Post job

Security architect jobs in Rogers, AR

- 518 jobs
All
Security Architect
Security Engineer
Information Security Manager
Information Security Director
Information Systems Security Officer
Senior Security Architect
SAP Security Consultant
Information Security Engineer
Senior Security Engineer
Architect
Cyber Security Analyst
Cyber Security Engineer
Information Security Officer
Senior Security Analyst
  • SAP Security Administrator

    Inceed 4.1company rating

    Security architect job in Oklahoma City, OK

    SAP Security Administrator Compensation: $130,000 - $160,000 annually, depending on experience Inceed has partnered with a great company to help find a skilled SAP Security Administrator to join their team! Join an innovative environment where you will play a critical role in managing and supporting SAP Roles and Security within a dynamic SAP landscape. This is an exciting opportunity to contribute to the design, development, and implementation of SAP Role Administration functions. If you are passionate about SAP security and thrive in a collaborative setting, this role is for you! Key Responsibilities & Duties: Design and maintain security solutions for identity and access management Analyze processes to deliver quality solutions meeting business requirements Drive security strategy for S4Hana ecosystem Identify and mitigate security risks and violations Ensure SAP security aligns with standards and methodologies Provide technical support and resolve security issues Collaborate with IT management for user/system access controls Generate SOX and adhoc reports regularly Maintain Segregation of Duties for SAP environment Conduct vulnerability assessments and penetration tests Required Qualifications & Experience: Bachelor's Degree in Business Management, Information Systems, or related field 4+ years experience in SAP GRC, Role Administration & Security Experience with SAP S/4 HANA security and authorizations In-depth understanding of SAP Security Role design & GRC Architecture Expertise in SAP Security automation and scripts creation Nice to Have Skills & Experience: Experience with cloud applications and Azure SAP GRC Certification Oil and Gas industry experience Experience with SAP GRC Access Control configuration Strong knowledge in provisioning to SAP LDAP and SAP Enterprise Portal Perks & Benefits: Comprehensive and competitive benefits package-details shared during later stages If you are interested in learning more about the SAP Security Administrator opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.
    $130k-160k yearly 1d ago
  • Senior Cloud Security Engineer

    Pyramid Consulting, Inc. 4.1company rating

    Security architect job in Missouri

    Immediate need for a talented Senior Cloud Security Engineer . This is a 04 months contract opportunity with long-term potential and is located in Elkhorn,NE(Remote). Please review the job description below and contact me ASAP if you are interested. Job ID:25-94911 Pay Range: $90 - $91.19/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location). Key Responsibilities: Deploy and configure container scanning tools to ensure secure containerized environments. Analyze vulnerabilities identified through SAST, DAST, SCA, and container scans, prioritizing remediation based on risk. Develop and maintain custom scripts to automate security processes and enhance scanning capabilities. Consult with development teams to provide secure coding guidance and assist with remediation strategies. Onboard applications into DAST scanning workflows, ensuring proper configuration and coverage. Configure and troubleshoot DAST scans, resolving issues related to application accessibility and scan accuracy. Review and validate SAST and SCA findings, confirming or rejecting false positives and “mitigated by design” claims from development teams. Document findings, create actionable reports, and communicate technical details effectively to stakeholders. Key Requirements and Technology Experience: Key Skills; Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk). Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security). Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration. Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10). Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk). Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security). Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration. Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10). Ability to troubleshoot complex scanning issues and optimize configurations for accuracy and performance. Strong analytical skills for vulnerability triage and risk prioritization. Excellent communication skills for consulting with development teams and explaining technical findings. Experience integrating security tools into CI/CD pipelines. Familiarity with cloud-native security (AWS, Azure, GCP) and container orchestration (Kubernetes). Knowledge of API security testing and microservices architecture. Exposure to DevSecOps practices and security automation frameworks. Relevant certifications such as OSWE, GWAPT, or CSSLP. Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration. Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
    $90-91.2 hourly 2d ago
  • Information Security Engineer

    Akkodis

    Security architect job in Overland Park, KS

    Akkodis is seeking an Information Security Engineer for a Contract with a client located in Overland Park, KS (Remote). Pay Range: $60/hr - $70/hr, The rate may be negotiable based on experience, education, geographic location, and other factors Must come from the Financial industry, has experience implementing SIEM, SASE/SSE, EDR/MDR, etc, has AWS or Azure as a cloud, CIS, NIST, ISO 27001, Okta or IAM, and SentinelOne experience is preferred. Job Description: We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture, you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Cloud Platform Focus: The client operates in a hybrid environment, primarily in Azure, with some AWS and on-prem infrastructure. Core Security Tooling: SentinelOne experience is preferred, but candidates with experience using other tools are strongly considered as long as they have solid, overarching experience across SIEM, EDR, and vulnerability management platforms. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security is built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. If you are interested in this role, then please click APPLY NOW . For other opportunities available at Akkodis , or any questions, please contact Anirudh Srivastava at ************ or ***********************************. Equal Opportunity Employer/Veterans/Disabled Benefit offerings include medical, dental, vision, term life insurance, short-term disability insurance, additional voluntary benefits, commuter benefits, and a 401K plan. Our program provides employees the flexibility to choose the type of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria. Disclaimer: These benefit offerings do not apply to client-recruited jobs and jobs that are direct hires to a client. To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit ******************************************
    $60 hourly 1d ago
  • Security Engineer - Threat & Vulnerability

    Ztek Consulting 4.3company rating

    Security architect job in Saint Louis, MO

    We are seeking a Security Engineer II to support threat and vulnerability management across on-premises and cloud environments. This role focuses on identifying security risks, assessing vulnerabilities, ensuring secure configurations, and driving remediation efforts to improve overall security posture. Key Responsibilities: Identify, assess, and remediate vulnerabilities across on-prem and cloud environments (AWS/Azure/GCP) Monitor and analyze threat intelligence using frameworks such as MITRE ATT&CK, OWASP, and CVSS Utilize vulnerability and cloud security tools (Tenable, Qualys, Rapid7, Prisma Cloud, Defender for Cloud, Wiz) Perform secure configuration audits using CIS Benchmarks, NIST, and STIGs Collaborate with IT, Cloud, and DevOps teams to implement remediation Automate security processes using scripting (Python, PowerShell, Bash) Track remediation progress and communicate risks to technical and non-technical stakeholders Required Skills & Experience: 4+ years of experience in Cybersecurity or IT with exposure to vulnerability or cloud security Hands-on experience with vulnerability management tools Strong understanding of security controls, risk management, and compliance Experience with scripting/automation and API integrations Familiarity with SIEM, logging, monitoring, and ticketing systems
    $75k-102k yearly est. 2d ago
  • Cyber Security Analyst

    Wildfire Talent Solutions

    Security architect job in Tulsa, OK

    The Mid-Level Cyber Analyst plays a key role in securing enterprise systems through proactive monitoring, advanced threat analysis, and incident response. The role involves collaboration with IT, engineering, and compliance teams to improve the organization's overall security posture. Key Responsibilities Lead analysis of complex security incidents and drive incident response efforts. Develop detection rules, tuning SIEM use cases, and creating actionable alerts. Conduct vulnerability assessments and partner with infrastructure teams for remediation. Support endpoint detection and response (EDR) and network intrusion detection (NIDS/NIPS) tuning. Perform threat hunting and forensic analysis to identify indicators of compromise (IoCs). Assist in designing and implementing security controls for new technologies or projects. Mentor junior analysts and support continuous process improvement in SOC operations. Qualifications Bachelor's degree in Cybersecurity, Computer Science, or related discipline. Must be a US Citizen or Permanent resident 3-5 years of experience in security operations, incident response, or network defense. Expertise with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and vulnerability management platforms. Knowledge of MITRE ATT&CK framework and common attack vectors. Certifications such as CompTIA CySA+, CEH, GCIH, or CISSP (in progress) preferred. Strong analytical, scripting (Python, PowerShell), and communication skills.
    $65k-88k yearly est. 2d ago
  • SAP CPI Architect

    Globalsource It 4.0company rating

    Security architect job in Saint Louis, MO

    SAP Integration Architect Full-time | Remote USC or Green Card Holder ONLY NO C2C Our client, a market-leading provider of engineered connection solutions, is seeking a hands-on SAP Integration Architect to design, build, and operate integrations on SAP Integration Suite and CPI. About three quarters of the role is true implementation work - creating iFlows, implementing modern EDI, and hardening security and monitoring. The balance involves coordinating delivery with external vendors and partnering with internal stakeholders to align scope, standards, and timelines. This role requires a strong communicator and technical leader who thrives on collaboration and clarity. The ideal candidate is not a people manager, but a leader of activities and discussions - someone who can drive technical design sessions, confidently make recommendations and changes, and effectively bridge communication between business, functional, and technical teams. You will help shape integration architecture decisions, influence standards, and ensure delivery aligns with both IT strategy and business outcomes. Responsibilities • Design, develop, and maintain CPI iFlows connecting SAP and non-SAP applications across cloud and on-prem environments. • Deliver B2B and EDI integrations end to end, including mapping, trading partner setup, error handling, monitoring, and run-book documentation. • Lead technical discussions with developers, architects, and functional teams to ensure consistent understanding of design and delivery expectations. • Act as the communication bridge between business, functional, and technical teams, translating business needs into actionable integration solutions. • Participate in solution design sessions, guiding decision-making around integration architecture, data flows, and interface security. • Confidently propose, validate, and implement technical changes in CPI and related platforms. • Build secure, resilient interfaces using OData, REST, SOAP, IDoc, SFTP, and HTTP with proper credential, certificate, and key management. • Apply Groovy scripting for message transformations, custom adapters, dynamic routing, and exception handling. • Define integration architecture, patterns, and coding standards; establish CI/CD, quality gates, and observability for interfaces. • Troubleshoot and tune integrations in production, perform root-cause analysis, and close the loop with corrective actions. • Collaborate with product owners, functional leads, and external vendors to translate requirements into technical designs and delivery plans. • Create and maintain technical specifications, sequence diagrams, iFlow inventories, and support documentation. • Champion security and compliance across integrations and support audits with evidence and traceability. • Work with internal and external stakeholders to enhance EDI connectivity, ensuring reliability, scalability, and compliance with partner and industry standards. Qualifications • Ten or more years in enterprise integrations with at least four to five years of recent, hands-on work in SAP Integration Suite and CPI delivering iFlows at scale. • Proven delivery of EDI transactions such as 850, 855, 856, 860, and 810 on CPI, including mapping, validation, retries, and alerts; experience with EDIFACT and X12. • Strong Groovy scripting skills applied within CPI for mappings, lookups, and custom logic. • Experience leading integration workshops and technical discussions with cross-functional teams. • Ability to confidently make and communicate technical decisions, including proposing alternative solutions when challenges arise. • SuccessFactors integration experience across EC, ECP, and related HR processes; familiarity with other SAP SaaS products is helpful. • Proficiency with IDoc processing and troubleshooting, SAP API Management, XML and XSLT, and core protocols including REST, SOAP, OData, SFTP, and HTTP. • Working knowledge of security artifacts, keystores, certificates, SSH keys, and payload encryption and decryption. • Experience integrating with S/4HANA; comfort working in landscapes that include Ariba, DMC, or other manufacturing-centric systems. • Excellent written and verbal communication skills with the ability to present to both technical and non-technical stakeholders. • Clear communicator who can engage engineers and executives, influence standards, and present tradeoffs and delivery plans. Preferred Experience • CPI certification or prior work in PI/PO, Dell Boomi, MuleSoft, or similar iPaaS. • Manufacturing industry exposure with B2B and EDI at scale. • Monitoring and observability using SAP tools and complementary platforms, plus basic CI/CD for transport and version control. • Experience mentoring or guiding technical peers and facilitating integration design reviews.
    $84k-132k yearly est. 3d ago
  • Cyber Security Operations Engineer

    Oaktree Staffing

    Security architect job in Tulsa, OK

    The CSOC Operations Engineer III position is a technical leader responsible for the tactical execution of incident response, threat detection and continuous improvement of solutions which defend and protect our computer systems, information, and networks from intentional or unintentional access, modification, or destruction. This position is responsible for technical leadership in the design, planning, documenting and support of projects and cyber security solutions for the company. This position needs to intently focus on prioritization and always seek the improvement of processes and tools, providing recommendations to engineering and architecture teams. A successful CSOC Operations Engineer III will have a multidisciplinary background beyond cyber security, with advanced knowledge in fields such as client and server systems, networking, and application development. This position will also be responsible for ensuring systems and processes follow regulatory requirements, such as PCI-DSS, HIPAA and SOX. This position is responsible for the mentorship of other IT staff and performs third level support for incidents and issues. Major functions for this position Cyber Security Incident Response - 15% of total job Lead Cyber Security Incident Response as an incident owner, direct incident response activities, provide real-time decision making and communicate with the incident commander. Function as a threat hunter, working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests and reviewing vulnerability assessments. Continuously develop and improve security technologies, focusing on the development of automation and orchestration capabilities as it relates to incident response. Coordinate documentation of activities during an incident and provide status updates to the incident commander during the life cycle of the incident. Participate in post-mortem collections and after-action reviews to identify and remediate gaps in processes and technologies. Participate in regular table-top sessions with the CSIRT and E-CSIRT teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Cyber Security Infrastructure Operations - 60% of total job Serve as an escalation point for all cyber security infrastructure operational issues during business hours and on-call for junior members of the team. Provide third tier support and subject matter expertise for all cyber security technologies and solutions. Work with the CSOC Principal and Manager to provide the team with tactical direction of operational technology capabilities focused on continuous improvement. Guide Security Engineering with necessary support as needed during IT projects with Cyber Security needs. Ensure project transitions meet CSOC operational standards for needed functionality, prevention, monitoring, detection, and response. Cyber Security Threat Operations - 15% of total job Perform third tier analysis of exploits such as malware, network intrusions, and unauthorized use to help determine attack-surface, patient zero, and possible pivot-points for escalation. Provide technical leadership to the team and guidance in investigating escalated notable/suspicious events and the latest investigation techniques, containment and mitigation methods, evidence handling standards, threat intelligence, playbook development and case documentation best practices. Participate in the Cyber Security Risk Scoring process to include scoring risks, providing remediation or compensating control guidance and risk remediation/mitigation validation. Stay current on monitoring, detection, prevention, analysis, and investigation techniques/tools and adversary techniques, to implement recommendations for improving cyber security event processes, procedures and tooling. Participate in regular technical table-top sessions with the cyber security teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Technical Leadership - 10% of total job Provide leadership and mentoring to IT staff in the following manner. Coordinate or lead necessary training to develop staff. Ensure that appropriate technology is implemented in the appropriate manner. Provide timely and effective communication of changes to processes and technologies. Maintain technical competence and relevance on existing and emerging cyber security, infrastructure, and automation technologies. Conceive, define, develop, and deploy tools/processes which help automate our cyber security technologies to produce higher business value. Help develop cyber security awareness content and provide education on security policies and practices both internal and external to the group. Routinely evaluate documentation provided by Security Engineering staff to ensure complete coverage of required diagrams, support articles, and other necessary documentation. Position Specifications: The required specifications (education, experience, and skills) are those that the employee must have to hold the position. Applicants applying for this position must possess the required specifications in order to be considered for the job. The desired specifications are those that are not required for the employee to hold the position, but the employee should try to obtain the desired education, experience, and/or skills to be effective and successful in the position. Required education: Bachelors in relevant field or the equivalent combination of education and experience. Desired education: Bachelor's degree in Cyber Security or a degree in a technology related field. Multiple industry certifications in Security, Systems Administration, and/or Networking, such as CISSP, GDSA, CCNP Security, or PCNSE. Required experience: Minimum of 8 years of progressive experience with cyber security technology design, administration or incident response in large, complex environments, particularly in multi-region retail. Advanced expertise in cryptography, network defense, endpoint protection, forensics, data protection, and incident response. Advanced understanding of data center technologies and concepts including services, security, infrastructure design, disaster recovery practices. Advanced level troubleshooting of IT systems. In depth knowledge of compliance standards such as HIPAA, PCI, and SOX. Experience mentoring, training, and developing other IT staff. Desired experience: Advanced experience in all aspects of cyber security technologies and knowledge in supporting and building large, complex cyber security environments. Experience planning and implementing a technical backlog to drive continuous improvement of technology and practices. Required skills: Advanced knowledge of multiple cyber security technologies, including next generation firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, data protection, credential vaulting, certificate management, Multi-Factor, access brokering, SIEM, public cloud compliance and Cybersecurity automation and orchestration technologies. Advanced experience in planning and tracking the execution of large and complex projects or other efforts. Experience in scripting or software development. The ability to communicate effectively to both business and IT staff in a professional manner. Desired skills: Working experience with Active Directory and Microsoft and/or Linux OS, networking, identity and access management, wireless networking and security, penetration testing, incident response, and application security methodologies. Understanding of encryption systems and methodology. Advanced experience in software development or secure coding techniques. This position will require shift work that could include weekends and nights as dictated by support needs. On call 24/7. Must have knowledge of many areas and be able to switch between them rapidly. Must be able to work under pressure and provide guidance to Information Technology and business users during a crisis. This position will require ability to maintain absolute confidentiality of information or events due to the sensitivity of their natures.
    $73k-99k yearly est. 4d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security architect job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
    $118k-154k yearly est. 23h ago
  • Google Cloud Security Architect

    Slalom 4.6company rating

    Security architect job in Kansas City, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. Join the Slalom Cloud Team -a team of trailblazers ensuring we achieve our strategic goals through innovation and investment in the future. You'll collaborate with local market teams, niche experts, and global partners to drive cloud solution sales and empower clients on their cloud transformation journey. As a key member of Slalom's Google Cloud Center of Excellence, you'll leverage our award-winning partnerships and multidisciplinary teams to deliver business value and technical excellence for high-impact security and infrastructure solutions. What You'll Do * Stay current with security trends, technologies, and best practices around Google Cloud solutions, leveraging tools like Cloud IAM, Cloud Security Command Center, BeyondCorp, and Cloud Armor. * Define and guide transformational security strategies for Google Cloud environments, ensuring alignment with Google's Zero Trust and BeyondCorp principles. * Translate complex regulatory requirements (e.g., GDPR, SOC 2, HIPAA) and technology standards into actionable functional and technical requirements for cloud and hybrid environments, ensuring security and compliance. * Lead teams through various phases of gap analyses, including security assessments, remediation planning, roadmap development, and implementation of remediation actions using Google Cloud-native tools. * Deliver on the vision, architecture, execution, and quality assurance of security projects on Google Cloud, driving initiatives that secure enterprise workloads and data. * Guide stakeholders and senior leaders on aligning security solutions with broader business goals, ensuring the architecture follows Google Cloud's security best practices and roadmap. * Establish security architecture patterns based on Google Cloud security frameworks and industry standards to meet the unique needs of enterprise clients. * Collaborate with other Google Cloud architects and security teams to continuously improve security knowledge assets and best practices, ensuring the most effective security solutions for clients. * Design and architect solutions to secure Generative AI models and applications against adversarial attacks, prompt injection, and their potential misuse for malicious cyber activities. What You'll Bring * Proven experience with Google Cloud security architecture, with hands-on experience in tools like Cloud IAM, VPC Service Controls, Cloud DLP, and Cloud Armor. * Strong background in defining and implementing Zero Trust and BeyondCorp security models within Google Cloud environments. * Familiarity or direct experience with Identity and Access Management (IAM), Data Protection, Vulnerability Management, and Cloud Security solutions in Google Cloud. * Extensive experience with security design patterns specific to Google Cloud, as well as hybrid and multi-cloud security architecture. * Experience in security and risk advisory consulting, particularly related to cloud security transformations. * Ability to lead the development and implementation of cloud security roadmaps aligned with business goals and compliance needs. * Familiarity with Google Cloud's Artificial Intelligence (AI) capabilities (e.g., Vertex AI, Generative AI services, Model Armor) including their applications, associated security risks (e.g., prompt injection, data poisoning, privacy concerns), and proven strategies for implementing security controls, governance, and responsible AI practices. * Relevant certifications are strongly desired but not required, including (but not limited to): * GCP Professional Security Engineer * GCP Professional Cloud Architect * CISSP * Security+ About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. Slalom is committed to fair and equitable compensation practices. For this role, we are targeting the following levels and salary ranges: East Bay, San Francisco, Silicon Valley: * Senior Consultant: $131,000-$196,500 San Diego, Los Angeles, Orange County, Seattle, Houston, New Jersey, New York City, Westchester, Boston, Washington DC: * Senior Consultant: $120,000-$180,000 All other locations: * Senior Consultant: $110,000-$165,000 In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
    $131k-196.5k yearly 3d ago
  • Senior Security Architect - Oklahoma

    Cyberone Security

    Security architect job in Oklahoma City, OK

    CyberOne is hiring! We hire smart, talented and high-performing professionals to push our organization forward and provide superior service to our customers. We each take accountability for our work, strive to make each other better, and genuinely love what we do. If you value learning new things, being innovative, and working in a supportive, collaborative environment, CyberOne may be the place for you. If you are ready to raise the bar for your career and be part of our exciting journey, we would like to hear from you! The Presales Senior Security Architect partners closely with Account Managers, Professional Services, and partner resources to design and deliver tailored cybersecurity solutions that address customer needs. Acting as a trusted advisor, this role combines deep technical expertise with strong communication skills to build confidence and drive successful outcomes. The Senior Security Architect will primarily support customers in the Oklahoma region, while providing additional support to other regions as needed. This position requires the candidate to reside in Oklahoma in order to effectively serve the assigned region.Essential Functions Build strong customer relationships and serve as a trusted technical advisor, helping them achieve their business and security goals. Work in close partnership with Account Managers, Professional Services, and vendor partners. Continuously expand and update knowledge of cybersecurity use cases, leading partner technologies, and CyberOne's Professional Services offerings to align with customer needs. Maintain a strong understanding of the broader cybersecurity ecosystem with deep knowledge of key verticals (e.g., network, cloud, OT, application security). Provide training and knowledge sharing to sales teams on vendor products, cybersecurity trends, and market insights. Perform assessments and consulting services to help customers identify risks within their environments. Lead strategic conversations with enterprise customers on industry trends and emerging technologies. Act as the customer's advocate for technical issues, ensuring timely follow-up and resolution. Travel as needed to participate in customer meetings, workshops, and strategic discussions. Education/Experience 7+ years of experience designing and implementing security solutions in large environments. Experience leading and recommending technology selection processes within or for enterprise organizations. Proven experience as a senior or lead technical resource/architect (cybersecurity, network, cloud, etc.) within a large organization, reseller, or systems integrator. Effectively lead and support customer demonstrations with Systems Engineers to highlight CyberOne's value proposition. Certification/License Requirements Industry-recognized certifications (e.g., CISSP, CCSP, SANS, Open CA) preferred. Vendor/technology certifications (e.g., AWS, Palo Alto Networks, Tenable) preferred. Core Skills/Abilities Excellent relationship-building skills with the ability to engage clients confidently in person and virtually. Strong organizational skills with the ability to manage multiple priorities in a fast-paced environment. Strong presentation, written, and oral communication skills across all organizational levels, from senior leadership to peers and team members. Proficiency with standard office equipment such as laptops and smartphones. Work Environment Ability to travel up to 50% within the Oklahoma territory and occasionally to the Plano, TX headquarters. Ability to navigate client environments, including walking, stairs, and carrying light materials (up to 25 lbs). Prolonged periods of sitting or standing while working remotely or attending meetings. Operates a laptop and standard office equipment for prolonged periods. Participates in virtual meetings and occasional in-person training or company events. Strong verbal, visual, and auditory capabilities to effectively present, communicate, and engage with clients and internal teams. If you are passionate, driven and ready to take your career to the next level, we invite you to apply today! CyberOne is a proud Equal Opportunity and Affirmative Action Employer. All qualified applicants, regardless of race, color, genetic information, national origin, religion or belief, sex, affectional or sexual orientation, gender identity or expression, immigration status, ancestry, age, marital status, disability, or protected veteran status, are encouraged to apply and will receive equal consideration based on merit, qualifications, and business need. Recruitment Agencies Please Note: "In accordance with our recruitment policy, CyberOne strictly prohibits any form of solicitation of our employees by external agencies or third parties. Any candidate information that may be received from such agencies or third parties shall be deemed as a voluntary gift and shall become the exclusive property of CyberOne. Exceptions to this policy apply only when an Agency/Third Party is an Authorized Vendor of CyberOne, holding a valid and current contract that has been duly signed by our People Services Manager or CFO of CyberOne. Under no circumstances will any payment be made to any Agency/Third Party unless they are an Authorized Vendor or possess written approval from the CyberOne People Services Manager or CFO, granting them explicit permission to engage in recruitment efforts on behalf of CyberOne."
    $98k-132k yearly est. Auto-Apply 60d+ ago
  • Director of Information Security

    Arkansas Oklahoma Gas Corp 3.6company rating

    Security architect job in Fort Smith, AR

    Join our Growing Team and see why Summit Utilities, Inc was named as one of the Fastest Growing Denver Area Private Companies 2019 and 2020; Best Places to Work in Maine 2019, 2020, 2021, 2022 and 2023; and Best Places to Work in Arkansas 2020 and 2023, Oklahoma 2022 and 2023 and Missouri 2023. Summit was also recently named one of Forbes 2023 America's Best Small Employers. Summit is a growing natural gas utility providing safe, reliable and clean burning natural gas service to homes and businesses in Arkansas, Colorado, Maine, Missouri, Oklahoma, and Texas. Being part of the Summit team means embracing excellence and innovation, committing to safety each and every day, and doing all that we can to serve each other, our customers and the communities where we live. We aim to bring warmth and energy to everything we do. We have an exciting hybrid opportunity for a Director of Information Technology based in Fort Smith, Arkansas. POSITION SUMMARY The Director of Information Security is a trusted senior leader responsible for protecting Summit's digital and physical information assets while upholding the highest standards of integrity, financial discipline, and organizational trust. This role oversees cybersecurity governance, risk management, and business continuity for enterprise systems - including modern threats emerging from AI technologies and data automation. The Director will develop and execute a forward-looking security strategy that supports Summit's operational excellence, compliance obligations, and AI-driven transformation initiatives. This includes defining governance frameworks, managing enterprise risk, ensuring prudent budget oversight, and cultivating a strong security culture across all levels of the organization. This position requires a strategic thinker, a disciplined financial steward, and a leader of high character who models accountability, transparency, and ethical decision-making. PRIMARY DUTIES AND RESPONSIBILITIES Lead the design, implementation, and continuous improvement of Summit's enterprise information security program - covering cybersecurity, AI and data protection, risk management, and incident response. Ensure strong alignment between security strategy, business goals, and regulatory requirements, particularly in the context of emerging AI use cases, machine learning models, and data governance. Oversee the IT Business Continuity and Disaster Recovery (BCP/DR) programs, including Business Impact Analysis (BIA) and scenario-based recovery exercises. Develop and enforce comprehensive policies, standards, and procedures aligned with frameworks such as NIST CSF 2.0, C2M2, and ISO 27001. Partner with data, application, and operations leaders to ensure secure design, access control, and model integrity across AI and analytics systems. Direct risk assessments and audits to identify vulnerabilities, ensuring mitigation strategies are financially sound and proportionate to organizational risk appetite. Maintain strict adherence to financial controls - including vendor spend, contract review, and security-related procurement - demonstrating accountability for budget stewardship and cost transparency. Lead and mentor a high-performing information security team, fostering a culture of ethics, service, and continuous learning. Serve as the executive liaison for internal and external audits, compliance reviews, and regulatory reporting related to cybersecurity. Stay ahead of evolving threats, particularly those involving AI misuse, data poisoning, and adversarial attacks, and integrate defenses into enterprise security posture. Provide executive-level reporting on risk posture, incidents, and metrics that connect security outcomes to business and financial value. EDUCATION AND WORK EXPERIENCE Bachelor's or Master's degree in information security, Computer Science, Information Technology, or a related field. 10+ years of experience in information security, including at least 5 years in a senior leadership or management capacity. Advanced security certifications strongly preferred (CISSP, CISM, CISA, CRISC, CCISO, etc.). Demonstrated experience managing security for cloud and hybrid environments, and integrating controls for AI, analytics, and data platforms. Proven record of financial accountability, including budget ownership, cost optimization, and vendor governance. Experience implementing and auditing against leading security frameworks (NIST CSF, C2M2, ISO 27001, SOC 2) and regulatory standards (GDPR, HIPAA, PCI, etc.). KNOWLEDGE, SKILLS, ABILITIES Deep expertise in cybersecurity, risk management, and incident response, including threat intelligence, vulnerability management, and data protection. Strong knowledge of AI and data security principles, including model governance, data ethics, and emerging threats tied to generative AI. Uncompromising integrity and sound judgment in handling confidential and financial information. Strong grasp of financial concepts related to technology management: budgeting, forecasting, cost-benefit analysis, and vendor contract negotiation. Exceptional leadership and communication skills - able to translate complex security concepts into clear, actionable guidance for executives and teams. Ability to lead under pressure with discipline, humility, and transparency. Demonstrated track record of fostering a culture of trust, compliance, and ethical leadership. The above statements are intended to describe the general nature and level of work being performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and/or skills required of all personnel so classified. Summit offers competitive pay and medical/dental/vision and other benefits that provide flexibility, choice and support to our employees when they need it most. We understand that home and family are essential pieces of your life, and our benefits are designed to support you both at work and at home. Summit Utilities, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or protected veteran status and will not be discriminated against on the basis of disability or veteran status.
    $106k-134k yearly est. Auto-Apply 9d ago
  • Director of Information Security

    Summit Utilities Inc. 4.4company rating

    Security architect job in Fort Smith, AR

    Join our Growing Team and see why Summit Utilities, Inc was named as one of the Fastest Growing Denver Area Private Companies 2019 and 2020; Best Places to Work in Maine 2019, 2020, 2021, 2022 and 2023; and Best Places to Work in Arkansas 2020 and 2023, Oklahoma 2022 and 2023 and Missouri 2023. Summit was also recently named one of Forbes 2023 America's Best Small Employers. Summit is a growing natural gas utility providing safe, reliable and clean burning natural gas service to homes and businesses in Arkansas, Colorado, Maine, Missouri, Oklahoma, and Texas. Being part of the Summit team means embracing excellence and innovation, committing to safety each and every day, and doing all that we can to serve each other, our customers and the communities where we live. We aim to bring warmth and energy to everything we do. We have an exciting hybrid opportunity for a Director of Information Technology based in Fort Smith, Arkansas. POSITION SUMMARY The Director of Information Security is a trusted senior leader responsible for protecting Summit's digital and physical information assets while upholding the highest standards of integrity, financial discipline, and organizational trust. This role oversees cybersecurity governance, risk management, and business continuity for enterprise systems - including modern threats emerging from AI technologies and data automation. The Director will develop and execute a forward-looking security strategy that supports Summit's operational excellence, compliance obligations, and AI-driven transformation initiatives. This includes defining governance frameworks, managing enterprise risk, ensuring prudent budget oversight, and cultivating a strong security culture across all levels of the organization. This position requires a strategic thinker, a disciplined financial steward, and a leader of high character who models accountability, transparency, and ethical decision-making. PRIMARY DUTIES AND RESPONSIBILITIES Lead the design, implementation, and continuous improvement of Summit's enterprise information security program - covering cybersecurity, AI and data protection, risk management, and incident response. Ensure strong alignment between security strategy, business goals, and regulatory requirements, particularly in the context of emerging AI use cases, machine learning models, and data governance. Oversee the IT Business Continuity and Disaster Recovery (BCP/DR) programs, including Business Impact Analysis (BIA) and scenario-based recovery exercises. Develop and enforce comprehensive policies, standards, and procedures aligned with frameworks such as NIST CSF 2.0, C2M2, and ISO 27001. Partner with data, application, and operations leaders to ensure secure design, access control, and model integrity across AI and analytics systems. Direct risk assessments and audits to identify vulnerabilities, ensuring mitigation strategies are financially sound and proportionate to organizational risk appetite. Maintain strict adherence to financial controls - including vendor spend, contract review, and security-related procurement - demonstrating accountability for budget stewardship and cost transparency. Lead and mentor a high-performing information security team, fostering a culture of ethics, service, and continuous learning. Serve as the executive liaison for internal and external audits, compliance reviews, and regulatory reporting related to cybersecurity. Stay ahead of evolving threats, particularly those involving AI misuse, data poisoning, and adversarial attacks, and integrate defenses into enterprise security posture. Provide executive-level reporting on risk posture, incidents, and metrics that connect security outcomes to business and financial value. EDUCATION AND WORK EXPERIENCE Bachelor's or Master's degree in information security, Computer Science, Information Technology, or a related field. 10+ years of experience in information security, including at least 5 years in a senior leadership or management capacity. Advanced security certifications strongly preferred (CISSP, CISM, CISA, CRISC, CCISO, etc.). Demonstrated experience managing security for cloud and hybrid environments, and integrating controls for AI, analytics, and data platforms. Proven record of financial accountability, including budget ownership, cost optimization, and vendor governance. Experience implementing and auditing against leading security frameworks (NIST CSF, C2M2, ISO 27001, SOC 2) and regulatory standards (GDPR, HIPAA, PCI, etc.). KNOWLEDGE, SKILLS, ABILITIES Deep expertise in cybersecurity, risk management, and incident response, including threat intelligence, vulnerability management, and data protection. Strong knowledge of AI and data security principles, including model governance, data ethics, and emerging threats tied to generative AI. Uncompromising integrity and sound judgment in handling confidential and financial information. Strong grasp of financial concepts related to technology management: budgeting, forecasting, cost-benefit analysis, and vendor contract negotiation. Exceptional leadership and communication skills - able to translate complex security concepts into clear, actionable guidance for executives and teams. Ability to lead under pressure with discipline, humility, and transparency. Demonstrated track record of fostering a culture of trust, compliance, and ethical leadership. The above statements are intended to describe the general nature and level of work being performed by employees assigned to this classification. They are not intended to be construed as an exhaustive list of all responsibilities, duties and/or skills required of all personnel so classified. Summit offers competitive pay and medical/dental/vision and other benefits that provide flexibility, choice and support to our employees when they need it most. We understand that home and family are essential pieces of your life, and our benefits are designed to support you both at work and at home. Summit Utilities, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or protected veteran status and will not be discriminated against on the basis of disability or veteran status.
    $104k-127k yearly est. Auto-Apply 9d ago
  • Manager Information Security

    Weokie Federal Credit Union

    Security architect job in Oklahoma City, OK

    We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector. The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan. Major Activities: * Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program. * Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats. * Organizes and conducts cybersecurity simulation exercises. * Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit. * Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated. * Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied. * Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned. * Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials. * Support technology/systems that enable all vendor management activities by administering the Tandem platform. * Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities. * Maintain, develop, update, and test WEOKIE's Business Continuity Plan. * Write reports to summarize testing activities, including results and recommendations. * Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented. Critical Results: * WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs. * Information Security risks and threats are clearly identified, measured and remediated timely. * The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts. * Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities. * WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources. * WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders. * Risk assessments are completed annually and deficiency are quickly addressed and/or remediated. * Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented. * New quality control activities are developed and presented to leadership that correspond to the information security program. * Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately. * Vendor Management is collaboratively managed with fellow team members. * Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures. * WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident. Qualifications: * Specialized or Technical Knowledge and Skills: The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of information security concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact. * A bachelor's degree is required, preferably in Information Technology or Computer Science. * A minimum of three years of experience in the information security field. * A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM) are preferred. * Demonstrated experience in managing and working with third party vendors. * Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels. * In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them. B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position. * Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values. * Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members. * Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements. * Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad. * Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position: * Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations. * Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans. * Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others. * Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges. * Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile. * Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace. * Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis. * Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality. C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus. D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate. WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
    $91k-132k yearly est. 23d ago
  • C2ISR Information System Security Officer

    Plexsys 4.1company rating

    Security architect job in Oklahoma City, OK

    At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe. As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture. GENERAL DESCRIPTION The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Officer (ISSO) will provide cybersecurity support to Joint Theater Air-to-Ground Simulation Systems (JTAGGS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSO is responsible for ensuring the appropriate operational security posture for information systems and must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include implementation of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. Duties also include physical and environmental protection, personnel security, and incident handling. Coordinate and synchronize security policy guidance with PLEXSYS Facility Security Officer and C2ISR Information System Security Manager (ISSM) and work in close coordination with Partner/Government ISSO/ISSM. Duties & Responsibilities Execute on-site information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations Develop, implement and maintain security emergency action plans Provide security education and training to local employees Maintain administrative security records and documents for local employees Conduct self-inspections to ensure current security measures and policies are effective Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees May assist in the development and updating of required Authority to Operate (ATO) artifacts Conduct system audits in accordance with System Security Plan requirements May be required to conduct maintenance on the networks, systems, and hardware May be required to perform software upgrades on networks, systems, and hardware Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements Other duties as assigned REQUIREMENTS Bachelor's degree in related field or 2 years' experience in related field Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Linux operating systems Specialized computer training in networking and active directory Experience with security audits for information systems Strong communication and problem-solving skill Ability to work in both a Team environment as well as independently Must be organized and detail orientated Current DoD 8570 IAT Level II and IAM Level I or higher certification (i.e. Security + or equivalent certification) DESIRABLE Experience with DoD Security Regulations and Policies Experience with Type 1 and/or Type 2 virtualization platforms Experience managing system security in an enterprise environment Strong system documentation skills Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS) AUTHORITY Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access PERKS As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals. Medical/Vision/Prescription/Dental Benefits Life, AD&D and Long Term Disability Coverage Paid Holidays, Military Leave, and Paid Time Off 401k Plan with eligibility from first day of employment Education reimbursement for job-related courses for full-time employees PriceClub/COSTCO/Sam's Club annual membership PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
    $76k-99k yearly est. 60d+ ago
  • Information Systems Security Office (ISSO) II

    GDIT

    Security architect job in Warrensburg, MO

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Information Security, Information Security Management, Information System Security Certifications: Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GICSP: Global Industrial Cyber Security Professional - Global Information Assurance Certification (GIAC), GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC) Experience: 2 + years of related experience US Citizenship Required: Yes Job Description: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Notify ISSM when changes occur that might affect the authorization determination of the information system(s). Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. Execute the cyber security portion of the self-inspection, to include providing security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied to computer systems. Perform ISSO duties in support of in-house and external customers. Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries. Experience: 2+ years related experience. SAP experience required. Prior performance in roles such as System, Network Administrator, or ISSO. Education: Bachelor's degree OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years) Certifications: IAT Level II or IAM Level II (Security+ CE, CCNA Security, etc.) Security Clearance: TS/SCI required. Must be able to Attain - TS/SCI with CI Poly. #AirforceSAPOpportunities #ISSO The likely salary range for this position is $79,390 - $107,410. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: 10-25% Telecommuting Options: Onsite Work Location: USA MO Warrensburg Additional Work Locations: Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $79.4k-107.4k yearly Auto-Apply 9d ago
  • Product Security Engineering 2

    The Structures Company, LLC 4.1company rating

    Security architect job in Saint Charles, MO

    JOB TITLE: Product Security Engineering 2 PAY RATE: $53-67/hour We are a national aerospace and defense staffing agency seeking highly qualified candidates for a position with a top-tier client. Job Details: Job Type: Contract (12 months with potential for extension) Clearance: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Industry: Aerospace / Defense / Aviation Benefits: Medical, dental, and vision (Cigna) Perks: Bonus potential + Priority access via Tier 1 supplier Openings Nationwide: Thousands of opportunities across the U.S. Qualifying Questions: Are you a U.S. person as defined under ITAR regulations? Do you meet the educational and experience requirements for this role? Can you commute to the job location or relocate if necessary? Summary: Assess organization-wide security and privacy risks, updating assessment results on an ongoing basis. Perform system analysis and develop system tests for cyber threats, cybersecurity evaluations, and large-scale event assessments. Ensure adherence to the product security engineering development lifecycle, emphasizing clear requirements development and verification (using CAMEO). Conduct criticality analyses, collaborate with suppliers, identify critical components, and integrate them into overall system designs. Perform cyber risk assessments and develop mitigation plans (e.g., POA&Ms, SCRM) using tools including but not limited to CAMEO. Support and facilitate ATO/IATT packages, including processing IAVMs and CTOs. Perform software assurance tasks, including developing software assurance risk reports. Support proposal development efforts (e.g., BOE generation, GR&A development, trade studies). Assist with the engineering installation and analysis of patches, updates, and upgrades to assess system impact. Attend and facilitate program boards, collect data, and manage project documentation and collaboration. Apply Security Technical Implementation Guides (STIGs) and manage Cyber Tasking Orders (CTOs). Document and verify all installation and configuration steps for labs and operational deliveries. Provide feedback to Cyber Leadership and engineers to improve tools and processes. Collaborate with Information System Security Officers (ISSOs) to ensure compliance with cybersecurity standards and regulations. Support cyber threat intelligence, scanning, patching, remediation, and tool/application development. Assist in compliance activities including TEMPEST, DFARS, COMSEC, and CNSSI. Develop tools for cyber forensics and identify opportunities for efficiency and productivity improvements. Perform system analysis trade studies to define technical concepts and solutions. Requirements: Active Top Secret U.S. Security Clearance required (must be active within the last 24 months) Bachelor's degree (or equivalent technical education) in engineering, engineering technology, computer science, data science, mathematics, physics, or chemistry. 2 or more years of related experience, or an equivalent combination of education and experience. Current DoD 8570 certification at IAT Level II / IAM Level I or higher (e.g., Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA). 1+ years of experience in product security or cybersecurity engineering. 1+ years of experience with cybersecurity frameworks (NIST, OWASP, DFARS). Strong analytical, collaboration, communication, and organizational skills. ABET accreditation preferred but not required. Must be a U.S. Citizen (as defined by ITAR). Preferred Qualifications: Proficiency with CAMEO. 2+ years of Windows/RHEL system administration experience, including tuning and troubleshooting cyber tools (ESS/HBSS, ConfigOS, Splunk, etc.). 2+ years of experience configuring and scripting audit tools. Experience with Software Assurance (SwA) static and/or dynamic code analysis tools (e.g., Fortify). Familiarity with FISMA/RMF and NIST 800-53 requirements. Experience leading cyber test and evaluation at system or component level. Strong written and verbal communication skills with the ability to simplify complex technical issues. Understanding of DoD defense systems architectures, communications systems, and test/data analysis methods. About Us: The Structures Company is a premier national aerospace and defense staffing agency specializing in contract, contract-to-hire, and direct hire placements. We deliver expert workforce solutions across engineering, IT, production, maintenance, and support roles. As trusted partners to major aerospace OEMs and Tier 1 suppliers, we connect professionals with opportunities to grow and excel in the aviation and aerospace industries. Eligibility Requirements: Must be a U.S. Citizen, lawful permanent resident, or protected individual under 8 U.S.C. 1324b(a)(3) to comply with ITAR regulations. Keywords: aerospace, aviation, engineering, maintenance, aircraft design, defense Take your career to new heights-apply today! Engineers - #Hotjobs
    $53-67 hourly 50d ago
  • Cybersecurity - Information System Security Officer (ISSO)

    Jeppesen 4.8company rating

    Security architect job in Hazelwood, MO

    Company: The Boeing Company The Boeing Company is looking for a highly motivated Cybersecurity - Information System Security Officer (ISSO) to join our Classified Operations Cybersecurity team based in Hazelwood, MO. This position supports Boeing's Enterprise Wide Area Network (eWAN). The selected candidate will rely on cyber security and Information Assurance (IA) background to support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and enforcing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information. Position Responsibilities: Perform security analysis of operational and development environments, threats, vulnerabilities, and internal interfaces to define and assess compliance with accepted industry and government standards Support and implement the Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF) for new and existing information systems Facilitate development of Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and support Continuous Monitoring (CONMON) Perform configuration management of assigned systems; auditing systems to ensure security posture integrity Conduct risk assessments and investigations, execute appropriate risk mitigations, and participate in incident response activities Conduct periodic hardware/software inventory assessments Interface with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements Basic Qualifications (Required Skills/Experience): IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, Security+ CE, CISSP, CASP, CISM, GSLC) 1+ years of experience in cybersecurity 1+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs Preferred Qualifications (Desired Skills/Experience): 3+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 3+ years of experience assessing and documenting test or analysis data to show cyber security compliance Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies . Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range: $92,650 - $125,350 Language Requirements: Not Applicable Education: Bachelor's Degree or Equivalent Relocation: Relocation assistance is not a negotiable benefit for this position. Export Control Requirement: This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee. Safety Sensitive: This is not a Safety Sensitive Position. Security Clearance: This position requires an active U.S. Secret Security Clearance (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active) Visa Sponsorship: Employer will not sponsor applicants for employment visa status. Contingent Upon Award Program This position is not contingent upon program award Shift: Shift 1 (United States of America) Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law. EEO is the law Boeing EEO Policy Request an Accommodation Applicant Privacy Boeing Participates in E - Verify E-Verify (English) E-Verify (Spanish) Right to Work Statement Right to Work (English) Right to Work (Spanish)
    $92.7k-125.4k yearly Auto-Apply 2d ago
  • Senior Security Analyst - Camden, AR

    RTX

    Security architect job in East Camden, AR

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: Secret - Current At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our Security team is seeking a Senior Security Analyst to support our team 100% onsite at our facilities in Camden, Arkansas. This person will serve as Alternate Facility Security Officer (AFSO), Designated Government Representative (DGR) and COMSEC hand receipt holder. What You Will Do Ensure adherence to the provisions of the National Industrial Security Program Operating Manual (NISPOM) and National Security Administration 3-16 (NSA/CSS 3-16). Serve as the DGR for foreign sales maintaining US State Department Licenses, communicating with Defense Counterintelligence Security Agency (DCSA) and Foreign DGR's to coordinate classified exports and imports. Report to the FSO for ensuring the open storage areas are properly maintained assist in reviewing articles and documents for appropriate classification markings. Assist the FSO in working with the lead guard to ensure cleared guard scheduling is achieved. Serve as the COMSEC hand receipt holder under supervision of the Facility Security Officer to conduct inventories, receive, transfer, destroy and inventory COMSEC material. Maintain the visitor control program. Follow specialized procedures for the transmission of classified and/or proprietary material/information. Participate in security audits, semi-annual alarms tests, and UL certification. Complete the DCSA SPeD training courses for Facility Security Officer - Possessing Facilities within one year of start date. Qualifications You Must Have Typically requires a University Degree or equivalent experience and minimum 2 years of prior relevant experience, or an Advanced Degree in a related field. Experience scheduling Guard Rotations. Experience with administrative requirements for classified areas. Perform physical tasks such as climbing ladders, conducting alarm tests and performing escort duties for uncleared visitors. Qualifications We Prefer Completion of FSO for Possessing Facilities from DCSA SPeD. Certified First Aid, AED and CPR to serve as a First Responder. Certified Industrial Security Professional or similar related certification or Certified DoD Security Manager. Excellent written, verbal, and presentation skills. Must be able to complete required NSA training for DIAS Ability to understand and safeguard Personal Identifiable Information (PII). Self-starter with minimal supervision and the ability to solve routine problems of moderate complexity. What We Offer Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation. Relocation Non-Eligible - Relocation assistance not available Please consider the following role type definition as you apply for this role: Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products. We are RTX #LI-Onsite The salary range for this role is 66,000 USD - 130,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $76k-103k yearly est. Auto-Apply 60d+ ago
  • EXECUTIVE DIRECTOR FOR INFORMATION SECURITY & CHIEF INFORMATION SECURITY OFFICER

    Emporia State University 4.1company rating

    Security architect job in Emporia, KS

    Developing, and implementing secure processes and systems used to prevent, detect, mitigate, and recover from cyberattacks. Educating and managing information and technology risk in collaboration with business leaders.Building and driving a cybersecurity strategy and framework, with initiatives to secure the organization's cyber and technology assets. Maintain Professional Knowledgebase; keep apprised of latest security and privacy legislation, regulations, advisories, alerts, and vulnerabilities pertaining to ESU.Continuously evaluating and managing the cyber and technology risk posture of the organization.Implementing and managing the cyber governance, risk, and compliance process. Developing, justifying, and evaluating cybersecurity investments. Developing and implementing ongoing security awareness training and education for users. In coordination with the CIO and emergency management team, implementing disaster recovery protocols and business continuity plans with business resilience in mind. QUALIFICATIONS: Minimum Qualifications: * Bachelor's degree; preference for advanced degree. * Minimum of five years' experience in information security or equivalent. * Strong commitment to customer-focused and team-oriented management. * Proven leadership abilities with a history of advancing roles in security management. * Proficiency in project planning, implementation, and management. * Demonstrated capability in collaborating with diverse populations. * Experience handling sensitive and confidential information in compliance with federal and state laws. * Skilled in presenting complex security concepts to various audiences (e.g., end-user training, executive-level briefings). * Up-to-date knowledge of emerging information security technologies and strategies. * Availability for off-hours support when necessary. COMPENSATION: * Annual salary range is $130,000-$160,000 * Salary will be commensurate with experience and qualifications. BENEFITS: Base pay is one component of Emporia State University's total rewards package. We are dedicated to supporting the needs of the "whole you" with our holistic approach to employee benefits by offering comprehensive well-being benefits for you and your family that include: * Health Insurance * Free Dental insurance for employees * Retirement through the Kansas Board of Regents * Paid parental leave * Up to 31 days paid vacation and holiday days * Tuition reduction and tuition assistance * Dependent tuition waiver * For full details about our benefit plan offerings, please visit here. APPLY: Please upload a cover letter, resume, and contact information of three references here. Consideration of applications will begin immediately, and will continue until the position is filled. A background check is required prior to hire. For more information Human Resources ****************** ************** Emporia State University is an equal opportunity and affirmative action employer. All qualified applicants will receive consideration for
    $130k-160k yearly Easy Apply 32d ago
  • Infrastructure Security Engineer

    Inceed 4.1company rating

    Security architect job in Lenexa, KS

    Infrastructure Security Engineer Compensation: $40-50 /hour, depending on experience Inceed has partnered with a great company to help find a skilled Infrastructure Security Engineer to join their team! Join a dynamic team in a company that values culture and work-life balance. As an Infrastructure Engineer, you will play a crucial role in designing and maintaining a secure hybrid infrastructure. This is an exciting opportunity for someone who thrives in a technical environment and is passionate about security compliance. Enjoy working in a supportive and collaborative setting where your skills and expertise will make a significant impact. Key Responsibilities & Duties: Design and manage Azure environments and Azure Virtual Desktop. Ensure compliance with security frameworks like CMMC and NIST. Administer Windows Server and Active Directory. Implement and monitor network security. Translate compliance requirements into technical controls. Collaborate with high-level executives and cross-functional teams. Required Qualifications & Experience: Bachelor's degree in IT or 10 years of IT experience. Proven experience with cloud and on-premises environments. Strong understanding of CMMC or NIST frameworks. Excellent written and verbal communication skills. Strong analytical and troubleshooting skills. Nice to Have Skills & Experience: Experience with Hyper-V and VMware. Knowledge of PowerShell scripting and automation. Familiarity with vulnerability management and incident response. Perks & Benefits: 3 different medical health insurance plans, dental, and vision insurance Voluntary and Long-term disability insurance Paid time off, 401k, and holiday pay Weekly direct deposit or pay card deposit If you are interested in learning more about the Infrastructure Security Engineer opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law. #IND
    $40-50 hourly 3d ago

Learn more about security architect jobs

How much does a security architect earn in Rogers, AR?

The average security architect in Rogers, AR earns between $73,000 and $151,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Rogers, AR

$105,000
Job type you want
Full Time
Part Time
Internship
Temporary