Sr. Information Security Engineer
Security architect job in Kansas City, MO
Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment.
Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed.
Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm.
Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves.
Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards.
Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment.
Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing.
Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level.
Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management.
Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process.
Independently and, as a team member, plans, executes and documents security tests and evaluation.
Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed.
Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects.
Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems.
Provides guidance to non-senior security staff on information security and any security related projects.
Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes.
Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives.
Required Technical Skillsets
Windows 2016+ Server Operating System Support and Configuration
• Azure Cloud Security Architecture and Implementation
Azure Blob Storage and Containers
• Certificate Authority and Key Management
• Cloud Intrusion Protection Systems / WAF
Cloud based DLP Systems
• Fluent ability to operate Security Information and Event Management solution
Additional Preferred Skillsets
Knowledge of CrowdStrike EDR, CrowdStrike SIEM
• Content Filtering via Web Gateway
• Malicious Site Analysis
• Apple (Mac) Security Enforcement
• Cloud Vulnerability and Penetration Testing
• Virus Protection, Endpoint Encryption
• Data Classification
AI Security
Detection & Response Security Engineer, Threat Intelligence
Security architect job in Topeka, KS
Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements.
**Required Skills:**
Detection & Response Security Engineer, Threat Intelligence Responsibilities:
1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects
2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work
3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services
4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions
5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network
6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences
7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations
8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems
**Minimum Qualifications:**
Minimum Qualifications:
9. 8+ years threat intelligence experience
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services
12. Experience developing and delivering information on threats, incidents and program status for leadership
13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures
14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework
15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks
16. Proven track record of managing and executing on short term and long term projects
17. Ability to work with a team spanning multiple locations/time zones
18. Ability to prioritize and execute tasks with minimal direction or oversight
19. Ability to think critically and qualify assessments with solid communications skills
20. Coding or scripting experience in one or more scripting languages such as Python or PHP
**Preferred Qualifications:**
Preferred Qualifications:
21. Experience recruiting, building, and leading technical teams, including performance management
22. Experience close collaborating with incident responders on incident investigations
23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
24. Familiarity with malware analysis or network traffic analysis
25. Familiarity with nation-state, sophisticated criminal, or supply chain threats
26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort
27. Experience in one or more query languages such as SQL
28. Experience authoring production code for threat intelligence tooling
29. Experience conducting large scale data analysis
30. Experience working across the broader security community
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Senior IT Security Analyst
Security architect job in Kansas City, MO
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyNetwork Security Architect
Security architect job in Overland Park, KS
+ High level of independent thinking and the ability to solve problems in a fast-paced environment + Ability to engage in deep system level problem determination and resolution + Must be able to work well within a technical team, as well as interface well with the outside business units Excellent organization skills, the ability to multi-task and prioritize various types of work and be able to meet/set deadlines for all assigned work
+ Excellent interpersonal and communication skills (both written and verbal), able to relate with users, service providers, and management
+ Ensures all solutions adhere to applicable change control requirements
+ Must be able to respond to, and work on, after hours issues related to all technologies/protocols/solutions
+ Self-motivated, proactive approach, able to work well independently in support of customer service level agreements
+ Occasional travel will be required. Must be able to travel without restriction, when required
+ Carries out duties in compliance with established business policies
+ Responsible for exhibiting professional behavior with both internal/external business associates that reflects positively on the company and is consistent with the company's policies and practices
+ Understands and is aware of the quality consequences which may result from the improper performance of their specific job. Has awareness of device defects that may occur in their area of responsibility, including product design, verification and validation, manufacturing and testing activities
Skills
Paloalto, Firewall, Network security, Security architecture, ISE, Firepower, IPSec
Top Skills Details
Paloalto, Firewall, Network security, Security architecture, ISE, Firepower, IPSec
Additional Skills & Qualifications
+ Network routing protocols (BGP/OSPF)
+ Cisco Data Center Networking
+ F5 Load Balancing
Experience Level
Expert Level
Job Type & Location
This is a Contract position based out of Overland Park, KS.
Pay and Benefits
The pay range for this position is $70.00 - $80.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following:
- Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a fully onsite position in Overland Park,KS.
Application Deadline
This position is anticipated to close on Dec 8, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Engineer, Information Security
Security architect job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplySenior Analyst, Security Compliance (SOX IT)
Security architect job in Topeka, KS
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Coinbase stores more digital currency than any company in the world, making us a top tier target on the internet. Security is core to our mission and has been a key competitive differentiator for us as we scale worldwide. Essential to scaling is building and running a security compliance program that reflects how we protect the data and assets in our care, to open the doors with customers, regulators, auditors, and other external stakeholders. If you love working with fast moving companies to grow and scale security compliance engines and create positive change across the business, we'd like to speak with you about joining our team. Coinbase is looking for a Security Compliance Senior Analyst to drive the second line of defense IT SOX initiatives and help mature the IT SOX program.
*What you'll be doing (ie. job duties):*
* Lead Security and IT initiatives to support the SOX roadmap and advance program maturity
* Assist with SOX planning activities, including scoping of IT systems and creating training material to owners in preparation for SOX audit
* Lead security control gap assessments over SOX control environment, recommend remediation plans and track through completion
* Assess SOX implications of new products, update relevant controls, and communicate requirements to product organization and other stakeholders
* Provide ongoing reporting to stakeholders and leadership on above responsibilities and communicate progress and escalations management
* Perform SOX audit and control impact analysis as a result of security and technology incidents and partner with owning teams on control uplift activities
* Build close relationships with stakeholder teams including Security, IT, Infrastructure, Engineering, Data, and Finance to advise on SOX requirements and ensure excellence in control ownership
* Create and improve SOX procedural documentation, including process documentation, data flow diagrams, and uplifting templates
* Work closely with internal and external auditors to educate them about a complex technology control environment
* Oversee quality of audit initiatives, identify and analyze process gaps, provide guidance and expertise to team members
* Develop creative solutions to prove risk mitigation and solve for complex audit problems faced by the crypto industry
* Identify opportunities to address systemic program challenges, recommend solutions and drive efficiency through AI and automation
*What we look for in you (ie. job requirements):*
* Minimum of 5+ years of security/IT compliance or equivalent experience
* Strong knowledge and hands-on experience in Internal Controls over Financial Reporting, SOX 404 frameworks, and testing to support compliance
* Prior experience at a big 4 accounting firm
* Experience leading compliance initiatives from start to finish
* Proven understanding and audit experience of cloud technologies, AWS preferred
* Ability to effectively and autonomously accomplish outcomes across cross-functional teams in ambiguous situations with minimal supervision
* Strong oral and written communication skills
* Ability to multitask, direct cross functional work, and hold others accountable to committed deadlines in a fast paced environment
* Ability to communicate with technical / non-technical stakeholders to align on shared outcomes
* Experience in Financial services, Big Tech, or FinTech
*Nice to haves:*
* BA or BS in a technical field or equivalent experience
* Security certifications e.g. CISA, CISSP, CISM or other relevant certifications
* Experience auditing in Crypto space
Position ID: P73675
\#LI-Remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$167,280-$196,800 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Engineer, Information Security and Risk
Security architect job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
IT Security Engineer
Security architect job in Shawnee, KS
Job Posting Important Recruitment Information for this vacancy Kansas Bureau of Investigation The Kansas Bureau of Investigation is the premier criminal investigative agency in the state of Kansas. The KBI is committed to its critical mission of preventing crime and enhancing public safety in Kansas. We employ individuals who exemplify the highest standards of integrity, service, and dedication. Come feel like you're part of something bigger at the KBI.
E-Verify: The Kansas Bureau of Investigation (KBI) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Kansas Bureau of Investigation
About the Position:
* Who can apply: Anyone (External)
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Work Schedule: M-F 8am-5pm
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* Search Keywords: KBI, Topeka, IT Security
Compensation:
* Hourly Pay Range: $43.87-$54.84
Note: Salary can vary depending upon education, experience, or qualifications.
Employment Benefits:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Fitness Centers in select locations
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
Visit the Employee Benefits page for more information…
Position Summary & Responsibilities:
Position Summary:
The KBI is accepting applications to fill an IT Security Engineer position. This position supports both the KBI and the Kansas Criminal Justice Information System (KCJIS). The IT Security Engineer plays a pivotal role in developing, implementing, and maintaining the organization's information security and networking systems. Collaborating closely with the IT Security Architect and other cross-functional teams, the ITSE ensures the confidentiality, integrity, and availability of KBI and KCJIS assets through the deployment and maintenance of security and network technologies. The regular work schedule for this position is Monday thru Friday - 8:00 AM to 5:00 PM. However, this position may be required to work hours outside of the regular working schedule and be on a rotational on-call schedule as necessary.
Job Responsibilities may include but are not limited to the following:
* Implement and maintain information security and networking solutions for the KBI and KCJIS.
* Assist in the implementation and maintenance of information security and networking standards, procedures, and guidelines.
* Collaborate with other departments and units to integrate security and network controls into systems and processes.
* Ensure compliance with applicable policies and governance requirements (ex. SoK ITEC, KCJIS).
* Monitor security controls, systems, and networks for potential security incidents and take appropriate action to respond to and mitigate threats. Analyze log files to identify possible threats to organizational information systems.
* Support the implementation and management of security and network technologies, including firewalls, intrusion detection/prevention systems, endpoint protection, encryption, logging, identity and access management solutions, switches, routers, and wireless networks.
* Stay current with emerging threats, vulnerabilities, security, and networking technologies through continuous learning.
* Contribute to the development and maintenance of security documentation and procedures.
* Provide technical support and guidance to internal and external stakeholders on security-related matters.
* Perform other duties as assigned.
Qualifications:
Minimum Qualifications
* Associate's or Bachelor's degree from an accredited college or university, (preferably in computer science, information security, or related field).
* A minimum 5 years of information security work experience and at least one industry advanced cybersecurity certification in good standing (e.g., CISSP or CISM).
* Relevant experience should include all of the following:
* At least 3 years of Check Point and/or Palo Alto firewall administration.
* Security log/event analysis and incident response (preferably Splunk).
* Systems security and administration of Windows and/or Linux server operating systems.
* Configuring, tuning, and managing security systems and controls, such as: VPNs, IDS/IPS, endpoint security, content filters, email security, vulnerability management systems, and mobile device management systems.
* Configuring, tuning, and managing network systems and controls, such as: routers, switches, and wireless LANs.
* Extensive computer, network, and security troubleshooting experience.
* Mastery of core security concepts.
* Strong communication, teamwork, leadership, and problem-solving skills.
* Ability to research, interpret, and understand advanced technical information.
* Basic understanding of project management concepts and principles.
Preferred Qualifications
* Additional industry standard certifications such as: Network+, Security+, SSCP, CCNA, CCNP, CCSA/CCSE/CCSM, or similar.
* Experience with cloud security (e.g., Azure or AWS).
* Experience with implementing or administering Microsoft 365.
* Experience with VMware virtual infrastructure (ESXi, vSphere/vCenter).
* Experience with federated authentication technologies, such as SAML and OAuth/OIDC.
* Experience with penetration testing.
Post-Offer, Pre-employment Requirements
* As a condition of employment, you will be subject to a pre-employment process to include a polygraph examination, fingerprint based records check, and comprehensive background investigation, including reference check of past and present employers. The pre-employment process will be waived for current KBI personnel who have previously completed the screening requirements
Recruiter Contact Information:
* Name: Luci Zieman
* Email: *************************
* Phone: ************
* Mailing Address: 1620 SW Tyler; Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* Tax Clearance Certificate, valid
* Transcripts
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Kansas Tax Clearance Certificate Required: Each applicant (even non-residents) applying for a State of Kansas job vacancy must obtain a valid Kansas Certificate of Tax Clearance by accessing the Kansas Department of Revenue's website. A Tax Clearance is a comprehensive tax account review to determine and ensure that an individual's account is compliant with all primary Kansas Tax Laws. A Tax Clearance expires every 90 days. All applicants, including current state employees, are responsible for submitting a valid certificate with all other application materials to the hiring agency. This is in accordance with Executive Order 2004-03. If you need assistance with the tax clearance, please contact ************.
Visit the Tax Clearance site for more information and where to obtain this Kansas Department of Revenue document.
Job Application Process
* Sign in to your existing account or Register for a new one to apply.
* Complete or review your contact information on the My Contact Information page.
* Upload documents listed in the Required Documents section of the job posting to the appropriate location.
* Check your email and My Job Notifications for written communications from the Recruiter.
* Email - sent to the preferred email listed on the My Contact Information page
* Notifications - view the Careers - My Job Notifications page
To assist in completing your application, please see helpful links below:
* Instructions:
* Job Search
* Registration & User Account
* Application
* Frequently Asked Questions
How to Claim Veterans Preference
* Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
Learn more about claiming Veteran's Preference
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference
PLEASE NOTE: The documentation verifying a person's eligibility for use of this preference should not be sent along with other application materials to the hiring agency but should be sent directly to OPS. These documents should be sent either by fax to *************, or scanned and emailed to *************************, or can be mailed/delivered in person to:
ATTN: Disability Hiring Preference Coordinator
Office of Personnel Services
Landon State Office Building
900 SW Jackson, Rm 401
Topeka, KS 66612
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the recruiter.
Security Engineer
Security architect job in Overland Park, KS
Job Description
Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply!
What You'll Do:
As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include:
Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services.
General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively.
Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments.
Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments.
Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives.
Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams.
Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends.
Who You Are:
Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats.
Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies.
Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to:
Google Cloud Security Command Center (SCC)
Google Security Operations
Google Threat Intelligence
Cloud Logging and Monitoring for security
Google Cloud Identity and Access Management (IAM)
Google Cloud Armor
Certifications: Possess one or more security certifications such as:
CompTIA Security+
(ISC)² SSCP or CISSP (Associate of (ISC)²)
Google Cloud Professional Cloud Security Engineer (highly preferred)
Other relevant cloud security certifications
Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences.
Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail.
Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
Security Engineer
Security architect job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyEngineer, Information Security
Security architect job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplySecurity Engineer - Data Protection
Security architect job in Kansas City, MO
Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure.
Key Responsibilities:
* Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal.
* Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery.
* Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications.
* Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration.
* Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls.
* Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails.
* Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response.
* Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership.
* Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform.
* Actively coach and mentor other security and technology team members on data protection best practices.
* Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
Senior Security Engineer
Security architect job in Kansas City, MO
Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years.
Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection.
Role Summary
The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn.
* Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
* Career Path: Security Architect
Key Role Responsibilities - Core
KEY ROLE RESPONSIBILITIES
SECURITY ENGINEER FAMILY - CORE
* Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices.
* Mentors team members on technical and security methodology characteristics.
* Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness.
* Acts as primary technical resource for design and implementation projects.
* Drafts and recommends operating procedures and changes to information security practices and solutions.
* Trains and engages operations and support personnel on security solutions.
* Advise on trends, threats, and emerging security risks, relevant to the organization.
* Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements.
* May be a subject matter expert for a variety of security related systems or applications.
* Communicates with operational groups for collaboration of security program management.
* Advocates secure culture and provides education throughout the appropriate client group.
* Improves maturity capability of processes, procedures, and operations of the security program.
* Communicates intelligence and program effectiveness reports to supervision.
Key Role Responsibilities - Additional Core
SENIOR SECURITY ENGINEER
In addition, this position will be responsible for the following:
* Designs and implements security solutions for various platforms
* Conducts comprehensive security assessments and audits to determine the effectiveness of security controls
* Assists operations as needed in incident response and contribute to post-incident analysis
* Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements
* Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level
* Implements and maintains access control system for any type of new enhancement opportunities
* Collaborates with development teams to ensure secure software development practices
* Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working
* Designs and implements robust security ensuring alignment with industry best practices and organization configurations
* Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration
* May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks
* Builds security automation scripts and tools to streamline security operations and improve efficiency
* Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle
* Plays an active role in contributing ideas for security innovations
* Assists in the design and execution of incident response as it pertains to security engineering
* Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program
* Implements security technologies with full understanding on accountability and ownership for full deployment
Knowledge, Skills & Abilities
*
* Ability to perform work accurately and completely, and in a timely manner
* Communication skills, verbal and written - Intermediate
* Ability to lead technical projects once assigned
* Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX
* Ability to solve technical issues - Advanced
* Demonstrated expert knowledge of information security practices
* Substantial knowledge of Python and Powershell scripting languages
* Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers
* Proficient with multiple cloud platforms
* Technical writing and documentation skills
* Organizational skills
* Ability to quickly and effectively solve complex problems
* Ability to deliver quality through attention to detail
* Ability to work in team and independently
* Ability to work a flexible schedule - might be on call in the evenings and weekends
* Ability to build relationships and collaborate within a team, internally and externally
Education
*
* Bachelor's degree in information security or related field (Preferred)
* In lieu of the above requirements, equivalent relevant experience will be considered
Experience
* 5+ Years information security experience (Preferred)
Working Environment
* Must be able to lift up to 25 pounds
* May require periods of overnight travel
* Normal office environment
* Frequent activity: Sitting, Viewing Computer Screen
* Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
Benefits Information
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details.
This role is expected to accept applications for at least three business days and may continue to be posted until a qualified applicant is selected or the position has been cancelled.
JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace.
JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to accommodations@jedunn.com
JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails.
Why People Work Here
At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them
Building on our rich history, our employee owners are shaping the future of JE Dunn. In our team-focused environment we do life together and are generously rewarded for our efforts
About JE Dunn
For more information on who we are, click here.
EEO NOTICES
Know Your Rights: Workplace Discrimination is Illegal
California Privacy Policy
E-Verify
JE Dunn participates in the Electronic Employment Eligibility Verification Program.
E-Verify Participation (English and Spanish)
Right to Work (English)
Right to Work (Spanish)
Security Engineer II
Security architect job in Topeka, KS
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Sr. Information Security Engineer
Security architect job in Kansas City, MO
Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment.
Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed.
Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm.
Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves.
Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards.
Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment.
Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing.
Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level.
Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management.
Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process.
Independently and, as a team member, plans, executes and documents security tests and evaluation.
Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed.
Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects.
Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems.
Provides guidance to non-senior security staff on information security and any security related projects.
Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes.
Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives.
Required Technical Skillsets
* Windows 2016+ Server Operating System Support and Configuration
* Azure Cloud Security Architecture and Implementation
* Azure Blob Storage and Containers
* Certificate Authority and Key Management
* Cloud Intrusion Protection Systems / WAF
* Cloud based DLP Systems
* Fluent ability to operate Security Information and Event Management solution
Additional Preferred Skillsets
* Knowledge of CrowdStrike EDR, CrowdStrike SIEM
* Content Filtering via Web Gateway
* Malicious Site Analysis
* Apple (Mac) Security Enforcement
* Cloud Vulnerability and Penetration Testing
* Virus Protection, Endpoint Encryption
* Data Classification
* AI Security
Bachelor's degree (B.A.) from four-year college or university; or four years information security and two years advanced information security experience and/or training with an emphasis on engineering functions; or eight years of combined information systems and information security experience; and/or equivalent combination of education and experience. Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and/or Certified Cloud Security Professional (CCSP) are strongly preferred. Must have advanced knowledge with PC and LAN servers, IT systems, and other Information Security related technologies. Has advanced technical skills in network servers, workstations, and applications.
Security Engineer
Security architect job in Topeka, KS
Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page.
**Required Skills:**
Security Engineer Responsibilities:
1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices.
2. Build machine attestation and secure certificate storage solutions to enable strong client trust.
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices.
4. Develop, validate, and enforce our client security policies.
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services.
6. Advise and collaborate with other teams.
7. Telecommuting from anywhere in the U.S. allowed.
**Minimum Qualifications:**
Minimum Qualifications:
8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation
9. Requires 12 months of experience involving the following:
10. PHP, Golang, Python, C/C++, Rush, or Ruby
11. Designing and deploying security infrastructure such as PKI, key management, and certificate management
12. Endpoint Security & Management
13. Certificate Lifecycle
14. Devices & OS hardening and security policies
15. Identity & Access Management (Authentication & Authorization, SSO)
16. Network Security and
17. Programming and Code Review
**Public Compensation:**
$178,041/year to $200,200/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Offensive Security Engineer, Assessments (Web3)
Security architect job in Topeka, KS
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services.
*What you'll be doing (ie. job duties):*
* Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure.
* Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities.
* Stay informed on emerging security trends, advisories, and academic research in the Web3 space.
* Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities.
* Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community.
* Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements.
* Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement.
* Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program.
* Mentor and train junior security engineers in Web3 bug bounty triage and analysis.
* Provide on-call support for critical Web3 bug bounty-related incidents.
* Document and report on Web3 bug bounty metrics and program effectiveness.
*What we look for in you (ie. job requirements):*
* Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field.
* 3+ years of experience in Web3 application security and penetration testing.
* Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components.
* Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms.
* Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25).
* Strong analytical skills to identify trends and patterns in vulnerabilities.
* Excellent communication skills for engaging with internal teams.
* Passion for security and a drive to improve Web3 security posture.
* Ability to work independently and take ownership of penetration testing initiatives.
* Energy and self-drive for continuous learning in the rapidly evolving crypto space.
* Excellence in clear, direct, and kind communication with technical and non-technical stakeholders.
* Experience building relationships with product, engineering, and security teams.
*Nice to haves:*
* Participation in CTFs, bug bounty programs, or open-source security research.
* Expertise in Application Security, Network Security, or Cloud Security.
* Relevant security certifications (e.g., OSCP, GPEN).
* Experience developing and implementing security tooling to support bug bounty triage and analysis.
* Experience with bug bounty programs and platforms, including triage, validation, and researcher communication.
* Strong analytical skills to identify trends and patterns in bug bounty submissions.
* Excellent communication skills to effectively engage with bug bounty researchers.
Position ID: P69494
\#LI-remote
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations***********************************
*Global Data Privacy Notice for Job Candidates and Applicants*
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required.
*AI Disclosure*
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
Engineer, Information Security and Risk
Security architect job in Topeka, KS
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Officer
Security architect job in Shawnee, KS
Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team!
Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position.
E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Office of Information Technology Services
About the Position:
* Who can apply: Anyone
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule.
Compensation:
* Annual Salary/Hourly Rate: $85,000 - 95,000/Annually
Note: Salary can vary depending upon education, experience, or qualifications.
Position Summary:
The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch.
Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF).
Key Responsibilities:
* Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53).
* Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure.
* Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs.
* Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others.
* Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects.
* Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans.
* Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices.
Required skills:
* Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53.
* Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences.
* Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders.
* Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment.
* Ability to assess regulatory requirements and determine whether existing controls meet those requirements.
* Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems.
Minimum Qualifications:
* Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security.
Preferred:
* One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year.
* Familiarity with government and public sector environments
* Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075.
Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment.
Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor).
Employment Benefits:
In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
* This benefits package represents additional annual compensation.
Visit the Employee Benefits page for more information…
Recruiter Contact Information:
* Name: Brenda Cripps
* Email: OITS_******************
* Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents."
Job Application Process
* First Sign in or register as a New User
* Complete or update your contact information on the:
* Careers> My Contact Information page
* NOTE: This information is included on all your job applications
* Upload required documents listed above for the Careers> My Job Applications page
* NOTE: This information is included on all your job applications
* Start your draft job application, upload other required documents, and submit when it is complete.
* Manage your draft and submitted applications on the Careers> My Job Applications page.
* Check your email and My Job Notifications for written communications from the Recruiter
* Email - sent to the Preferred email on the My Contact Information page
* Notifications - view the Careers> My Job Notifications page
Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions."
How to Claim Veterans Preference
Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference:
Disability Hiring Preference | Kansas Department of Administration (ks.gov)
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
Senior Security Engineer
Security architect job in Kansas City, MO
**Best People + Right Culture. These are the driving forces behind JE Dunn's success.** **By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years.**
**Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection.**
**Role Summary**
The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn.
+ Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
+ Career Path: Security Architect
**Key Role Responsibilities - Core**
KEY ROLE RESPONSIBILITIES
_SECURITY ENGINEER FAMILY - CORE_
+ Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices.
+ Mentors team members on technical and security methodology characteristics.
+ Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness.
+ Acts as primary technical resource for design and implementation projects.
+ Drafts and recommends operating procedures and changes to information security practices and solutions.
+ Trains and engages operations and support personnel on security solutions.
+ Advise on trends, threats, and emerging security risks, relevant to the organization.
+ Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements.
+ May be a subject matter expert for a variety of security related systems or applications.
+ Communicates with operational groups for collaboration of security program management.
+ Advocates secure culture and provides education throughout the appropriate client group.
+ Improves maturity capability of processes, procedures, and operations of the security program.
+ Communicates intelligence and program effectiveness reports to supervision.
**Key Role Responsibilities - Additional Core**
_SENIOR SECURITY ENGINEER_
In addition, this position will be responsible for the following:
+ Designs and implements security solutions for various platforms
+ Conducts comprehensive security assessments and audits to determine the effectiveness of security controls
+ Assists operations as needed in incident response and contribute to post-incident analysis
+ Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements
+ Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level
+ Implements and maintains access control system for any type of new enhancement opportunities
+ Collaborates with development teams to ensure secure software development practices
+ Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working
+ Designs and implements robust security ensuring alignment with industry best practices and organization configurations
+ Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration
+ May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks
+ Builds security automation scripts and tools to streamline security operations and improve efficiency
+ Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle
+ Plays an active role in contributing ideas for security innovations
+ Assists in the design and execution of incident response as it pertains to security engineering
+ Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program
+ Implements security technologies with full understanding on accountability and ownership for full deployment
**Knowledge, Skills & Abilities**
+ Ability to perform work accurately and completely, and in a timely manner
+ Communication skills, verbal and written - Intermediate
+ Ability to lead technical projects once assigned
+ Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX
+ Ability to solve technical issues - Advanced
+ Demonstrated expert knowledge of information security practices
+ Substantial knowledge of Python and Powershell scripting languages
+ Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers
+ Proficient with multiple cloud platforms
+ Technical writing and documentation skills
+ Organizational skills
+ Ability to quickly and effectively solve complex problems
+ Ability to deliver quality through attention to detail
+ Ability to work in team and independently
+ Ability to work a flexible schedule - might be on call in the evenings and weekends
+ Ability to build relationships and collaborate within a team, internally and externally
**Education**
+ Bachelor's degree in information security or related field (Preferred)
+ In lieu of the above requirements, equivalent relevant experience will be considered
**Experience**
+ 5+ Years information security experience (Preferred)
**Working Environment**
+ Must be able to lift up to 25 pounds
+ May require periods of overnight travel
+ Normal office environment
+ Frequent activity: Sitting, Viewing Computer Screen
+ Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
**Benefits Information**
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details. (************************************************************************************
This role is expected to accept applications for at least three business days and may continue to be posted until a qualified applicant is selected or the position has been cancelled.
_JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace._
**_JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to_** **_accommodations@jedunn.com_**
_JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails._
**Why People Work Here**
At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them
**Building on our rich history,** our employee **owners are shaping the future** of JE Dunn. In our team-focused environment **we do life together** and are generously **rewarded for our efforts**
**About JE Dunn**
For more information on who we are, clickhere. (***********************************
**EEO NOTICES**
Know Your Rights: Workplace Discrimination is Illegal (***********************************************************************************************
California Privacy Policy
**E-Verify**
JE Dunn participates in the Electronic Employment Eligibility Verification Program.
E-Verify Participation (English and Spanish) (********************************************************************************************
Right to Work (English)
Right to Work (Spanish) (*****************************************************************************************************************************
**Nearest Major Market:** Kansas City