Information System Security Manager
Security architect job in Warren, MI
ISSM
Duration: 9 Month Contract to hire
Salary Range: $120k - $145k
**Exact compensation may vary based on several factors, including skills, experience, and education.
**Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.
Day to Day:
Insight Global is looking for an ISSM to work for a DoD customer based out of Warren, MI.
The ISSM will provide support in the following areas:
Provide guidance to ISSOs, Information Technology team members, and the system owner regarding goals and objectives that will minimize the organizational risk present in the system
Compose, distribute, and execute local policies and procedures that will ensure system compliance with DoD RMF controls. These policies include, but are not limited to:
Vulnerability management
POA&M management
Personnel onboarding and offboarding
Incident response
Provide advisory to management regarding changes that may impact the security posture of the system
Preparation and submission of system security plans to upstream accrediting organizations
Must Haves:
Previous experience working as an ISSM for 3+ years
Strong Risk Management Framework (RMF) experience
Excellent written and verbal communication skills
Strong familiarity with NIST publications
Understanding of common operating systems, network technologies, and security tools
Secret Clearance
Certification required for IAM level II or III appointment
CAP
CASP+ CE
CISM
CISSP
GSLC
CCISO
HCISPP
CISM
CISSP
GSLC
CCISO
Plusses:
A BS degree in Information Technology, Cybersecurity, Data Science, Information Systems or Computer Science
Senior Platform Cyber Security Engineer
Security architect job in Sterling Heights, MI
The Panther Group is hiring a W2 Contract To Hire Senior Platform Cyber Security Engineer with one of our partners supporting the Department of Defense. This role requires an Active Security Clearance. This role is onsite in Sterling Heights, MI.
Job Summary
The function of this position is to support the Cyber and Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) section with responsibility for Cyber architecture, technology, evaluation, testing and compliance across the US market and support the delivery of products and services to Ground Combat Platforms. This is an engineering management position to broadly execute guidance from platform Chief Engineer, Systems Engineering Manager, and functional management.
This position will require a US security clearance.
Responsibilities to Anticipate/Expect:
Exercise authority and responsibility for Cyber and tasks to help integrate cross-functional technical scope within schedule and other constraints. Help project team to ensure a balanced, integrated, and compliant Cyber design across the vehicle system.
Manage/support the identification, development and implementation of platform cyber-physical design best practices, tools and education across the entire engineering enterprise. This will be done with a cross functional team of engineering and program disciplines and form the basis for developing a cyber security culture within the engineering organization.
Develop and manage System requirements and interface allocations including Performance and Space, weight and Power-Cooling, Reliability and Maintenance SWaP-CRaM), and enforce across the design team; develop system specification requirements compliance documentation
Manage and coordinate requirements, architectures and system designs and any changes, conditions, inputs and final resolution for requirements, trades, and alternatives
Manage, develop, support and conduct trade studies/structured decisions for system and subsystem design including system-level impacts to include balance of space, weight, power, cost, reliability, and performance across a Cyber vehicle suite
Oversee/support development of verification plans and manage their execution including test and production and field site shakedown and verification
Participate in and lead design and integration troubleshooting/Root Cause Corrective Action (RCCA) and problem report/test incident resolution for production, development, test, or modification projects
Develop and evaluate checkpoint and design milestone artifacts and Contract Data Requirements List (CDRLs) and review to ensure technical accuracy and compliance with contract requirements
Coordinate with platform Design Integrated Product Teams (IPTs) where interface is required, such as in threat analysis, interface development and requirements decomposition and compliance
Evaluate new Cyber and C5ISR technologies for potential use on products
Manage and participate in peer reviews
Position Requirements:
(Candidates will be considered on the aggregate of the position requirements, it is not required that candidates possess experience in all categories):Bachelor of Science in Engineering, related science or equivalent (Relevant cyber technical certificates and management credentials will be considered)
Minimum of 7+ years' experience
Experience with engineering and/or military projects
Experience with Cameo Systems Modeler and modeling languages such as SysML
Experience with embedded system engineering Cyber space.
Experience with Threat Analysis and Risk Assessment (TARA)
Experience with Cyber Tabletop Exercise (CTTX) drills
Ensure compliance with federal regulations and standards, including NIST SP 800-37 and NIST SP 800-53, RMF.
Prepare and maintain System Security Plans (SSPs), Plan of Action and Milestones (POA&Ms), and other required documentation.
Experience leading teams in technical development projects
Experience in military vehicle development and integration
Experience in interpreting higher level customer requirements and flowing them down to technology areas
Experience in developing and managing system level cyber requirements
Familiarity with various electrical line replaceable units and the development and troubleshooting of electronic hardware
Experience with cyber warfare, offensive and/or defensive
Experience with embedded systems, automotive and military related
Experience with software and computer science principles
Familiarity with cyber physical system security requirements
Familiarity with Microsoft Office software (Word, Excel, PowerPoint, Visio, Project)
Ability to travel (mostly domestic, some international) up to 15%
This position will require a US security clearance.
This position may require the candidate to be able to climb on/off, work in, and work around military vehicles is desired. Must be able to pass ASR test (Anthropometric Size Requirement for confined space)
Principal Information Security Architect
Security architect job in Lansing, MI
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress.
We're looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
**The Role**
The Principal Information Security Architect provides subject matter expertise for multiple, complex security systems, including developing security architectures and roadmaps, and evaluating, planning and designing security solutions. Additionally, the Principal Architect provides subject matter expertise to Product, IT, Network, and Security teams in the implementation of recommended solutions for identified technical security issues; ensures the implementation of security solutions utilizing advanced technical expertise; serves as architecture lead on major projects with the ability and expertise to develop overall architectural direction; initiates and executes advanced research and development activities of significance to future business security strategies.
**The Main Responsibilities**
+ Drives beneficial security change into the business through the development or review of architectures to ensure that they fit business requirements for security, mitigate risks, conform to the relevant security standards, and balance information risk against the cost of appropriate countermeasures.
+ Develops and designs new security solutions to reduce risk and align business requirements with security standards. Supports vendor relationships; leads vendor reviews through RFx process, working with Procurement and appropriate business partners on requirements and success criteria. Supports development of business case and approval process.
+ Delivers guidelines, best practices, and direction on security standards/policies and roadmaps. Provides subject matter expertise, consultation, and escalation support.
+ Provides support to Security Review process by assisting with complex questions and projects. Work with business units and partners as needed.
+ Acts as liaison between the business and technology from a security perspective, maintains an overview of the environment as a whole and its security aspects, understands business strategy and how it relates to security strategy, acts as a liaison between appropriate regulatory bodies, IT auditors, and business stakeholders, educates IT and enterprise roles on the need for (and consequences of) reducing information-related risk, and ultimately drives organizational change at all levels of the business.
**What We Look For in a Candidate**
Required:
+ Bachelor's degree in computer science, engineering, or related field with 15+ years of relevant experience or
+ Master's degree in computer science, engineering, or related field with 12+ years of relevant experience.
+ Applicable professional/technical certifications must be in place, such as CISSP, GPEN, GWAPT, GISEC, CISM or CISA.
+ Knowledge of information security industry and regulatory obligations (ISO 27001/27002, NIST Framework, FISMA, FedRAMP, and GDPR).
+ Software development experience.
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$149,084 - $198,779 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$156,539 - $208,718 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$163,993 - $218,657 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (****************************************************
+ Bonus Structure
\#LI-Remote
**What to Expect Next**
Requisition #: 340981
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (************************************* . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
App Security Architect.
Security architect job in Michigan
Length of Contract: 24+ months. Long-term assignment.
Description:
The Application Security Architect will report to the Application Security Architect Lead and will be responsible for assuring that IT application software and infrastructure is designed, implemented, and operated in accordance with applicable security standards and practices. Primary responsibilities include applications security, risk assessment, validation of security pen test results, problem resolution, system documentation, and system security management and support.
Position Responsibilities:
• Serve as primary information security interface to the assigned projects to collaborate with business representatives, systems development and business users for establishing business requirements, information security functional requirements, security solution options and implementation plans
• Good understanding of the architecture and the various web application tier and database tier components: underlying objects, schemas/products, database objects, file system structure, tables, views, packages, procedures, sequences, indexes, and constraints
• Conduct information security threat analyses on new and changed application development initiatives towards design, review, and incident response planning.
• Identify security requirements for applications, services and supporting infrastructure and effectively communicate requirements to application development teams and business owners
• Review application source code for vulnerabilities, using both manual and automated code scanning techniques aka Whitebox Testing.
• Identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options.
• Determine and clearly communicate quantitatively where possible the information security risks to the application development teams.
• Identify threats and risks to the confidentiality, integrity and availability of all data residing on information systems platforms.
• Recommend appropriate security solutions and review remediation activities for completeness.
• Assure compliance to security policies, standards, and procedures, including HIPPA, SOX, and CMS compliance.
• Monitor and recommend changes in standards that affect application security, especially in the area of privacy and identity theft.
• Initiate and promote activities to foster information security awareness and education among application development.
• Work with Information security peers and manager to assure standards compliance on various platforms (e.g., OSs, databases, networks, etc.) upon which application development group relies for the operation of its applications.
• Knowledge of operating systems (Windows, Unix) and common COTS products used to deliver web services, including IIS, Apache, Tomcat, Oracle Application Server, WebSphere, etc.
Top 3 Skills/Experience:
1. Skilled to identify and explain the risks associated with common application vulnerabilities, demonstrate exploitation, and recommend mitigation options.
2. Ability to be the primary information security interface to the assigned projects, and collaborate with business representatives, systems development and business users for establishing business requirements, information security functional requirements, security solution options and implementation plans
3. Skilled to determine and clearly communicate quantitatively where possible the information security risks to the application development teams.
Required Skills/Experience:
o Advanced written and verbal communications skills
o Experience with a variety of information security processes and technologies such as:
• Common operating systems, network protocols, web services and databases
• Risk assessment and management
• Identity management and authentication
• Directory services
• Application security and systems development life cycle
• Data and systems integrity controls
• Encryption technology
• Business requirements development and technical architecture development
• Change control and release management
• Network and application security assessment and ethical hacking
• System planning and integration
o Ability to adjust to changing priorities while multitasking effectively
o Ability to design, evaluate and document processes and lead teams in accomplishing process review and improvement
o Ability to interact with technical managers and development teams to articulate requirements and processes while collaborating on design options, implementation, testing and user acceptance
o Experience in project management, change management and release management
o Demonstrated ability to develop metrics, perform critical analysis and develop executive decision support content
o Knowledge of database applications, spreadsheet design, and report writing software
o Minimum 2 years experience in a security or related IT function
Preferred Skills/Experience:
• CISSP, CCNA, CCENT, CCNP, GSEC, MCSA, CISM certifications are preferred
Educational Requirements:
• Bachelors degree in Computer Science, Information Systems, Engineering or related major
OT Security Architect
Security architect job in Auburn Hills, MI
We're looking for a passionate and skilled Cybersecurity Architect (officially titled OT Security Architect) to join our team. The role involves the design, implement, and govern security architectures for operational technology environments, applying Zero Trust principles to protect critical industrial and IT systems. This role will collaborate with IT, plant operations, and security teams to ensure secure access, network segmentation, and threat mitigation across IT, manufacturing and industrial operations. The architect will drive strategy, standards, and solutions to enhance the resilience, visibility, and security posture of OT systems.
Job Responsibilities
* Design, implement, and maintain security architectures for OT environments while integrating Zero Trust principles across IT systems.
* Develop and enforce network segmentation, access controls, and secure connectivity between IT and OT systems to minimize risk exposure.
* Partner with IT, plant operations, and security teams to assess risks, identify vulnerabilities, and implement mitigations in OT and industrial control systems.
* Lead the evaluation, selection, and deployment of security technologies that support Zero Trust in IT and OT environments, including identity and access management, micro-segmentation, and endpoint protection solutions.
* Establish security standards, policies, and procedures for OT systems in alignment with organizational and regulatory requirements (e.g., NIST, ISA/IEC 62443, ISO 27001).
* Conduct security reviews and audits of OT systems, documenting findings and coordinating remediation with IT and OT stakeholders.
* 5-8 years of experience in OT/ICS security, IT security, or cybersecurity architecture, with hands-on experience implementing Zero Trust principles across IT and OT environments.
* Deep understanding of OT protocols, industrial control systems (ICS), SCADA, PLCs, DCS, and network architectures.
* Strong knowledge of Zero Trust frameworks, identity and access management, micro-segmentation, network security, and endpoint protection.
* Experience with regulatory frameworks and standards relevant to OT security, such as NIST Cybersecurity Framework, ISA/IEC 62443, ISO 27001, or similar.
* Proven ability to design and implement secure IT/OT architectures, conduct risk assessments, and recommend mitigation strategies.
* Strong collaboration and communication skills, able to engage with IT, OT, plant operations, and executive leadership.
* Support international operations by maintaining flexible work hours to accommodate time zone differences, particularly with European teams.
Job Qualifications
* Education: Bachelor's degree in Cybersecurity, Information Technology, Computer Science, Electrical/Industrial Engineering, or a related field.
* Certifications: Relevant cybersecurity certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), CompTIA Security+, or equivalent is beneficial.
* Advise workers of potential and actual hazards
* Provide workers with written instructions as to the measures and procedures to be followed for protection of the worker.
* Take every reasonable precaution in the circumstances for the protection of workers.
Working Conditions:
* Physical Environment - Majority of the time is spent in an office space.
* Working Hours - Standard 40 hours a week. Overtime may be required based on business demands.
* Occupational Stress - This role may require meeting strict compliance deadlines and ensuring protection of sensitive data.
* Health and Safety - This role often requires extended periods of sitting at a desk and looking at a computer screen. Using proper ergonomic office equipment and taking breaks to stand and/or stretch is beneficial.
*
EEO Statement:
TI Automotive is committed to equal employment opportunity regardless of race, color, religion, sex, national origin, sexual orientation, age, citizenship, marital status, pregnancy status, disability, gender identity or Veteran status.
Associate Security Architect (Cloud & Enterprise)
Security architect job in Traverse City, MI
At SCP Health, what you do matters
As part of the SCP Health team, you have an opportunity to make a difference. At our core, we work to bring hospitals and healers together in the pursuit of clinical effectiveness. With a portfolio of over 8 million patients, 7500 providers, 30 states, and 400 healthcare facilities, SCP Health is a leader in clinical practice management spanning the entire continuum of care, including emergency medicine, hospital medicine, wellness, telemedicine, intensive care, and ambulatory care.
Why you will love working here:
- Strong track record of providing excellent work/life balance.
- Comprehensive benefits package and competitive compensation.
- Commitment to fostering an inclusive culture of belonging and empowerment through our core values - collaboration, courage, agility, and respect.
Responsibilities:
Architecture & Design
Define security requirements, best practices, and reference architectures for hybrid multi-cloud (AWS, Azure) and on-premises environments.
Design and implement security controls for DevSecOps and CI/CD pipelines.
Establish best practices for Cloud Security Posture Management (CSPM) and secure Infrastructure-as-Code (IaC).
Apply SaaS Security Posture Management (SSPM) standards for enterprise SaaS applications.
Support architecture and security reviews to identify vulnerabilities and recommend mitigation strategies.
Evaluate and integrate emerging security technologies and practices across cloud and enterprise systems.
Enterprise Security Enablement
Support enterprise IAM and PAM strategies, including MFA, SSO, certificate, and secrets management.
Ensure security for enterprise platforms, including network, endpoint, and data security.
Contribute to compliance, governance, and audit readiness efforts (HIPAA, HITRUST, SOC 2, SOX, ISO 27001, NIST CSF).
Align security initiatives with enterprise IT roadmaps and transformation programs.
Collaboration & Culture
Partner with IT, DevOps, Data, and Application teams to embed security throughout the development, testing, and deployment lifecycle.
Provide security mentorship, training, and guidance across technical teams.
Advocate for a security-first culture and serve as a bridge between technical staff, business stakeholders, and leadership.
Engage with auditors, regulators, and executives to communicate security posture, risks, and remediation strategies.
Knowledge, Skills, and Abilities:
Frameworks & Standards: NIST CSF, ISO 27001, HIPAA, HITRUST, SOX, SOC 2, CIS Controls.
Cloud Security: AWS Security Hub, Azure Security Center, IAM, encryption, monitoring.
Enterprise Security: Network segmentation, endpoint security, DLP, vulnerability management.
Application Security: OWASP Top 10, secure SDLC, CI/CD security, DevSecOps.
Data Security & Privacy: Encryption, DLP, data classification, GDPR, CCPA compliance.
Identity & Access Management: IAM, PAM, MFA, SSO, certificate/secrets management.
Automation & Tooling: Terraform, Python, PowerShell, security orchestration.
Soft Skills: Strategic thinking, strong communication, collaboration, and mentoring abilities.
EDUCATION (Required and/or Preferred):
Bachelor's degree in Computer Science, Information Security, Cybersecurity, or related field.
Master's degree in Computer Science or related field, preferred
FIELD OF STUDY:
Computer Science
Information Security
Cyber Security
Information Technology
WORK EXPERIENCE/QUALIFICATIONS:
5+ years in cybersecurity, with at least 2+ years in architecture or engineering roles spanning both cloud and enterprise environments.
Hands-on experience designing and implementing security controls for AWS and/or Azure.
Familiarity with hybrid infrastructure security, IAM, PAM, and enterprise platforms.
Experience with compliance frameworks (HIPAA, HITRUST, SOC 2, NIST CSF, ISO 27001, CIS).
Proficiency in threat modeling, risk assessment, and security control design.
Experience with CSPM, SSPM, and secure DevOps practices.
Strong Microsoft Excel and Visio/Lucid skills.
Experience in healthcare security and regulatory environments, preferred
Knowledge of container security (Kubernetes, Docker) and cloud-native security, preferred
Experience with security automation, scripting, and orchestration, preferred
CERTIFICATES AND LICENSES:
Certifications such as CISSP, CISM, CCSP, Azure Security Engineer, AWS Security Specialty, GIAC (GCSA, GSEC, GPEN, etc.), preferred
PRIMARY LOCATION:
Atlanta, GA
Dallas, TX
Lafayette, LA
Traverse City, MI
SECONDARY LOCATION(S):
US-based Hybrid
#LI-PM1
Auto-ApplyGoogle Cloud Security Architect
Security architect job in Detroit, MI
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies
As a Consultant or Senior Consultant, you will collaborate with cross-functional teams, including IT, security, and business units, to design and implement Google Cloud-based application innovation solutions. You will work alongside experienced cloud architects, data scientists, and other specialists, ensuring the successful delivery of scalable, cloud-native applications and AI-powered solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this position the base salary pay ranges are listed below. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
East Bay, San Francisco, Silicon Valley:
* Consultant: $120,000-$177,000
* Senior Consultant: $140,000-$203,000
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Consultant: $110,000-$162,000
* Senior Consultant: $130,000-$186,000
All other locations:
* Consultant: $105,000-$148,000
* Senior Consultant: $115,000-$171,000
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
We are accepting applications until 12/31.
Security Architect (Identity & Access Management)
Security architect job in Saline, MI
Collabera is the largest minority-owned Information Technology (IT) staffing firm in the U.S., with more than $525 million in sales revenue and a global presence that represents approximately 10,000 professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but we are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for four consecutive years since 2012. With over forty offices globally and a presence in seven countries, Collabera provides staff augmentation, managed services and direct placement services to Global 2000 Corporations. Collabera is ranked amongst the top 10 IT staffing firms in the U.S., and for the past 24 years we have continued to grow rapidly year after year.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings.
Awards and Recognitions
--Staffing Industry Analysts: Best Staffing Firm to Work For (2015, 2014, 2013, 2012)
--Staffing Industry Analysts: Largest U.S. Staffing Firms (2015, 2014, 2013)
--Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
BS or BA degree in computer science, business administration, or related technical field or equivalent experience is required
· Minimum of 8 years of security application architecture, data security and code review experience.
· Must have expert level knowledge of a wide variety of information security architectures, concepts and techniques, as well as supporting security tools
· Exemplary general IT knowledge (applications development, testing, deployment, operations, documentation, standards, best practices, security, hardware, networking, OS, DBMS, middleware, etc.)
· Experience with secure application architecture, application intrusion and vulnerability penetration testing, secure coding practices, J2EE/.NET/Web Services Architecture and code review
· Experience with pattern oriented design and architecture of high-volume transactional systems
· Experience in identifying and validating application vulnerabilities at both an architectural and source code level.
· Must have strong skills in networking (TCP/IP, topology & security), operating systems (Windows, UNIX, Linux, Citrix, Midrange and Mainframe), databases, application security, web operations (internet security), and secure remote access capabilities
· Extensive knowledge of information security best practices, regulatory concerns and security standards including COBIT, ISO, ITIL, CMM, and Sarbanes-Oxley
· Effective project management skills, including the ability to plan, organize, prioritize, and balance multiple tasks and/or projects to ensure target dates and goals are achieved
· Ability to coordinate the efforts of multiple internal and external cross-functional teams to perform thorough audit processes
· Must have excellent analytical abilities
· Excellent written and verbal communication skills with the ability to work independently or as part of a team
Qualifications
Technical Skills: Oracle Identity Manager, Oracle Unified Directory, Oracle Access Manager, Workday, Active Directory, Azure, ADFS, SPML, Linux, MSSQL, LDAP, XML, Oracle DB, SQL Server, Weblogic, REST
Additional Information
To know more about this position, please contact:
Sreeni
************
sreenivasulu. ************************
Easy ApplySenior Manager, Information Security Office Consultant
Security architect job in Grand Rapids, MI
Jobs for Humanity is partnering with Capital One to build an inclusive and just employment ecosystem. Therefore, we prioritize individuals coming from the following communities: Refugee, Neurodivergent, Single Parent, Blind or Low Vision, Deaf or Hard of Hearing, Black, Hispanic, Asian, Military Veterans, the Elderly, the LGBTQ, and Justice Impacted individuals. This position is open to candidates who reside in and have the legal right to work in the country where the job is located.
Company Name: Capital One
Job Description
201 Third Street (61049), United States of America, San Francisco, California
Senior Manager, Information Security Office Consultant
At Capital One, you will help consult on initiatives, programs, and projects to raise their game in Information Security. You are pragmatic and practical in your understanding of risk and security, but also willing to know when to pull in experts and escalate. You collaborate and innovate with other teams within Capital One to push the envelope. You are comfortable with Cloud Service technologies like Storage Services, Security & Access Control Management, Container Services, and API Implementation and Management. You are familiar with various Cloud computing models to include IaaS, PaaS, and SaaS along with their architectural differences. Security is essential to what we do here, from protecting our customers to our associates.
What You'll Do:
Act as a central Information Security point of contact for the Enterprise Platform team
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management
Serve as an expert in Capital One's Information Security capabilities, solutions, policies, procedures and standards
Influence customers to leverage security capabilities and solutions to shift and integrate security to the left in the development processes
Escalate and manage cyber security risk
Provide ad hoc support on special Information Security hot topics for the business
Provide regular updates to executive leadership with your line of business on the overall Information Security health and risk environment
Work with line of business leadership to anticipate their objectives and needs to better serve the line of business
Product security consulting in Authentication/Access Management /Identity application and experienced in Authentication and industry-standard protocol for authorization/authorization
Basic Qualifications:
High School Diploma, GED or equivalent certification
At least 8 years of experience working in cybersecurity or information technology
At least 7 years of experience providing guidance and oversight of Security concepts
At least 7 years of experience performing security risk assessments and security architecture reviews
At least 7 years of experience with architecture, software design, networking, and cloud infrastructure
At least 5 years of experience with cloud security engineering
Preferred Qualifications:
Bachelor's Degree
3+ years of experience in securing a public cloud environment (e.g. AWS, GCP, Azure)
4+ years of experience in IAM or related areas
Experience building software utilizing public cloud (e.g. AWS, GCP, Azure)
Familiarity with Cloud patch management practices such as system rehydration and image management
Experience utilizing Agile methodologies
Experience with Software Security Architecture
Experience with Application Security
Experience with Threat Modeling
Experience with Penetration Testing or Vulnerability Management
Experience with integrating SaaS products into an Enterprise Environment
Experience with securing Container services
Splunk-Fu / Enterprise Monitoring experience
Financial services industry experience
Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP)
Experience in Offensive and Defensive Security techniques
Experience in a regulated environment
Strong conceptual thinking, influence and communication skills
At this time, Capital One will not sponsor a new applicant for employment authorization for this position.
The minimum and maximum full-time annual salaries for this role are listed below, by location. Please note that this salary information is solely for candidates hired to perform work within one of these locations, and refers to the amount Capital One is willing to pay at the time of this posting. Salaries for part-time roles will be prorated based upon the agreed upon number of hours to be regularly worked.
New York City (Hybrid On-Site): $230,100 - $262,700 for Sr Manager, Cyber Technical
San Francisco, California (Hybrid On-Site): $243,800 - $278,200 for Sr Manager, Cyber Technical
Candidates hired to work in other locations will be subject to the pay range associated with that location, and the actual annualized salary amount offered to any candidate at the time of hire will be reflected solely in the candidate's offer letter.
Capital One offers a comprehensive, competitive, and inclusive set of health, financial and other benefits that support your total well-being. Learn more at the
Capital One Careers website
. Eligibility varies based on full or part-time status, exempt or non-exempt status, and management level.
This role is expected to accept applications for a minimum of 5 business days.
No agencies please. Capital One is an equal opportunity employer committed to diversity and inclusion in the workplace. All qualified applicants will receive consideration for employment without regard to sex (including pregnancy, childbirth or related medical conditions), race, color, age, national origin, religion, disability, genetic information, marital status, sexual orientation, gender identity, gender reassignment, citizenship, immigration status, protected veteran status, or any other basis prohibited under applicable federal, state or local law. Capital One promotes a drug-free workplace. Capital One will consider for employment qualified applicants with a criminal history in a manner consistent with the requirements of applicable laws regarding criminal background inquiries, including, to the extent applicable, Article 23-A of the New York Correction Law; San Francisco, California Police Code Article 49, Sections 4901-4920; New York City's Fair Chance Act; Philadelphia's Fair Criminal Records Screening Act; and other applicable federal, state, and local laws and regulations regarding criminal background inquiries.
If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation, please contact Capital One Recruiting at ************** or via email at
[email protected]
. All information you provide will be kept confidential and will be used only to the extent required to provide needed reasonable accommodations.
For technical support or questions about Capital One's recruiting process, please send an email to
[email protected]
Capital One does not provide, endorse nor guarantee and is not liable for third-party products, services, educational tools or other information available through this site.
Capital One Financial is made up of several different entities. Please note that any position posted in Canada is for Capital One Canada, any position posted in the United Kingdom is for Capital One Europe and any position posted in the Philippines is for Capital One Philippines Service Corp. (COPSSC).
Associate Security Systems Engineer - Access Control & CCTV
Security architect job in Plymouth, MI
Together, We Enhance Innovation and Growth
i2G specializes in advanced physical electronic security and life safety solutions. I2G has proven experience in surveillance, access control, and intrusion detection systems, biometrics, fence sensors, radars, ground sensors, anti-drone technologies, and more. We excel in design, project management, commissioning, and enterprise technology integrations.
i2G's mission is to provide the products and services that meet our customers' needs to give them a vital advantage in today's market, helping to protect what matters most.
This position will provide engineering design and support for security solutions for new and existing clients while working alongside internal teams, external teams, clients, and subcontractors to ensure project success.
We are looking for a motivated and knowledgeable Jr. Security Engineer to join our team. The ideal candidate will have an understanding of standard Low voltage systems ideally in the Electronic Security technology space, to include Access Control Systems (ACS), Intrusion Detection Systems (IDS), Closed-Circuit Television (CCTV), and supporting equipment such as computer software/hardware, and networking infrastructure. This candidate will excel in critical thinking, have the ambition to learn and grow, and possess a strong desire to perform at the top of their abilities.
Responsibilities
Review architectural, electrical, telecommunication, and security engineering floor plans, riser drawings, device schedules, and detail drawings.
Design, develop, and implement solutions for system installations, upgrades, repairs, and conversions.
Review Field Site Survey documentation and provide technical assistance with RFI/RFP responses.
Create solution design documentation, including drawings, Bills of Materials (BOMs), permitting packages and solution design summaries.
Learn and Maintain familiarity with current and emerging electronic security technologies, such as access control, video surveillance, intrusion detection, biometrics, and industry-leading vendors
On the job Training will be provided to increase skills in all key responsibilities listed above, including hands on field work with installation and integration teams to better understand design and implementation requirements.
Qualifications
Mechanical, Engineering, Plumbing Engineering degree or a minimum of 2 years of previous experience in the industry.
An associate or bachelor's degree in a relevant field if no previous experience, a comparable amount of experience in the appropriate field may be substituted.
Experience in the design and planning of MEP systems.
Ability to make load calculations associated with power, data, conduit fill ratios and/or HVAC systems.
Ability to manage time and multiple tasks without supervision.
Strong organizational skills and attention to detail.
Excellent analytical and problem-solving skills.
Exceptional presentation, writing, verbal, and written customer communication skills.
Experience with computer programs such as Microsoft Office, Excel, Adobe, etc. is preferred. Knowledge of Microsoft Project, Visio, BlueBeam, AutoCAD, or Revit is a plus.
Company Overview
This is a Low Voltage Security Estimator career opportunity with i2G Systems. Learn more about i2G: ***************************************
"Kastle Systems Makes Strategic Investment in i2G Systems, Strengthening Leadership in Serving High-Security Industries and High-Value, Large Scale Facilities" Read More About the Partnership Here:
***********************************************************************************************************************************************************************************
Equal Opportunity Statement
We are an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, protected veteran status, marital status, pregnancy or any other basis protected by applicable federal or state laws.
#JuniorSecuritySystemsDesignEngineer #SecuritySystemDesign #AccessControlDesign #VideoSurveillanceDesign #IntrusionDetectionSystems #SecuritySystemsEngineering #SecuritySystemShopDrawings #SecuritySystemLayouts #SystemRiserDiagrams #EngineeringSpecifications #SecurityDesignDocumentation #SecurityProposalDesign #BidPreparation #SecuritySystemEstimation #SecuritySystemSubmittals #AutoCADSecurityDesign #RevitBIMSecurityDesign #SecuritySystemsIntegration #TechnicalSupportForSecurityDesign #SecuritySolutionsEngineering #PhysicalSecuritySystemDesign
Auto-ApplyInformation Security Manager
Security architect job in Detroit, MI
Computech Corporation provides IT and consulting services to various customers across the globe. We are a Minority Certified Company with over 15 years of industry experience. Our global delivery model and proven track record enable companies to realize improved business efficiency and increased profitability.
Job Description
As an Information Security Product Manager, you will work with highly skilled engineers, key business decision makers, and IT leadership. You will define the future direction for our technical security services and bring about the realization of that vision. You will work with vendors and the ecosystem, to help us stay abreast in new security technologies and to identify what capabilities to invest in.
Qualifications
Top 3 Skills required
• Design, architecture, and implementation of centralized security technology solutions at large enterprises - 5 years
• Operations experience in identity management, key management, or other security domains - 3 years
• Leadership role in the development or delivery of information security services - 3 years
Background Required
• In depth knowledge of key information security domains, including authentication, authorization, access control, and encryption
• Demonstrated experience in designing and implementing enterprise class security solutions
• Familiarity with agile and waterfall development methodologies
• Ability to translate the information security domain to IT and business domains, as well as communicate complex technologies in a clear and concise manner
Preferences
• Security operations experience, such as identity management or key management.
• Previous leadership experience, either through leading teams and/or initiatives
• Success in large corporate environments
Role and Responsibilities
• Internalize the team's mission and strategies, including key initiatives
• Distill the technical vision for the team, including the future state for our centralized security technologies. This will span authentication, authorization, encryption, and other related services
• Understand our customers; leverage feedback and learning to guide improvements to the information security customer experience
• Gather, understand, and prioritize the business needs for centralized, shared security technology. This will be a comprehensive and ongoing exercise.
• Build and maintain relationships with service customers and key stakeholders. This includes
o representing the team with stakeholders, communicating on behalf of stakeholders within the team, and being the team's inbound/outbound point of contact
o communicate evangelizing our mission and the value our services deliver
o gather feedback from customers and stakeholders to ensure on-going suitability of service features
o communicating regularly with senior IT leadership on key security metrics and service development successes
• Facilitate and govern the full life-cycle of technical security service components, including
o guiding the technical security control architecture
o approving service life-cycle transitions
• Prioritize and launch service development initiatives,
o interfacing with business and technical stakeholders to define scope
o establishing success criteria
o estimating work efforts
o securing funding
• Seek new business opportunities that are enabled by our services
• Identify potential areas for service improvements, including through
o new technologies and vendor relationships. This also means Influencing selection of security technologies and managing relationships with vendor partners
o partnering with information security research, service development, and security delivery teams
• Assisting in planning for skill, methodology, technology, and facility needs for future services and capabilities
Qualifications - Education and/or experience
• Bachelors degree
• Minimum 7 years of experience in information security architecture or engineering
Qualifications - Other skills and abilities [soft skills]
• Excellent verbal and written communication skills
• Ability to influence and motivate people across a wide range of functional areas
• Strong customer service skills
• Capable in managing conflict and driving win-win outcomes
• Highly organized; prepared to juggle multiple tasks while keeping focus on priorities
• Comfortable switching from big picture to detail oriented activities
• Passionate learner; able to rapidly digest, analyze, and apply new knowledge
Additional Information
All your information will be kept confidential according to EEO guidelines.
Data Privacy Manager & Information Security Officer
Security architect job in Auburn Hills, MI
WHAT WE ARE LOOKING FOR We are seeking an experienced and dedicated Data Privacy Manager and Information Security Officer to join our organization. This dual-role position ensures the confidentiality, integrity, and availability of data, while ensuring compliance with relevant privacy laws, regulations, and best practices.
The ideal candidate will lead efforts to safeguard sensitive data and implement robust information security measures.
Including, but not limited to:
* Assessing local data protection requirements and activities.
Implementing and maintaining the Group-wide data protection management system in his area of responsibility (if applicable, by means of local implementation guidelines).
* Taking on country-wide data protection issues/tasks, supported by the responsible Data Privacy Officer.
* Coordination of data privacy projects.
* Interface to the responsible Data Privacy Officer.
* Data breach management.
* Processing of and/or support with data protection related inquiries.
* If necessary, support during inspections by the relevant authorities.
* Coordination of the Data Privacy Manager in his region
* Identifies the need of further contact partners as potential Data Privacy Manager in the region.
* Attends to general inquiries from supervisory data protection authorities as first responder. At a minimum, the Regional Data Privacy Manager shall act as second responder when, for example, inquiries come directly to management.
* Primary Contact within the legal entity for Rheinmetall's data privacy organization.
* Primary data protection counterpart for the management and employees within the legal entity.
* Regular exchange with the relevant Data Privacy Officer.
* Responsible for data protection related advice and support of business departments.
* Data protection related support of business departments with the introduction of new or change of existing processes and/or assets (especially IT-solutions).
* Develop and enforce the organization's information security policies, standards, and procedures.
* Conduct risk assessments to identify and mitigate information security vulnerabilities.
* Oversee the implementation of security technologies, including firewalls, intrusion detection systems, and encryption tools.
* Lead the response to information security incidents, including investigations and post-incident reviews.
WHAT QUALIFICATIONS YOU SHOULD HAVE
* Bachelor's degree in Computer Science, Information Systems, Cybersecurity, Law, or a related field.
* At least 5 years of experience in data privacy, information security, or a related field.
* In-depth knowledge of global data protection regulations and frameworks (e.g., GDPR, CCPA).
* Strong understanding of information security principles, practices, and technologies.
* Certifications such as CIPP/E, CIPM, CISSP, CISM, or equivalent are highly desirable.
* Excellent analytical and problem-solving skills.
* Strong communication and interpersonal skills to interact with all levels of the organization.
* Ability to manage multiple projects and priorities simultaneously.
* High level of integrity and a strong commitment to maintaining confidentiality.
chief information security officer (WEBCAM INTERVIEW)
Security architect job in Lansing, MI
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
Skill Required/Desired Amount
Multi-disciplined IT background Required 10
Experience as CISO or equivalent position for medium sized organizations Required 4
Degree(s) in Computer Science, Business, Engineering or Information Systems Highly desired 1
Current certifications such as CISSP, CISA, and/or others as relevant will be preferred Nice to have 1
Professional IT process / methodology certifications (e.g., ITIL, CobIT, LEAN, Six Sigma) with experience implementing processes and methodologies. Nice to have 3
Experience as a business or IT consultant Highly desired 4
Strong knowledge and experience in managing complex project plans with interdependencies Required 5
Qualifications
Skill Required/Desired Amount
Multi-disciplined IT background Required 10
Experience as CISO or equivalent position for medium sized organizations Required 4
Degree(s) in Computer Science, Business, Engineering or Information Systems Highly desired 1
Current certifications such as CISSP, CISA, and/or others as relevant will be preferred Nice to have 1
Professional IT process / methodology certifications (e.g., ITIL, CobIT, LEAN, Six Sigma) with experience implementing processes and methodologies. Nice to have 3
Experience as a business or IT consultant Highly desired 4
Strong knowledge and experience in managing complex project plans with interdependencies Required 5
Additional Information
Thanks and Regards,
Karan Sharma
510-254-3300 ext. 150
Global Physical Security Systems Engineer
Security architect job in Zeeland, MI
Why join us? Our purpose is design for the good of humankind. It's the ideal we strive toward each day in everything we do. Being a part of MillerKnoll means being a part of something larger than your work team, or even your brand. We are redefining modern for the 21st century. And our success allows MillerKnoll to support causes that align with our values, so we can build a more sustainable, equitable, and beautiful future for everyone.
GENERAL PURPOSE
Responsible for supporting Physical Security Systems hardware and software technology throughout the enterprise. Independently conducts field work, oversees contractor labor, and troubleshoots service issues according to department guidelines utilizing Milestone, Lenel, Bosch and other systems.
ESSENTIAL FUNCTIONS
* Coordinates contract install/service labor and reviews work for commissioning. May lead small projects.
* Advises and assists in annual security systems budgeting process.
* Coordinates with external relationships to ensure the viability of all physical security systems, legacy and new, with the goal of minimal business disruption as the result of failed or improperly configured systems.
* Ensures the coordination, installation, upgrade and conversion or servicing of alarm systems, access controls, video cameras, burglary, radio systems and all other types of physical security equipment.
* Maintains an in-depth knowledge of the state-of-the-art security equipment standards and technology encompassing all physical security products. Suggests system solutions to specific security concerns identified through customer request and security audits.
* Perform additional responsibilities as requested to achieve business objectives.
* Performs annual audits for various access control systems.
* Provides product research, feasibility studies, project planning, tracking and quality assurance and overall vendor communication and management.
* Reviews physical security system standards, policies, required upgrades, maintenance and day-to-day management of all security systems through system integrators or internal resources.
* With guidance, plans and recommends to management the physical security systems and service requirements for the company.
* Identifies errors, troubleshoots, and determines corrective action in existing systems.
* Creates scope of work and requests for proposal for installation projects.
* Interprets CAD/technical blueprints for construction design.
* Coordinates vendor/installer technicians for project installs and service calls.
* Administers infrastructure upgrades, implementations and integrations.
* Anticipates technology solutions to solve current and future business needs.
* Independently programs access control, intrusion detection, and camera equipment.
* Independently installs and wires security system components
* Tests and commissions new security equipment installations.
* Determines the appropriate physical security techniques in balance with MillerKnoll practices to accomplish objectives.
* Suggests technology solutions aligned with corporate security strategy and budget guidelines.
* Performs additional responsibilities as requested to achieve business objectives.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education/Experience
* High school diploma or equivalent
* Two years' experience hands-on with physical security systems and related software with basic DC electrical and networking experience or an equivalent combination of education, training and experience.
* Electrician's Trade License or associate's degree in computer science related field and demonstrated relevant work experience, preferred.
Licenses and Certifications
* Lenel Certification or equivalent experience preferred
* Milestone Certification or equivalent experience preferred
* Bosch RPS Programming Experience Preferred
* Basic knowledge of Network design and function
* Ability to learn and integrate new technologies as business needs change.
Skills and Abilities
* Must be able to lift 50 lbs., bend, walk and twist.
* Ability to travel up to 20% or as needed to achieve business objectives.
* Strong problem solving, critical thinking, and interpersonal communication skills.
* Strong customer focus.
* Ability to effectively use office automation, communication, software and tools currently used in the HMI office environment.
* Applies advanced problem-solving skills and executes solutions to complex problems independently
* With guidance, plans and recommends to management the physical security systems and service requirements for the company.
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Must be able to perform all essential functions of the position with or without accommodations.
Who We Hire?
Simply put, we hire qualified applicants representing a wide range of backgrounds and abilities. MillerKnoll is comprised of people of all abilities, gender identities and expressions, ages, ethnicities, sexual orientations, veterans from every branch of military service, and more. Here, you can bring your whole self to work. We're committed to equal opportunity employment, including veterans and people with disabilities.
This organization participates in E-Verify Employment Eligibility Verification. In general, MillerKnoll positions are closed within 45 days and are open for applications for a minimum of 5 days. We encourage our prospective candidates to submit their application(s) expediently so as not to miss out on our opportunities. We frequently post new opportunities and encourage prospective candidates to check back often for new postings.
MillerKnoll complies with applicable disability laws and makes reasonable accommodations for applicants and employees with disabilities. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact MillerKnoll Talent Acquisition at careers_********************.
Auto-ApplyPrincipal Security Engineer - IAM
Security architect job in Waterford, MI
We are Lennar
Lennar is one of the nation's leading homebuilders, dedicated to making an impact and creating an extraordinary experience for their Homeowners, Communities, and Associates by building quality homes and providing exceptional customer service, giving back to the communities in which we work and live in, and fostering a culture of opportunity and growth for our Associates throughout their career. Lennar has been recognized as a Fortune 500 company and consistently ranked among the top homebuilders in the United States.
Join a Company that Empowers you to Build your Future
The Principal Security Engineer is the highest technical position within the security engineering team, responsible for driving the overall security strategy of the organization. This role is focused on designing cutting-edge security solutions, with a strong emphasis on cloud security, and leading the organization's response to the most complex security challenges.
A career with purpose.
A career built on making dreams come true.
A career built on building zero defect homes, cost management, and adherence to schedules.
Your Responsibilities on the Team
Define and lead the implementation of the organization's security strategy, with a focus on Cloud Security, Identity Access Management, and all other aspects of Cybersecurity
Architect and oversee the deployment of IAM solutions across both on-premise and cloud environments, ensuring they meet the highest standards of security.
Lead the most complex security assessments, including threat modeling, red teaming, and cloud security reviews.
Collaborate with executive leadership to ensure that security initiatives align with the organization's strategic goals and risk appetite.
Act as the technical lead for large-scale security projects, coordinating cross-functional teams to ensure successful delivery.
Architect and implement solutions across workforce IAM, PAM, and customer IAM ecosystems.
Provide thought leadership in adopting passwordless authentication, passkeys, adaptive MFA, and AI-driven access orchestration strategies
Engineer integrations with Agentic AI tools for intelligent decisioning, policy enforcement, and autonomous identity lifecycle operations.
Develop and implement automated provisioning/deprovisioning workflows
Ensure integration of IAM with cloud platforms (Azure, AWS, GCP) and SaaS applications.
Mentor and develop the skills of senior security engineers, fostering a culture of continuous improvement and innovation.
Requirements
Education: Bachelor's degree in Computer Science, Cybersecurity, or a related discipline; Master's degree is highly preferred.
Professional Experience: Minimum of 10 years in security engineering, with significant expertise in Identity and Access Management (IAM).
Project Leadership: Demonstrated success in leading large-scale IAM initiatives and formulating security strategies for complex organizations.
IAM Solutions: Design and hands-on engineering across IAM:
Identity Providers (such as Microsoft Entra ID, Okta, Ping, ForgeRock),
Identity Governance & Administration (SailPoint, Saviynt),
Privileged Access Management (CyberArk, Delinea, HashiCorp Vault), and
Customer IAM (Auth0, PingOne-preferred).
Protocols & APIs: Deep understanding of federation protocols (SAML, OAuth2.0, OIDC), SCIM, and RESTful APIs.
Directory Services & Cloud IAM: Hands-on experience with Active Directory, LDAP, and cloud IAM solutions (Azure, AWS, GCP).
Security Frameworks: Solid foundation in Zero Trust architecture and contemporary security standards.
Automation: Proficient in scripting and automation using PowerShell, Python, Java, or RESTful APIs.
Recognized industry certifications such as CISSP, CCSP, AWS Certified Security - Specialty, or equivalent credentials.
Exceptional leadership and communication abilities, capable of influencing executive decision-makers and directing cross-functional teams.
Physical & Office/Site Presence Requirements
This is primarily a sedentary office position which requires the incumbent to have the ability to operate computer equipment, speak, hear, bend, stoop, reach, lift, and move and carry up to 25 lbs. Finger dexterity is necessary.
This description outlines the basic responsibilities and requirements for the position noted. This is not a comprehensive listing of all job duties of the Associates. Duties, responsibilities and activities may change at any time with or without notice.
Life at Lennar
At Lennar, we are committed to fostering a supportive and enriching environment for our Associates, offering a comprehensive array of benefits designed to enhance their well-being and professional growth. Our Associates have access to robust health insurance plans, including Medical, Dental, and Vision coverage, ensuring their health needs are well taken care of. Our 401(k) Retirement Plan, complete with a $1 for $1 Company Match up to 5%, helps secure their financial future, while Paid Parental Leave and an Associate Assistance Plan provide essential support during life's critical moments. To further support our Associates, we provide an Education Assistance Program and up to $30,000 in Adoption Assistance, underscoring our commitment to their diverse needs and aspirations. From the moment of hire, they can enjoy up to three weeks of vacation annually, alongside generous Holiday, Sick Leave, and Personal Day policies. Additionally, we offer a New Hire Referral Bonus Program, significant Home Purchase Discounts, and unique opportunities such as the Everyone's Included Day. At Lennar, we believe in investing in our Associates, empowering them to thrive both personally and professionally. Lennar Associates will have access to these benefits as outlined by Lennar's policies and applicable plan terms. Visit Lennartotalrewards.com to view our suite of benefits.
Join the fun and follow us on social media to see what's happening at our company, and don't forget to connect with us on Lennar: Overview | LinkedIn for the latest job opportunities.
Lennar is an equal opportunity employer and complies with all applicable federal, state, and local fair employment practices laws.
Auto-ApplyInformation System Security Officer (ISSO)
Security architect job in Warren, MI
Job Details Experienced Warren - DEVCOM - GVSC - Warren, MI Full Time 4 Year DegreeDescription
FEDITC, LLC is a fast-growing business supporting DoD and other intelligence agencies worldwide. FEDITC develops mission critical national security systems throughout the world directly supporting the Warfighter, DoD Leadership, & the country. We are proud & honored to provide these services.
Overview of position:
FEDITC is seeking an Information System Security Officer (ISSO) to work in Warren, MI. A United States Citizenship and an active Secret DoD Security Clearance is required to be considered for this position.
The Information System Security Officer (ISSO) serves as the principal advisor to the Information System Owner (SO), Business Process Owner, and the Chief Information Security Officer (CISO) / Information System Security Manager (ISSM) on all matters, technical and otherwise, involving the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance of security controls in accordance with the Security Plan (SP) and Department of Defense (DoD) policies. In almost all cases, ISSOs will be called on to provide guidance, oversight, and expertise, but they may or may not develop security documents or actually implement any security controls. While ISSOs will not actually perform all functions, they will have to coordinate, facilitate, or otherwise ensure certain activities are being performed. As a result, it is important for ISSOs to build relationships with the SO, technical staff, and other stakeholders.
Responsibilities:
The goal of information security is to help the business process owner accomplish the mission in a secure manner. To be successful, ISSOs need to know and understand the following:
Coordinates with the ISO to ensure the appropriate operations security posture is maintained for the Information system
Servers as principal advisor on all matters involving the security of an Information System
Manage day-to-day security operations of the system
Monitors information system and environment
Manages and controls changes to the system
Handles incidents
Assists in the development of the: Security policies and procedures, Development and ongoing maintenance of the System Security Plan, Security Impact Analysis, Mission and business functions of the Information System
How the system supports the organization's mission - System details, including:
Architecture
System components (hardware, software, peripherals, etc.)
Location of each system component
Data flow
Interconnections (internal and external)
Security categorization, Security requirements, Configuration management processes and procedures
Qualifications
Certifications Required:
CompTIA Security +, ISC2 Certified Accreditation Professional (CAP)
Clearance:
Active Secret clearance is required.
Must be a US Citizen and pass a background check.
Maintain applicable security clearance(s) at the level required by the client and/or applicable certification(s) as requested by FEDITC and/or required by FEDITC'S Client(s)/Customer(s)/Prime contractor(s).
FEDITC, LLC. is committed to fostering an inclusive workplace and provides equal employment opportunities (EEO) to all employees and applicants for employment. We do not employ AI tools in our decision-making processes. Regardless of race, color, religion, sex (including pregnancy), sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran. FEDITC, LLC. ensures that all employment decisions are made in accordance with applicable federal, state, and local laws. Our commitment to non-discrimination in employment extends to every location in which our company operates.
Vehicle Cyber Security Systems Engineer
Security architect job in Dearborn, MI
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
As a key member of our Information Technology group, you'll play a critical part in shaping the future of mobility. If you're looking for the chance to leverage advanced technology to redefine the transportation landscape, enhance the customer experience and improve people's lives, this is the opportunity for you. Join us and challenge your IT expertise and analytical skills to help create vehicles that are as smart as you are!
The Vehicle Cyber Security Systems Engineer will serve a key role in shaping the future of product development security for vehicles (e.g. Connected Vehicle, Autonomous Vehicle, Electric Vehicle, Ford Smart Mobility, and V2X Security). The engineer will work within cross functional team to do/support the following:
You'll have...
Bachelor's degree in Electrical Engineering, Computer Engineering, Software Engineering, Computer Science, or Cybersecurity OR a combination of education and experience
5+ years of experience with embedded and/or automotive systems
3+ years of experience with in-vehicle network architecture, modules, and protocols (CAN, etc.)
Ability to develop and maintain engineering documentation including requirements, specifications, test plans, etc.
Ability to work independently and collaboratively
Strong communication and analytical skills
Even better, you may have...
Experience with Hardware Security Module (HSM) and Secure Hardware Extension (SHE)
Experience with coding (i.e., C, C++, C# Python, Java, CAPL, JQL)
Experience with JIRA and Kanban boards for project management
Familiar with vehicle system (i.e., capabilities of ECUs on a vehicle)
Familiar with automotive standards (i.e., ISO 14229-1, ISO 21434)
Familiar with quality tools and methodologies (i.e., FMEA, DVP)
Able to work following an agile methodology
Knowledge of Ford's internal engineering systems and requirements
Comfortable working in a fast-paced and innovative environment where problems are not always well-defined.
Experience advocating and driving adoption of industry standard methodologies.
Project management skills, including identifying and scheduling process steps, determining resources and staff required to successfully complete research projects.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder…or all of the above? No matter what you choose, we offer a work life that works for you, including:
• Immediate medical, dental, vision and prescription drug coverage
• Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
• Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
• Vehicle discount program for employees and family members and management leases
• Tuition assistance
• Established and active employee resource groups
• Paid time off for individual and team community service
• A generous schedule of paid holidays, including the week between Christmas and New Year's Day
• Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 5-8.
Visa sponsorship is not available for this position.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
#LI-Hybrid
What you'll do...
Perform product Cyber Security assessments on projects of multiple Ford product lines
Compliance reviews on features, modules as defined in the Ford Cyber Security engineering process in compliance with ISO 21434, UNECE R155, UNECE WP.29 and any other required relevant global cyber security requirements, regulations. Using that understanding to standardize all business operations and establish clear, documented protocols.
Have the ability to review technical documentation to assess compliance.
Manage and apply cybersecurity requirements into product design and development life cycle from requirement to testing with required deliverables
Work with feature and ECU owners to manage the progression of each feature / ECU through development to ensure security by design from inception
Ensure features, components, systems are designed using robust engineering processes including threat analysis, risk assessment, adoption of security requirements, security audits, and vehicle ecosystem assessments
Develop and utilize global supplier expertise to meet cyber security expectations
Proficient in JIRA. Process, requirement improvement support, for future reference, particularly in the event of an audit by a regulatory agency.
Provide presentations to management (program milestones, security governance board, etc.)
Auto-ApplyInformation Systems Security Officer (ISSO)
Security architect job in Detroit, MI
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation System Security Manager
Security architect job in Warren, MI
Day to Day:
Insight Global is looking for an ISSM to work for a DoD customer based out of Warren, MI.
The ISSM will provide support in the following areas:
Provide guidance to ISSOs, Information Technology team members, and the system owner regarding goals and objectives that will minimize the organizational risk present in the system
Compose, distribute, and execute local policies and procedures that will ensure system compliance with DoD RMF controls. These policies include, but are not limited to:
Vulnerability management
POA&M management
Personnel onboarding and offboarding
Incident response
Provide advisory to management regarding changes that may impact the security posture of the system
Preparation and submission of system security plans to upstream accrediting organizations
Must Haves:
Previous experience working as an ISSM for 3+ years
Strong Risk Management Framework (RMF) experience
Excellent written and verbal communication skills
Strong familiarity with NIST publications
Understanding of common operating systems, network technologies, and security tools
Secret Clearance
Google Cloud Security Architect
Security architect job in Detroit, MI
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies.
Join the Slalom Cloud Team -a team of trailblazers ensuring we achieve our strategic goals through innovation and investment in the future. You'll collaborate with local market teams, niche experts, and global partners to drive cloud solution sales and empower clients on their cloud transformation journey. As a key member of Slalom's Google Cloud Center of Excellence, you'll leverage our award-winning partnerships and multidisciplinary teams to deliver business value and technical excellence for high-impact security and infrastructure solutions.
What You'll Do
* Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor.
* Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles.
* Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance.
* Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools.
* Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data.
* Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap.
* Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients.
* Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients.
* Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities.
What You'll Bring
* Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor.
* Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments.
* Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud.
* Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture.
* Experience in security and risk advisory consulting, particularly related to cloud security transformations.
* Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs.
* Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices.
* Relevant certifications are strongly desired but not required, including (but not limited to):
* GCP Professional Security Engineer
* GCP Professional Cloud Architect
* CISSP
* Security+
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices.
Slalom is committed to fair and equitable compensation practices. For this role, we are targeting the following levels and salary ranges:
East Bay, San Francisco, Silicon Valley:
* Senior Consultant: $131,000-$196,500
San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC:
* Senior Consultant: $120,000-$180,000
All other locations:
* Senior Consultant: $110,000-$165,000
In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.