executive Management Team on cybersecurity posture, risks, and key initiatives. Key Responsibilities Strategic Leadership & Governance Develop and execute the global information security strategy aligned to business objectives and risk appetite. Provide quarterly cybersecurity updates to the Audit Committee and Executive Management Team. Establish security governance, policies, and standards consistent with leading frameworks (NIST CSF, ISO 27001, CIS). Oversee enterprise risk assessments and maintain a risk-based roadmap for continuous improvement. Security Operations & Technical Controls Lead the design, implementation, and management of all security technologies and controls including endpoint protection, identity & access management, SIEM/SOC operations, cloud security, vulnerability management, and network security. Ensure proactive monitoring, rapid detection, and response to security incidents across global operations. Oversee business continuity and disaster recovery security components in partnership with Infrastructure and Applications teams. Security Architecture & New Technology Reviews Embed security-by-design into IT and business projects, including cloud, ERP, operational technology (OT), and Industry 4.0 initiatives. Conduct architectural reviews and threat modeling for new technologies and digital transformation efforts. Compliance, Privacy & Legal Collaboration Partner closely with Legal to ensure compliance with global data privacy laws, including GDPR, CCPA, and emerging regulations. Oversee data protection practices, records retention security considerations, and reporting obligations related to data privacy incidents. Third-Party & Customer Security Lead the global third-party risk management program, including supplier assessments and ongoing monitoring. Respond to and manage customer security inquiries, audits, and contractual security requirements. Drive vendor governance for security tools, MSSP partnerships, and other outsourced services. Team Leadership & Budget Management Lead a global Information Security team of 12 across the U.S., Germany, and India. Manage a $3M annual operating budget, ensuring cost-effective investments in technology, services, and capabilities. Mentor, develop, and scale the team to support global manufacturing operations and business growth. Qualifications Required 10+ years of progressive experience in Information Security leadership roles. Minimum 3 years as a CISO or a deputy/second-in-command security leader in a larger enterprise. Deep expertise in security operations, architecture, governance, risk, compliance, and incident response. Strong working knowledge of NIST CSF, ISO 27001, CIS Controls, and modern cybersecurity technologies. Experience in global environments and working with distributed teams. Demonstrated ability to present complex cybersecurity topics to Audit Committees and senior executives. Experience managing multimillion-dollar security budgets. Strong understanding of GDPR, CCPA, and global privacy regulations. Preferred Experience in industrial manufacturing or OT/ICS security environments. Certifications such as CISSP, CISM, CISA, CCSP, or similar. Familiarity with ERP environments, cloud security (Azure/AWS), and M&A cybersecurity integration. Experience working with India-based operations or offshore security teams. Personal Attributes Executive presence and strong communication skills. Business-oriented mindset with the ability to translate technical issues into business risk. Proven ability to drive process discipline, build governance, and mature a security program. Collaborative leadership style with strong partnership skills across IT, Legal, and business units. #LI-SC1 Who we are: Hillenbrand (NYSE: HI) is a global industrial company that provides highly-engineered, mission-critical processing equipment and solutions to customers in over 100 countries around the world. Our portfolio is composed of leading industrial brands that serve large, attractive end markets, including durable plastics, food, and recycling. Guided by our Purpose - Shape What Matters For Tomorrow™ - we pursue excellence, collaboration, and innovation to consistently shape solutions that best serve our associates, customers, communities, and other stakeholders. To learn more, visit: ******************** EEO: The policy of Hillenbrand Inc. is to extend opportunities to qualified applicants and employees on an equal basis regardless of an individual's age, race, color, sex, religion, national origin, disability, sexual orientation, gender identity/expression or veteran status. Additionally, Hillenbrand Inc. and our operating companies are committed to being an Equal Employment Opportunity (EEO) Employer and offers opportunities to all job seekers including individuals with disabilities. If you need a reasonable accommodation to assist with your job search or application for employment, email us @recruitingaccommodations@hillenbrand.com . In your email, please include a description of the specific accommodation you are requesting as well as the job title and requisition number of the position for which you are applying. At Hillenbrand, everyone is welcome to apply and "Shape What Matters for Tomorrow".
    $98k-125k yearly est. Auto-Apply 33d ago
  • Senior Offensive Security Engineer, Red Team

    Procter & Gamble 4.8company rating

    Security architect job in Cincinnati, OH

    Information Technology at Procter & Gamble is where business, innovation and technology integrate to build a competitive advantage for P&G. Our mission is clear -- we deliver IT to help P&G win with the over 5 billion consumers we serve worldwide. Our IT professionals are diverse business leaders who apply IT expertise to deliver innovative, tech-focused business models and capabilities for our 65 iconic, trusted brands. From Day 1, you'll be trusted to dive right in, take the lead, use your initiative, and build billion-dollar brands that help make everyday activities easier and make the world a better place! Our company offers purposeful work that will take your career places you never envisioned, in creative workspaces where innovation thrives and where your technical expertise is recognized and rewarded. The Opportunity Are you a person who is passionate about breaking applications, devices, services and/or processes to help protect them against the world's most advanced cyber security adversaries? The Information Security Protect organization at P&G is responsible for providing a realistic depiction of threat actor behaviors and scenarios during simulated exercises. We drive improvements to applications and systems, as well as detection and response capabilities through regular testing of security controls across the enterprise. Responsibilities: + Lead end-to-end red team operations aligned to priority threat actors: scenario design, ROE, pre-briefs, execution, and hot-wash/AAR. + Support purple-team engagements with DFIR/SOC and Detection Engineering to convert TTPs into durable detections, runbooks, and response improvements with measurable outcomes. + Orchestrate assumed-breach campaigns emphasizing evasion and control bypass (EDR/AV, email/web security, identity/conditional access, network segmentation, cloud guardrails). + Perform campaign/TTP research, develop internal PoCs/tooling (e.g., tradecraft to exercise specific controls, lightweight payloads), and steward OPSEC. + Produce executive-ready risk narratives and technical reporting (ATT&CK mapping, artifacts, evidence handling) and brief senior leadership. + Mentor junior engineers; set standards for craft quality, methodology, and safety. + Coordinate multi-party/third-party exercises; manage risk, deconflict with production, and ensure stakeholder alignment. + Contribute to operational expansion by researching, prototyping, and developing novel capabilities for offensive use. + Contribute to program maturity: metrics/KPIs, roadmap, methodology standardization, control validation cadence, and integration with vulnerability management. Job Qualifications Required: + BA or BS degree in Information Security, Cyber Security, Computer Science, or related field (OR 7+ years of relevant experience required in lieu of a degree). + 5+ years running offensive or emulation operations in large/complex environments, with demonstrated impact on detections/response. + Expertise across 2+ domains: enterprise/web/mobile apps; identity; cloud (AWS/GCP/Azure); network/endpoint; IoT/OT; or directory services. + Proven ability to bypass preventative/detective controls and reach mission objectives while maintaining safety and ROE. + Strong engineering skills (Python, PowerShell, GO, C++, Web Frameworks); comfort with low-level concepts a plus) and familiarity with C2 tradecraft. + Deep command of MITRE ATT&CK and threat-informed defense; history partnering with DFIR/SOC and Detection Engineering. + Excellent executive and technical communication. + Ability to work in Cincinnati, Ohio based office 3 days per week. Preferred: + Leadership of purple-team campaigns and incident-driven emulations; closed-loop improvements with measurable KPI movement. + Building program metrics/KPIs, standardizing reporting, and integrating with risk governance. + Threat-intel integration: actor/campaign analysis, hypothesis generation, and prioritization tied to business impact. + Identity and cloud attack paths (SSO, MFA, OAuth, PAM; AWS/GCP/Azure control planes) with hardening collaboration across platform/IDAM teams. + Coordinating large third-party exercises and setting complex ROE. Pay Range: $110,000 - $165,000 Compensation for roles at P&G varies depending on a wide array of equal opportunity factors including but not limited to the specific office location, role, degree/credentials, relevant skills, and level of experience. At P&G compensation decisions are dependent on the facts and circumstances of each case. Total rewards at P&G include salary + bonus (if applicable) + benefits. Your recruiter may be able to share more about our total rewards offerings and the specific salary range for the relevant location(s) during the hiring process. Our company is committed to providing equal opportunities in employment. We value diversity and do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status. Immigration Sponsorship is not available for this role. For more information regarding who is eligible for hire at P&G along with other work authorization FAQ's, please click HERE (******************************************************* . P&G participates in e-verify as required by law. Qualified individuals will not be disadvantaged based on being unemployed. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. Job Schedule Full time Job Number R000138781 Job Segmentation Experienced Professionals Starting Pay / Salary Range $110,000.00 - $165,000.00 / year
    $110k-165k yearly 60d+ ago
  • Information Systems Security Officer (ISSO) III

    GD Information Technology

    Security architect job in Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC) Experience: 5 + years of related experience US Citizenship Required: Yes Job Description: The Information Systems Security Officer (ISSO) II is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Notify ISSM when changes occur that might affect the authorization determination of the information system(s). Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. Execute the cyber security portion of the self-inspection, to include security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied to computer systems. Perform ISSO duties in support of in-house and external customers. Conduct continuous monitoring activities for authorization boundaries under your preview. Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts. Experience: 5+ years related experience. 2+ years SAP experience required. Prior performance in roles such as System, Network Administrator or ISSO. Education: Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: IAT Level II ( Security+ CE, CCNA Security, etc) or IAM Level II - within 6 months of hire Clearance Required to Start: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph #AirforceSAPOpportunities The likely salary range for this position is $92,735 - $125,465. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $92.7k-125.5k yearly Auto-Apply 34d ago
  • Network and Security Services Solutions Architect*

    Accenture 4.7company rating

    Security architect job in Cincinnati, OH

    We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era. You Are: An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions. You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant. As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives. You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery. The Work: You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models). You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance. Lead Pre‑Sales Architecture & Solutioning: * Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies. * Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access. * Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans. Qualify & Propose: * Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience. * Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial. Client Engagements & Demonstrations: * Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility. * Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives. Trusted Advisory & Best Practices: * Advise customers on security best practices, emerging threats, network modernization, and resilience improvements. * Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles. Technology Mastery: * Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation. Compliance, Governance & Risk: * Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.). * Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility. Cross‑Functional Handover & Delivery Readiness: * Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation. * Where appropriate, support early deal stabilization to de‑risk transition. Thought Leadership: * Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings. * Support technical training, marketing presentations, and participation in industry events. Travel may range from 0% to 100% depending on deal stage, client discussions, and business need Qualification Here's what you need: * Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity * Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture. * Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls. * Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes. * Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required Bonus Points if: * You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA. * You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native security architectures; familiarity with automation/orchestration (Terraform, Ansible, Python). * You have strong understanding of ITIL service operations and managed‑service delivery models. Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply. Information on benefits is here. Role Location Annual Salary Range California $73,800 to $218,800 Cleveland $68,300 to $175,000 Colorado $73,800 to $189,000 District of Columbia $78,500 to $201,300 Illinois $68,300 to $189,000 Maryland $73,800 to $189,000 Massachusetts $73,800 to $201,300 Minnesota $73,800 to $189,000 New York/New Jersey $68,300 to $218,800 Washington $78,500 to $201,300 Locations
    $78.5k-201.3k yearly 7d ago
  • Information Systems Security Officer (ISSO) II

    GDIT

    Security architect job in Dayton, OH

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC) Experience: 2 + years of related experience US Citizenship Required: Yes Job Description: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Experience: 2+ years related experience SAP experience required Prior performance in roles such as System, Network Administrator, or ISSO Education: Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: IAT Level II or IAM Level II - within 6 months of hire (Security+ CE, CCNA Security, etc.) Security Clearance: TS/SCI required Must be able to Attain - TS/SCI with CI Polygraph Other Requirements: Must be able to regularly lift up to 50lbs #AirforceSAPOpportunities The likely salary range for this position is $86,615 - $117,185. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA OH Dayton Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $86.6k-117.2k yearly Auto-Apply 19d ago
  • Information System Security Officer (ISSO)

    Applied Research Solutions 3.4company rating

    Security architect job in Dayton, OH

    ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact. Why Work with us?  ​Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers.   Responsibilities: Maintain the operational security posture of systems. Monitor systems and environments for security compliance. Develop and update System Security Plans (SSPs). Manage and control system changes and assess their security impact. Handle physical, personnel, and environmental security. Conduct incident response and security awareness training. Assist the ISSM and assume ISSM duties when necessary. Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM; Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package; Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard; Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS; Report all security-related incidents to the ISSM Conduct periodic reviews of information systems to ensure compliance with the security authorization package; Serve as member of the CCB, if designated by the ISSM; Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change; Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization; Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly; Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and Ensure audit records are collected, reviewed, and documented (to include any anomalies). Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval. Other duties as assigned Requirements: Must be a US citizen Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard 5+ years related experience in SCI/SAP environments. Bachelor's degree in computer science, Engineering, Finance, Business, or related field 5-8 years demonstrated performance in related technology Top Secret w/ SCI eligibility All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans.
    $70k-94k yearly est. 34d ago
  • Manager, Information Security

    Medpace 4.5company rating

    Security architect job in Cincinnati, OH

    The Manager of IT Security is a strategic leader responsible for safeguarding the organization's information assets and infrastructure. This individual will develop, implement, and manage a comprehensive cybersecurity program, ensuring compliance with industry standards and regulations. They will lead a team of security professionals, oversee vulnerability assessments and incident response, and drive continuous improvement in the organization's security posture. You will be joining an amazing organization where your contribution will have a significant impact in protecting Medpace and our Sponsors! Responsibilities * Plan, direct and manage the day-to-day operations of the IT Security department including the Security Operations Center (SOC); * Develop, maintain, and enforce IT security procedures and policies that are effective and efficient in protecting Medpace computer systems & data and are consistent with regulatory requirements; * Keep IT leadership informed by preparing security posture reports; identifying areas/process improvement opportunities; communicating security trends and risks; * Safeguards information system assets by identifying and solving potential and actual security problems; * Recognize problems by identifying abnormalities; reporting violations; manage IT Security incidents to closure; * Experience managing a 24/7 Security Operations Center (SOC); * Protect systems by defining access privileges, control structures, and resources; * Work across IT to upgrade systems by implementing and maintaining security controls; * Collaborate with Functional Areas/business units across the company to ensure IT Security best practices are understood and followed; * Oversee the hiring, training, evaluation, and retention of associates; and * Conduct IT Security policy training and ensure employees are working in compliance with SOPs and Good Clinical Practice guidelines. Qualifications * Bachelor's degree in information security, cybersecurity, information technology or related discipline; * 5+ years of Information Security experience, 1+ years of management or leadership experience; * Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP or CASP and/or SIEM-specific training and certification preferred; * Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements; * Hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations; * In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Microsoft Sentinel); * Extensive experience in all Microsoft related products including operating systems, Active Directory, Azure, Remote Server and Desktop Access, SQL Server, Office 365, Teams and SharePoint; * Experience with Perimeter Security systems and software (e.g., Firewalls, Intrusion Protection Systems, VPN); and * Excellent management, leadership. communication, presentation, organization and positive influencing skills. Medpace Overview Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries. Why Medpace? People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today. The work we've done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future. Cincinnati Perks * Cincinnati Campus Overview * Flexible work environment * Competitive PTO packages, starting at 20+ days * Competitive compensation and benefits package * Company-sponsored employee appreciation events * Employee health and wellness initiatives * Community involvement with local nonprofit organizations * Discounts on local sports games, fitness gyms and attractions * Modern, ecofriendly campus with an on-site fitness center * Structured career paths with opportunities for professional growth * Discounted tuition for UC online programs Awards * Named a Top Workplace in 2024 by The Cincinnati Enquirer * Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024 * Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility What to Expect Next A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.
    $93k-128k yearly est. Auto-Apply 11d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Security architect job in Cincinnati, OH

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $89k-121k yearly est. Easy Apply 6d ago
  • Senior Security Engineer

    Hudson Manpower

    Security architect job in Cincinnati, OH

    Job Title: Senior Security Engineer TOP SKILLS: Top 3 Required Skills: Experience managing data protection and security controls in MS O365 (SharePoint, OneDrive, Teams) Hands-on experience configuring Data Classification Labels, Retention Policies, and DLP rules Strong technical communication and collaboration skills, with the ability to gather business context and explain security solutions clearly What You'll Do We are seeking a highly technical, hands-on Security Engineer to support our enterprise data protection initiatives within MS O365. This mid- to senior-level contractor will play a key role in building and managing security controls across SharePoint, OneDrive, and Teams environments. The role focuses on implementing and tuning Data Loss Prevention (DLP), Retention Policies, and Data Classification Labels. This is an ideal opportunity for someone with an administrative background in MS O365 who is transitioning into or expanding their career in security engineering. The ideal candidate will be a proactive “doer” who thrives in a collaborative environment and is comfortable engaging directly with end users to understand business needs and secure data accordingly. Top 3 Required Skills: Experience managing data protection and security controls in MS O365 (SharePoint, OneDrive, Teams) Hands-on experience configuring Data Classification Labels, Retention Policies, and DLP rules Strong technical communication and collaboration skills, with the ability to gather business context and explain security solutions clearly Additional Requirements: Background in Microsoft 365 administration with a desire to focus on security Familiarity with secure handling of large file volumes and resolving oversharing risks Experience implementing or tuning custom security controls within Microsoft 365 environments Ability to validate data use cases and work with end users to align controls with business needs Responsibilities: Build, configure, and maintain MS O365 security controls, including DLP policies, Retention Labels, and Data Classification Labels Evaluate and tune existing configurations to improve protection of enterprise data Help reduce risk from overshared files, stale data, or inappropriate access across large MS O365 environments Engage directly with end users and business teams to gather context and guide the implementation of appropriate security controls Take ownership of solutions-this role is for someone who will recommend, implement, and follow through on actions Contribute to the security posture of the OneDrive, SharePoint, and Teams environment across the organization What You'll Get Competitive base salary Medical, dental, and vision insurance coverage Optional life and disability insurance provided 401(k) with a company match and optional profit sharing Paid vacation time Paid Bench time Training allowance offering You'll be eligible to earn referral bonuses! All done! Your application has been successfully submitted! Other jobs
    $90k-123k yearly est. 60d+ ago
  • Security Solution Engineer - Email Security

    Proofpoint 4.7company rating

    Security architect job in Cincinnati, OH

    **About Us:** Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people. **How We Work:** At Proofpoint you'll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values: **Bold** in how we dream and innovate **Responsive** to feedback, challenges and opportunities **Accountable** for results and best in class outcomes **Visionary** in future focused problem-solving **Exceptional** in execution and impact **POSITION SUMMARY** The Security Solutions Engineer is an information security expert responsible for assessing and improving the security posture of customer environments. The Security Solutions Engineer manages the technical aspects of customer systems and is primarily responsible for solution uptime, availability, policy development and problem troubleshooting. Security Solutions Engineers are also responsible for the technical development of various clients' security solutions such as: Proofpoint Protection Server, TAP, TRAP, and other Proofpoint products. Platform Engineers serve as an escalation point and mentor for other members of the team. Platform Engineers also help develop internal process, procedure, and drive collaboration across business units to help streamline service delivery. He or she must ensure that all tasks performed adhere to the firm's ISO 27001 Information Security Management System (ISMS). This includes participation in annual information and network security training and acceptance of spot checks on an ad hoc basis to guarantee that Proofpoint is constantly improving upon the organization's ISMS. Each member of our team must understand the importance of the ISMS and the corresponding handling of customer data. **DUTIES & ESSENTIAL JOB FUNCTIONS:** + Serve as an escalation point for other engineers on the team + Optimize security policies to protect against emerging threats and adhere to industry best practices + Create and develop custom solutions for managed security systems + Maximize system uptime, availability, and performance + Utilize internal CRM for problem tracking and project development + Assist the team in meeting all customer SLAs + Unsurpassed attention to detail, analytical problem-solving skills, and ability to diagnose and troubleshoot technical issues + Maintain awareness of industry trends, security news, and best practices + Take on-call rotation after hours and on weekends, serving as a point of escalation as necessary + Provide flexibility with schedule to cover job requirements + Ability to quickly and efficiently resolve client issues while maintaining high levels of client satisfaction + Lead technical discussions with customers and partnering organizations + Research and analyze industry trends and security vulnerabilities, in order to effectively communicate to customers any risk to their + environments and implement solutions to mitigate the risk + Administer and support lab environment to include change request review and approval, maintenance, and design **QUALIFICATIONS:** + Bachelor's Degree in Computer Science, Information Technology, or related discipline. Experience may be considered in lieu of a degree + Experience with Email Security + Corporate computer networking, technical support, system administration, Windows, Unix/Linux Operating System administration and/or + network security experience + Experience and proficiency in Proofpoint email security products, to include certification and training + Experience and proficiency designing and implementing Proofpoint solutions + High Level of critical thinking and proven ability to manage customer expectations high pressure situations + Proficiency in technical writing, diagraming, and communications. + Combine patience, determination, and persistence to troubleshoot client issues + Ability to work effectively with team members and clients + Desire to mentor junior engineers + Self-motivated, with ability to manage and follow up on multiple tasks simultaneously + Strong analytical capabilities, problem solving skills, providing solutions in a systematic and clear manner, and easily understood by + colleagues and customers + Strong time-management skills **PREFERRED** + Experience with Proofpoint email security products - PoD/TAP/TRAP + Expert in information security or network security + SQL or Oracle database experience + Regular expression experience + Scripting knowledge of Perl, Python, Java, or Bash + Proofpoint product certifications + Industry certifications such as CISSP, Network+, Security+, etc. + Experience working in Managed Services. \#LI-Remote **Why Proofpoint?** At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us: + Competitive compensation + Comprehensive benefits + Career success on your terms + Flexible work environment + Annual wellness and community outreach days + Always on recognition for your contributions + Global collaboration and networking opportunities **Our Culture:** Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone. We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com . **How to Apply** Interested? Submit your application along with any supporting information- we can't wait to hear from you! Consistent with Proofpoint values and applicable law, we provide the following information to promote pay transparency and equity. Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets as set out below. Pay within these ranges varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate. The range provided may represent a candidate range and may not reflect the full range for an individual tenured employee. This role may be eligible for variable compensation and/or equity. We offer a competitive benefits package, including flexible time off, a comprehensive well-being program with two paid Wellbeing Days and two paid Volunteer Days per year, plus a three-week Work from Anywhere option. **Base Pay Ranges:** SF Bay Area, New York City Metro Area: Base Pay Range: 98,900.00 - 155,430.00 USD California (excludes SF Bay Area), Colorado, Connecticut, Illinois, Washington DC Metro, Maryland, Massachusetts, New Jersey, Texas, Washington, Virginia, and Alaska: Base Pay Range: 78,800.00 - 123,805.00 USD All other cities and states excluding those listed above: Base Pay Range: 70,400.00 - 110,605.00 USD Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams. We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people. Our BRAVE Values: At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow. We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact. We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people. Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability. Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together. This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one. Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there. Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
    $85k-111k yearly est. 7d ago
  • IT Security Engineer

    Advent Global Solutions 4.5company rating

    Security architect job in Cincinnati, OH

    Advent Global Solutions (AGS) is a leading global IT services company, specialized in delivering enterprise software solutions, IT consulting & outsourcing services, and product engineering solutions. Advent Global's commitment to deliver IT services is backed by 1,000+ employees and preferred partnerships with companies like SAP, Oracle, Sybase, and IBM Job Description Role: IT Security Engineer Location: Cincinnati, OH Duration: 12 months Need 10+ years consultant Key Responsibilities: Minimum 10+ years of IT security experience that includes proven IT Security risk assessments and audits, information risk management and assessment development Minimum 10+ years of on-site working experience in the US Minimum of 2 years of experience with any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security. Intermediate knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security. 3+ years of experience in Web development and web technologies like HTTP, HTML, CSS, and JSPs. 3+ years of experience in microservice development, Node.js preferred or java springboard 2+ years of experience in continuous integration, continuous delivery and deployment automation 2+ years of experience in secure software development and deployment Intermediate knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security. Contributes to the design, engineering and implementation of systems infrastructure. Ability to execute in an agile driven environment Applies proven communication, analytical and problem-solving skills to identify, communicate and resolve issues. Application security reviews * Application Penetration testing * Projects and research work as needed * Security training and outreach to internal development teams * Security guidance documentation * Security tool development * Security metrics delivery and improvements Conduct deep code reviews and find design flaws, and think long-term about driving down operational cost Solve problems at their root, stepping back to understand the broader context, and implementing fixes to ensure that discovered issues are not repeated Stay abreast of new techniques, tools and methodologies used to solve cloud security problems Experience understanding Common Vulnerabilities and Exposures (CVE) and Web Application Security - OWASP Top 10 Requirements analysis, definition, and refinement Secure and assured systems engineering Hands on software engineering and development Mobile computing platform application development Application of Information Security Principals Must have experience in the Assessment of security risk, Big data and analytics, Reverse engineering and Malware analysis Software innovation and technology insertion Use of database technologies such as Oracle, MySQL, or SQL-based equivalents, as well as NoSQL-based databases such as Mongo DB Use Software Configuration Management tools Understanding of Software Development Life Cycle (SDLC) processes Support Test Engineering during formal testing phase of the project Represents the organization in providing solutions to difficult technical issues associated with specific projects Supports project developing solutions for Modernization and Sustainment tasks Must have Agile and DevOps Experience Bachelor's Degree or equivalent education and experience required. Security and/or risk-related certifications preferred but not required (CISSP, CSSLP, GEWB, CASS, CISA, CRISC, C-WAST) Proven analytical skills to identify and analyze security requirements and relate them to appropriate security policies, standards and/or controls in order to determine associated risk. Ensure that technical solutions effectively meet and support business needs. Proven ability to handle and prioritize multiple assignments, often within limited time constraints. The ability to interact with internal and external personnel at all organizational levels. Therefore, the candidate must have the ability to influence others across a matrix organizational structure Proven strong written and verbal communication skills are a requirement; both within the organization and with external partners and vendors. The ability to work independently and as a self-starter. Please share resumes to hemanth[dot]n[at]adventglobal[dot]com Additional Information All your information will be kept confidential according to EEO guidelines.
    $64k-81k yearly est. 19h ago
  • Information System Security Officer

    University of Dayton, Ohio 4.6company rating

    Security architect job in Dayton, OH

    Secure Your Future with the University of Dayton Research Institute! The University of Dayton's Research Institute (UDRI) is seeking a highly motivated and experienced Information System Security Officer to join our dynamic Sensor & Software Systems division in Warner Robins, GA. This is an exceptional opportunity to be part of a renowned research institution committed to excellence, innovation, and community engagement. The Information System Security Officer (ISSO) position is supporting the Air Force Rapid Sustainment Office (RSO). The RSO increases mission readiness by rapidly identifying, applying and scaling technology essential to the operation and sustainment of the U.S. Air Force. Success comes from our teamwork and mutual respect for each other's talents and unique perspectives. This role supports the government cyber lead and provides cybersecurity support for advanced software-intensive technologies to include agile manufacturing, conditioned-based maintenance, augmented reality/virtual reality, cloud-based infrastructure and services, and robotics. Responsibilities: • Serve as cybersecurity technical advisor, consultant, and primary point of contact to the Program Manager, Information System Owner, and other stakeholders for the Information systems • Assessing systems for vulnerabilities and providing corrective recommendations. • Supporting government Cyber lead in performing RMF activities leading to system RMF acceptance IAW DoDI 8510.01, NIST 800-series special publications, USAF policy and instructions, and guidance as applicable on RSO IT systems in networked, standalone, and cloud configurations. • Support, coordinate, and continuously monitor system security posture and ensure adverse events are formally handled and reported • Developing, reviewing, and updating necessary documentation associated with achieving RMF accreditation of each system. • Applying currently accepted methods for documenting the RMF status of each RSO system within the DoD environment. • Security Technical Implementation Guides (STIGs) for all systems • Managing projects in compliance with DoD and AF RMF policies including but not limited to the following: o DoDI 8500.01 - Cybersecurity Risk Management Framework for DoD Information Technology. o DoD 8570.01 M - Information Assurance Training, Certification, and Workforce Management. o CNSSI 1253 - Security Categorization and Control Selection for National Security Systems. o NIST 800-series Special Publications (SP). o Computer Security, including SP 800-53 - Security Controls and Assessment Procedures for Federal Information Systems and Organizations and Air Force Instruction Series 17. Cyberspace: Accomplishing system categorization, security control selection, security control implementation, security control assessment, and security control monitoring, including, but not limited to, accomplishing the RMF steps as outlined in DoDI 8510.01 on a system-by-system basis • Providing system performance reporting. • Support System Administrator for multiple cloud projects and implementations. • Supporting Interim Authority to Test (IATT)/ Authority to Operate (ATO) planning and execution. Minimum Qualifications: • Associates Degree in Cybersecurity, Computer Science, or related field • 3+ years relevant cybersecurity experience • Experience with the NIST RMF process • Security Technical Implementation Guides (STIGs) application experience • The applicant must meet DoD 8570.01-M IAT Level II or higher certification requirements on hire date (Security+ CE) • Familiarity with the DOD Information Assurance Vulnerability Management program • Effective verbal and written communication skills • Ability to obtain a Secret level security clearance • Due to the requirements of our research contracts with the U.S. federal government, candidates for this position must be a U.S. citizen Preferred Qualifications: While not everyone may possess all of the preferred qualifications, the ideal candidate will bring many of the following: • 5+ years' DoD cybersecurity experience • IAT Level III or IAM Level I Certification • Bachelor's Degree in Cybersecurity, Computer Science, or related field • Additive Manufacturing experience • Systems Administration experience • Experience with Secure Development Operations Systems, as either a user, developer, or system administrator • Experience with submission of system security package to DoD for ATO, IATO, etc • Active Secret level security clearance. • Familiarity with Enterprise Mission Assurance Support Service (eMASS). • Experience with approved government cloud services such as Microsoft Azure, Amazon Web Services, Google Cloud. • Relevant cloud infrastructure and security certifications (i.e. Office365, SharePoint, Amazon AWS) • Cloud Application experience • Experience managing various project activities ensuring accurate task completion Special Instructions to Applicants: To apply please submit a cover letter addressing each minimum qualification and any applicable preferred qualifications that you meet. Closing Statement: Informed by its Catholic and Marianist mission, the University is committed to the principles of diversity, equity, and inclusion. Informed by this commitment, we seek to increase diversity, achieve equitable outcomes, and model inclusion across our campus community. As an Affirmative Action and Equal Opportunity Employer, we will not discriminate against minorities, women, protected veterans, individuals with disabilities, or on the basis of age, race, color, national origin, religion, sex, sexual orientation or gender identity.
    $57k-70k yearly est. 60d+ ago
  • Cloud Security Architect

    Elevance Health

    Security architect job in Mason, OH

    **Location:** This role requires associates to be in-office 1 - 2 days per week, fostering collaboration and connectivity, while providing flexibility to support productivity and work-life balance. This approach combines structured office engagement with the autonomy of virtual work, promoting a dynamic and adaptable workplace. Alternate locations may be considered if candidates reside within a commuting distance from an office. Please note that per our policy on hybrid/virtual work, candidates not within a reasonable commuting distance from the posting location(s) will not be considered for employment, unless an accommodation is granted as required by law. The **Cloud Security Architect** is responsible for enabling, maturing, and operationalizing cyber defense capabilities across Elevance Health's enterprise and subsidiary cloud environments. This role partners closely with Cloud Infrastructure, Application Engineering, Detection Engineering, and Security Operations to ensure cloud-native security telemetry, detection, and response capabilities are deployed, monitored, and continuously improved. **How You Will Make an Impact:** + Lead efforts to integrate cyber defense and security operations capabilities into enterprise and subsidiary cloud environments (AWS, Azure, GCP, and OCI), ensuring consistent visibility and detection coverage across platforms. + Partner with cloud infrastructure and application teams to ensure security controls, logging, and telemetry are properly enabled, validated, and operational for cloud services and workloads. + Work with app, platform and engineering teams to ensure the appropriate level of logging is enabled within their respective environments. + Define roadmap and strategy for the future of cloud cyber defense, including CSPM, threat detection, logging pipelines, and incident response integration. Develop an approach that is tailored to the organization and keeps us out in front of developing threats. + Propose and develop cloud threat monitoring use cases. Train SOC analysts on how to properly triage, investigate and remediate alerts based on those use cases. + Collaborate with security operations and incident response teams to investigate complex cloud security events (e.g. threat detection events, misconfigurations, exposed resources) and support remediation efforts. + Infuse automation and AI-driven capabilities into cloud threat management operations. + Work with vendors to evaluate, select, and onboard technologies. Partner with vendor contacts to ensure product roadmaps address evolving business and technical requirements. + Support pursuit of new business by designing new cloud architectures that are compliant with FedRAMP or other regulatory requirements. + Participate in and contribute to governance review for new cloud services, AI-enabled platforms, and SaaS offerings, ensuring security requirements, logging, and guardrails are defined before approval. + Act as Subject Matter Expert in all aspects of cloud cyber defense. Advise executive leadership on matters relating to cloud security. Train and mentor junior team members. + Draft business-level presentations that garner executive and stakeholder support for cloud cyber defense initiatives. + Develop policies, technical standards and other foundational documentation. + Support regulatory and audit initiatives by validating cloud security controls, evidence collection, and alignment with frameworks such as SOC2, PCI, HITRUST, and FedRAMP. **Minimum Requirements:** Requires BS/BA in Information Technology or related field of study and a minimum of 10 years experience in systems administration and security aspects of information systems, access management and network security technologies, network communications, computer networking, telecommunications, systems development and management, hardware, software, data, and people; experience with multiple technical and business disciplines required; or any combination of education and experience, which would provide an equivalent background. **Preferred Skills, Capabilities & Experiences:** + Fluency with all 3 major cloud service providers: AWS, Azure & Google Cloud Platform. + Experience designing, implementing or operating cloud security programs in an enterprise environment. + Cloud security certifications such as CCSP or CSP-specific security certifications . + Experience with Oracle Cloud Infrastructure. Please be advised that Elevance Health only accepts resumes for compensation from agencies that have a signed agreement with Elevance Health. Any unsolicited resumes, including those submitted to hiring managers, are deemed to be the property of Elevance Health. Who We Are Elevance Health is a health company dedicated to improving lives and communities - and making healthcare simpler. We are a Fortune 25 company with a longstanding history in the healthcare industry, looking for leaders at all levels of the organization who are passionate about making an impact on our members and the communities we serve. How We Work At Elevance Health, we are creating a culture that is designed to advance our strategy but will also lead to personal and professional growth for our associates. Our values and behaviors are the root of our culture. They are how we achieve our strategy, power our business outcomes and drive our shared success - for our consumers, our associates, our communities and our business. We offer a range of market-competitive total rewards that include merit increases, paid holidays, Paid Time Off, and incentive bonus programs (unless covered by a collective bargaining agreement), medical, dental, vision, short and long term disability benefits, 401(k) +match, stock purchase plan, life insurance, wellness programs and financial education resources, to name a few. Elevance Health operates in a Hybrid Workforce Strategy. Unless specified as primarily virtual by the hiring manager, associates are required to work at an Elevance Health location at least once per week, and potentially several times per week. Specific requirements and expectations for time onsite will be discussed as part of the hiring process. The health of our associates and communities is a top priority for Elevance Health. We require all new candidates in certain patient/member-facing roles to become vaccinated against COVID-19 and Influenza. If you are not vaccinated, your offer will be rescinded unless you provide an acceptable explanation. Elevance Health will also follow all relevant federal, state and local laws. Elevance Health is an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to age, citizenship status, color, creed, disability, ethnicity, genetic information, gender (including gender identity and gender expression), marital status, national origin, race, religion, sex, sexual orientation, veteran status or any other status or condition protected by applicable federal, state, or local laws. Applicants who require accommodation to participate in the job application process may contact ******************************************** for assistance. Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws, including, but not limited to, the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act.
    $99k-146k yearly est. 5d ago
  • Network and Security Services Solutions Architect*

    Accenture 4.7company rating

    Security architect job in Cincinnati, OH

    We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era. You Are: An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions. You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant. As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives. You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery. The Work: You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models). You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance. Lead Pre‑Sales Architecture & Solutioning: + Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies. + Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access. + Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans. Qualify & Propose: + Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience. + Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial. Client Engagements & Demonstrations: + Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility. + Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives. Trusted Advisory & Best Practices: + Advise customers on security best practices, emerging threats, network modernization, and resilience improvements. + Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles. Technology Mastery: + Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation. Compliance, Governance & Risk: + Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.). + Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility. Cross‑Functional Handover & Delivery Readiness: + Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation. + Where appropriate, support early deal stabilization to de‑risk transition. Thought Leadership: + Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings. + Support technical training, marketing presentations, and participation in industry events. Travel may range from 0% to 100% depending on deal stage, client discussions, and business need Here's what you need: + Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity + Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture. + Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls. + Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes. + Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required Bonus Points if: + You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA. + You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native security architectures; familiarity with automation/orchestration (Terraform, Ansible, Python). + You have strong understanding of ITIL service operations and managed‑service delivery models. Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply. Information on benefits is here. (************************************************************ Role Location Annual Salary Range California $73,800 to $218,800 Cleveland $68,300 to $175,000 Colorado $73,800 to $189,000 District of Columbia $78,500 to $201,300 Illinois $68,300 to $189,000 Maryland $73,800 to $189,000Massachusetts $73,800 to $201,300 Minnesota $73,800 to $189,000 New York/New Jersey $68,300 to $218,800 Washington $78,500 to $201,300 Requesting an Accommodation Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired. If you would like to be considered for employment opportunities with Accenture and have accommodation needs such as for a disability or religious observance, please call us toll free at **************** or send us an email or speak with your recruiter. Equal Employment Opportunity Statement We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Equal Opportunity Statement (******************************************************************************************************************************************** Accenture is an EEO and Affirmative Action Employer of Veterans/Individuals with Disabilities. Accenture is committed to providing veteran employment opportunities to our service men and women. Other Employment Statements Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States. Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration. Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. Further, at Accenture a criminal conviction history is not an absolute bar to employment. The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information. California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information. Please read Accenture's Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
    $78.5k-201.3k yearly 6d ago
  • Information System Security Officer (ISSO)

    Applied Research Solutions 3.4company rating

    Security architect job in Dayton, OH

    ARS is looking for an Information System Security Officer (ISSO). Our desire is to build a team of highly qualified professionals that will provide expertise in Cybersecurity, Cloud, and Systems Engineering, who will support the development and sustainment of unique secure enclaves at the edge, that provide enterprise services and cyber network defense capabilities to customers across the DoD. This team will provide engineering expertise using technologies such as ePO, Splunk, ACAS, Azure Automation, STIG/SCAP, and other enterprise capabilities. The ISSO will have an active role in monitoring a system and its environment of operation to include developing and updating a System Security Plan, managing and controlling changes to the system, and assessing the security impact. **Why Work with us?** Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support. Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal professionals, we would not be able to deliver state-of-the-art results for our mission partners. We firmly believe that prioritizing our employees is of the upmost importance. We provide a culture where our employees are challenged to meet their career goals and aspirations, while still obtaining a work/life balance. ARS employees are motivated through our industry competitive benefits package, our awards and recognition program, and personalized attention from ARS Senior Managers. **Responsibilities:** + Maintain the operational security posture of systems. + Monitor systems and environments for security compliance. + Develop and update System Security Plans (SSPs). + Manage and control system changes and assess their security impact. + Handle physical, personnel, and environmental security. + Conduct incident response and security awareness training. + Assist the ISSM and assume ISSM duties when necessary. + Assist the ISSM in meeting their duties and responsibilities. The ISSO shall assume ISSM responsibilities in the absence of the ISSM; + Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package; + Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard; + Ensure all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS; + Report all security-related incidents to the ISSM + Conduct periodic reviews of information systems to ensure compliance with the security authorization package; + Serve as member of the CCB, if designated by the ISSM; + Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change; + Formally notify the ISSM and AO/DAO when changes occur that might affect system authorization; + Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly; + Ensure all IS security-related documentation is current and accessible to properly authorized individuals; and + Ensure audit records are collected, reviewed, and documented (to include any anomalies). + Participate in joint agile backlog planning and provide feedback to the software development team and infrastructure teams around high to medium risk items that require information system owner approval. + Other duties as assigned **Requirements:** + Must be a US citizen + Advanced technical competency and experience in one or more of the following areas: Active Directory Domain Services, Active Directory Federated Services, Active Directory Certificate Services, Windows Server Update Services, ePO, Splunk, STIG/SCAP, YUM, ACAS Automation, and Azure Monitor / Log Analytics. + Maintain equivalent IAM Level 2 certifications based off of DoD 8140 standard + 5+ years related experience in SCI/SAP environments. + Bachelor's degree in computer science, Engineering, Finance, Business, or relatedfield + 5-8 years demonstrated performance in related technology + Top Secret w/ SCI eligibility All positions at Applied Research Solutions are subject to background investigations. Employment is contingent upon successful completion of a background investigation including criminal history and identity check. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-741.5(a). This regulation prohibits discrimination against qualified individuals on the basis of disability, and requires affirmative action by covered prime contractors and subcontractors to employ and advance in employment qualified individuals with disabilities. This contractor and subcontractor shall abide by the requirements of 41 CFR 60-300.5(a). This regulation prohibits discrimination against qualified protected veterans, and requires affirmative action by covered contractors and subcontractors to employ and advance in employment qualified protected veterans. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
    $70k-94k yearly est. 34d ago
  • Network Information Security Engineer

    Medpace 4.5company rating

    Security architect job in Cincinnati, OH

    We are hiring a full-time Cybersecurity Engineer who is technical, dedicated to learning new things, security-minded, has strong initiative, and is able to manage projects autonomously. The Information Security team defends the company's digital infrastructure by designing, implementing, and improving the company's cybersecurity architecture. This is a critical role responsible for protecting infrastructure, cloud, edge devices, and data against unauthorized use, modification, exfiltration, or damage. If you're excited to be part of a fast-growing team, then Medpace is a great place to grow your career. Responsibilities * Engineer security solutions without oversight while collaborating with multiple internal departments and vendors; * Analyze security systems and drive continuous improvements; * Research vulnerabilities, perform vulnerability scanning and remediate threats; * Mature security best practices and policies internal to the organization; * Develop new processes while cross-training coworkers and assisting employees on security-related matters; * Provide security awareness training and testing for employees to verify proper security protocols are being adhered to; * Performing cyber security incident triage, reviewing logs, and performing remediation activities; and; * Review and reduce inappropriate/overprovisioned access to drive least privileged access. Qualifications * Minimum of bachelor's degree, preferably in Cybersecurity or Information Technology; * 3 years of experience in implementing, sustaining, and supporting Information Security solutions; * Understanding of security best practices and how to implement them within an enterprise environment; * Experience with managing, configuring, and deploying enterprise-grade security solutions in some of the following areas: * Zero Trust networking and network segmentation * Networking protocol analysis and forensics * Firewall configuration, Intrusions Detection and Prevention Systems (IDS/IPS) * Configuring Azure network architecture, working with Azure policies and Defender for Cloud Nice to have: * Experience with vulnerability assessment tools such as Nessus and Tenable; * Experience with enterprise web proxy solutions, web filters, and VPN such as Zscaler; * Experience with governing Windows environment including GPO; * Previous employment or experience in a highly regulated industry such as healthcare, financial, or defense experience with standards such as ISO, NIST, HIPPA, and/or SOC2; and * Auditing and policy-writing experience. Medpace Overview Medpace is a full-service clinical contract research organization (CRO). We provide Phase I-IV clinical development services to the biotechnology, pharmaceutical and medical device industries. Our mission is to accelerate the global development of safe and effective medical therapeutics through its scientific and disciplined approach. We leverage local regulatory and therapeutic expertise across all major areas including oncology, cardiology, metabolic disease, endocrinology, central nervous system, anti-viral and anti-infective. Headquartered in Cincinnati, Ohio, employing more than 5,000 people across 40+ countries. Why Medpace? People. Purpose. Passion. Make a Difference Tomorrow. Join Us Today. The work we've done over the past 30+ years has positively impacted the lives of countless patients and families who face hundreds of diseases across all key therapeutic areas. The work we do today will improve the lives of people living with illness and disease in the future. Cincinnati Perks * Cincinnati Campus Overview * Flexible work environment * Competitive PTO packages, starting at 20+ days * Competitive compensation and benefits package * Company-sponsored employee appreciation events * Employee health and wellness initiatives * Community involvement with local nonprofit organizations * Discounts on local sports games, fitness gyms and attractions * Modern, ecofriendly campus with an on-site fitness center * Structured career paths with opportunities for professional growth * Discounted tuition for UC online programs Awards * Named a Top Workplace in 2024 by The Cincinnati Enquirer * Recognized by Forbes as one of America's Most Successful Midsize Companies in 2021, 2022, 2023 and 2024 * Continually recognized with CRO Leadership Awards from Life Science Leader magazine based on expertise, quality, capabilities, reliability, and compatibility What to Expect Next A Medpace team member will review your qualifications and, if interested, you will be contacted with details for next steps.
    $71k-97k yearly est. Auto-Apply 11d ago
  • Job Title: Information Security Engineer - Vulnerability Management III

    Hudson Manpower

    Security architect job in Cincinnati, OH

    TOP SKILLS: Must Have Brinq Excellent communication and presentation skills, and a proven background of presenting to senior leaders, large groups, etc. on relevant matters pertaining to large projects and impacting key functionality. Lead and Implementation Experience Performing referral to principle proven consistent experience in vulnerability management, security engineering, security consulting etc Proven experience with proactive threat management, research, escalation, discovery etc. Security Solid understanding of popular security tooling and understanding of security architecture/interconnectedness of processes and tooling. Nice To Have CISSP, CISA, CISM, AWS Solutions Architect certifications GRC/audit management experience Scripting/automation experience - python preferred Solid proven experience with tooling such as Qualys, Brinqa, Archer, ServiceNOW, Checkmarx, Prisma (and any AWS experience is great as well) What You'll Do Responsible for performing all functions required to support day-to-day data security operations and accountable for security and networking infrastructure component availability and integrity, monitoring compliance with IT security policy, and coordinating investigation and reporting of security incidents. Primary Responsibilities: Define, deliver, and support enterprise security tools and architecture in collaboration with other teams. Enhance the Bank's network vulnerability management program for in-scope subsidiaries and affiliates. Define security environments and lead the implementation and onboarding of new applications, programs, processes, projects, and initiatives into the Enterprise Vulnerability Management Program. Communicate, escalate, support, and guide the resolution of open vulnerabilities, including infrastructure, application security, and configuration management vulnerabilities. Conduct security research on threats and remediation techniques/technology, make recommendations to IS/IT teams, and oversee their implementation. Proactively monitor and investigate security alerts from managed security service providers and in-house security tools. Conduct risk assessments to evaluate the effectiveness of existing controls and determine the impact of proposed changes to business processes, applications, and systems. Support ad hoc requests for reporting and control evidence, as needed. Perform threat analysis and incident response by interpreting events. Support the Bank's operational information security responsibilities, including developing and maintaining standards, procedures, and guidelines for the Enterprise Vulnerability Management Program. Share knowledge and industry best practices with team members. Serve as a security engineer/consultant on projects. What You'll Get Competitive base salary Medical, dental, and vision insurance coverage Optional life and disability insurance provided 401(k) with a company match and optional profit sharing Paid vacation time Paid Bench time Training allowance offering You'll be eligible to earn referral bonuses! All done! Your application has been successfully submitted! Other jobs
    $69k-93k yearly est. 60d+ ago
  • IT Security Engineer

    Advent Global Solutions 4.5company rating

    Security architect job in Cincinnati, OH

    Advent Global Solutions (AGS) is a leading global IT services company, specialized in delivering enterprise software solutions, IT consulting & outsourcing services, and product engineering solutions. Advent Global's commitment to deliver IT services is backed by 1,000+ employees and preferred partnerships with companies like SAP, Oracle, Sybase, and IBM Job Description Role: IT Security Engineer Location: Cincinnati, OH Duration: 12 months Need 10+ years consultant Key Responsibilities: Minimum 10+ years of IT security experience that includes proven IT Security risk assessments and audits, information risk management and assessment development Minimum 10+ years of on-site working experience in the US Minimum of 2 years of experience with any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security. Intermediate knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security. 3+ years of experience in Web development and web technologies like HTTP, HTML, CSS, and JSPs. 3+ years of experience in microservice development, Node.js preferred or java springboard 2+ years of experience in continuous integration, continuous delivery and deployment automation 2+ years of experience in secure software development and deployment Intermediate knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, or application security. Contributes to the design, engineering and implementation of systems infrastructure. Ability to execute in an agile driven environment Applies proven communication, analytical and problem-solving skills to identify, communicate and resolve issues. Application security reviews * Application Penetration testing * Projects and research work as needed * Security training and outreach to internal development teams * Security guidance documentation * Security tool development * Security metrics delivery and improvements Conduct deep code reviews and find design flaws, and think long-term about driving down operational cost Solve problems at their root, stepping back to understand the broader context, and implementing fixes to ensure that discovered issues are not repeated Stay abreast of new techniques, tools and methodologies used to solve cloud security problems Experience understanding Common Vulnerabilities and Exposures (CVE) and Web Application Security - OWASP Top 10 Requirements analysis, definition, and refinement Secure and assured systems engineering Hands on software engineering and development Mobile computing platform application development Application of Information Security Principals Must have experience in the Assessment of security risk, Big data and analytics, Reverse engineering and Malware analysis Software innovation and technology insertion Use of database technologies such as Oracle, MySQL, or SQL-based equivalents, as well as NoSQL-based databases such as Mongo DB Use Software Configuration Management tools Understanding of Software Development Life Cycle (SDLC) processes Support Test Engineering during formal testing phase of the project Represents the organization in providing solutions to difficult technical issues associated with specific projects Supports project developing solutions for Modernization and Sustainment tasks Must have Agile and DevOps Experience Bachelor's Degree or equivalent education and experience required. Security and/or risk-related certifications preferred but not required (CISSP, CSSLP, GEWB, CASS, CISA, CRISC, C-WAST) Proven analytical skills to identify and analyze security requirements and relate them to appropriate security policies, standards and/or controls in order to determine associated risk. Ensure that technical solutions effectively meet and support business needs. Proven ability to handle and prioritize multiple assignments, often within limited time constraints. The ability to interact with internal and external personnel at all organizational levels. Therefore, the candidate must have the ability to influence others across a matrix organizational structure Proven strong written and verbal communication skills are a requirement; both within the organization and with external partners and vendors. The ability to work independently and as a self-starter. Please share resumes to hemanth[dot]n[at]adventglobal[dot]com Additional Information All your information will be kept confidential according to EEO guidelines.
    $64k-81k yearly est. 60d+ ago

Learn more about security architect jobs

How much does a security architect earn in Kettering, OH?

The average security architect in Kettering, OH earns between $83,000 and $174,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Kettering, OH

$120,000

What are the biggest employers of Security Architects in Kettering, OH?

The biggest employers of Security Architects in Kettering, OH are:
  1. Deloitte
Job type you want
Full Time
Part Time
Internship
Temporary