Security architect jobs in Mount Pleasant, SC - 142 jobs
All
Security Architect
Security Engineer
Cyber Security Engineer
Architect
SAP Security Consultant
Information Security Engineer
Senior Security Analyst
Information Systems Security Officer
Information Security Manager
Cyber Security Analyst
SAP Admin
Canon U.S.A., Inc. 4.6
Security architect job in Greenville, SC
Requisition ID 2026-20576 # of Openings 1 Category (Portal Searching) Warehouse/Shipping Type (Portal Searching) Regular Full-Time
Our people make the difference. We believe in our employees and give them daily opportunities to grow as professionals and make their mark on the business. Each person brings unique skills to his or her role, and with employees around the globe, we have a diverse workforce that we-and our clients-deeply value.
We're looking for people with a wide range of work experiences and skills, as well as those pursuing a career in managed business process services for the first time. We welcome people from diverse backgrounds who want to work hard and who take pride in what they do.
As an employee, you'll have a rewarding and enriching work environment. You will be encouraged to innovate. Your coworkers will respect and value your opinions. Each day, you will have the opportunity to make an impact on a globally recognized company. At Canon, you'll have more than just a job with competitive pay and benefits-you will have a long and rewarding career.
Canon Business Process Services, Inc. offers a comprehensive portfolio of managed services and technology across information and document management, business process outsourcing; and managed workforce services. The company helps clients improve operational business performance while reducing costs and risk. Named a Global Outsourcing 100 Leader in 2018 by IAOP for the twelfth year; Canon Business Process Services is a wholly owned subsidiary of Canon U.S.A., Inc. Learn more at cbps.canon.com; and follow us on Twitter @CanonBPO.
Responsibilities
Responsible for entering, tracking, and maintaining proper inventory levels within the SAP Warehouse Management System.
Organize and validate incoming work orders and reporting through SAP.
Ability to create and manage purchase requisitions, delivery documents, pick tickets, cycle count sheets and standard reports (KPI's).
Troubleshoot production orders, receiving, inventory discrepancies and other transactional issues.
Assist warehouse with order issues, product returns and nonconforming products.
Determine root cause of order/transactions and assist in development of process improvement plans.
Must be able to perform duties with little supervision
Follows CBPS safety practices and procedures and contributes to a positive CBPS safety culture.
Qualifications
High School Diploma or equivalent required.
Strong background in SAP MM and WM modules with 1 or more years of SAP experience.
Strong background in problem solving in a dynamic team environment
Requires knowledge of materials distribution and/or logistics processes, methods, and skills related to inventory management. Superior organizational skills
Strong data entry skills
Strong SAP transactional knowledge with troubleshooting experience
Ability to work in an ever changing, dynamic environment
Strong computer skills (Excel, Word, Office, etc.)
Must develop strong product knowledge.
Must have experience using SAP within a Warehouse Management System (WMS)
Must have Microsoft Office Suite experience
Physical Demand
80-100% Inventory-related duties
0-20% Continuous Process Improvement, Training, Guiding and Mentoring related duties
Ability to lift 40 lbs.
Repetitive motion
Reaching, pushing, pulling carts, pallet jacks and other manual handling equipment
Walking, standing for extended periods of time
Mental qualifications include math skills necessary for maintaining inventory records and understanding process improvement initiatives. Must also be able to verify work orders, invoices, etc.
What We Offer:
An opportunity to join an established team and be part of a successful and proven global organization!
A competitive compensation program!
Large Company Benefits: Medical/Dental/Vision/401K with a competitive company match!
Employee discounts on Canon products & vendor discount programs for employees!
World-Class Training & Career Development Programs!
COME JOIN OUR TEAM!
Connect With Us!
Not ready to apply? We look forward to connecting with you in the future! By joining our Talent Network, you can receive job alerts for new positions that match your skills and experience sent straight to your inbox.
$71k-93k yearly est. 2d ago
Looking for a job?
Let Zippia find it for you.
Security Architect
Ask It Consulting
Security architect job in Columbia, SC
Ask ITC Inc. is a software development Company. Our passion is delivering technology strategies & digital solutions that assist our clients with building competitive, innovative and successful companies.
Job Description
DAILY DUTIES / RESPONSIBILITIES:
Information Securityarchitecting, engineering and operations. This is full information security to include, systems, network, procedural and operational.
Work with existing staff to architect and deploy advanced information security systems in a highly complex distributed enterprise environment.
Develop installation, configuration, and operational process/procedure documentation to enable Division of Technology and Agencies to install and operate approved security solution.
Work with Security Operations Center to identify enhanced data collection and correlation capabilities in existing data and gaps in data collection/analysis architecture, systems and procedures.
Identify and develop solutions for preventing, detecting and mitigating risks to information and information systems.
Conduct training as necessary to division and agency personnel on security processes, procedures and methodologies to ensure security event information is properly identified, correlated, documented and mitigated in accordance with department standards.
Operate and administer security services as part of a team.
Additional Information
All your information will be kept confidential according to EEO guidelines.
JOB DESCRIPTION:
SCOPE OF THE PROJECT: THE POSITION WILL WORK AS A SECURITYARCHITECT WITHIN THE DIVISION OF INFORMATION SECURITY AND WILL ASSIST WITH THE IMPLEMENTATION, INTEGRATION, AND OPERATIONALIZING SECURITY TECHNOLOGIES. THIS POSITION REQUIRES EXPERIENCE IN INFORMATION SECURITYARCHITECTURE AND SOLUTION DESIGN TO ASSIST IN THE STRATEGIC PLANNING, DESIGNING, AND IMPLEMENTATION OF NEW SYSTEMS AND CHANGES IN CURRENT SYSTEMS IN A SECURE MANNER. THIS POSITION IS EXPECTED TO BE NEEDED FOR 12 MONTHS WITH THE POSSIBILITY OF EXTENSION.
DAILY DUTIES / RESPONSIBILITIES:
• LOGGING AND EVENT MANAGEMENT - ENSURING THAT APPROPRIATE SECURITY LOGS ARE INGESTED INTO THE SIEM AND/OR LOG AGGRIGATION PLATFORM AND PROPERLY PARSED TO SUPPORT SECURITY OPERATIONS
• RESPONSIBLE FOR PLANNING, DESIGNING, DEVELOPMENT AND IMPLEMENTATION OF ENTERPRISE SECURITYARCHITECTURE SOLUTIONS THAT ALIGN WITH BUSINESS GOALS AND RISK TOLERANCE. LEVERAGING STATE APPROVED PROCESSES AND TECHNOLOGIES WHEREVER POSSIBLE.
• LEAD PROCESS DEFINITION, REDESIGN AND/OR TECHNOLOGY INNOVATION OF SECURITYARCHITECTURE, TO ENSURE DIS SOLUTIONS SUPPORT SECURE DELIVERY OF ENTERPRISE BUSINESS ARCHITECTURE AND SERVICES.
• DESIGN, DEPLOY AND MANAGE COUNTERMEASURES TO KNOWN SECURITY THREATS AND DEVELOP PREVENTATIVE MITIGATION STRATEGIES FOR NEW AND EMERGENT THREATS TO ENTERPRISE DATA, NETWORKS AND ASSOCIATED SERVICES.
• ENSURE, VALIDATE AND MEASURE THE CONSISTENT APPLICATION OF PROTECTIVE MEASURES THROUGHOUT THE ENTERPRISE BUSINESS APPLICATION AND INFRASTRUCTURE SUPPORT ENVIRONMENTS. TAKE APPROPRIATE ACTION TO PROTECT STATE DATA AND TECHNOLOGY SERVICES.
Requirements
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• CYBER SECURITY AWARENESS AND UNDERSTANDING
• EXPERIENCE WITH LINUX, WINDOWS, NETWORK SECURITY PROTOCOLS AND PROCEDURES
• EXPERT UNDERSTANDING OF ACCESS CONTROL, LOGGING AND REPORTING SYSTEMS
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• SIEM MANAGEMENT
• INTRUSION PREVENTION SYSTEMS (IPS)
• SECURITY FRAMEWORKS: NIST, CSF, CJIS, IRS 1075, CMS MARS -E
• APPLICATION SECURITY (APPSEC)
REQUIRED EDUCATION/CERTIFICATIONS:
• BACHELOR'S DEGREE IN AN
INFORMATION TECHNOLOGY OR
INFORMATION SECURITY RELATED
FIELD
• SIX YEARS OF RELEVANT WORK
EXPERIENCE MAY BE SUBSTITUTED IN LIEU OF EDUCATION
• THREE YEARS OF EXPERIENCE IN SUPPORTING LARGE IT ENVIRONMENTS AND/OR SYSTEM DEPLOYMENTS
PREFERRED EDUCATION/CERTIFICATIONS:
• GSEC
• GCED
BenefitsHealth Insurance
Sick Leave
$89k-133k yearly est. 60d+ ago
Security Engineer - IR Threat Intelligence
Meta 4.8
Security architect job in Columbia, SC
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture.
**Required Skills:**
Security Engineer - IR Threat Intelligence Responsibilities:
1. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
2. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
3. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
4. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
5. Engage constructively in cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
**Minimum Qualifications:**
Minimum Qualifications:
6. 5+ years threat intelligence experience
7. Bachelor's degree or equivalent experience in Security
8. Familiarity with campaign tracking techniques and ability to convert the tracking results to long term countermeasures
9. Familiarity with threat modeling framework, such as Diamond Model or/and MITRE ATT&CK framework
10. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
11. Proven track record of managing and executing on short term and long term projects
12. Ability to work with a team spanning multiple locations/time zones
13. Ability to prioritize and execute tasks with minimal direction or oversight
14. Ability to think critically and qualify assessments with solid communications skills
15. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
16. Experience close collaborating with incident responders on incident investigations
17. Familiarity with malware analysis or network traffic analysis
18. Familiarity with nation-state, sophisticated criminal, or supply chain threats
19. Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
20. Experience in one or more query languages such as SQL
21. Experience writing production code for threat intelligence tooling
22. Experience conducting large scale data analysis
23. Experience working across the broader security community
**Public Compensation:**
$154,000/year to $217,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$154k-217k yearly 6d ago
Sr. Security Analyst
Maximus 4.3
Security architect job in Charleston, SC
Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. *
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$80k-107k yearly est. Easy Apply 6d ago
SAP Admin
Canon Business Process Services
Security architect job in Greenville, SC
Our people make the difference. We believe in our employees and give them daily opportunities to grow as professionals and make their mark on the business. Each person brings unique skills to his or her role, and with employees around the globe, we have a diverse workforce that we-and our clients-deeply value. We're looking for people with a wide range of work experiences and skills, as well as those pursuing a career in managed business process services for the first time. We welcome people from diverse backgrounds who want to work hard and who take pride in what they do. As an employee, you'll have a rewarding and enriching work environment. You will be encouraged to innovate. Your coworkers will respect and value your opinions. Each day, you will have the opportunity to make an impact on a globally recognized company. At Canon, you'll have more than just a job with competitive pay and benefits-you will have a long and rewarding career.
Canon Business Process Services, Inc. offers a comprehensive portfolio of managed services and technology across information and document management, business process outsourcing; and managed workforce services. The company helps clients improve operational business performance while reducing costs and risk. Named a Global Outsourcing 100 Leader in 2018 by IAOP for the twelfth year; Canon Business Process Services is a wholly owned subsidiary of Canon U.S.A., Inc. Learn more at cbps.canon.com; and follow us on Twitter @CanonBPO.
Responsibilities
Responsible for entering, tracking, and maintaining proper inventory levels within the SAP Warehouse Management System.
* Organize and validate incoming work orders and reporting through SAP.
* Ability to create and manage purchase requisitions, delivery documents, pick tickets, cycle count sheets and standard reports (KPI's).
* Troubleshoot production orders, receiving, inventory discrepancies and other transactional issues.
* Assist warehouse with order issues, product returns and nonconforming products.
* Determine root cause of order/transactions and assist in development of process improvement plans.
* Must be able to perform duties with little supervision
* Follows CBPS safety practices and procedures and contributes to a positive CBPS safety culture.
Qualifications
* High School Diploma or equivalent required.
* Strong background in SAP MM and WM modules with 1 or more years of SAP experience.
* Strong background in problem solving in a dynamic team environment
* Requires knowledge of materials distribution and/or logistics processes, methods, and skills related to inventory management. Superior organizational skills
* Strong data entry skills
* Strong SAP transactional knowledge with troubleshooting experience
* Ability to work in an ever changing, dynamic environment
* Strong computer skills (Excel, Word, Office, etc.)
* Must develop strong product knowledge.
* Must have experience using SAP within a Warehouse Management System (WMS)
* Must have Microsoft Office Suite experience
Physical Demand
* 80-100% Inventory-related duties
* 0-20% Continuous Process Improvement, Training, Guiding and Mentoring related duties
* Ability to lift 40 lbs.
* Repetitive motion
* Reaching, pushing, pulling carts, pallet jacks and other manual handling equipment
* Walking, standing for extended periods of time
* Mental qualifications include math skills necessary for maintaining inventory records and understanding process improvement initiatives. Must also be able to verify work orders, invoices, etc.
What We Offer:
An opportunity to join an established team and be part of a successful and proven global organization!
A competitive compensation program!
Large Company Benefits: Medical/Dental/Vision/401K with a competitive company match!
Employee discounts on Canon products & vendor discount programs for employees!
World-Class Training & Career Development Programs!
COME JOIN OUR TEAM!
$69k-95k yearly est. Auto-Apply 10d ago
Security Engineer - Secure Software Development
Sedgwick 4.4
Security architect job in Charleston, SC
By joining Sedgwick, you'll be part of something truly meaningful. It's what our 33,000 colleagues do every day for people around the world who are facing the unexpected. We invite you to grow your career with us, experience our caring culture, and enjoy work-life balance. Here, there's no limit to what you can achieve.
Newsweek Recognizes Sedgwick as America's Greatest Workplaces National Top Companies
Certified as a Great Place to Work
Fortune Best Workplaces in Financial Services & Insurance
Security Engineer - Secure Software Development
Security Engineer - Secure Software Development
**PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus on executing security fundamentals for threat detection, investigation, and response efforts.
**ARE YOU AN IDEAL CANDIDATE?** We are looking for enthusiastic candidates who thrive in a collaborative environment, who are driven to deliver great work, are customer-oriented and are naturally empathetic.
**ESSENTIAL RESPONSIBLITIES MAY INCLUDE**
+ Engineers, implements and monitors security measures for the protection of computer systems, networks and information.
+ Identifies and defines system security requirements.
+ Designs computer securityarchitecture and develops detailed cyber security designs.
+ Prepares and documents standard operating procedures and protocols.
+ Configures and troubleshoots security infrastructure devices.
+ Develops technical solutions and new security tools to assist in mitigating security vulnerabilities and automating repeatable tasks.
+ Leads IT groups and business units as necessary in troubleshooting compatibility issues between security tools and business or productivity programs.
+ Performs analysis of suspected malicious code and other software or programs and provides written or verbal analysis to management.
+ Analyzes client and customer needs as required and provides clear and concise reports to leadership.
+ Works closely with management on assigned projects from inception through implementation ensuring adequate internal communication and user involvement is maintained.
**QUALIFICATIONS**
Eight (8) years of encryption technologies/algorithms, digital forensics, network topologies, and access controls experience or equivalent combination of educated and experience required.
**Skills & Knowledge**
+ Knowledge of TCP/IP services
+ Knowledge of audit and compliance
+ Knowledge of vulnerability management
+ Knowledge of penetration testing
+ Knowledge of various operating systems
+ Knowledge of desktop productivity software
+ Knowledge of Carbon Black Protection
+ Knowledge of Symantec Endpoint Protection and host data loss prevention
+ Knowledge of information technology security frameworks
+ Excellent oral and written communication skills, including presentation skills
+ PC literate, including Microsoft Office products
+ Analytical and interpretive skills
+ Strong organizational skills
+ Excellent interpersonal skills
+ Ability to create and complete comprehensive, accurate and constructive written reports
+ Ability to work in a team environment
+ Ability to meet or exceed Performance Competencies
**Proficient in Snyk for Application Security:** Demonstrated expertise in integrating Snyk into CI/CD pipelines to proactively identify and remediate vulnerabilities in open-source dependencies, container images, and infrastructure as code. Skilled in leveraging Snyk's developer-first tools to maintain secure codebases, enforce security policies, and ensure compliance with industry standards. Experienced in configuring automated scans, interpreting results, and collaborating with development teams to implement effective remediation strategies, contributing to a robust DevSecOps culture.
**TAKING CARE OF YOU**
+ Career development and promotional growth opportunities
+ A diverse and comprehensive benefits offering including medical, dental vision, 401K, PTO and more
\#LI-TS1
Work environment requirements for entry-level opportunities include -
Physical: Computer keyboarding
Auditory/visual: Hearing, vision and talking
Mental: Clear and conceptual thinking ability; excellent judgement and discretion; ability to meet deadlines
Travels as required
The statements contained in this document are intended to describe the general nature and level of work being performed by a colleague assigned to this description. They are not intended to constitute a comprehensive list of functions, duties, or local variances. Management retains the discretion to add or to change the duties of the position at any time.
Sedgwick is an Equal Opportunity Employer and a Drug-Free Workplace.
**If you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, consider applying for it anyway! Sedgwick is building a diverse, equitable, and inclusive workplace and recognizes that each person possesses a unique combination of skills, knowledge, and experience. You may be just the right candidate for this or other roles.**
**Sedgwick is the world's leading risk and claims administration partner, which helps clients thrive by navigating the unexpected. The company's expertise, combined with the most advanced AI-enabled technology available, sets the standard for solutions in claims administration, loss adjusting, benefits administration, and product recall. With over 33,000 colleagues and 10,000 clients across 80 countries, Sedgwick provides unmatched perspective, caring that counts, and solutions for the rapidly changing and complex risk landscape. For more, see** **sedgwick.com**
$78k-100k yearly est. 60d+ ago
Manager, Information Security Policy and Controls Governance
UNUM Group 4.4
Security architect job in Columbia, SC
Our Fortune 500 company is driving a digital transformation and looking for forward-thinking innovators to disrupt how our industry thinks about and uses technology. As one of the world's leading employee benefits providers, we help millions of people gain affordable access to benefits that help them protect their families, their finances and their futures.
Are you an asker of questions, a solver of problems, and a challenger of the status quo? Our mission is to provide a differentiated customer experience and exceed the expectations people have of technology at any company - not just insurers.
We are seeking individuals to join our team of talented IT professionals who share never-ending passion and an unwavering focus on our customer experience. Team members comfortable working in an agile, fast-paced, and delivery-focused environment thrive in our environment where we value an entrepreneurial spirit and those who challenge the status-quo.
Unum is changing, and we're excited about what's next. Join us.
General Summary:
The Manager - Information Security Policy and Controls Governance is responsible for strategic enhancement and day-to-day operation of key governance, risk, and compliance capabilities, including policy and standards governance, enterprise and application-level risk assessments, and controls management and attestation programs. This role will oversee the full lifecycle of governing documents, manage policy exceptions, coordinate external and regulatory assessments, and ensure strong alignment between security controls and regulatory requirements. The manager will also drive consistent, timely issues management across all domains. This leader will partner closely with stakeholders across the organization to mature processes, strengthen compliance posture, and ensure effective, repeatable execution of GRC activities. They will manage a small to mid-size team of IT security and risk management professionals.
Job Specifications
* Bachelors degree in computer science, or relevant technical experience
* Has 5+ years experience in an IT Risk Management field, or equivalent relevant work experience
* Has a security technology background with strong knowledge of relevant technical security disciplines
* Exhibits courage by taking smart risks and encouraging others to do so; empowers innovative approaches by motivating others to be proactive and resourceful
* Able to effectively coach, mentor, identify, and address skills needs and gaps
* Proficient in methods and techniques for running effective meetings and for understanding and influencing the roles played by participants
* Displays good interpersonal skills at all levels of contact and in a wide variety of situations, able to listen and influence, and to relate to customers in their own language
* Demonstrates the ability to champion change and support teams through change.
* Demonstrates the ability to think critically, challenge conventional thinking and generate and apply unique business insight to create competitive advantage for the organization
* Has solid knowledge of regulations, including, GLPA, HIPAA, GDPR, CCPA, and other cyber security regulatory compliance requirements and related programs
* Has in-depth knowledge of security and control frameworks such as the NIST Cyber Security Framework, NIST SP 800-53, ISO 17799/27001, CobIT, and ITIL
* CRISC, CISSP, CISM, CISA, and other security related certifications are a plus
Principal Duties and Responsibilities
* Oversees and evaluates the delivery and effectiveness of the organizations policy governance, risk assessments, control attestation, and issues management capabilities, taking action to address performance or quality gaps as needed.
* Ensures the team maintains a well‑defined, risk‑aligned backlog of work that advances program maturity and meets regulatory, audit, and business needs.
* Guides team members in prioritizing assessments, policy lifecycle activities, and control-related work based on risk, business value, and regulatory timelines.
* Proactively removes obstacles and operational roadblocks that hinder timely completion of assessments, attestations, and governance processes.
* Partners with business and technology stakeholders to translate security, compliance, and risk management objectives into actionable work items.
* Ensures best‑practice execution, including structured assessment methodologies, clear control documentation, consistent issue tracking, adherence to policy standards, and high‑quality evidence collection.
* Encourages creativity and continuous improvement in maturing governance, assessment, and control processes; fosters a culture of innovation within the team.
* Uses operational metrics, assessment cycle data, and workflow insights to understand team performance and drive process efficiency.
* Partners with leadership to ensure strong talent is in place to support the organization's governance, risk and compliance obligations.
* Mentors, coaches, and motivates team members to elevate their GRC expertise, business partnership skills, and overall performance.
* Identifies skill gaps related to risk frameworks, regulatory requirements, control design, and assessment techniques, ensuring development plans address these needs.
* Promotes cross‑training and shared ownership of GRC functions to reduce single‑points‑of‑failure and increase team resilience.
* While accountable for the team's output, actively cultivates a self‑organizing, autonomous, and collaborative team that consistently demonstrates accountability and continuous improvement.
* Conducts regular 1:1s and development discussions to monitor progress, reinforce strengths, and close skill gaps.
* Collaborates with peers to evaluate the effectiveness of resourcing models, proposing enhancements to better support team operations.
* Maintains a strong understanding of emerging regulatory trends, risk frameworks (e.g., NIST CSF, HIPAA, SOC, ISO), and control expectations to inform program improvements.
* Reinforces disciplined prioritization by ensuring the team focuses on the highest‑value, highest‑risk activities and commitments.
* Designs and operates GRC processes with partner teams' knowledge and needs in mind, ensuring risk governance activities are clear, intuitive, and easy to complete.
#LI-TO1
#LI-MULTI
IN4
Our company is built on helping individuals and families, and this starts with our employees. We want employees to maintain a positive balance, which is why we provide access to the benefits and resources they need to invest in themselves. From our onsite fitness facilities and generous paid time off to employee professional development programs, we are committed to helping employees live and work their best - both inside and outside the office.
Unum is an equal opportunity employer, considering all qualified applicants and employees for hiring, placement, and advancement, without regard to a person's race, color, religion, national origin, age, genetic information, military status, gender, sexual orientation, gender identity or expression, disability, or protected veteran status.
The base salary range for applicants for this position is listed below. Unless actual salary is indicated above in the job description, actual pay will be based on skill, geographical location and experience.
$89,400.00-$183,500.00
Additionally, Unum offers a portfolio of benefits and rewards that are competitive and comprehensive including healthcare benefits (health, vision, dental), insurance benefits (short & long-term disability), performance-based incentive plans, paid time off, and a 401(k) retirement plan with an employer match up to 5% and an additional 4.5% contribution whether you contribute to the plan or not. All benefits are subject to the terms and conditions of individual Plans.
Company:
Unum
$89.4k-183.5k yearly Auto-Apply 13d ago
Security Engineer
Barndoor Ai 4.1
Security architect job in Charleston, SC
Who we are We help enterprises unlock the future of AI, and realize untapped potential through a thoughtful approach to access, security, and scalability. We're a growing startup at the forefront of enterprise GenAI infrastructure. We are building a next-generation platform that empowers enterprises to securely adopt and manage advanced AI workflows. We know that successful technology adoption hinges on secure and appropriate access. Our founding team helped shape past technology revolutions - from pioneering secure API Management during the rise of mobile apps to driving enterprise AI adoption across Fortune 100 enterprises.
At the core of all we do is our team. We're made up of builders, creators, and curious minds, on a mission to make AI safer, more responsible. Just as we are thoughtful about our products, we're thoughtful about how we build teams and our culture. We believe with each addition to the team, culture can be enhanced. Take a look at what we value in our About Barndoor page. If this speaks to you, we'd love to hear from you!
How you'll make an impact Security is foundational to everything we build. As our core Security Engineer, you will directly continue to shape the architecture, policies, and culture that scale our secure software. The systems you design will enable our customers-enterprises with complex regulatory and operational needs-to safely deploy AI-powered agents at scale. Your work won't just prevent breaches-it will enable trust, unlock innovation, and differentiate our platform in the market.
What You'll Be Working OnWhile all roles have fluidity, here's a sense of some of what you might work on at any given time.
Core responsibilities and role responsibilities include:
Responsibilities
Audit and strengthen OAuth 2.0 and OIDC token flows across internal proxies, the control plane, and third-party integrations
Identify and mitigate common and emerging threats in delegated authentication workflows
Review and co-design REST, WebSocket, and streaming APIs with strong boundaries, secure defaults, and least-privilege access models
Help define system boundaries for multi-agent, multi-tenant orchestration
Integrate and tune automated CVE, SCA, and IaC scanning tools into CI/CD pipelines
Convert security findings into high-signal engineering tickets with practical remediation paths
Lead lightweight, iterative threat models for new features and services
Define internal security baselines and policies, and mentor others to promote a strong security culture
Favor automation-friendly controls over burdensome manual security processes
Contribute to compliance initiatives such as SOC 2 and ISO 27001, supporting scalable security programs
Leverage deep expertise in OAuth 2.0/OIDC with real-world experience securing authentication flows in production systems
Design secure APIs, review system architectures, and implement scalable authentication and authorization models
Apply hands-on experience with supply chain and container security tools such as Trivy, Snyk, Grype, and Terraform scanning
Demonstrate familiarity with modern identity platforms like Auth0, Okta, and Keycloak, and with Zero Trust models
Requirements
5+ years in application or platform security roles, ideally in high-growth SaaS or cloud-native environments.
Deep expertise in OAuth 2.0/OIDC, including real-world experience securing auth flows in production systems.
Strong track record designing secure APIs, reviewing system architectures, and implementing scalable authN/authZ models.
Hands-on experience with supply chain and container security tools (e.g., Trivy, Snyk, Grype, Terraform scanning).
Familiarity with modern identity platforms (Auth0, Okta, Keycloak) or Zero Trust models.
Proven success contributing to SOC 2, ISO 27001, and overall compliance programs.
Experience working with AI/ML platforms or agent-based architectures.
Comfortable collaborating with infrastructure, product, and legal teams to align security priorities with company goals.
Passion for mentorship, documentation, and building a strong security culture without over-engineering.
Soft Skills That Matter Here
Startup Agility: You thrive in fast-paced, evolving environments and are quick to take initiative without waiting for perfect clarity.
Ownership Mentality: You see a gap and step in-you don't wait to be told what needs securing, you go find it.
Collaborative Spirit: You work well across functions-engineering, product, sales, and beyond-to elevate the entire team's security awareness.
Pragmatic Mindset: You balance ideal security outcomes with real-world constraints, always looking for simple, sustainable solutions.
Mentorship and Influence: You uplift teammates by sharing knowledge and helping others build security into their everyday thinking.
Travel RequirementsTeam connection is an important part of our culture. With a remote-friendly structure, we do require that our team be available to travel for in-person collaboration sessions and meetings. Some roles may have more travel than others. Typical team meetups are every 6-8 weeks, however, this may vary depending on team and business needs. We work to plan out our travel schedules in advance to give as much notice as possible.
Equal Opportunity EmployerWe celebrate diversity and are committed to creating an inclusive environment for all employees. We do not discriminate based on race, color, ancestry, national origin, citizenship, religion or creed, sex (including pregnancy, childbirth, and related conditions), sexual orientation, gender identity or expression, age, marital status, veteran status, disability, genetic information, or any other legally protected status. We believe that diverse teams build better products, and we strive to ensure that our hiring, development, and advancement practices are fair, equitable, and welcoming for everyone.
$81k-112k yearly est. Auto-Apply 60d+ ago
Security Engineer
HCA 4.5
Security architect job in Charleston, SC
Introduction Experience the HCA Healthcare difference where colleagues are trusted, valued members of our healthcare team. Grow your career with an organization committed to delivering respectful, compassionate care, and where the unique and intrinsic worth of each individual is recognized. Submit your application for the opportunity below: Security Engineer HCA Healthcare. This is a hybrid position and requires three days per week in the Division office and/or closest HCA Hospital within the Division.
HCA Healthcare offers a total rewards package that supports the health, life, career and retirement of our colleagues. The available plans and programs include:
* Comprehensive medical coverage that covers many common services at no cost or for a low copay. Plans include prescription drug and behavioral health coverage as well as free telemedicine services and free AirMed medical transportation.
* Additional options for dental and vision benefits, life and disability coverage, flexible spending accounts, supplemental health protection plans (accident, critical illness, hospital indemnity), auto and home insurance, identity theft protection, legal counseling, long-term care coverage, moving assistance, pet insurance and more.
* Free counseling services and resources for emotional, physical and financial wellbeing
* 401(k) Plan with a 100% match on 3% to 9% of pay (based on years of service)
* Employee Stock Purchase Plan with 10% off HCA Healthcare stock
* Family support through fertility and family building benefits with Progyny and adoption assistance.
* Referral services for child, elder and pet care, home and auto repair, event planning and more
* Consumer discounts through Abenity and Consumer Discounts
* Retirement readiness, rollover assistance services and preferred banking partnerships
* Education assistance (tuition, student loan, certification support, dependent scholarships)
* Colleague recognition program
* Time Away From Work Program (paid time off, paid family leave, long- and short-term disability coverage and leaves of absence)
* Employee Health Assistance Fund that offers free employee-only coverage to full-time and part-time colleagues based on income.
Learn more about Employee Benefits
Note: Eligibility for benefits may vary by location.
We are seeking a Security Engineer for our team to ensure that we continue to provide all patients with high quality, efficient care. Did you get into our industry for these reasons? We are an amazing team that works hard to support each other and are seeking a phenomenal addition like you who feels patient care is as meaningful as we do. We want you to apply!
Job Summary and Qualifications
The IPS Security Engineer will support Division and Facility Network/System Engineers and Administrators by analyzing a wide range of applications, network configurations, and securityarchitectures to ensure the security, integrity, and regulatory compliance of critical information transmitted or stored within the enterprise. Their role is to facilitate the discovery of information and IT-related risks, apply critical thinking to assumptions and develop the right security position/priorities that: first, attain compliance; second, address the material risks to the company while allowing the business to attain its objectives. This position blends cybersecurity engineering with system infrastructure expertise to support risk management, threat mitigation, infrastructure reliability, and compliance with IT and security standards.
The IPS Security Engineer will work across multiple domains of information security (i.e. Security and Risk Management, Asset Security, SecurityArchitecture and Engineering, Network Security, Identity and Access Management, Security Assessment and Testing, and Security Operations), providing consultation, assessments, and security/technical guidance to business units and IT teams.
Major Responsibilities:
* Risk Management and Security Consulting
* Serves as an internal information security consultant to the enterprise while balancing the needs of the business.
* Research and recommend solutions that meet security standards while ensuring functionality for business continuity.
* Drive and manage execution of corrective actions to address deficiencies identified during risk assessments.
* Translate security standards and regulatory requirements into actionable technical and business requirements.
* Lead and support the IPS program by assessing new applications and technologies and ensuring they are implemented in accordance with company standards
* Partner with appropriate stakeholders on vulnerability remediation
* Engage in Architecture Review Committee discussions to identify and address Third Party solution variance from company standards
* Support, coordinate, and manage incident response and investigation activities
* Evaluate and recommend security solutions that balance risk mitigation with business functionality
* Drive ongoing compliance with IPS policies, standards, and operational procedures
* Serve as an internal security consultant across business units
* Manage operational processes that monitor and respond to potential security threats
Security Engineering & Architecture
* Evaluate new and proposed security technologies and assist in their integration
* Assist in the design and implementation of secure network, application, and system architectures.
* Partner with IT colleagues to assure ongoing maturity of IT operational security controls.
* Participate in the development and testing of disaster recovery and contingency plans
* Security Operations and Threat Management
* Partner with corporate and local departments as required to facilitate rapid response to cybersecurity events.
* Maintain awareness of emerging threats, vulnerabilities, and mitigation techniques.
* Oversee processes for review and approval of security exception requests.
Vendor Systems Security
* Partner with appropriate business and IT leadership to help ensure systems, services, and devices receive appropriate assessments and remediation as part of local on-boarding processes.
* Partner with business and IT leadership to ensure proper controls are in place for existing vendor-maintained solutions.
* Performs other duties as assigned
* Practices and adheres to the "Code of Conduct" philosophy and "Mission and Value Statement."
Education & Experience:
* Bachelors degree required
* Masters degree preferred
* 3+ years of experience in a relevant field required
* 3+ years of experience in security risk management, information security domains, and/or hospital operations preferred, or equivalent combination of education and/or experience
Licenses, Certifications, & Training:
* CISSP, CISA, CISM, CCNA, MCSA or other relevant certifications in network administration or information security preferred
Required Knowledge, Skills, Abilities, Behaviors:
* Knowledge of supported operating systems (Windows server and VMware ESX), utilities, vendor products, applicable programming languages and scripting, diagnostic techniques, applicable communications protocols, applicable hardware configurations
* Must have 1+ years of experience in deploying technically complex infrastructure computing solutions across platforms and components.
* Knowledge of virtual technology, such as, Citrix, VMWare ESX, IBM LPARs, VIO servers, and micro partitions.
* Knowledge of OS environment running one or more databases including SQL, Oracle, DB2.
* Experience in one or more of the following: NetBackup, Data Domain, or CommVault
* Applicable communication protocols and hardware configurations
* Statistical and analytical tools for systems monitoring
* Working knowledge of information security concepts, including risk management, engineering, networking, and cloud.
* Understanding of cloud fundamentals and concepts, as well as experience with a popular cloud provider, like Microsoft, Google, or Amazon.
* Excellent written and oral skills
* Demonstrates a high degree of initiative, dependability, and the ability to work with minimal supervision.
* Possesses a sense of responsibility and accountability - one who takes ownership and initiative.
* Creative thinker, always looking for a "better way" to deliver value; not stopped or discouraged by adversity.
* Maintains professional demeanor, appearance, and positive attitude.
* Adaptable and flexible, with the ability to handle ambiguity and sometimes changing priorities.
Travel Required
* The job may require 10-15% travel. (Mostly within the Division)
HCA Healthcare has been recognized as one of the Worlds Most Ethical Companies by the Ethisphere Institute more than ten times. In recent years, HCA Healthcare spent an estimated 3.7 billion in cost for the delivery of charitable care, uninsured discounts, and other uncompensated expenses.
"There is so much good to do in the world and so many different ways to do it."- Dr. Thomas Frist, Sr.
HCA Healthcare Co-Founder
If you find this opportunity compelling, we encourage you to apply for our Security Engineer opening. We promptly review all applications. Highly qualified candidates will be directly contacted by a member of our team. We are interviewing - apply today!
We are an equal opportunity employer. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$77k-92k yearly est. 60d+ ago
Information System Security Officer
IFAS LLC
Security architect job in Charleston, SC
Job Description
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
$60k-82k yearly est. 15d ago
Information System Security Officer
Ifas LLC
Security architect job in Charleston, SC
The U.S. Department of State (DoS), Comptroller and Global Financial Services (CGFS), Chief Information Officer, Information Systems Security Office (CGFS/CIO/ISSO) requires the contractor to provide analytical and coordination support in the Information Systems Security Office (ISSO) as a Security Analyst in applying interrelationships of multiple Cybersecurity specialties; IT architecture; new IA developments and applications; emerging technologies and their applications to business processes; IT security concepts, standards, and methods; project management principles and methods.
Minimum Requirements
Four-year degree in computer science, business, or closely related area.
Technical certification in computer systems security and a minimum of 5 years' experience in intrusion detection, vulnerability assessments, and network diagnostics.
Experience with DoS computer security policies and guidelines.
Security+ certification is required; CompTIA+ certification is preferred.
Job Responsibilities
CGFS Charleston ISSO Information Assurance and Risk Management Framework (RMF).
User creation and conditional email assignment of user and administrative accounts on CGFS General Support Systems.
Active role in network and systems design to ensure that appropriate systems security policies and procedures are contemplated and introduced into designs at the outset.
Assess breaches of security to determine their impact on system operations and the confidentiality, integrity, and reliability of the information stored and manipulated within the system. Applies findings to the development of corrective measures and user awareness.
Creation and maintenance of users for CGFS Financial Applications.
Creation and updating of Treasury Keys for supported applications.
Storing and distribution of classified peripheral devices.
Creation and maintenance of network drive folder file permissions.
Documenting visiting Government and Non-Government visitor's laptops.
Support internal and external access management audits.
Create and maintain ISO 9001 documentation for engineering and access management efforts Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Brief and maintain documentation for all users on automated information systems (AIS).
SharePoint development and maintenance.
Provide tier III support for all Information Systems Security.
Create, modify, and delete user accounts on automated information systems.
Security Clearance Requirement
All contractors supporting this Department must be able to either possess or obtain a security clearance of “Top Secret/SCI.”
Important note to consider
: A Secret Clearance will open a lot of other doors for your career in the Government to include possibilities of being hired directly.
Work Schedule
The employee will work an 8-hour shift between the hours of 6:15 am to 6:00 pm with a non-compensated 45-minute lunch (See your Project Manager for work schedule and department policies). Additional hours may be required and must be authorized by your Project Manager and DoS Management. This position requires 5 days on-site.
Software Systems Utilized:
Basic knowledge and experience with Windows 2012/2016/or future elaborations Server network environment.
Basic knowledge and experience on personal computers running Windows 10 or future elaborations workstation in a Windows network environment.
Experience with PC workstation operations including word processing, spreadsheets, and electronic mail, as well as knowledge of Windows 10 or future elaborations system internals such as the registry.
Ability to communicate technical as well as non-technical information clearly, both orally and in writing.
Formal Job-Specific Training Requirements:
IA 201 - Information Assurance for System Administrators
Our Most Successful Employees in this Position Demonstrate:
An understanding of the mission and business functions of the organization.
An ability to build relationships with key personnel who have authority or ability to ensure compliance with security laws, regulations, guidance, and requirements.
An ability to troubleshoot issues while maintaining appropriate operational security posture.
$60k-82k yearly est. Auto-Apply 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security architect job in Columbia, SC
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d ago
Cyber Security Engineer
Atlas Executive Consulting
Security architect job in Charleston, SC
Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies.
We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients.
Perks of Working at Ignite Digital Services:
* Competitive pay and benefits, including PTO
* Education stipends and referral bonuses
* Compelling work with the U.S. federal government
* Strong emphasis on volunteer and community engagement
* Opportunity to shape the future of our industry
* Supportive colleagues and management who invest in your growth
Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing.
Responsibilities:
* Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers.
* Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment.
* Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
* Evaluated incident response procedures and capabilities through Red Team exercises.
* Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities.
* Monitored, analyzed, and detected Cyber events and incidents within information systems and networks.
* Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks.
* Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective.
* Evaluate the performance and applicability of software code review tools against customer and client requirements
* Foster collaborative business relationships with stakeholders, business partners, and team members
* Assist in the training and development of the command workforce to increase the ability to produce secure software code
Minimum Qualifications:
* Ability to obtain a DoD security clearance
* Bachelor of Science Degree in Engineering, Computer Science or Information Systems
* Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards.
* Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening.
* Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification.
* Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities.
* Must have Security+ certification
Preferred Qualifications:
* Active DoD security clearance
* Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment
* Experience in mentoring/training/coaching others in technical concepts
* Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision
* Ability to obtain a DoD Government Security Clearance is mandatory for this position*
Salary: $150k+ to align with education, certification, & experience
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors.
Equal Opportunity Employer/Veterans/Disabled
For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract.
OFCCP'S Pay Transparency Rule
EEO is the Law Poster
Create a Job Alert
Interested in building your career at Ignite Digital Services? Get future opportunities sent straight to your email.
Create alert
$150k yearly 60d+ ago
Cyber Security Engineer
Ignite Digital Services
Security architect job in Charleston, SC
Are you searching for an opportunity to take your career to the next level? Ignite Digital Services is a fast-growing digital transformation company serving the national security sector. Our small business applies data science, program management and technical domain expertise to help clients implement data-driven approaches that maximize operational efficiencies.
We've redefined what it means to be a leader in our industry by creating and maintaining effective and rewarding working relationships with our clients, partners and internal team members. Our company culture is built upon a team-based approach, which offers continuous opportunities for personal growth and innovation, while providing unmatched value to our clients.
Perks of Working at Ignite Digital Services:
Competitive pay and benefits, including PTO
Education stipends and referral bonuses
Compelling work with the U.S. federal government
Strong emphasis on volunteer and community engagement
Opportunity to shape the future of our industry
Supportive colleagues and management who invest in your growth
Ignite Digital, has an exciting opportunity for a Principal, Cyber Security Engineer in Charleston, SC to support our client engagements within the federal government. The ideal candidate is a self-starter with strong cybersecurity skills and a strong work ethic. This position serves an important role in supporting a DevSecOps software development program and producing business process improvements. The individual will implement state-of-the-art best cybersecurity practices to ensure software code meets rigorous security audits and testing.
Responsibilities:
Evaluate, develop, and implement cybersecurity code review solutions within current business processes to optimize efficiencies in collaboration with software developers.
Identify methods to collect, analyze, and manage data with the goal of making recommendations to accelerate the Risk Management Framework process within a DevSecOps environment.
Conducts vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
Evaluated incident response procedures and capabilities through Red Team exercises.
Exploited system and network vulnerabilities and misconfigurations for the purpose of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities.
Monitored, analyzed, and detected Cyber events and incidents within information systems and networks.
Planned, implemented, managed, monitored and upgraded security measures for the protection of the organizations data, systems and networks.
Developed security assessment plans for systems, including the objectives, scope, schedule, required documentation, possible risks, and other logistical items for security assessments; developed cloud service provider testing approach from security perspective.
Evaluate the performance and applicability of software code review tools against customer and client requirements
Foster collaborative business relationships with stakeholders, business partners, and team members
Assist in the training and development of the command workforce to increase the ability to produce secure software code
Minimum Qualifications:
Ability to obtain a DoD security clearance
Bachelor of Science Degree in Engineering, Computer Science or Information Systems
Fifteen (15) years in cyber security to include: Maintained the information security activities to preserve the availability, integrity, and confidentiality of information resources in compliance with applicable security policies and standards.
Experience performing cybersecurity requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, and systems hardening.
Demonstrated experience supporting Risk Management Framework (RMF)/ FedRAMP system certification.
Demonstrated ability to take initiative and work independently and quickly transition to reassess priorities.
Must have Security+ certification
Preferred Qualifications:
Active DoD security clearance
Knowledge of the system development life cycle, software project management approaches and requirements, design and test techniques including experience working in a DevOps/DevSecOps delivery environment
Experience in mentoring/training/coaching others in technical concepts
Adapts quickly to new situations, is willing to learn new technologies and works well in a team environment, leading individual projects without the need for supervision
*Ability to obtain a DoD Government Security Clearance is mandatory for this position*
Salary: $150k+ to align with education, certification, & experience
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Ignite Digital Services is a Small Business committed to providing exceptional service to government agencies at competitive prices. The capabilities and experience of our staff and our extensive industry relationships distinguish Ignite Digital Services among government contractors.
Equal Opportunity Employer/Veterans/Disabled
For individuals who would like to request an accommodation, please visit ********************** (CA) or ********************** (SC) or contact Human Resources. Ignite Digital Services will not make any posting or employment decision that does not comply with applicable laws relating to labor and employment, equal employment opportunity, employment eligibility requirements or related matters. Nor will Ignite Digital Services require, in a posting or otherwise, U.S. citizenship or lawful permanent residency in the U.S. as a condition of employment except as necessary to comply with law, regulation, executive order, or federal, state, or local government contract.
OFCCP'S Pay Transparency Rule EEO is the Law Poster
$150k yearly Auto-Apply 11d ago
Cyber Engineer III
ITC Defense
Security architect job in Charleston, SC
Cyber Engineer III Overview: ITC Defense is seeking to hire a Cyber Engineer III in support of U.S. Navy /Air Force CYP (Child Youth Programs) CCTV Lifecycle Support Service program. Responsibilities:
Design, implement, and maintain security controls and architectures across networks, systems, and applications in alignment with NIST, ISO 27001, CIS, and Zero Trust principles.
Evaluate, integrate, and manage security tools and technologies, including SIEM, SOAR, EDR, IDS/IPS, DLP, and IAM solutions.
Lead or support advanced threat detection, incident response, forensic analysis, and remediation activities.
Conduct threat modeling, security design reviews, and root cause analysis for new and existing systems.
Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking.
Coordinate and validate penetration testing efforts and report on security metrics and risk posture.
Support compliance, audit, and ATO activities (e.g., NIST 800-53, NIST 800-171, CMMC, FedRAMP).
Develop, maintain, and improve security documentation, policies, procedures, and incident response playbooks.
Other duties as assigned.
Minimum Qualifications:
Master's degree in Cybersecurity, Computer Engineering, Electrical Engineering, Electronics Engineering, or Mathematics with a concentration in Computer Science (or equivalent).
Minimum of ten (10) years of demonstrated experience preparing, implementing, and ensuring compliance with cybersecurity policies and standards.
DoD 8570.1M-compliant certification at one or more of the following levels, as required by PWS tasking:
Information Assurance Management (IAM) Level I
Information Assurance Technical (IAT) Level I
Information Assurance System Architect and Engineer (IASAE) Level I
Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing compliance.
Experience designing, upgrading, monitoring, and maintaining cybersecurity measures to improve cyber defense and ensure network resiliency.
Proven experience assessing cybersecurity vulnerabilities, performing risk analysis, and developing and implementing remediation or risk mitigation strategies.
Experience ensuring security controls are in place to protect digital files and electronic infrastructure.
Experience responding to and reporting on cybersecurity incidents and security breaches.
Preferred Qualifications:
Experience with NIST, CMMC, Zero Trust, and cloud security frameworks (AWS, Azure, GCP).
Hands-on expertise with security tools (SIEM, SOAR, EDR, IDS/IPS, DLP, IAM) and vulnerability management.
Strong analytical, problem-solving, and critical-thinking skills to assess risks and develop solutions.
Excellent communication, collaboration, and mentoring abilities for cross-functional teams.
Why work at ITC Defense:
Employer Supplemented Health Insurance
Employer Paid Dental and Vision Insurance
Employer Paid Life and AD&D Insurance
3% Biweekly 401(k) Contribution
Paid Time Off
Tuition and Certification Reimbursement
Competitive Salaries with Performance Incentives
A positive working environment with supportive teammates and leadership
ITC Defense Corp. is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or protected veteran status. U.S. Citizenship is required for most positions. This job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee. Duties, responsibilities and activities may change, or new ones may be assigned at any time with or without notice. Employment with ITC is at-will. For further information on our equal opportunity protections as part of the employment process, please see **************************************************************** and ***********************************************************************************************
ACCESSIBILITY- Candidates must be able to perform the essential functions of the position satisfactorily and that, if requested, reasonable accommodation may be made to enable employees with disabilities to perform the essential functions of their job, absent undue hardship. If you are a qualified individual with a disability or a disabled veteran, you have the right to request a reasonable accommodation for purposes of participating in the application/selection process with ITC. Please refer to our website ************************** for further information on all our EEO/VEVRAA policies.
Thank you for your interest in ITC Defense!
$74k-101k yearly est. Auto-Apply 33d ago
Security Engineer
Phaxis
Security architect job in Fort Mill, SC
Remain current on security trends, standards, regulations, and tools.
Ensure cybersecurity files are maintained and current.
Hold security review meetings regularly with relevant stakeholders.
Monitor development tool and 3 rd party software items for vulnerabilities and updates.
Run regular scans on products using latest tools to detect newest vulnerabilities.
Work with development to keep 3 rd party software incorporated in products updated.
Review encryption algorithms to make sure current best practices are followed.
Ensure code authenticity is managed and secure.
Review security training for personnel is completed.
Ensure device Windows Images use latest updates and are released regularly.
$71k-98k yearly est. 60d+ ago
Security Engineer II
Trustmark 4.6
Security architect job in Columbia, SC
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain securityarchitectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
$74k-95k yearly est. 60d+ ago
Need Oracle SOA Architect
360 It Professionals 3.6
Security architect job in Columbia, SC
This is Priya Sharma from 360 IT Professionals Inc. and we are Staffing Specialist working directly with all US States and Local and Commercial clients. We are known for our IT Services, Mobile development, Web development and Cloud computing and working with clients to deliver high-performance results.
Job Description
REQUIRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• Demonstrated architecture and development experience with the software development life cycle of both Windows and Java-based technology implementations.
• Demonstrated experience with cross-platform interoperability for SOA-based Enterprise application implementation patterns
• Experience with Microsoft SQL Server, Oracle Database, and NoSQL database platform implementation architecture
• Experience with middleware component implement patterns for capabilities as defined in the TPP and TRA.
• Demonstrated experience with security identity implementation standards and patterns
• Ability to create and deliver solution architecture designs to leadership through content and presentations.
PREFERRED SKILLS (RANK IN ORDER OF IMPORTANCE):
• Prior experience working in areas of emerging technology and articulating strategic technology directions.
• Experience in development methodologies (waterfall, agile, etc), enterprise planning, and estimation
• Experience delivering end-to-end solutions
• Implementation of federated identity standards with applications, portals, and middleware components
• Identity federation using SAML 2.0 standard with Active Directory Federation Services (ADFS) or similar products.
• Ability to create solution architecture diagrams using modeling tools such as Microsoft Visio
Qualifications
REQUIRED EDUCATION/CERTIFICATIONS:
Bachelor's degree in Computer Science, Engineering or Technical Science or equivalent experience
PREFERRED EDUCATION/CERTIFICATIONS:
Master's degree in Computer Science, Engineering or Technical Science or equivalent experience
QUALIFICATIONS:
Ten or more years' experience in designing complex enterprise solutions
within a service oriented architecture with specific experience
including:
• Standards-based focus on system interoperability using service oriented components
• Proven experience in leading enterprise platform and solution implementation projects
• Demonstrable experience with architecting complex enterprise service bus capabilities
• Demonstrated ability to create complex solution architecture designs
• Demonstrated ability to create solution implementation strategies and roadmaps
• Proven leadership experience for enterprise solution implementation projects
Additional Information
Kindly share your resume to priya.sharma@_360itpro.com or call me on 510-254-33-00 Ext. 130
$97k-127k yearly est. 60d+ ago
ServiceNow Architect
Farm Credit Services of America 4.7
Security architect job in Columbia, SC
The ServiceNow Architect designs and implements enterprise-wide technology solutions, ensuring seamless integration of IT services. This role requires deep technical expertise, strong problem-solving skills, and the ability to lead and collaborate across teams.
What You'll Do:
Design and implement scalable, secure technology solutions aligned with business needs.
Customize and configure enterprise applications and modules.
Integrate systems to ensure seamless data flow and functionality.
Lead and mentor engineers, providing technical guidance and support.
Manage system administration tasks, including user access, security, and data.
Develop and maintain technical documentation and user guides.
Troubleshoot and resolve complex technical issues.
Collaborate with stakeholders to gather requirements and deliver effective solutions.
What You'll Need:
Bachelor's or master's degree in computer science, Information Systems, or related field preferred
8-10 years of IT experience in system planning, architecture, engineering, and optimization
Proficient in system architecture and high-level administration
Strong programming/scripting skills (e.g., JavaScript, HTML, CSS)
Experienced with APIs, web services, and system integration
Excellent written and verbal communication skills
Proven ability to translate technical concepts for diverse audiences
How much does a security architect earn in Mount Pleasant, SC?
The average security architect in Mount Pleasant, SC earns between $75,000 and $160,000 annually. This compares to the national average security architect range of $92,000 to $179,000.
Average security architect salary in Mount Pleasant, SC