Post job

Security architect jobs in Missouri

- 167 jobs
  • Security Engineer IV - Exposure Management

    Edward Jones 4.5company rating

    Security architect job in Saint Louis, MO

    Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship. Job Overview Position Schedule: Full-Time This job posting is anticipated to remain open for 30 days, from 18-Nov-2025. The posting may close early due to the volume of applicants. Team Overview: The Exposure Management team protects Edward Jones by identifying, prioritizing, and reporting vulnerabilities across all assets that handle business information. As part of a team, you will manage scanning platforms and workflows to proactively prevent exploitation and strengthen the firm's security posture. What You'll Do: Design, implement, and administer vulnerability scanning platforms and appliances. Manage internal and external scans, analyze results, and ensure accurate detection of vulnerabilities. Optimize scanning workflows and tune configurations for efficiency across diverse technology stacks. Collaborate with cross-functional teams to remediate findings and improve security processes. Mentor and train associates in your area of expertise. Provide technical leadership, including guidance on tools, methodologies, frameworks, best practices, and standards. Research and implement technical improvements to enhance security posture. Represent the team in cross-functional groups and communicate issues and resolutions to stakeholders. Conduct feasibility studies and cost-benefit analyses for system requirements. Ensure prudent use of the firm's financial resources. Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page. Hiring Minimum: $99200 Hiring Maximum: $168900 Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf. Read More About Job Overview Skills/Requirements What Experience You'll Need: Bachelor's degree in information technology, Telecommunications, Engineering, or equivalent experience. Minimum of 7 years of experience in a relevant technical discipline. Subject matter expertise in information systems, with experience across multiple platforms or technologies (networking, computing, operating systems, data, software deployment, patching, software infrastructure, vulnerability management, security). Ability to design systems and analyze requirements for feasibility and cost-effectiveness. Proven ability to provide strategic direction and technical leadership aligned with firm objectives. Strong interpersonal and communication skills (written and verbal); persuasive and credible communicator. Ability to manage multiple large and complex projects simultaneously. Knowledge of brokerage or financial industry processes is preferred. Familiarity with project management concepts and system development methodologies. Ability to quickly learn and apply emerging technologies and adapt to change. Demonstrates accuracy, thoroughness, and initiative to improve processes and systems. Build strong team environments through mentoring and collaboration. Experienced in globalization considerations for technology design and deployment in multinational environments. Current home-based associates please note: Even as a hybrid posted role you are eligible to apply and, if selected, may retain your home-based status. However future business or regulatory needs may require on-site work and some roles may carry a preference for hybrid presence. **External Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.** Read More About Skills/Requirements Awards & Accolades At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received. Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones Read More About Awards & Accolades About Us Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns. Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging. People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career. View our Purpose, Inclusion and Citizenship Report. ¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating. Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law. #LI-HO
    $99.2k-168.9k yearly 4d ago
  • Senior Security Engineer - IAM Analyst

    Edward Jones 4.5company rating

    Security architect job in Saint Louis, MO

    Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship. Job Overview Position Schedule: Full-Time This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants. Team Overview: As an IAM Analyst you will work independently to identify and define IAM solution requirements for both existing capabilities and the expansion of new features. You will ensure that all platforms within your span of responsibility meet your customer's requirements; designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. Serving as a Security practicioner, you will bring deep industry knowledge and experience to understand the threat landscape and use that knowledge to shape the platforms that the Firm depends on for critical identity lifecycle functions. In this role you will regularly engage in leading-edge technology initiatives, including research, vetting, and adoption of emerging technologies, tools and methodologies in alignment with the overall security strategy. What You'll Do: Identify and implement opportunities to improve solutions that combat advanced and relevant threats while considering integration into the environment, stability, availability, disaster recovery, and cost-effectiveness. Serve as a subject matter expert for the identity management platform (Saviynt) and be a key contributor to stabilization and expansion efforts. Lead conversations centered on solving for complex business requirements in solution designs, and ensuring compliance with internal standards, policies, and regulatory requirements. Identify potential gaps in existing IAM processes or systems and recommending solutions to improve security and efficiency. Manage SOX compliance, auditing, and access review processes. Collaborate with internal teams and stakeholders to understand requirements and develop solutions. Effectively document solutions and configurations for future reference. Produce, maintain, and facilitate distribution of training resources to effectively empower key stakeholders with the information needed to meet Firm objectives and/or drive adoption of new processes. Establish and maintain effective communications and relationships across key departments, business areas, and vendors, including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm expectations. Creating and maintaining documentation for IAM processes, procedures, solution designs, requirements, etc. Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page. Hiring Minimum: $99200 Hiring Maximum: $168900 Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf. Read More About Job Overview Skills/Requirements What Experience You'll Need: Minimum 4-5 years experience In-depth understanding of Saviynt product functionality, including provisioning, access certification, SOD, analytics, RBAC, workflow, email notifications, etc. Experience designing JML flows for Saviynt automation. Experience integrating applications with Saviynt using various connectors. Solid understanding of workflows in ARS and the ability to leverage Saviynt analytics tools. Experience managing SOX compliance, auditing, and access review processes within Saviynt. Experience with configuration management of Rules Technical Users, UI Global Configurations, Backend configurations, and GSP files. Excellent written and verbal communication skills. Experience with APIs and integrations Strong analytical and problem-solving skills Excellent communication and collaboration skills Experience using ticketing systems (e.g., Jira) **Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.** Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work. Read More About Skills/Requirements Awards & Accolades At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received. Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones Read More About Awards & Accolades About Us Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns. Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging. People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career. View our Purpose, Inclusion and Citizenship Report. ¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating. Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law. #LI-HO
    $99.2k-168.9k yearly 4d ago
  • Sr. Information Security Engineer

    Shook, Hardy & Bacon 4.9company rating

    Security architect job in Kansas City, MO

    Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment. Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed. Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm. Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves. Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards. Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment. Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing. Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level. Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management. Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process. Independently and, as a team member, plans, executes and documents security tests and evaluation. Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed. Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects. Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems. Provides guidance to non-senior security staff on information security and any security related projects. Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes. Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches. Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives. Required Technical Skillsets Windows 2016+ Server Operating System Support and Configuration • Azure Cloud Security Architecture and Implementation Azure Blob Storage and Containers • Certificate Authority and Key Management • Cloud Intrusion Protection Systems / WAF Cloud based DLP Systems • Fluent ability to operate Security Information and Event Management solution Additional Preferred Skillsets Knowledge of CrowdStrike EDR, CrowdStrike SIEM • Content Filtering via Web Gateway • Malicious Site Analysis • Apple (Mac) Security Enforcement • Cloud Vulnerability and Penetration Testing • Virus Protection, Endpoint Encryption • Data Classification AI Security
    $113k-149k yearly est. 20h ago
  • Application Security Architect

    Genoa Employment Solutions 4.8company rating

    Security architect job in Saint Louis, MO

    The Application Security Architect is responsible for designing, implementing, and maintaining the security of the company's applications, systems, and networks. The position requires expertise in security principles, methods, and technologies related to application development, deployment, and maintenance. The Application Security Architect is also responsible for conducting security assessments and audits, identifying vulnerabilities, and recommending solutions to mitigate risks. Essential Duties and Responsibilities Design and implement application security strategies, policies, and procedures that meet business and regulatory requirements. Work with software development teams to integrate security into the development process and ensure that applications are built securely from the ground up. Evaluate application code and conduct threat modeling to identify potential security risks and recommend solutions. Conduct vulnerability assessments and penetration testing to identify security vulnerabilities and weaknesses in applications, systems, and networks. Develop and maintain security metrics and key performance indicators (KPIs) to measure the security program's effectiveness. Collaborate with internal and external stakeholders to communicate security risks, guide best practices, and facilitate compliance with relevant security standards and regulations. Develop and maintain knowledge of emerging security threats, vulnerabilities, and technologies to proactively identify and mitigate security risks. Conduct security awareness training and education for employees to promote a security culture across the organization.
    $95k-138k yearly est. 60d+ ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Security architect job in Kansas City, MO

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 47d ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Security architect job in Jefferson City, MO

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Jefferson City, MO

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 14d ago
  • Senior AI Security Engineer

    Mastercard 4.7company rating

    Security architect job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Senior AI Security EngineerJob Description Summary As an Information Security Engineer specializing in AI Security, you will be at the forefront of protecting our AI systems and data. Your role will involve deep technical expertise in designing, implementing, and maintaining advanced security measures to safeguard our AI infrastructure from sophisticated threats and vulnerabilities. You will be instrumental in ensuring the robustness, confidentiality, and availability of our AI-driven solutions. Key Responsibilities: - Security Architecture Design: Architect and implement robust security frameworks for AI systems, including authoring of secure coding practices and secure design principles. - Vulnerability Assessment: Identify, implement and manage tooling and methodologies for penetration testing on AI models and systems to identify and remediate security weaknesses. - Secure AI Development: Collaborate with data scientists and software engineers to integrate security best practices into the AI development lifecycle, including secure model training, validation, and deployment. Support security engineers in the evaluation of AI systems being developed and implemented. - Compliance and Standards: Keep track of emerging industry standards, regulations, and best practices for AI security, such as NIST, ISO, and GDPR. - Research and Innovation: Stay abreast of the latest advancements in AI security, conduct research, and contribute to the development of innovative security solutions. - Documentation and Reporting: Prepare and document standard operating procedures, protocols, and security reports, including assessment-based findings and recommendations for further system security enhancement. - Advisory and Support: Provide guidance and support on security matters, including answering queries, providing feedback, and advising on best practices - Technical Training and Mentorship: Provide technical training and mentorship to team members and stakeholders on AI security principles and practices. - Experimentation and POCs: Design and execute experiments and proof of concepts (POCs) to validate emerging threats and security solutions. Conduct R&D to explore new methodologies and technologies for enhancing AI security. Qualifications: - Bachelor's or Master's degree in Computer Science, Information Security, or a related field. - Extensive experience in information security, with a strong focus on AI security. - In-depth knowledge of AI technologies, machine learning algorithms, and data protection techniques. - Proven expertise in designing and implementing security measures for AI systems, including secure coding, encryption, and access controls. - Strong analytical and problem-solving skills, with the ability to conduct vulnerability assessments and penetration testing. - Excellent technical communication and collaboration skills to work effectively with diverse teams. - Relevant certifications such as CISSP, CEH, OSCP, or equivalent are highly desirable.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Pay Ranges O'Fallon, Missouri: $115,000 - $184,000 USD
    $115k-184k yearly Auto-Apply 60d ago
  • Product Security Engineering 2

    The Structures Company, LLC 4.1company rating

    Security architect job in Saint Charles, MO

    JOB TITLE: Product Security Engineering 2 PAY RATE: $53-67/hour We are a national aerospace and defense staffing agency seeking highly qualified candidates for a position with a top-tier client. Job Details: Job Type: Contract (12 months with potential for extension) Clearance: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Industry: Aerospace / Defense / Aviation Benefits: Medical, dental, and vision (Cigna) Perks: Bonus potential + Priority access via Tier 1 supplier Openings Nationwide: Thousands of opportunities across the U.S. Qualifying Questions: Are you a U.S. person as defined under ITAR regulations? Do you meet the educational and experience requirements for this role? Can you commute to the job location or relocate if necessary? Summary: Assess organization-wide security and privacy risks, updating assessment results on an ongoing basis. Perform system analysis and develop system tests for cyber threats, cybersecurity evaluations, and large-scale event assessments. Ensure adherence to the product security engineering development lifecycle, emphasizing clear requirements development and verification (using CAMEO). Conduct criticality analyses, collaborate with suppliers, identify critical components, and integrate them into overall system designs. Perform cyber risk assessments and develop mitigation plans (e.g., POA&Ms, SCRM) using tools including but not limited to CAMEO. Support and facilitate ATO/IATT packages, including processing IAVMs and CTOs. Perform software assurance tasks, including developing software assurance risk reports. Support proposal development efforts (e.g., BOE generation, GR&A development, trade studies). Assist with the engineering installation and analysis of patches, updates, and upgrades to assess system impact. Attend and facilitate program boards, collect data, and manage project documentation and collaboration. Apply Security Technical Implementation Guides (STIGs) and manage Cyber Tasking Orders (CTOs). Document and verify all installation and configuration steps for labs and operational deliveries. Provide feedback to Cyber Leadership and engineers to improve tools and processes. Collaborate with Information System Security Officers (ISSOs) to ensure compliance with cybersecurity standards and regulations. Support cyber threat intelligence, scanning, patching, remediation, and tool/application development. Assist in compliance activities including TEMPEST, DFARS, COMSEC, and CNSSI. Develop tools for cyber forensics and identify opportunities for efficiency and productivity improvements. Perform system analysis trade studies to define technical concepts and solutions. Requirements: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Bachelor's degree (or equivalent technical education) in engineering, engineering technology, computer science, data science, mathematics, physics, or chemistry. 2 or more years of related experience, or an equivalent combination of education and experience. Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.g., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA). 1+ years of experience in product security or cybersecurity engineering. 1+ years of experience with cybersecurity frameworks (NIST, OWASP, DFARS). Strong analytical, collaboration, communication, and organizational skills. ABET accreditation preferred but not required. Must be a U.S. Citizen (as defined by ITAR). Preferred Qualifications: Proficiency with CAMEO. 2+ years of Windows/RHEL system administration experience, including tuning and troubleshooting cyber tools (ESS/HBSS, ConfigOS, Splunk, etc.). 2+ years of experience configuring and scripting audit tools. Experience with Software Assurance (SwA) static and/or dynamic code analysis tools (e.g., Fortify). Familiarity with FISMA/RMF and NIST 800-53 requirements. Experience leading cyber test and evaluation at system or component level. Strong written and verbal communication skills with the ability to simplify complex technical issues. Understanding of DoD defense systems architectures, communications systems, and test/data analysis methods. About Us: The Structures Company is a premier national aerospace and defense staffing agency specializing in contract, contract-to-hire, and direct hire placements. We deliver expert workforce solutions across engineering, IT, production, maintenance, and support roles. As trusted partners to major aerospace OEMs and Tier 1 suppliers, we connect professionals with opportunities to grow and excel in the aviation and aerospace industries. Eligibility Requirements: Must be a U.S. Citizen, lawful permanent resident, or protected individual under 8 U.S.C. 1324b(a)(3) to comply with ITAR regulations. Keywords: aerospace, aviation, engineering, maintenance, aircraft design, defense Take your career to new heights-apply today! Engineers - #Hotjobs
    $53-67 hourly 36d ago
  • Security Engineer - Data Protection

    Lockton 4.5company rating

    Security architect job in Kansas City, MO

    Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure. Key Responsibilities: * Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal. * Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery. * Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications. * Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration. * Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls. * Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails. * Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response. * Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership. * Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform. * Actively coach and mentor other security and technology team members on data protection best practices. * Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
    $75k-96k yearly est. 30d ago
  • Cloud Security Engineer

    Us Corp2Corp

    Security architect job in Saint Louis, MO

    Compunnel Software Group is a New Jersey based premier information technology consulting & services company into this market for nearly two decades now; with close to two decades of experience in IT Industry which includes consulting, development, e-learning etc. Our company is going through a tremendous growth spurt and we are now interested in personnel like you to augment the work force in the company. We have several projects starting that we are staffing for. If you think you would like to become a consultant for Compunnel Software Group Inc ., please send me an updated copy of your resume along with a detailed summary of your work experience. I need a phone number to contact you. I look forward to possibly working with you on these positions. We offer specialized services to our clients to meet their business objectives. Successful solutions that are valued by our clients are in industry areas such as pharmaceuticals, telecommunications, banking, finance, manufacturing, publishing and consumer products. Job Description Position: Cloud Security Engineer Duration: 6+ months Location: St. Louis, MO, 63167 Must Have: Cloud Security Security Patches Cloud Security Automation Engineer Client is seeking a Cloud Security Automation Engineer with deep technical experience in securing cloud technologies. The successful candidate possesses out of the box thinking, the ability to collaboration with development team members, and experience with automation and solving end to end application/infrastructure security problems. Our mission is to design and build a highly secure cloud environment without sacrificing our developers' ability to quickly innovate and deliver world class software solutions. Responsibilities: • Define security best practices for our cloud platform and provide guidance to development teams. • Build tools to monitor for compliance of security policy and automate the resolution process. • Evangelize security throughout the enterprise and collaborate to help architect secure applications. • Research emerging technologies and build proof of concepts to investigate better ways of meeting our control objectives. • Collaborate with incident response, risk and compliance, product security and development teams to solve critical security problems. • Develop an AppSec pipeline and integrate it into the agile software development process. Required Qualifications: • BA/BS degree in Computer Science, Information Systems, Cyber Security or a related technical field or equivalent experience. • At least 3 years of experience in Information Security and/or infrastructure engineering. • An accomplished security practitioner with a strong understanding of industry trends in all areas of security. • Experience with building IaaS cloud based solutions including AWS, Azure, etc.. and knowledge of their network security and IAM models. • Experience working with security vendors including evaluating and implementing new products. Desired Qualifications: • Expertise in common AWS services (CloudFormation, Route53, VPC, EC2, Lambda, etc...) and their security best practices. • Programming experience in JavaScript, Java, Scala, Python, Perl, Ruby, etc.. and their use in automating security and compliance. • Strong understanding of security technologies including host and network based protection and detection technologies. • Experience with vulnerability management (including: running vulnerability scans, creating reports, communicating with asset owners and giving remediation guidance). • Experience with continuous integration and automation tools (e.g. Jenkins, Chef, Puppet, Ansible). • Experience writing security white papers and/or presenting security products and technologies to diverse audiences. • CISSP or CSSLP (Certified Secure Software Lifecycle Professional) certification. Qualifications Must Have: Cloud Security Security Patches Additional Information All your information will be kept confidential according to EEO guidelines.
    $71k-97k yearly est. 1d ago
  • Product Security Engineering 2

    Lancesoft 4.5company rating

    Security architect job in Saint Charles, MO

    This job is with Encode, Inc a fully owned subsidiary of Lancesoft Active Top Secret Clearance Primary Responsibilities: Team members will work with other industry partners in the development and execution of a comprehensive assessment program supporting the specialized Advanced Weapons Proprietary Programs in the Space, Intelligence & Weapons Systems (SIWS) organization. These individuals will act as the primary product security engineers on the program for assessing, updating, and maintaining the security posture of the programs. This team will be supporting the program's systems by interacting continuously with the cyber team compliance team to remediate any vulnerabilities found during automated or manual cyber scans. A detailed oriented individual with a strong leadership skillset is a must for this position. •Assess organization-wide security and privacy risk and update assessment results on an ongoing basis •Perform system analysis and develop system test for cyber threats, cyber test activities, and the cybersecurity of large-scale events •Ensure product security engineering development lifecycle is followed, with an emphasis on clear requirements development/verification (using CAMEO) •Perform criticality analysis to include the ability to work with suppliers, identify critical components, and integrating them into the overall system •Perform cyber risk assessments and develop risk mitigation plans (i.E., POA&Ms, SCRM, etc.) using a variety of tools including but not limited to CAMEO •Support and facilitate various ATO/IATT packages including processing IAVMs and CTOs for the same •Perform software assurance tasks, including but not limited to software assurance risk reports •Support proposal development efforts, including but not limited to: BOE generation, GR&A development, trade study analysis •Support the engineering installation & analysis of patches and various system updates and upgrades to determine system consequence of these changes •Attend, collect data from, out brief, and facilitate collaboration and project management from various program boards •Applying Security Technical Implementation Guides (STIGs) •Managing and addressing any Cyber Tasking Orders (CTOs) related to the Cyber Tools •Documentation and verification of all installation and configuration steps for the labs and operations deliveries •Providing feedback to Cyber Leadership and engineers to improve the cybersecurity tools and processes •Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations •Support cyber threat intelligence activities •Support the development and maintenance of cyber scanning, patching, remediation, tools and applications •Support, as required, TEMPEST, DFARS, COMSEC, CNSSI, and other compliance drivers as needed •Perform and/or support the development of tools for cyber forensics •Develop, define efficiencies and improvements to tools to improve team productivity •Perform system analysis trade studies to define technical concepts and solutions This position requires an active Top Secret U.S. Security Clearance. (A U.S. Security Clearance that has been active in the past 24 months is considered active.) Basic Qualifications (Required Skills/Experience): •Bachelor of Science degree from an accredited course of study in engineering, engineering technology (includes manufacturing engineering technology), chemistry, physics, mathematics, data science, or computer science. •Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.G., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA) •1+ years of experience in product security / cybersecurity engineering •1+ years of experience with industry standard cybersecurity frameworks (NIST, OWASP, DFARS) •Experience using analytical, collaboration, communication and organizational skills Preferred Qualifications (Desired Skills/Experience): •Experience using CAMEO (proficiency preferred) •2+ years of experience in Windows/RHEL System admin experience, installing, tuning & troubleshooting Cyber Tools to include ESS/HBSS, ConfigOS, Splunk, etc. •2+ years of experience in configuring, running, and scripting audit tools •2+ years of experience using knowledge of Software Assurance (SwA) static and/or dynamic code analysis (e.G. Fortify) •Experience with Federal Information Security Management Act (FISMA)/RMF and National institute of Standards and Technology (NIST) 800-53 requirements •Experience leading system and component level cyber test and evaluation, including threat and security assessments, and tabletop exercises •Experienced self-starter with strong written and oral communication skills, and a focus on translating technically complex issues into simple, easy to understand concept •Growing understanding of DoD defense systems architectures and communications system concepts, mission, and common system test and data analysis techniques Typical Education/Experience: Associate (2): Education/experience typically acquired through advanced technical education from an accredited course of study in engineering, engineering technology (includes manufacturing engineering technology), computer science, engineering data science, mathematics, physics or chemistry (e.G. Bachelor) and typically 2 or more years'related work experience or an equivalent combination of technical education and experience or non-US equivalent qualifications. In the USA, ABET accreditation is the preferred, although not required, accreditation standard. Education/experience typically acquired through advanced technical education from an accredited course of study in engineering, engineering technology (includes manufacturing engineering technology), computer science, engineering data science, mathematics, physics or chemistry (e.G. Bachelor) and typically 2 or more years'related work experience or an equivalent combination of technical education and experience or non-US equivalent qualifications. In the USA, ABET accreditation is the preferred, although not required, accreditation standard.
    $67k-85k yearly est. 36d ago
  • Security Engineer IV

    Charter Spectrum

    Security architect job in Maryland Heights, MO

    This role requires the ability to work lawfully in the U.S. without employment-based immigration sponsorship, now or in the future. is not eligible for immigration sponsorship. Spectrum's Product and Technology team creates, develops, and operates the nation's fastest mobile service, most reliable internet service, most viewed live TV app, and the most advanced WiFi, serving nearly 100 million users and 500 million devices. We are transforming the next era of connectivity and entertainment experiences. The diversity of experience available within Spectrum's Product and Technology team is unmatched and there are opportunities to grow your career as a designer, architect, engineer, developer, operator, or data scientist. We are creative, disciplined, hard-working, complex-problem solvers that believe in collaborating to deliver the highest quality customer experience. BE A PART OF THE CONNECTION As a Security Engineer IV on the Information Security Engineering team, you'll drive security engineering activities that monitor, detect and alert on potential security threats and vulnerabilities concerning company database and application software systems. You'll work closely with database admins and technical operations staff to coordinate and communicate incident and remediation efforts and incident status to management. MAJOR DUTIES AND RESPONSIBILITIES * Designs and implements queries and use cases to correlate security relevant system and application log data to alert and report on potential security events. * Leads the security incident response lifecycle for any cyber security related events affecting Charter's databases and services. * Responsible for providing timely updates to security management according to Charter's Incident Response Plan. * Leads efforts to integrate and maintain scanning services with SEIM, ASPM and vulnerability management systems. * Implements, maintains and monitors threat intelligence data from various resources that is relevant to Charter's networks and systems. * Proactively hunts for security related threats and vulnerabilities that potentially affect Charter's databases and services. * Develops and coordinates the implementation of security counter-measures with the appropriate organizations. * Develops and recommends security policies, standards, and configurations to the security governance committee. * Leads and performs the advanced forensics analysis and data evidence gathering for critical security events. * Recommends, designs and implements security systems and tools used for Database Security * Manages security scanning infrastructure and integrations, mentoring others on management and providing ongoing system support. * Develops security requirements for new projects and performs the security testing prior to going into production. * Ensures compliance with security standards, policies and procedures. * Adheres to industry specific local, state, and federal regulations, as applicable Required Qualifications Education: * Bachelor's Degree or Master's in Computer Science or Information Systems or related field or equivalent experience * Minimum five (5) years of Information security experience * Minimum four (4) years of Information security operations experience PREFERRED JOB QUALIFICATIONS: * Current security certifications, such as CISSP, CEH, or SANS GIAC. * Oracle Certified Professional - Oracle Database Security Expert * Computer forensics * Cyber Security Risk Management and assessment methodologies * Understanding of AWS and cloud infrastructure Abilities: * Ability to read, write, speak and understand the English language to communicate with employees, customers, suppliers, in person, on the phone, and by written communications in a clear, straight-forward, and professional manner Skills: * Demonstrated knowledge of database management or database security * Experience with security scan assessment tools of Oracle, MSSQL, PostgreSQL or other relational or NoSQL databases. * Must understand what is required to prevent security exploits, how to detect security attacks and anomalies and how to respond to security incidents and intrusions * Expert knowledge of forensic methodologies and best practices to investigate intrusions, preserve evidence and coordinate a unified security response * Advanced knowledge of database management and administration. * Advanced knowledge of industry security standards and cyber security frameworks. * Demonstrated experience in managing information security events and incidents for large and sophisticated networks * Demonstrated leadership capabilities with the ability to work across functional boundaries, build consensus and drive results * Strong written and verbal communication skills and should have good presentation skills * Demonstrated understanding of file storage systems; block filesystems, NFS, S3 * Must be a problem solver, able to balance competing priorities, have a strong process orientation and be able to manage through complexity and rapid change Working Conditions: * Office Environment * Occasional off-hours incident response for critical security events. * May require some weekend and evening shift work for infrastructure administration * Minimal Travel Required SPECTRUM CONNECTS YOU TO MORE * Innovative Tools & Tech: Work with high-performing software and applications on the forefront of the digital telecommunications industry. * Dynamic Growth: The growth of our industry and evolving technology will power your career as you move up or around the company. * Supportive Teams: Who you are matters here. We aim to foster an inclusive workplace where every person is empowered to bring their best ideas. * Total Rewards: See all the ways we invest in you-at work and in life. #LI-SS5 ISE313 2025-62913 2025 Here, our employees don't just have jobs, they're building careers. That's why we offer a comprehensive pay and benefits package that rewards employees for their contributions to our success, supporting all aspects of their well-being at every stage of life. A qualified applicant's criminal history, if any, will be considered in a manner consistent with applicable laws, including local ordinances. Get to Know Us Charter Communications provides superior communication and entertainment products for residential and business customers through the Spectrum brand. Our offerings include Spectrum Internet, TV, Mobile and Voice. Beyond our connectivity solutions, we also provide local news, programming and regional sports via Spectrum Networks and multiscreen advertising solutions via Spectrum Reach. When you join our team, you'll be keeping our customers connected to what matters most in 41 states across the U.S. Watch this video to learn more. Grow Your Career Here We're committed to growing a workforce that reflects the customers and communities we serve - providing opportunities for employment and advancement to all team members. Spectrum is an Equal Opportunity Employer, including job seekers with disabilities and veterans. Learn about Life at Spectrum.
    $71k-97k yearly est. 9d ago
  • Sr. Security Analyst - Perimeter Security Team

    Edward Jones 4.5company rating

    Security architect job in Saint Louis, MO

    Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship. Job Overview Position Schedule: Full-Time This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants. Team Overview: As a Security Analyst you will work independently to manage 1 - 2 platforms within a product team and collaborate with colleagues to solve routine to difficult engineering challenges. You will ensure that all platforms within your span of responsibility meet your customer's requirements; are designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. As a Security Engineer you deeply understand network architecture and data flows, proxy solutions, remote access platforms and have the ability and drive to solve complex issues and manage competing priorities. What You'll Do: Identify and implement opportunities to improve solutions and ensure system availability while maintaining acceptable risk levels for the firm to remain in compliance with industry regulations and security framework. Serve as a subject matter expert for proxy and intrusion prevention platforms, remote access connectivity, zero-trust, and network security monitoring. Lead and oversee the solution design lifecycle for Zscaler and IPS, including stakeholder requirement gathering and prioritization, alignment with architectural standards and best practices, implementation planning, implementation execution, documentation completeness, and ongoing health monitoring and maintenance. Provide design thinking and oversight for Zscaler and IPS to ensure cohesiveness, completeness, and effectiveness of the platform; and provide feedback to the Team Lead on the overall direction of the technology stack. Continue to implement new features and performance improvements for Zscaler and IPS in partnership with key stakeholders. Adhere to frameworks and processes for cohesive change management, health monitoring, performance monitoring, stability, and backups across the product space. Support technology incidents including: triaging technology services performance segregation or outages, performing root cause analysis across a complex environment, and identifying short and long-term solutions while operating in stressful and time sensitive situations. Effectively communicate with peers and leaders to ensure the awareness of progress, the awareness of challenges, the identification and escalation of risks, and the impact of ongoing security work. Including the ability to clearly discuss complex technical or security topics with a non-technical audience. Establish and maintain effective communications and relationships across key departments, business areas, and vendors. Including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm needs. Mentor and coach less senior team members and represent the Firm across the financial service's information security community through industry forums, working groups, and conference presentations. Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page. Hiring Minimum: $84100 Hiring Maximum: $143100 Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf. Read More About Job Overview Skills/Requirements What Experience You'll Need: Degree in Cyber Security, Computer Science, Computer Engineering, or Information Systems or related field preferred; or equivalent training and certifications (A+, Net+, Sec+, SANS, Cloud, etc), or related work experience 3-5 years of managing enterprise class proxy solutions, remote access solutions, network security platforms, on-prem and cloud data centers. Experience in a variety of technical fields including software, infrastructure, and security engineering at an enterprise level. This experience gives you deep understanding of the full stack required to deliver and operate software and platforms at an enterprise level. Understanding of core enterprise technology platforms including: infrastructure, software, data, cloud and cloud native platforms, microservices, API management, event streaming, CI/CD pipelines. Experience with core enterprise level information security components, principles, practices, and procedures. Including common technology stack components, deep knowledge of threats and adversary tactics, and experience managing regulatory requirements and common frameworks used by security teams within the Financial Industry. Understanding of core enterprise best practices, including: security risk management, architecture diagrams and documentation, digital transformation, change management, crisis management, business continuity, disaster recovery, and observability. Experienced in designing and building highly scalable, distributed & secure solutions that run in a cloud environment such as Azure, AWS, or GCP. Including demonstrated proficiency in deploying infrastructure as code through Terraform, Ansible, or similar technologies. Experience with managing and delivering on stakeholder requirements in a way that balances design functionality, cost optimization, and production support considerations. Advanced experience with writing code/scripts in at least one language (Python, PowerShell, Bash, Go, etc) Demonstrated competency with reading and generating architectural diagrams and maintaining full and accurate documentation of software, systems, and platforms. Strong understanding of observability, performance monitoring, and root cause analysis principles to perform continuous platform improvements or quickly troubleshoot and restore services in a case of disruption. Experience working with Product Teams and Agile methodology and practices Demonstrated proficiency with proxy solutions and zero trust methodologies Demonstrated proficiency with network security best practices Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday. Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work. Read More About Skills/Requirements Awards & Accolades At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received. Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones Read More About Awards & Accolades About Us Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns. Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging. People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career. View our Purpose, Inclusion and Citizenship Report. ¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating. Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law. #LI-HO
    $84.1k-143.1k yearly 4d ago
  • Sr. Information Security Engineer

    Shook, Hardy & Bacon 4.9company rating

    Security architect job in Kansas City, MO

    Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment. Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed. Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm. Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves. Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards. Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment. Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing. Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level. Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management. Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process. Independently and, as a team member, plans, executes and documents security tests and evaluation. Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed. Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects. Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems. Provides guidance to non-senior security staff on information security and any security related projects. Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes. Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches. Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives. Required Technical Skillsets * Windows 2016+ Server Operating System Support and Configuration * Azure Cloud Security Architecture and Implementation * Azure Blob Storage and Containers * Certificate Authority and Key Management * Cloud Intrusion Protection Systems / WAF * Cloud based DLP Systems * Fluent ability to operate Security Information and Event Management solution Additional Preferred Skillsets * Knowledge of CrowdStrike EDR, CrowdStrike SIEM * Content Filtering via Web Gateway * Malicious Site Analysis * Apple (Mac) Security Enforcement * Cloud Vulnerability and Penetration Testing * Virus Protection, Endpoint Encryption * Data Classification * AI Security Bachelor's degree (B.A.) from four-year college or university; or four years information security and two years advanced information security experience and/or training with an emphasis on engineering functions; or eight years of combined information systems and information security experience; and/or equivalent combination of education and experience. Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and/or Certified Cloud Security Professional (CCSP) are strongly preferred. Must have advanced knowledge with PC and LAN servers, IT systems, and other Information Security related technologies. Has advanced technical skills in network servers, workstations, and applications.
    $113k-149k yearly est. 37d ago
  • Security Engineer Investigator, Insider Trust

    Meta 4.8company rating

    Security architect job in Jefferson City, MO

    As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats. **Required Skills:** Security Engineer Investigator, Insider Trust Responsibilities: 1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats 2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes 3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations 4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation 5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities 6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities 7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success **Minimum Qualifications:** Minimum Qualifications: 8. Bachelor's degree in Computer Science, Engineering, or equivalent experience 9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role 10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis 11. Experience with attacker tactics, techniques, and procedures 12. Proficiency in coding or scripting in one or more general-purpose programming languages **Public Compensation:** $147,000/year to $208,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $147k-208k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Jefferson City, MO

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 14d ago
  • Principal Information Security Engineer (Security Product Owner)

    Mastercard 4.7company rating

    Security architect job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Principal Information Security Engineer (Security Product Owner) Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview: The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security organization is looking for a Security Product Owner to lead execution of our preventative security control strategy. The ideal candidate is driven, proactive about security, analytical, and brings strong technical cyber security expertise. This role is central to shaping and executing the roadmap and strategy for our program's primary security tools and defenses. We are looking for a technically proficient and forward-thinking professional who proactively monitors evolving security trends, modern modern defenses, and leverages advanced knowledge of security tools to foster innovation and strengthen resilience throughout our environments. Role • Define and drive the roadmap for the ‘Defend' product, which covers preventative and detective security controls and configurations across dozens of security tools and platforms including SIEM, SOAR, DLP, Application Control, XDR, NGFW, UEBA, NDR, and more. • As the Defend product owner, you will be the team lead ensuring the Defend product feature team's work is prioritized, aligned to strategy, and properly road mapped. • Partner with stakeholders from engineering, endpoint, identity, and cloud teams to deploy and optimize security technologies and controls. • Translate security requirements, risk policies, and threat models into actionable work items and initiatives. • Lead capability assessments and recommend technologies aligned with business needs and program strategies. • Configure, integrate, and optimize security tools (e.g., EDR/XDR, NGFW, IDS, DLP, Application Control) in accordance with strategic objectives and initiatives. • Monitor control effectiveness and continuously tune policies to reduce friction and increase coverage. • Ensure alignment with internal standards, regulatory frameworks, and industry best practices. All About You The ideal candidate for this position should: • Be an advanced technical expert with hands-on experience across multiple SecOps teams and functions such as Security Operations Center, Security Engineering, Incident Response, Detection Engineering, Threat Hunting, and Insider Threat for a large, global enterprise. • Understand modern agile methodologies and how to define, assign, and track work for product feature teams and partner engineering teams. • Be skilled at translating complex security requirements into clear, actionable technical plans in accordance with relevant security strategies and objectives. • Be confident in how to approach complex security tooling and dependencies such as configuring access controls, tuning detection policies, and integrating tools into detection models and lifecycles. • Be a strong communicator, able to articulate vision and strategy to technical and non-technical stakeholders at all levels. Additional capabilities that will set you apart: • Experience with proactive security strategies and security technology products, platforms, and key technology. • Expertise in successfully integrating and leveraging threat intelligence data into security controls and tools for proactive, targeted security prevention. • Deep understanding of modern SecOps concepts and strategies such as ‘SOC 3.0', posture management domains, attack surface reduction, adaptive protections, automated triage and response, zero trust, cloud-native security, etc. • Familiarity with regulatory compliance standards and frameworks (e.g., NIST, ISO, ATT&CK, D3FEND, PCI). • Ability to collaborate effectively with SOC, IR, Engineering, and other key stakeholders. • Passion for innovation and continuous improvement in security technology optimization. Corporate Security Responsibility: Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected information security violation or breach; • Complete all periodic mandatory security training in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Pay Ranges O'Fallon, Missouri: $165,000 - $264,000 USD
    $62k-82k yearly est. Auto-Apply 44d ago
  • Cloud Security Engineer

    Us Corp2Corp

    Security architect job in Saint Louis, MO

    Compunnel Software Group is a New Jersey based premier information technology consulting & services company into this market for nearly two decades now; with close to two decades of experience in IT Industry which includes consulting, development, e-learning etc. Our company is going through a tremendous growth spurt and we are now interested in personnel like you to augment the work force in the company. We have several projects starting that we are staffing for. If you think you would like to become a consultant for Compunnel Software Group Inc., please send me an updated copy of your resume along with a detailed summary of your work experience. I need a phone number to contact you. I look forward to possibly working with you on these positions. We offer specialized services to our clients to meet their business objectives. Successful solutions that are valued by our clients are in industry areas such as pharmaceuticals, telecommunications, banking, finance, manufacturing, publishing and consumer products. Job Description Position: Cloud Security Engineer Duration: 6+ months Location: St. Louis, MO, 63167 Must Have: Cloud Security Security Patches Cloud Security Automation Engineer Client is seeking a Cloud Security Automation Engineer with deep technical experience in securing cloud technologies. The successful candidate possesses out of the box thinking, the ability to collaboration with development team members, and experience with automation and solving end to end application/infrastructure security problems. Our mission is to design and build a highly secure cloud environment without sacrificing our developers' ability to quickly innovate and deliver world class software solutions. Responsibilities: • Define security best practices for our cloud platform and provide guidance to development teams. • Build tools to monitor for compliance of security policy and automate the resolution process. • Evangelize security throughout the enterprise and collaborate to help architect secure applications. • Research emerging technologies and build proof of concepts to investigate better ways of meeting our control objectives. • Collaborate with incident response, risk and compliance, product security and development teams to solve critical security problems. • Develop an AppSec pipeline and integrate it into the agile software development process. Required Qualifications: • BA/BS degree in Computer Science, Information Systems, Cyber Security or a related technical field or equivalent experience. • At least 3 years of experience in Information Security and/or infrastructure engineering. • An accomplished security practitioner with a strong understanding of industry trends in all areas of security. • Experience with building IaaS cloud based solutions including AWS, Azure, etc.. and knowledge of their network security and IAM models. • Experience working with security vendors including evaluating and implementing new products. Desired Qualifications: • Expertise in common AWS services (CloudFormation, Route53, VPC, EC2, Lambda, etc...) and their security best practices. • Programming experience in JavaScript, Java, Scala, Python, Perl, Ruby, etc.. and their use in automating security and compliance. • Strong understanding of security technologies including host and network based protection and detection technologies. • Experience with vulnerability management (including: running vulnerability scans, creating reports, communicating with asset owners and giving remediation guidance). • Experience with continuous integration and automation tools (e.g. Jenkins, Chef, Puppet, Ansible). • Experience writing security white papers and/or presenting security products and technologies to diverse audiences. • CISSP or CSSLP (Certified Secure Software Lifecycle Professional) certification. Qualifications Must Have: Cloud Security Security Patches Additional Information All your information will be kept confidential according to EEO guidelines.
    $71k-97k yearly est. 60d+ ago
  • Principal Information Security Engineer (Security Product Owner)

    Mastercard 4.7company rating

    Security architect job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Principal Information Security Engineer (Security Product Owner) Who is Mastercard? Mastercard is a global technology company in the payments industry. Our mission is to connect and power an inclusive, digital economy that benefits everyone, everywhere by making transactions safe, simple, smart, and accessible. Using secure data and networks, partnerships and passion, our innovations and solutions help individuals, financial institutions, governments, and businesses realize their greatest potential. Our decency quotient, or DQ, drives our culture and everything we do inside and outside of our company. With connections across more than 210 countries and territories, we are building a sustainable world that unlocks priceless possibilities for all. Overview: The Security Threat & Response Management (STRM) program within Mastercard's Corporate Security organization is looking for a Security Product Owner to lead execution of our preventative security control strategy. The ideal candidate is driven, proactive about security, analytical, and brings strong technical cyber security expertise. This role is central to shaping and executing the roadmap and strategy for our program's primary security tools and defenses. We are looking for a technically proficient and forward-thinking professional who proactively monitors evolving security trends, modern modern defenses, and leverages advanced knowledge of security tools to foster innovation and strengthen resilience throughout our environments. Role * Define and drive the roadmap for the 'Defend' product, which covers preventative and detective security controls and configurations across dozens of security tools and platforms including SIEM, SOAR, DLP, Application Control, XDR, NGFW, UEBA, NDR, and more. * As the Defend product owner, you will be the team lead ensuring the Defend product feature team's work is prioritized, aligned to strategy, and properly road mapped. * Partner with stakeholders from engineering, endpoint, identity, and cloud teams to deploy and optimize security technologies and controls. * Translate security requirements, risk policies, and threat models into actionable work items and initiatives. * Lead capability assessments and recommend technologies aligned with business needs and program strategies. * Configure, integrate, and optimize security tools (e.g., EDR/XDR, NGFW, IDS, DLP, Application Control) in accordance with strategic objectives and initiatives. * Monitor control effectiveness and continuously tune policies to reduce friction and increase coverage. * Ensure alignment with internal standards, regulatory frameworks, and industry best practices. All About You The ideal candidate for this position should: * Be an advanced technical expert with hands-on experience across multiple SecOps teams and functions such as Security Operations Center, Security Engineering, Incident Response, Detection Engineering, Threat Hunting, and Insider Threat for a large, global enterprise. * Understand modern agile methodologies and how to define, assign, and track work for product feature teams and partner engineering teams. * Be skilled at translating complex security requirements into clear, actionable technical plans in accordance with relevant security strategies and objectives. * Be confident in how to approach complex security tooling and dependencies such as configuring access controls, tuning detection policies, and integrating tools into detection models and lifecycles. * Be a strong communicator, able to articulate vision and strategy to technical and non-technical stakeholders at all levels. Additional capabilities that will set you apart: * Experience with proactive security strategies and security technology products, platforms, and key technology. * Expertise in successfully integrating and leveraging threat intelligence data into security controls and tools for proactive, targeted security prevention. * Deep understanding of modern SecOps concepts and strategies such as 'SOC 3.0', posture management domains, attack surface reduction, adaptive protections, automated triage and response, zero trust, cloud-native security, etc. * Familiarity with regulatory compliance standards and frameworks (e.g., NIST, ISO, ATT&CK, D3FEND, PCI). * Ability to collaborate effectively with SOC, IR, Engineering, and other key stakeholders. * Passion for innovation and continuous improvement in security technology optimization. Corporate Security Responsibility: Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach; * Complete all periodic mandatory security training in accordance with Mastercard's guidelines. Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: * Abide by Mastercard's security policies and practices; * Ensure the confidentiality and integrity of the information being accessed; * Report any suspected information security violation or breach, and * Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Pay Ranges O'Fallon, Missouri: $165,000 - $264,000 USD
    $62k-82k yearly est. Auto-Apply 43d ago

Learn more about security architect jobs

Do you work as a security architect?

What are the top employers for security architect in MO?

Top 8 Security Architect companies in MO

  1. UMB Bank

  2. SHI International

  3. Deloitte

  4. Genoa

  5. Highmark

  6. KPMG

  7. ManpowerGroup

  8. Oracle

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security architect jobs in missouri by city

All security architect jobs

Jobs in Missouri