Security architect jobs in Oklahoma City, OK - 47 jobs
All
Security Architect
Security Engineer
Information Security Engineer
Senior Information Security Analyst
Information Security Manager
Information Systems Security Officer
Network Security Architect
Senior Security Architect
Senior Security Analyst
Information Security Analyst
Senior Security Engineer
Information Security Specialist
Federal Reserve Bank of Kansas City 4.7
Security architect job in Oklahoma City, OK
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
Important Information
Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen.
No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered.
This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility.
This position is not eligible to be remote and relocation assistance is not available.
We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies.
This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization.
Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal.
Key Activities
Interpret and evaluate policies in order to mature and implement the DevSecOps program.
Assess maturity of development teams' DevSecOps practices against an existing framework.
Proactively advocate for and drive enhancements into the program.
Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC).
Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process.
Monitors information security policy compliance using security tooling.
Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives.
Provide technical expertise and support to internal teams on security-related matters.
Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure.
Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture.
Support leadership decision making through timely analysis and written communications.
Qualifications
Typically requires 3-6 years of relevant experience.
Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience.
Strong competence in cloud technologies such as AWS, Azure, and other platforms.
Expert understanding of DevSecOps practices, frameworks, and tools.
Expertise with tool integration for the DevOps pipeline such as Git.
Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules.
Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work.
Conveys complex and technical issues to diverse audiences.
Demonstrated competencies with artificial intelligence are beneficial.
Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others.
Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java
Technical expertise in security tools and knowledge of security practices and procedures.
A learning mindset, proactiveness, collaboration, and strong attention to detail.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Locations: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Relocation Assistance: No
Salary:
$79,100 - $111,500 / Experienced Level
$98,600 - $139,000 / Senior Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels.
Privacy Notice
$98.6k-139k yearly 4d ago
Looking for a job?
Let Zippia find it for you.
Security Architect
Addison Group 4.6
Security architect job in Oklahoma City, OK
Job Description
Job Title: SecurityArchitect
Salary Range: $100,000 - $200,000 / year depending on experience.
is eligible for medical, dental, vision, and 401(k).
**Must be authorized to work in the United States now, and in the future, without assistance.
Overview
We are seeking a SecurityArchitect to design, implement, and continuously improve enterprise securityarchitecture across infrastructure, applications, and cloud environments. This role partners closely with IT, engineering, and leadership to ensure security is embedded into systems and processes while supporting business growth and compliance requirements.
Key Responsibilities
Design and maintain securityarchitecture frameworks, standards, and roadmaps
Evaluate current systems and identify security risks, gaps, and mitigation strategies
Partner with infrastructure, application, and cloud teams to embed security best practices
Support cloud and on-prem security initiatives, including identity, network, and data protection
Lead security design reviews for new technologies, applications, and integrations
Develop security policies, reference architectures, and technical documentation
Support incident response, threat modeling, and vulnerability management efforts
Stay current on emerging threats, security trends, and regulatory requirements
Required Qualifications
Experience in information securityarchitecture or senior security engineering roles
Strong understanding of network security, IAM, encryption, and endpoint security
Experience designing security solutions for cloud and hybrid environments
Knowledge of common security frameworks and standards (NIST, ISO, CIS, Zero Trust)
Ability to translate business requirements into secure technical designs
Strong communication skills with both technical and non-technical stakeholders
Preferred / Nice to Have
Experience with major cloud platforms (AWS, Azure, or GCP)
Familiarity with SIEM, SOAR, and vulnerability management tools
Security certifications (CISSP, CISM, CCSP, or similar)
Experience supporting compliance or regulatory initiatives
No 3rd parties.
Why choose Addison IT?
· Pay: We negotiate high salaries using U.S. Bureau of Labor Statistics
· Benefits & Bonuses: You are eligible for medical, dental, vision insurance benefits, 401K, and monetary bonuses
· Permanent Employment: Many of Addison's job openings lead to potential permanent employment
· Connections: You connect directly with hiring managers from renowned organizations
· Options: You are presented with multiple employment options near your home
· Professional Development: You are provided hiring process advice, resume revision, and employment term negotiation
Addison Group is an Equal Opportunity Employer. Addison Group provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable federal, state, and local laws. Addison Group complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. Reasonable accommodation is available for qualified individuals with disabilities, upon request.
IND 005-010
$100k-200k yearly 5d ago
Manager Information Security & Risk Management - Cloud Security Manager
Highmark Health 4.5
Security architect job in Oklahoma City, OK
This job provides Information Security and Risk Management services for the Organization. Works with peers within security, HM Health Solutions customers and application teams to ensure alignment with current and future security needs. Manages activities of various Information Security personnel. Makes decisions on personnel actions (promotions, hiring, terminations, etc.). Develops talent, addresses resource management, cultivates capabilities of staff, planning and coordination of work, and managing performance. Conducts the oversight of security technology products for network, systems, and data. Controls expenses within the operating unit and is responsible for meeting budget goals. Actively contributes to the Information Security ans Risk Management (ISRM) strategic planning process by working with the Directors to develop and implement department strategic plans and action steps that support the corporate strategic objectives. Actively involved in the coordination, implementation, problem solving, communication, and training of new technologies and processes, as they are developed and moved into the environment. Develops and presents Information Security awareness and training programs.
**ESSENTIAL RESPONSIBILITIES**
+ Perform management responsibilities including, but not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity.
+ Plan, organize, staff, direct and control the day-to-day operations of the department; develop and implement policies and programs as necessary; may have budgetary responsibility and authority.
+ Provide oversight of all aspects of project management to ensure continuous improvement of processes: negotiate and collaborate with leadership and staff to develop security solutions and options; develop and adhere to internal standards and strategies; ensure adherence to approved methodologies; coordinate resources, time, contingency plans and risk management.
+ Provide leadership to the department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security innovation; encourage and enforce proper training in regards to security issues.
+ Ensure compliance to Corporate and Information Security policies, standards and procedures.
+ Communicate effectively with all levels of the organization: facilitate meetings; plan, design and provide presentations; represent HM Health Solutions with outside entities; prepare divisional procedures, policies, reports and correspondence; spread awareness of new and existing security threats; provide oversight regarding metrics, funding, budgets and resources.
+ Other duties as assigned or requested.
**EDUCATION**
**Required**
+ Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field
**Substitutions**
+ 6 years of relevant experience substitution for a Bachelor's Degree
**Preferred**
+ Master's Degree in Computer Science, Information Security or related field
**EXPERIENCE**
**Required**
+ 7 - 10 years in Information Security and/or Information Risk Management and/or Information Technology
+ 7 - 10 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences
+ 1 - 3 years in mentoring others in a leadership role
+ 1 - 3 years in Staff Management
+ 1 - 3 years in developing and executing strategic plans to realize business objectives
**Preferred**
+ 10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology
+ Experience managing an information security function using the HITRUST Common Security Framework (HITRUST CSF), or the NIST 800-83 cyber security framework
+ Experience supporting SSAE 16 or SOC 2 Security Trust Principle audits
+ Experience establishing budgets and meeting fiduciary goals
+ Security industry organization participation/leadership (HITRUST, ISACA, InfraGard, ISC2, ISSA, etc.)
**LICENSES AND CERTIFICATIONS**
**Required**
+ None
**Preferred**
+ Certified Information Systems Security Professional (CISSP) **OR**
+ Certified Information Security Manager (CISM) **OR**
+ Certified in Risk and Information Systems Controls (CRISC) **OR**
+ Information Technology Infrastructure Library (ITIL)
**SKILLS**
+ Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
+ Strong teamwork and interpersonal skills
+ Experience in leading process improvement initiatives
+ Ability to motivate high performance, multi-discipline teams
+ Demonstrated competency in project execution
+ Demonstrated abilities in relationship management
**Languages (Other than English)**
None
**Travel Requirement**
0% - 25%
**PHYSICAL, MENTAL DEMANDS and WORKING CONDITIONS**
**Position Type**
Office-Based
Teaches/Trains others regularly
Frequently
Travels regularly from the office to various work sites or from site-to-site
Occasionally
Works primarily out-of-the office selling products/services (Sales employees)
Does Not Apply
Physical Work Site Required
Yes
Lifting: up to 10 pounds
Does Not Apply
Lifting: 10 to 25 pounds
Does Not Apply
Lifting: 25 to 50 pounds
Does Not Apply
**_Disclaimer:_** _The job description has been designed to indicate the general nature and essential duties and responsibilities of work performed by employees within this job title. It may not contain a comprehensive inventory of all duties, responsibilities, and qualifications required of employees to do this job._
**_Compliance Requirement_** _: This job adheres to the ethical and legal standards and behavioral expectations as set forth in the code of business conduct and company policies._
_As a component of job responsibilities, employees may have access to covered information, cardholder data, or other confidential customer information that must be protected at all times. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy._
_Furthermore, it is every employee's responsibility to comply with the company's Code of Business Conduct. This includes but is not limited to adherence to applicable federal and state laws, rules, and regulations as well as company policies and training requirements._
**Pay Range Minimum:**
$108,000.00
**Pay Range Maximum:**
$201,800.00
_Base pay is determined by a variety of factors including a candidate's qualifications, experience, and expected contributions, as well as internal peer equity, market, and business considerations. The displayed salary range does not reflect any geographic differential Highmark may apply for certain locations based upon comparative markets._
Highmark Health and its affiliates prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on any category protected by applicable federal, state, or local law.
We endeavor to make this site accessible to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact the email below.
For accommodation requests, please contact HR Services Online at *****************************
California Consumer Privacy Act Employees, Contractors, and Applicants Notice
Req ID: J269753
$108k-201.8k yearly 60d+ ago
Product Security Engineer, AI
Meta 4.8
Security architect job in Oklahoma City, OK
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Senior Security Architect - Oklahoma
Cyberone Security
Security architect job in Oklahoma City, OK
CyberOne is hiring! We hire smart, talented and high-performing professionals to push our organization forward and provide superior service to our customers. We each take accountability for our work, strive to make each other better, and genuinely love what we do. If you value learning new things, being innovative, and working in a supportive, collaborative environment, CyberOne may be the place for you.
If you are ready to raise the bar for your career and be part of our exciting journey, we would like to hear from you!
The Presales Senior SecurityArchitect partners closely with Account Managers, Professional Services, and partner resources to design and deliver tailored cybersecurity solutions that address customer needs. Acting as a trusted advisor, this role combines deep technical expertise with strong communication skills to build confidence and drive successful outcomes. The Senior SecurityArchitect will primarily support customers in the Oklahoma region, while providing additional support to other regions as needed.
This position requires the candidate to reside in Oklahoma in order to effectively serve the assigned region.Essential Functions
Build strong customer relationships and serve as a trusted technical advisor, helping them achieve their business and security goals.
Work in close partnership with Account Managers, Professional Services, and vendor partners.
Continuously expand and update knowledge of cybersecurity use cases, leading partner technologies, and CyberOne's Professional Services offerings to align with customer needs.
Maintain a strong understanding of the broader cybersecurity ecosystem with deep knowledge of key verticals (e.g., network, cloud, OT, application security).
Provide training and knowledge sharing to sales teams on vendor products, cybersecurity trends, and market insights.
Perform assessments and consulting services to help customers identify risks within their environments.
Lead strategic conversations with enterprise customers on industry trends and emerging technologies.
Act as the customer's advocate for technical issues, ensuring timely follow-up and resolution.
Travel as needed to participate in customer meetings, workshops, and strategic discussions.
Education/Experience
7+ years of experience designing and implementing security solutions in large environments.
Experience leading and recommending technology selection processes within or for enterprise organizations.
Proven experience as a senior or lead technical resource/architect (cybersecurity, network, cloud, etc.) within a large organization, reseller, or systems integrator.
Effectively lead and support customer demonstrations with Systems Engineers to highlight CyberOne's value proposition.
Certification/License Requirements
Industry-recognized certifications (e.g., CISSP, CCSP, SANS, Open CA) preferred.
Vendor/technology certifications (e.g., AWS, Palo Alto Networks, Tenable) preferred.
Core Skills/Abilities
Excellent relationship-building skills with the ability to engage clients confidently in person and virtually.
Strong organizational skills with the ability to manage multiple priorities in a fast-paced environment.
Strong presentation, written, and oral communication skills across all organizational levels, from senior leadership to peers and team members.
Proficiency with standard office equipment such as laptops and smartphones.
Work Environment
Ability to travel up to 50% within the Oklahoma territory and occasionally to the Plano, TX headquarters.
Ability to navigate client environments, including walking, stairs, and carrying light materials (up to 25 lbs).
Prolonged periods of sitting or standing while working remotely or attending meetings.
Operates a laptop and standard office equipment for prolonged periods.
Participates in virtual meetings and occasional in-person training or company events.
Strong verbal, visual, and auditory capabilities to effectively present, communicate, and engage with clients and internal teams.
If you are passionate, driven and ready to take your career to the next level, we invite you to apply today!
CyberOne is a proud Equal Opportunity and Affirmative Action Employer. All qualified applicants, regardless of race, color, genetic information, national origin, religion or belief, sex, affectional or sexual orientation, gender identity or expression, immigration status, ancestry, age, marital status, disability, or protected veteran status, are encouraged to apply and will receive equal consideration based on merit, qualifications, and business need.
Recruitment Agencies Please Note:
"In accordance with our recruitment policy, CyberOne strictly prohibits any form of solicitation of our employees by external agencies or third parties. Any candidate information that may be received from such agencies or third parties shall be deemed as a voluntary gift and shall become the exclusive property of CyberOne. Exceptions to this policy apply only when an Agency/Third Party is an Authorized Vendor of CyberOne, holding a valid and current contract that has been duly signed by our People Services Manager or CFO of CyberOne. Under no circumstances will any payment be made to any Agency/Third Party unless they are an Authorized Vendor or possess written approval from the CyberOne People Services Manager or CFO, granting them explicit permission to engage in recruitment efforts on behalf of CyberOne."
$98k-132k yearly est. Auto-Apply 60d+ ago
Manager Information Security
Weokie Federal Credit Union
Security architect job in Oklahoma City, OK
We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, and has experience in IT Security, Business Continuity, and Vendor Management, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector.
The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan.
Major Activities:
* Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program.
* Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats.
* Organizes and conducts cybersecurity simulation exercises.
* Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit.
* Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated.
* Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied.
* Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned.
* Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials.
* Support technology/systems that enable all vendor management activities by administering the Tandem platform.
* Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities.
* Maintain, develop, update, and test WEOKIE's Business Continuity Plan.
* Write reports to summarize testing activities, including results and recommendations.
* Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented.
Critical Results:
* WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs.
* Information Security risks and threats are clearly identified, measured and remediated timely.
* The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts.
* Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities.
* WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources.
* WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders.
* Risk assessments are completed annually and deficiency are quickly addressed and/or remediated.
* Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented.
* New quality control activities are developed and presented to leadership that correspond to the information security program.
* Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately.
* Vendor Management is collaboratively managed with fellow team members.
* Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures.
* WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident.
Qualifications:
* Specialized or Technical Knowledge and Skills: The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of information security concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact.
* A bachelor's degree is required, preferably in Information Technology or Computer Science.
* A minimum of three years of experience in the information security field.
* A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM) are preferred.
* Demonstrated experience in managing and working with third party vendors.
* Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels.
* In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them.
B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position.
* Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values.
* Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members.
* Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements.
* Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad.
* Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position:
* Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations.
* Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans.
* Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others.
* Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges.
* Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile.
* Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace.
* Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis.
* Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality.
C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus.
D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate.
WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
$91k-132k yearly est. 5d ago
Information Systems Security Officer - 201810
Delaware Nation Industries
Security architect job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
An active security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
$71k-97k yearly est. Auto-Apply 58d ago
Sr. Security Analyst
Maximus 4.3
Security architect job in Oklahoma City, OK
Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned.
*This role is remote but requires working standard business hours in the US time zone of the client.*
Essential Duties and Responsibilities:
- Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary.
- Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget.
- Work closely with management and work groups to create and maintain work plan documents.
- Track the status and due dates of projects.
- Manage relationships with project staff responsible for projects.
- Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed.
- Facilitate regular meetings and reviews.
- Adhere to contract requirements and comply with all corporate policies and procedures.
Job Specific Duties and Responsibilities:
-Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects.
-Review project documentation and client materials and provide analysis of technical and security related topics.
-Participate in client meetings and offer observations and insight on technical and security related topics.
-Identify risk areas and potential problems that require proactive attention.
-Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to:
*System Security Plan
*Plan of Action and Milestones (POA&M)
*Security Assessment Plan
*Risk Assessment reports
*CMS ARC-AMPE forms and documentation
*Data Conversion and Migration Management Plan
*Deployment and/or roll-out plans
-Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects.
-Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues.
-Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work.
-Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager.
-Complete project work in compliance with Maximus standards and procedures.
-Support team to complete assigned responsibilities as outlined in the Project schedule.
-Support all other tasks assigned by Senior Manager / Project Manager.
Minimum Requirements
- Bachelor's degree in related field.
- 7-10 years of relevant professional experience required.
- Equivalent combination of education and experience considered in lieu of degree.
Job Specific Requirements:
-Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required.
-Bachelor's degree from an accredited college or university, or equivalent work experience.
-7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry.
-5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks.
-Familiar with operating systems: Windows, Linux/UNIX, OS/X.
-Familiar with AI tools, capabilities.
-Strong command of cloud computing topics.
-Strong command of agile software development practices as well as waterfall development practices.
-Strong desktop software skills: proficient in MS Office, Excel, Word, Project.
-Ability to explain and communicate technical subjects to non-technical audiences.
-Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills.
-Ability to work independently.
-Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously.
-Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential.
-Excellent verbal and writing skills and be comfortable working with customers.
-Ability to multi-task with supervision.
-Self-motivated fast learner.
Preferred Skills:
-Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid).
-Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional).
EEO Statement
Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Accommodations
Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
Minimum Salary
$
120,000.00
Maximum Salary
$
140,000.00
$83k-111k yearly est. Easy Apply 5d ago
Senior/Information Security Analyst
Western Farmers Electric Co-Op 3.8
Security architect job in Moore, OK
Applications will be accepted until January 20, 2026 - Apply on-line at ************ * At the option of the hiring official, a candidate will be placed in one of the following levels based on education, experience, knowledge, skills, and behaviors required.
SUMMARY - Senior Information Security Analyst: Under the general supervision of the Supervisor, IT Infrastructure, the Senior Information Security Analyst performs troubleshooting, installation, and maintenance on equipment and software systems related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems. In addition, the incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
SUMMARY - Information Security Analyst: Under the general supervision of the Supervisor, IT Infrastructure, the Information Security Analyst performs troubleshooting, installation and maintenance on equipment and software related to electronic access control and monitoring. The incumbent ensures the stability and integrity of in-house electronic access control and monitoring systems. In addition, the incumbent participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required. The incumbent also participates in exercises that test policies, procedures and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
ESSENTIAL DUTIES AND RESPONSIBILITIES - Senior Information Security Analyst include the following; other duties may be assigned. Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems, and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments. Performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. Installs, troubleshoots, and maintains hardware and software systems related to electronic access control and monitoring systems. Reviews logs, configurations, rule sets, user accounts, account groups, and network traffic for adherence to policy/procedure. Responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security. Tests and implements IDS/IPS rule sets and signatures. Conducts security controls testing after significant changes to cyber assets to ensure proper security posture to meet regulatory guidelines. Monitors cyber assets and critical infrastructure to ensure system up-time. Engages in change/configuration management activities for cyber assets. Performs network traffic analysis when anomalous traffic needs to be investigated. Assists in conducting incident response and forensic investigations. Conducts vulnerability testing, analysis, and mitigation for cyber assets. Analyzes network infrastructure rule sets manually and uses software tools to ensure proper security posture for compliance. Writes reports and briefings related to specific information security issues. Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group. Conducts research on network products, services, protocols, and standards to remain abreast of developments in the information security industry. Participates in exercises that test policies, procedures, and skills which are required by business and critical operations. Participates in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required.
ESSENTIAL DUTIES AND RESPONSIBILITIES - Information Security Analyst include the following; other duties may be assigned. Ensures the stability and integrity of in-house electronic access control and monitoring systems which may include SEIM devices, IDS sensors, IPS, data diodes, firewalls, switches, routers, application white listing, network anomaly detection devices, log retention systems, log forwarding systems, network monitoring systems and analytics software used in the monitoring of critical cyber assets associated with the operation of multiple departments. Installs, troubleshoots and maintains hardware and software systems related to electronic access control and monitoring systems. Reviews logs, configurations, rule sets, user accounts, account groups and network traffic for adherence to policy/procedure. Responds to anomalous events that will require analysis and synthesizes and correlates complex events to ensure operational security. Monitors cyber assets and critical infrastructure to ensure system up-time. Engages in change/configuration management activities for cyber assets. Performs network traffic analysis when anomalous traffic needs to be investigated. Writes reports and briefings related to specific information security issues related to WFEC systems and critical cyber assets. Tickets and tracks operational issues related to the security posture of cyber assets which are in scope for this group. Conducts research on network products, services, protocols and standards to remain abreast of developments in the information security industry. Participates in exercises that test policies, procedures and skills which are required by business and critical operations. Participates in in-house, regulatory and industry teams including working groups, committees, incident response teams and business continuity teams as required.
COMPETENCIES: To perform the job successfully, an individual should demonstrate the following competencies:
Analysis/Design: Synthesizes complex or diverse information; collects and researches data; uses experience to complement data; designs workflows and procedures; generates creative solutions; translates concepts and information into images; uses feedback to modify designs; applies design principles; demonstrates attention to detail.
Problem Solving: Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Develops alternative solutions; Works well in group problem solving situations; Uses reason even when dealing with emotional topics.
Professional Knowledge: Generates creative solutions; translates concepts and information into applications; uses feedback to modify recommendations; pursues training and development opportunities; strives to continuously build knowledge and skills; shares expertise with others.
Oral and Written Communication: Speaks clearly and persuasively in positive or negative situations; listens and gets clarification; responds well to questions; demonstrates group presentation skills; participates in meetings; writes clearly and informatively; varies writing style to meet needs; presents numerical data effectively; able to read and interpret written information.
Teamwork: Balances team and individual responsibilities; exhibits objectivity and openness to others' views; gives and welcomes feedback; able to build morale and group commitments to goals and objectives; supports everyone's efforts to succeed.
Planning/Organizing: Prioritizes and plans work activities; uses time efficiently; sets goals and objectives; develops realistic action plans.
Project Management: Develops project plans; coordinates projects effectively; communicates changes and progress; completes projects on time and budget; manages project team activities.
Adaptability: Adapts to changes in the work environment; manages competing demands; changes approach or method to best fit the situation; able to deal with frequent change, delays or unexpected outcomes.
Customer Service: Manages difficult or emotional customer situations; responds promptly to customer needs; solicits customer feedback to improve service; responds to requests for service and assistance; meets commitments to customers.
Cost Consciousness: Works within approved budget; develops and implements cost saving measures; conserves organizational resources.
QUALIFICATIONS: To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the education, experience, knowledge, skills, abilities, and behaviors required.
Education and Experience:
Sr. Information Security Analyst - ($98,946 - $155,088): A Bachelor's degree in a related field and five (5) years of directly related experience in information security, digital networking, computing, telecommunications or SCADA/EMS operations is required. Extensive knowledge of TCP/IP and Cisco routing and switching, as well as proven experience with Cisco ASA firewall and VPN appliances, is preferred. Industry specific certifications may be substituted for experience at the rate of one (1) year experience for each certification. Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
Information Security Analyst - ($89,710 - $139,142): A Bachelor's degree in Computer Science, Information Management, or a related field and two (2) years of directly related experience in information security, digital networking, computing, telecommunications or SCADA/EMS operations is required. An Associate's degree in Computer Science, Information Management, or a related field and six (6) years of direct work experience may be considered as a substitute for a degree. Extensive knowledge of TCP/IP, Cisco routing and switching and proven experience with Cisco ASA firewall and VPN appliances is preferred. Industry specific certifications may be substituted for experience at the rate of one (1) year of experience for each certification. Directly related experience may be substituted for education at the rate of two (2) years of experience for one (1) year of education.
Language Skills: Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations. Ability to write reports, business correspondence and procedure manuals. Ability to effectively present information and respond to questions from groups of employees, managers, clients or customers.
Mathematical Skills: Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry, trigonometry, calculus and differential equations. Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations.
Reasoning Ability: Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
Computer Skills: In addition to the qualifications listed above, knowledge and experience using Microsoft Office products is required.
CERTIFICATES, LICENSES, REGISTRATIONS: Requires a current driver's license. CCNA, CCNP, Comptia Network +, Comptia Security +, CISSP, GIAC, CEH or Engineer-level Operating System certifications is desirable. Must be able to attain CISSP or similar within twelve (12) months of hire.
WORK SCHEDULE REQUIREMENTS: Normally works a weekday schedule, but may be required to work evenings, holidays or weekends. May be required to travel on short notice. May be required to work differentiated 8-hour work schedule between 8:00 am to 7:00 pm. On-call nights and weekends will be required for response to anomalous issues.
PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit and talk or hear. The employee is frequently required to use hands to finger, handle, or feel and reach with hands and arms. The employee is occasionally required to stand and walk. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, distance vision and color vision.
WORK ENVIRONMENT: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee will be subject to moderate outdoor weather conditions. The noise level in the work environment is usually quiet. In accordance with WFEC Administrative Procedure 805-Alcohol and Drug-Free Workplace this position is classified as "safety sensitive".
MUST MEET ALL PHYSICAL AND ENVIRONMENTAL REQUIREMENTS
WFEC IS AN EQUAL OPPORTUNITY PROVIDER AND EMPLOYER AND
TAKES AFFIRMATIVE ACTION WITH RESPECT TO INDIVIDUALS
WITH DISABILITIES AND PROTECTED VETERANS
$98.9k-155.1k yearly 11d ago
Network and Security Services Solutions Architect*
Accenture 4.7
Security architect job in Oklahoma City, OK
We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era.
You Are:
An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions.
You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant.
As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives.
You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery.
The Work:
You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models).
You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance.
Lead Pre‑Sales Architecture & Solutioning:
* Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies.
* Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access.
* Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans.
Qualify & Propose:
* Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience.
* Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial.
Client Engagements & Demonstrations:
* Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility.
* Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives.
Trusted Advisory & Best Practices:
* Advise customers on security best practices, emerging threats, network modernization, and resilience improvements.
* Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles.
Technology Mastery:
* Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation.
Compliance, Governance & Risk:
* Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.).
* Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility.
Cross‑Functional Handover & Delivery Readiness:
* Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation.
* Where appropriate, support early deal stabilization to de‑risk transition.
Thought Leadership:
* Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings.
* Support technical training, marketing presentations, and participation in industry events.
Travel may range from 0% to 100% depending on deal stage, client discussions, and business need
Qualification
Here's what you need:
* Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity
* Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture.
* Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls.
* Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes.
* Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required
Bonus Points if:
* You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA.
* You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native securityarchitectures; familiarity with automation/orchestration (Terraform, Ansible, Python).
* You have strong understanding of ITIL service operations and managed‑service delivery models.
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here.
Role Location Annual Salary Range
California $73,800 to $218,800
Cleveland $68,300 to $175,000
Colorado $73,800 to $189,000
District of Columbia $78,500 to $201,300
Illinois $68,300 to $189,000
Maryland $73,800 to $189,000
Massachusetts $73,800 to $201,300
Minnesota $73,800 to $189,000
New York/New Jersey $68,300 to $218,800
Washington $78,500 to $201,300
Locations
$78.5k-201.3k yearly 5d ago
Offensive Security Engineer, Assessments (Web3)
Coinbase 4.2
Security architect job in Oklahoma City, OK
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
$152.4k-179.3k yearly 60d+ ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security architect job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
**Responsibilities:**
+ **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance.
+ **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning.
+ **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications**
+ Experience with SailPoint IdentityIQ (IIQ) is a must
+ Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP)
+ Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses)
+ Solid understanding of the SailPoint object model, rules, and policies
+ Experience with both lifecycle manager (LCM) and compliance manager (CM) modules
+ Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required
+ Proven track record of successful IAM implementations including large scale enterprise deployments.
+ Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 59d ago
Security Solution Engineer - Email Security
Proofpoint 4.7
Security architect job in Oklahoma City, OK
**About Us:** Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people.
**How We Work:**
At Proofpoint you'll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values:
**Bold** in how we dream and innovate
**Responsive** to feedback, challenges and opportunities
**Accountable** for results and best in class outcomes
**Visionary** in future focused problem-solving
**Exceptional** in execution and impact
**POSITION SUMMARY**
The Security Solutions Engineer is an information security expert responsible for assessing and improving the security posture of customer environments.
The Security Solutions Engineer manages the technical aspects of customer systems and is primarily responsible for solution uptime, availability, policy development and problem troubleshooting. Security Solutions Engineers are also responsible for the technical development of various clients' security solutions such as: Proofpoint Protection Server, TAP, TRAP, and other Proofpoint products.
Platform Engineers serve as an escalation point and mentor for other members of the team. Platform Engineers also help develop internal process, procedure, and drive collaboration across business units to help streamline service delivery.
He or she must ensure that all tasks performed adhere to the firm's ISO 27001 Information Security Management System (ISMS). This includes participation in annual information and network security training and acceptance of spot checks on an ad hoc basis to guarantee that Proofpoint is constantly improving upon the organization's ISMS. Each member of our team must understand the importance of the ISMS and the corresponding handling of customer data.
**DUTIES & ESSENTIAL JOB FUNCTIONS:**
+ Serve as an escalation point for other engineers on the team
+ Optimize security policies to protect against emerging threats and adhere to industry best practices
+ Create and develop custom solutions for managed security systems
+ Maximize system uptime, availability, and performance
+ Utilize internal CRM for problem tracking and project development
+ Assist the team in meeting all customer SLAs
+ Unsurpassed attention to detail, analytical problem-solving skills, and ability to diagnose and troubleshoot technical issues
+ Maintain awareness of industry trends, security news, and best practices
+ Take on-call rotation after hours and on weekends, serving as a point of escalation as necessary
+ Provide flexibility with schedule to cover job requirements
+ Ability to quickly and efficiently resolve client issues while maintaining high levels of client satisfaction
+ Lead technical discussions with customers and partnering organizations
+ Research and analyze industry trends and security vulnerabilities, in order to effectively communicate to customers any risk to their
+ environments and implement solutions to mitigate the risk
+ Administer and support lab environment to include change request review and approval, maintenance, and design
**QUALIFICATIONS:**
+ Bachelor's Degree in Computer Science, Information Technology, or related discipline. Experience may be considered in lieu of a degree
+ Experience with Email Security
+ Corporate computer networking, technical support, system administration, Windows, Unix/Linux Operating System administration and/or
+ network security experience
+ Experience and proficiency in Proofpoint email security products, to include certification and training
+ Experience and proficiency designing and implementing Proofpoint solutions
+ High Level of critical thinking and proven ability to manage customer expectations high pressure situations
+ Proficiency in technical writing, diagraming, and communications.
+ Combine patience, determination, and persistence to troubleshoot client issues
+ Ability to work effectively with team members and clients
+ Desire to mentor junior engineers
+ Self-motivated, with ability to manage and follow up on multiple tasks simultaneously
+ Strong analytical capabilities, problem solving skills, providing solutions in a systematic and clear manner, and easily understood by
+ colleagues and customers
+ Strong time-management skills
**PREFERRED**
+ Experience with Proofpoint email security products - PoD/TAP/TRAP
+ Expert in information security or network security
+ SQL or Oracle database experience
+ Regular expression experience
+ Scripting knowledge of Perl, Python, Java, or Bash
+ Proofpoint product certifications
+ Industry certifications such as CISSP, Network+, Security+, etc.
+ Experience working in Managed Services.
\#LI-Remote
**Why Proofpoint?**
At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you'll love working with us:
+ Competitive compensation
+ Comprehensive benefits
+ Career success on your terms
+ Flexible work environment
+ Annual wellness and community outreach days
+ Always on recognition for your contributions
+ Global collaboration and networking opportunities
**Our Culture:**
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone.
We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com .
**How to Apply**
Interested? Submit your application along with any supporting information- we can't wait to hear from you!
Consistent with Proofpoint values and applicable law, we provide the following information to promote pay transparency and equity. Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets as set out below. Pay within these ranges varies and depends on job-related knowledge, skills, and experience. The actual offer will be based on the individual candidate. The range provided may represent a candidate range and may not reflect the full range for an individual tenured employee. This role may be eligible for variable compensation and/or equity. We offer a competitive benefits package, including flexible time off, a comprehensive well-being program with two paid Wellbeing Days and two paid Volunteer Days per year, plus a three-week Work from Anywhere option.
**Base Pay Ranges:**
SF Bay Area, New York City Metro Area:
Base Pay Range: 98,900.00 - 155,430.00 USD
California (excludes SF Bay Area), Colorado, Connecticut, Illinois, Washington DC Metro, Maryland, Massachusetts, New Jersey, Texas, Washington, Virginia, and Alaska:
Base Pay Range: 78,800.00 - 123,805.00 USD
All other cities and states excluding those listed above:
Base Pay Range: 70,400.00 - 110,605.00 USD
Proofpoint has been honored with six Best Places to Work Awards in 2024 by workplace culture leader Comparably, including Best Company Career Growth, Best Company Outlook, Best Global Culture, Best Engineering Teams, Best Sales Teams, and Best HR Teams.
We are the leader in human-centric cybersecurity. Half a million customers, including 87 of the Fortune 100, rely on Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people.
Our BRAVE Values:
At Proofpoint, we are BRAVE in everything we do, and our values aren't just words-they shape how we work, collaborate, and grow.
We seek people who are bold enough to challenge the status quo, responsive in the face of ever-evolving threats, and accountable for delivering real impact.
We value those with a visionary mindset who anticipate what's next and push cybersecurity forward, and we celebrate exceptional execution that ensures we continue to defend data and protect people.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
Find your network, your allies, and your biggest fans. We know that work is simply better when you're surrounded by people who inspire you-who share ideas, cheer you on, and genuinely want to see you succeed. That's why we offer social circles, sponsored networks, and connection points across teams and time zones-to help you find your people, build your community, and thrive together.
This isn't just a job-it's a mission to protect people and defend data in a world that never slows down. We're building the future of human-centric cybersecurity, and that future belongs to all of us. We take ownership, move fast, and hold ourselves accountable-because that's what it takes to stay ahead. And we do it together, winning as one.
Be empowered to reach your full potential through meaningful challenges and personalized support-designed around you and your goals. Whether you're growing as a leader or leveling up from great to exceptional as an individual contributor, we're here to help you get there.
Proofpoint is an equal opportunity employer, we hire without consideration to race, religion, creed, color, national origin, age, gender, sexual orientation, marital status, veteran status or disability.
$85k-110k yearly est. 6d ago
Senior PKI Security Engineer
Eliassen Group 4.7
Security architect job in Oklahoma City, OK
**Anywhere** **Type:** Contract **Category:** Security **Industry:** Financial Services **Workplace Type:** Remote **Reference ID:** JN -012026-105045 **Shortcut:** ********************************** + Description + Recommended Jobs
**Description:**
_Remote_
Our client is a large financial institution distinguished by its use of modern cloud technologies, mobile platforms, and agile delivery at enterprise scale. The organization promotes ownership, collaboration, and a balanced work environment while investing in continuous innovation. It seeks professionals who can navigate complex technology and business contexts and deliver secure, customer-centric solutions.
_We can facilitate w2 and corp-to-corp consultants. For our w2 consultants, we offer a great benefits package that includes Medical, Dental, and Vision benefits, 401k with company matching, and life insurance._
Rate: $55.00 to $65.00/hr. w2
**Responsibilities:**
+ Participate or lead complex or high severity troubleshooting and incident problem resolutions with infrastructure teams or vendors.
+ Analyze, design, and implement PKI, certificate, and security solutions.
+ Translate business needs into technology solutions for internal customers.
+ Lead or contribute to projects involving PKI, certificates, and security.
+ Monitor the PKI and certificate incident queue and resolve issues of all levels.
+ Create, review, approve, and implement changes to PKI and certificate environments.
+ Analyze current PKI and certificate environments to identify challenges and develop improvements.
+ Act as PKI and certificate lead on complex incidents, changes, or upgrades.
+ Represent the crypto services team on global incident management calls with technical teams, customers, or vendors.
+ Analyze data, identify trends, and facilitate root cause analysis with service improvement opportunities.
+ Participate in capacity planning, performance monitoring, and maintenance to ensure high availability and proactive improvement.
+ Apply DevOps principles within PKI operations and engineering.
+ Lead periodic disaster recovery exercises for PKI and certificates.
+ Participate in an off-hours on-call rotation.
+ Communicate technical issues and challenges to technical and non-technical audiences.
**Experience Requirements:**
+ At least 4 years of information technology experience.
+ At least 2 years of hands-on experience with PKI.
+ Experience with operational support and implementation of enterprise-level PKI and certificate solutions preferred.
+ Experience leading technical teams or projects preferred.
+ Strong understanding of DevOps principles preferred.
+ Python or other programming or scripting language experience preferred.
+ AWS Certification preferred.
+ 3+ years of PKI experience preferred.
+ Understanding of ITIL principles preferred.
**Education Requirements:**
+ High School Diploma, GED, or equivalent certification.
+ Bachelor's degree in Computer Science, Information Systems, or Engineering preferred.
+ AWS Certification.
+ ITIL-related knowledge or certification preferred.
**_Recruitment Transparency Notice_**
**_Eliassen Group values transparency in our recruitment practices. Please be advised that Eliassen Group utilizes artificial intelligence (AI) tools as part of its initial application screening process. You may receive email and SMS notifications from the Eliassen Virtual Recruiting Team (_** **_noreply@eliassen.com_** **_, ************* inviting you to complete a brief voice screening as part of your application process. These tools assist our hiring teams in different ways, including but not limited to, assistance in reviewing application materials to help identify candidates whose qualifications most closely match the requirements of the position. All AI-assisted evaluations and responses are reviewed by human recruiters before any hiring decisions are made. The use of AI in our process is intended to support fairness, efficiency, and consistency, and Eliassen Group takes measures to prevent bias or discrimination in connection with its hiring practices. By proceeding, you acknowledge, agree, and consent to Eliassen Group's use of these tools, including AI tools, as part of the application and hiring process._**
_Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range._
_W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality._
_Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact_ _********************_ _._
_About Eliassen Group:_
_Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate._
_Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status._
_Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!_
$55-65 hourly 3d ago
Cloud Security Engineer
Ford Motor Company 4.7
Security architect job in Oklahoma City, OK
We are the movers of the world and the makers of the future. We get up every day, roll up our sleeves and build a better world -- together. At Ford, we're all a part of something bigger than ourselves. Are you ready to change the way the world moves?
The Enterprise Cyber Security Cloud Security team is responsible for working with other security and cloud services teams to ensure alignment and collaboration in securing Ford's public cloud infrastructure. The teams work closely together to identify security gaps in the cloud environments and address them.
The Cloud Security team is responsible for identifying, evaluating, and recommending cloud security tools and functions to enhance security around Ford's public cloud. The team is also responsible for developing and managing the following Security Services in Ford's public cloud environments:
- Cloud Security Automation Development
- GCP/Azure Security Compliance
- GCP VPC Service Control
- GCP Cloud Armor/ Azure WAF
**What you'll do...**
+ Partner with other Cloud Security team members to identify and develop automation for security related workflows and audits (VPC SC, DLP, Exceptions, Org Policy, etc..).
+ Lead evaluation and develop an understanding of tools needed to address security gaps.
+ Lead/Collaborate with EPEO Services teams on security gap remediation.
**You'll have...**
+ Bachelor's degree in Computer Science, Information Technology or related OR a combination of education and experience
+ 5+ years of scripting and automation experience
+ Proven experience in developing and implementing automation using scripting languages such as
+ Python, PowerShell, or Go, particularly for API integrations, security tool orchestration, and custom audit scripts.
+ Solid understanding and practical experience with Git and GitHub for version control, collaborative development, and security automation pipeline management.
+ Familiarity with CI/CD pipelines and automated deployment tools (e.g., Jenkins, Azure DevOps, GitHub Actions) to integrate security automation into the software development lifecycle.
+ Knowledge of Infrastructure-as-Code (IaC) principles and tools like Terraform.
+ Strong knowledge of security best practices and guidelines (at the enterprise-level) related to GCP and Azure Cloud deployments as well as common web application frameworks
+ Understand the functionality and secure usage of various GCP services: VPCs, IAM, security groups, compute engine, cloud storage, Security Command Center, VPC Service Control, Cloud DLP and Cloud Armor
+ Customer focused and strong team orientation
+ Self-starter and fast-learner
+ Strong communication and interpersonal skills
+ Strong problem solving and Analytical/Reasoning skills
+ Strong drive for results and ability to work independently
+ Demonstrated commitment to quality and project timing
+ Familiarity with the agile project planning process and use of Rally.
+ Document processes & procedures and developing other documentation.
**Even better, you may have...**
+ Understand the functionality and secure usage of various Azure services: Virtual Machines, Virtual Networks, Azure Active Directory, App Services, Azure SQL Databases, Storage Accounts, Kubernetes, Containers, Key vaults.
You may not check every box, or your experience may look a little different from what we've outlined, but if you think you can bring value to Ford Motor Company, we encourage you to apply!
As an established global company, we offer the benefit of choice. You can choose what your Ford future will look like: will your story span the globe, or keep you close to home? Will your career be a deep dive into what you love, or a series of new teams and new skills? Will you be a leader, a changemaker, a technical expert, a culture builder...or all of the above? No matter what you choose, we offer a work life that works for you, including:
- Immediate medical, dental, vision and prescription drug coverage
- Flexible family care days, paid parental leave, new parent ramp-up programs, subsidized back-up child care and more
- Family building benefits including adoption and surrogacy expense reimbursement, fertility treatments, and more
- Vehicle discount program for employees and family members and management leases
- Tuition assistance
- Established and active employee resource groups
- Paid time off for individual and team community service
- A generous schedule of paid holidays, including the week between Christmas and New Year's Day
- Paid time off and the option to purchase additional vacation time.
For a detailed look at our benefits, click here:
*******************************
This position is a range of salary grades 7-8.
Visa sponsorship is not available for this position.
SOUTHEAST MI RESIDENTS: This role is posted as remote unless you reside within 50 miles of Dearborn, MI-in which case we request on-site presence up to 4 days a week.
Candidates for positions with Ford Motor Company must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
We are an Equal Opportunity Employer committed to a culturally diverse workforce. All qualified applicants will receive consideration for employment without regard to race, religion, color, age, sex, national origin, sexual orientation, gender identity, disability status or protected veteran status. In the United States, if you need a reasonable accommodation for the online application process due to a disability, please call **************.
\#LI-Remote
**Requisition ID** : 54783
$72k-100k yearly est. 5d ago
Security Engineer II
Trustmark 4.6
Security architect job in Oklahoma City, OK
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain securityarchitectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
$73k-94k yearly est. 60d+ ago
Product Security Engineer, Instagram
Meta 4.8
Security architect job in Oklahoma City, OK
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and SecurityArchitecture: Work directly with product managers and technical leads on threat models and securityarchitecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$184,000/year to $257,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
$184k-257k yearly 60d+ ago
Information Systems Security Officer - 201810
Delaware Nation Industries
Security architect job in Oklahoma City, OK
Delaware Nation Industries/Unami works with the Oklahoma City Air Logistics Complex (OC-ALC) located at Tinker AFB, OK to provide on-site cybersecurity support services to maintain an Authority to Operate (ATO) for all OC-ALC systems, applications, and networks using the NIST Risk Management Framework (RMF) per DoDI 8510.01, Risk Management Framework (RMF) for DoD Information and AFI 17-101, Risk Management Framework (RMF) for Air Force Information Technology.
An active security clearance is REQUIRED.
A Security+ Certification is REQUIRED.
This position is 100% onsite.
· Document and maintain controls, appendices, and document attachments under NIST SP 800-53 Rev. 4 & 5 for all DSS and IDM systems and sub-systems
· Document and maintain inheritable common controls catalog for to document controls offered to applications or systems hosted on multi-cloud platform
· Ensure common controls are available for all hosted systems to inherit and maintain
· Assist in the development and maintenance of System Security Plans (SSP) and security controls assessments, and organizational policy
· Update the SSP and server documentation and provide the ISSO to update security artifacts and the baseline documents
· Update POA&Ms throughout the POA&M lifecycle till closure for all system controls.
· Provides high-level functional systems analysis, design, integration, documentation, and implementation advice on moderately complex cybersecurity problems that require an appropriate level of knowledge of the subject matter for effective implementation
· Serves as the IT security POC for assigned systems to ensure information systems comply with applicable policies
· Ensures security activities are implemented throughout the entire SDLC, including during system changes and modifications
· Provides audit support by developing the appropriate responses to audit questionnaires and remediation recommendations of audit report findings.
· Coordinates with appropriate stakeholders and system owners to ensure all NIST 800-53 controls are properly implemented and assessed during the steps of the ATO lifecycle
· Ability to conduct an analysis of the NIST SP 800-53 rev. 5 controls and identify controls that can be automated
· Ensures all systems are operated, maintained, and disposed of IAW documented security policies and procedures, including but not limited to Assessment & Authorization (A&A).
· Supports the development and maintenance of all security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Testing, POA&Ms, and incident reports.
Requirements
At least 2+ years of related experience
Detailed knowledge of NIST SP 800-53 Rev. 4 & 5, Security Policies, NIST Risk Management Framework, eMASS, Security Planning and Architecture, Incident Analysis, and General Security Best Practices
Knowledge of NIST regulatory compliance requirements
Deep knowledge of the information security principles
Experience developing Information Security policies and procedures
Experience performing A&As and supporting the Risk Management Framework lifecycle
Ability to communicate, both written and orally, to both technical and non-technical stakeholders
Strong written and oral communication skills to interact with senior managers, junior staff, and business unit (non-technical) customer
Benefits
Benefits Include:
Covers 100% of employee benefit premiums, including Medical (PPO or HDHP Option), Vision, Dental
Matching 401K
Short- and Long-Term Disability
Pet Insurance
Professional Development/Education Reimbursement
Parking and Transit Benefits for NY, NJ, ATL, and DC Metro areas
Other Duties:
Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice.
$71k-97k yearly est. 29d ago
Network and Security Services Solutions Architect*
Accenture 4.7
Security architect job in Oklahoma City, OK
We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era.
You Are:
An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions.
You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant.
As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives.
You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery.
The Work:
You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models).
You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance.
Lead Pre‑Sales Architecture & Solutioning:
+ Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies.
+ Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access.
+ Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans.
Qualify & Propose:
+ Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience.
+ Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial.
Client Engagements & Demonstrations:
+ Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility.
+ Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives.
Trusted Advisory & Best Practices:
+ Advise customers on security best practices, emerging threats, network modernization, and resilience improvements.
+ Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles.
Technology Mastery:
+ Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation.
Compliance, Governance & Risk:
+ Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.).
+ Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility.
Cross‑Functional Handover & Delivery Readiness:
+ Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation.
+ Where appropriate, support early deal stabilization to de‑risk transition.
Thought Leadership:
+ Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings.
+ Support technical training, marketing presentations, and participation in industry events.
Travel may range from 0% to 100% depending on deal stage, client discussions, and business need
Here's what you need:
+ Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity
+ Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture.
+ Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls.
+ Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes.
+ Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required
Bonus Points if:
+ You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA.
+ You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native securityarchitectures; familiarity with automation/orchestration (Terraform, Ansible, Python).
+ You have strong understanding of ITIL service operations and managed‑service delivery models.
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here. (************************************************************
Role Location Annual Salary Range
California $73,800 to $218,800
Cleveland $68,300 to $175,000
Colorado $73,800 to $189,000
District of Columbia $78,500 to $201,300
Illinois $68,300 to $189,000
Maryland $73,800 to $189,000Massachusetts $73,800 to $201,300
Minnesota $73,800 to $189,000
New York/New Jersey $68,300 to $218,800
Washington $78,500 to $201,300
Requesting an Accommodation
Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you would like to be considered for employment opportunities with Accenture and have accommodation needs such as for a disability or religious observance, please call us toll free at **************** or send us an email or speak with your recruiter.
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities.
For details, view a copy of the Accenture Equal Opportunity Statement (********************************************************************************************************************************************
Accenture is an EEO and Affirmative Action Employer of Veterans/Individuals with Disabilities.
Accenture is committed to providing veteran employment opportunities to our service men and women.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. Further, at Accenture a criminal conviction history is not an absolute bar to employment.
The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information.
Please read Accenture's Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
$78.5k-201.3k yearly 5d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security architect job in Oklahoma City, OK
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
How much does a security architect earn in Oklahoma City, OK?
The average security architect in Oklahoma City, OK earns between $76,000 and $158,000 annually. This compares to the national average security architect range of $92,000 to $179,000.
Average security architect salary in Oklahoma City, OK
$110,000
What are the biggest employers of Security Architects in Oklahoma City, OK?
The biggest employers of Security Architects in Oklahoma City, OK are: