Sr. Security Analyst - Perimeter Security Team
Security architect job in Tempe, AZ
Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship.
Job Overview
Position Schedule: Full-Time
This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants.
Team Overview:
As a Security Analyst you will work independently to manage 1 - 2 platforms within a product team and collaborate with colleagues to solve routine to difficult engineering challenges. You will ensure that all platforms within your span of responsibility meet your customer's requirements; are designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. As a Security Engineer you deeply understand network architecture and data flows, proxy solutions, remote access platforms and have the ability and drive to solve complex issues and manage competing priorities.
What You'll Do:
Identify and implement opportunities to improve solutions and ensure system availability while maintaining acceptable risk levels for the firm to remain in compliance with industry regulations and security framework.
Serve as a subject matter expert for proxy and intrusion prevention platforms, remote access connectivity, zero-trust, and network security monitoring.
Lead and oversee the solution design lifecycle for Zscaler and IPS, including stakeholder requirement gathering and prioritization, alignment with architectural standards and best practices, implementation planning, implementation execution, documentation completeness, and ongoing health monitoring and maintenance.
Provide design thinking and oversight for Zscaler and IPS to ensure cohesiveness, completeness, and effectiveness of the platform; and provide feedback to the Team Lead on the overall direction of the technology stack.
Continue to implement new features and performance improvements for Zscaler and IPS in partnership with key stakeholders.
Adhere to frameworks and processes for cohesive change management, health monitoring, performance monitoring, stability, and backups across the product space.
Support technology incidents including: triaging technology services performance segregation or outages, performing root cause analysis across a complex environment, and identifying short and long-term solutions while operating in stressful and time sensitive situations.
Effectively communicate with peers and leaders to ensure the awareness of progress, the awareness of challenges, the identification and escalation of risks, and the impact of ongoing security work. Including the ability to clearly discuss complex technical or security topics with a non-technical audience.
Establish and maintain effective communications and relationships across key departments, business areas, and vendors. Including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm needs.
Mentor and coach less senior team members and represent the Firm across the financial service's information security community through industry forums, working groups, and conference presentations.
Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page.
Hiring Minimum: $84100
Hiring Maximum: $143100
Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf.
Read More About Job Overview
Skills/Requirements
What Experience You'll Need:
Degree in Cyber Security, Computer Science, Computer Engineering, or Information Systems or related field preferred; or equivalent training and certifications (A+, Net+, Sec+, SANS, Cloud, etc), or related work experience
3-5 years of managing enterprise class proxy solutions, remote access solutions, network security platforms, on-prem and cloud data centers.
Experience in a variety of technical fields including software, infrastructure, and security engineering at an enterprise level. This experience gives you deep understanding of the full stack required to deliver and operate software and platforms at an enterprise level.
Understanding of core enterprise technology platforms including: infrastructure, software, data, cloud and cloud native platforms, microservices, API management, event streaming, CI/CD pipelines.
Experience with core enterprise level information security components, principles, practices, and procedures. Including common technology stack components, deep knowledge of threats and adversary tactics, and experience managing regulatory requirements and common frameworks used by security teams within the Financial Industry.
Understanding of core enterprise best practices, including: security risk management, architecture diagrams and documentation, digital transformation, change management, crisis management, business continuity, disaster recovery, and observability.
Experienced in designing and building highly scalable, distributed & secure solutions that run in a cloud environment such as Azure, AWS, or GCP. Including demonstrated proficiency in deploying infrastructure as code through Terraform, Ansible, or similar technologies.
Experience with managing and delivering on stakeholder requirements in a way that balances design functionality, cost optimization, and production support considerations.
Advanced experience with writing code/scripts in at least one language (Python, PowerShell, Bash, Go, etc)
Demonstrated competency with reading and generating architectural diagrams and maintaining full and accurate documentation of software, systems, and platforms.
Strong understanding of observability, performance monitoring, and root cause analysis principles to perform continuous platform improvements or quickly troubleshoot and restore services in a case of disruption.
Experience working with Product Teams and Agile methodology and practices
Demonstrated proficiency with proxy solutions and zero trust methodologies
Demonstrated proficiency with network security best practices
Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.
Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work.
Read More About Skills/Requirements
Awards & Accolades
At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received.
Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones
Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones
Read More About Awards & Accolades
About Us
Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns.
Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging.
People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career.
View our Purpose, Inclusion and Citizenship Report.
¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating.
Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law.
#LI-HO
Licensed Architect with Healthcare Exp
Security architect job in Phoenix, AZ
. * Apogee Consulting was founded in 1999 to meet clients' practical needs. We started as an electrical design firm and now specialize on healthcare architecture and engineering. We love encouraging architects, engineers, and other disciplines to work together effortlessly toward common goals throughout the design process. Our flat organization encourages innovation, growth, and project ownership. We offer exciting healthcare initiatives in 38 states.
Our team seeks a motivated Healthcare Project Architect. This vital role involves managing architectural project design and documentation, engaging with consultants and stakeholders, and ensuring design purpose is met during construction. The ideal candidate will be passionate about thoughtful design, critical problem-solving, and excellence and have a thorough understanding of architectural ideas, industry standards, and project delivery methods. This role offers projects in a creative, collaborative environment.
*Benefits*
The employees of Apogee Consulting Group are among the company's most valuable resources. In addition to providing a safe and happy work environment, we also give each and every one of our employees a robust benefits package.
* Generous salary
* Up to five weeks of vacation (depending on experience)
* Medical, dental, and vision insurance with company assistance
* Free short- and long-term disability insurance, Life Insurance
* HSA & FSA Options
* Employee Assistance Program
* Company-matched 401(k)
* 8 paid holidays, with 1 birthday floating holiday to use at your discretion.
* Professional license bonuses
* Continued educational reimbursement with manager pre-approval.
*Key Responsibilities*
* Leads collaborative project teams with open communication and clear guidance for high performance, new design solutions, and project success.
* Determines functional and spatial needs, design, specifications, materials, color, equipment, anticipated costs, and construction timeframe with customers.
* Coordination of project layout and engineering for client approval.
* Creates construction contractor scale drawings and contracts.
* Establishing and monitoring discipline programs.
* Oversees construction contracts and plan compliance on-site.
* Makes project plans and designs using computer-aided design.
* Attend internal and customer project meetings as appropriate.
* Keeps project team informed through meetings, minutes, and notes.
* Manages junior designers' drawings and specs.
* Work with team leaders and cross-disciplinary teams during projects.
* Communicates well with clients, consultants, contractors, subcontractors, and others.
* Records allocated project conditions.
* Mentor junior staff, providing feedback and assistance for skill and career development.
*Equal Opportunity Statement*
_Apogee does not discriminate in employment based on race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, parental status, military service, or other non-merit factors. As federal contractors, U.S. citizenship is required, and background checks will be performed._
_Please Read About Third-party Recruitment And Employment agencies._
_Recruitment firms and recruiters cannot send unsolicited resumes to Apogee Consulting Group. Apogee will not pay referral compensation or recruiter fees without a signed Agreement. If a recruiter or agency sends a resume or applicant without a formal agreement, Apogee has the right to pursue and hire the candidate(s) without financial commitment. Apogee Consulting Group owns unsolicited resumes, including those submitted to employees._
Job Type: Full-time
Pay: $120,000.00 - $180,000.00 per year
Benefits:
* 401(k)
* 401(k) matching
* Dental insurance
* Employee assistance program
* Flexible schedule
* Flexible spending account
* Health insurance
* Health savings account
* Life insurance
* Paid time off
* Parental leave
* Professional development assistance
* Retirement plan
* Vision insurance
License/Certification:
* Architecture License (Required)
Willingness to travel:
* 25% (Preferred)
Work Location: Remote
Senior Security Engineer - IAM Analyst
Security architect job in Tempe, AZ
Innovate here. And see your ideas come to life. It's an exciting time to work in tech at Edward Jones. We are making massive investments in emerging technologies to improve how we work with our clients and with each other. Relationships are the focus of our business model. And working in Technology here means using your skills to build, deliver and maintain the technologies that enable us to deepen and support those relationships. The best part? We develop and create our own industry-leading solutions internally. And you can be a part of it. Working with emerging new technologies. Creating platforms, programs and experiences that change how we work together - and support our client-first focus. Changing the future of our firm, the industry and the advisor-client relationship.
Job Overview
Position Schedule: Full-Time
This job posting is anticipated to remain open for 30 days, from 01-Dec-2025. The posting may close early due to the volume of applicants.
Team Overview:
As an IAM Analyst you will work independently to identify and define IAM solution requirements for both existing capabilities and the expansion of new features. You will ensure that all platforms within your span of responsibility meet your customer's requirements; designed, built, documented, and maintained in adherence with the Firm's standards and architectural patterns; and are managed to the highest level for performance, stability, and security. Serving as a Security practicioner, you will bring deep industry knowledge and experience to understand the threat landscape and use that knowledge to shape the platforms that the Firm depends on for critical identity lifecycle functions. In this role you will regularly engage in leading-edge technology initiatives, including research, vetting, and adoption of emerging technologies, tools and methodologies in alignment with the overall security strategy.
What You'll Do:
Identify and implement opportunities to improve solutions that combat advanced and relevant threats while considering integration into the environment, stability, availability, disaster recovery, and cost-effectiveness.
Serve as a subject matter expert for the identity management platform (Saviynt) and be a key contributor to stabilization and expansion efforts.
Lead conversations centered on solving for complex business requirements in solution designs, and ensuring compliance with internal standards, policies, and regulatory requirements.
Identify potential gaps in existing IAM processes or systems and recommending solutions to improve security and efficiency.
Manage SOX compliance, auditing, and access review processes.
Collaborate with internal teams and stakeholders to understand requirements and develop solutions.
Effectively document solutions and configurations for future reference.
Produce, maintain, and facilitate distribution of training resources to effectively empower key stakeholders with the information needed to meet Firm objectives and/or drive adoption of new processes.
Establish and maintain effective communications and relationships across key departments, business areas, and vendors, including supporting engagements with key vendors to ensure the correct level of support to the Firm and drive solution roadmaps to meet Firm expectations.
Creating and maintaining documentation for IAM processes, procedures, solution designs, requirements, etc.
Edward Jones' compensation and benefits package includes medical and prescription drug, dental, vision, voluntary benefits (such as accident, hospital indemnity, and critical illness), short- and long-term disability, basic life, and basic AD&D coverage. Short- and long-term disability, basic life, and basic AD&D coverage are provided at no cost to associates. Edward Jones offers a 401k retirement plan, and tax-advantaged accounts: health savings account, and flexible spending account. Edward Jones observes ten paid holidays and provides 15 days of vacation for new associates beginning on January 1 of each year, as well as sick time, personal days, and a paid day for volunteerism. Associates may be eligible for bonuses and profit sharing. All associates are eligible for the firm's Employee Assistance Program. For more information on the Benefits available to Edward Jones associates, please visit our benefits page.
Hiring Minimum: $99200
Hiring Maximum: $168900
Qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance and the California Fair Chance Act. Edward Jones is prohibited from hiring individuals with certain specified criminal history as set forth in Section 3(a)(39) and 15(b)(4) and Rule 17a-3(a)(12) of the Securities and Exchange Act of 1934, and conducts background reviews consistent with FINRA Rule 3110(e). A copy of a notice regarding the provisions of the Los Angeles County Fair Chance Ordinance is available at: dcba.lacounty.gov/wp-content/uploads/2024/08/FCOE-Official-Notice-Eng-Final-8.30.2024.pdf.
Read More About Job Overview
Skills/Requirements
What Experience You'll Need:
Minimum 4-5 years experience
In-depth understanding of Saviynt product functionality, including provisioning, access certification, SOD, analytics, RBAC, workflow, email notifications, etc.
Experience designing JML flows for Saviynt automation.
Experience integrating applications with Saviynt using various connectors.
Solid understanding of workflows in ARS and the ability to leverage Saviynt analytics tools.
Experience managing SOX compliance, auditing, and access review processes within Saviynt.
Experience with configuration management of Rules Technical Users, UI Global Configurations, Backend configurations, and GSP files.
Excellent written and verbal communication skills.
Experience with APIs and integrations
Strong analytical and problem-solving skills
Excellent communication and collaboration skills
Experience using ticketing systems (e.g., Jira)
**Candidates that live within in a commutable distance from our Tempe, AZ and St. Louis, MO home office locations are expected to work in the office three days per week, with preference for Tuesday through Thursday.**
Current INTERNAL home-based associates: While this role is posted as hybrid, if selected and accepted, you may retain your home-based status. Edward Jones intends in good faith to continue offering the role as home-based, though future business or regulatory needs may require on-site work.
Read More About Skills/Requirements
Awards & Accolades
At Edward Jones, we are building a place where everyone feels like they belong. We're proud of our associates' contributions to the firm and the recognitions we have received.
Check out our U.S. awards and accolades: Insights & Information Blog Postings about Edward Jones
Check out our Canadian awards and accolades: Insights & Information Blog Postings about Edward Jones
Read More About Awards & Accolades
About Us
Join a financial services firm where your contributions are valued. Edward Jones is a Fortune 500¹ company where people come first. With over 9 million clients and 20,000 financial advisors across the U.S. and Canada, we're proud to be privately-owned, placing the focus on our clients rather than shareholder returns.
Behind everything we do is our purpose: We partner for positive impact to improve the lives of our clients and colleagues, and together, better our communities and society. We are an innovative, flexible, and inclusive organization that attracts, develops, and inspires performance excellence and a sense of belonging.
People are at the center of our partnership. Edward Jones associates are seen, heard, respected, and supported. This is what we believe makes us the best place to start or build your career.
View our Purpose, Inclusion and Citizenship Report.
¹Fortune 500, published June 2024, data as of December 2023. Compensation provided for using, not obtaining, the rating.
Edward Jones does not discriminate on the basis of race, color, gender, religion, national origin, age, disability, sexual orientation, pregnancy, veteran status, genetic information or any other basis prohibited by applicable law.
#LI-HO
Senior Security Engineer
Security architect job in Las Vegas, NV
Since 2012, we've grown to become one of the leading single-family rental companies and homebuilders in the country, recently recognized as a top employer by Fortune and Great Place To Work . At AMH, our goal is to simplify the experience of leasing a home through professional management and maintenance support, so our residents can focus on what really matters to them, wherever they are in life.
The Senior Security Engineer is responsible for the research, testing, implementation, optimization, and maintenance of security products and services supported by effective change management.
Other responsibilities include cloud security and cloud risk management. Additional responsibilities can include designing, testing, and implementing secure operating systems, networks, and databases. Password auditing, network based and Web application-based vulnerability scanning, virus management, and intrusion detection. Conducting risk audits and assessments, providing recommendations for application design. Monitoring and analyzing system access logs. Planning for security backup and system disaster recovery. Managing projects/processes, working independently with limited supervision. Coaching and reviewing the work of lower-level professionals. Problems faced are difficult and sometimes complex.
Responsibilities
Research, test, implement, optimize, and maintain new security products and services to address future and current threats supported by effective change management.
Develops, maintains, and supports processes to support the IT Security Framework such as incident management, cloud risk management, and cloud security.
Act as an escalation path to Security issues and lead forensic investigations.
Identifies and investigates actual or potential information security violations. Performs follow up investigations with written reports.
Participate in application and infrastructure projects to provide security planning and implementation.
Develop dashboards and metrics that includes incident reporting and risk management reporting.
Requirements
High School Diploma or GED required
Bachelor's degree in Computer Science, Information Technology, Information Security, and/or related field preferred
Minimum of seven (7) years of experience in IT Security
Minimum of three (3) years of experience in Cloud Technologies
Experience in managing SIEM solutions
Experience in endpoint and email security solutions
Experience in Security incident management and reporting
Advanced knowledge of networking/web, phishing/cyberattacks, and incident response
CISSP, cloud security, and other security related certifications preferred
Excellent verbal and written communication, planning, analysis and organizing skills
May occasionally work evenings or weekends as this position is part of an on-call rotation.
Compensation
The anticipated pay range/scale for this position is $105,322.00 to $131,652.00 Annually. Actual starting base pay within this range will depend on factors including geographic location, education, training, skills, and relevant experience.
Additional Compensation
This position is eligible to receive a discretionary annual bonus.
Perks and Benefits
Employees have the opportunity to participate in medical, dental and vision insurance; flexible spending accounts and/or health savings accounts; dependent savings accounts; 401(k) with company matching contributions; employee stock purchase plan; and a tuition reimbursement program. The Company provides 9 paid holidays per year, and, upon hire, new employees will accrue paid time off (PTO) at a rate of 0.0577 hours of PTO per hour worked, up to a maximum of 120 hours per year.
CA Privacy Notice: To learn more about what information we collect when you apply for a job, and how we use that information, please see our CA Job Applicant Privacy Notice found at **************************************
Bank Information Security Governance Senior
Security architect job in Glendale, AZ
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplySenior Cloud Security Engineer
Security architect job in Scottsdale, AZ
We are seeking a Senior Cloud Security Engineer to join our client for a full-time, direct hire role that will be hybrid in Scottsdale, AZ. This role will design, deploy, and manage security technologies and modern automation tools for the enforcement of security controls across private and public cloud service platforms.
Location: Hybrid in Scottsdale, AZ (4 days onsite)
Compensation: This job is expected to pay about $130,000-150,000 plus benefits
Relocation Assistance Available
What You'll Do:
Design, implement, and maintain custom and native security services across large-scale hybrid multi-cloud environments.
Automate and orchestrate secure cloud migrations and operations using configuration management tools and workflows.
Partner with architecture, engineering, and operations teams to deploy security controls aligned with business strategies and industry standards (NIST, CIS, ISO 27001/31000, CSA).
Manage PKI services, certificate lifecycle, cryptographic solutions, SSH key management, CSPM, and CWPP platforms.
Integrate DevSecOps practices into CI/CD pipelines, including vulnerability scanning (SAST, DAST, SCA), IaC scanning, and secure coding guidance.
Maintain CSPM vulnerability dashboards for multi-cloud environments; generate compliance and leadership reports.
Configure and optimize WAF, DDoS, and bot protection policies.
Collaborate with SOC to develop Splunk event management, integrate cloud/SaaS logs, and enhance security alerting.
Contribute to enterprise security standards, documentation, and architecture diagrams.
Provide Tier III/IV support, knowledge transfer, and escalation for security and network operations.
What Gets You the Job:
5+ years in cloud security and/or IT security engineering.
Expertise in AWS, Azure, Salesforce, and Google Cloud; strong SaaS and application workload security knowledge.
Background in Windows Server, Linux (RHEL), Apache, SAP Hybris, MySQL, Tomcat, and native cloud services.
Strong understanding of network/web protocols (TCP/IP, UDP, IPSEC, HTTP/S, routing).
Proficient in automation/scripting with Java, JSON, Python, Bash, or similar.
4+ years with LDAP/AD, cloud identity federation, OIDC/OAuth2, and SAML2 SSO.
Skilled in PKI, certificate lifecycle, cryptographic solutions, and SSH key management.
Knowledge of DevOps, Jenkins CI/CD, BitBucket, and secure coding practices for common vulnerabilities.
Please send your resume to Hannah Xu, Senior Technical Recruiter for immediate consideration.
Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders - bringing you opportunity coupled with personal growth, and professional development! Join us. Let us catapult your career!
Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
Cyber Security Analyst
Security architect job in Las Vegas, NV
We're looking for a seasoned Cybersecurity Analyst to take the fight to advanced threats. From incident response and malware analysis to threat hunting and vulnerability management, you'll be on the front lines safeguarding our systems, data, and users while contributing to the overall program maturity. If you thrive on solving complex problems and driving continuous improvement, this is your mission.
Job Responsibilities
Monitor and analyze security tools, systems, and network activity for threats or suspicious behavior.
Investigate and triage alerts, perform threat hunting, and conduct malware and phishing analysis.
Manage the full lifecycle of security incidents, from detection through resolution and documentation.
Conduct vulnerability assessments, detection validation, and regular security reviews or audits.
Maintain and optimize security monitoring platforms, infrastructure, and tooling.
Collaborate with IT and third-party partners to implement security controls, apply fixes, and support incident response.
Develop and maintain incident response playbooks, procedures, and security awareness initiatives.
Ensure compliance with internal policies, industry standards, and regulatory requirements.
Generate and maintain reports, dashboards, and metrics for ongoing security performance tracking.
Provide occasional after-hours or on-call support as part of incident response efforts.
Perform other related tasks as assigned.
Technical Requirements
Proficiency with SIEM tools and EDR platforms.
Strong understanding of network protocols, security principles, and operating systems (Windows, Linux).
Hands-on experience with firewall, IDS/IPS, and threat intelligence technologies.
Familiarity with cloud security concepts (AWS, Azure, GCP).
Knowledge of attack vectors, mitigation strategies, and incident investigation techniques.
Education & Experience
Bachelor's degree in Cybersecurity or equivalent with 2+ years of relevant experience.
2-4 years in cybersecurity operations or a similar role, ideally within a SOC environment.
Relevant certifications preferred:
CompTIA Security+, THM SAL1, HTB CJCA, Blue Team Level 1/2, Antisyphon Training
, etc.
Proven experience in incident response, risk management, and security policy development.
Strong knowledge of cybersecurity frameworks, standards, and technologies.
Required Skills
Strong analytical and problem-solving skills with attention to detail.
Excellent written and verbal communication abilities.
Ability to work independently and collaboratively in a fast-paced environment.
Skilled in documentation, reporting, and managing multiple priorities.
Highly organized, adaptable, and committed to continuous learning.
Nice to Have
Experience in retail environments or with point-of-sale systems.
Background in networking or infrastructure engineering.
Familiarity with security frameworks (NIST, ISO 27001, CIS).
Scripting skills in Python, PowerShell, or similar languages.
Architect
Security architect job in Las Vegas, NV
Kingdom & Co. is a premier design-build firm based in Las Vegas, specializing in high-end renovations, custom new builds, and luxury interiors. Recognized as an HGTV contractor and part of the 2025 AdPro list, the company blends craftsmanship, innovation, and timeless design. Kingdom & Co. transforms residential and commercial spaces into functional and stunning environments, ensuring exceptional results and client satisfaction. Committed to elevating standards of luxury living, we deliver expertise from concept to completion.
About the Role
We are a high-end, full-service design-build firm specializing in large-scale luxury remodels and new builds. We're seeking a licensed Architect with exceptional technical and project management skills to join our dynamic team. This role is ideal for a proactive problem-solver who thrives in a fast-paced, collaborative environment and takes ownership of delivering precise, buildable solutions from concept through construction.
As our Architect, you will manage the architectural documentation and coordination process-working closely with our in-house interior design team, project directors, and field managers to bring exceptional residential projects to life.
Key Responsibilities
Develop and oversee detailed architectural plans for luxury residential remodels and new construction projects, including:
Floor plans
Lighting/electrical plans
Architectural details
Material schedules
Renderings
Manage the design and documentation process from schematic design through permitting and construction.
Collaborate closely with designers, project directors, and field project managers to ensure all drawings are complete, coordinated, and construction-ready.
Review and maintain accuracy and consistency across plan sets as project details evolve.
Coordinate with structural, mechanical, electrical, plumbing, and specialty consultants to integrate engineering solutions.
Oversee and manage all permitting processes across multiple jurisdictions.
Communicate with city and county agencies to support and expedite permitting and approvals.
Qualifications
Bachelor's or Master's degree in Architecture.
Architectural license (preferred or in progress).
Proficiency in drafting software (Chief Architect preferred; AutoCAD, Revit, or similar tools a plus).
Strong understanding of residential construction methods, materials, and terminology.
Experience in a design-build environment highly preferred.
Familiarity with permitting processes and local building codes.
Exceptional attention to detail and organizational skills.
Excellent written and verbal communication skills.
What We Are Looking For:
We're seeking an Architect who thrives in collaboration-someone who works seamlessly with others, especially our in-house interior designers, to translate creative design intent into clear, buildable plans. You should be both a self-starter and a natural problem-solver, with the ability to anticipate challenges, propose solutions, and keep projects moving efficiently.
The ideal candidate is a team-oriented professional who values open communication, precision, and accountability. You take pride in your work, are comfortable coordinating with multiple disciplines, and enjoy contributing to a creative and detail-driven environment where teamwork is key to exceptional results.
Architect
Security architect job in Phoenix, AZ
Industry:
Architecture - Commercial
Pay:
$68,000 - $95,000 annually + bonus potential
Benefits:
Multiple healthcare plan options (some 100% employer-paid)
Vision, dental, and long-term care coverage
$25k life insurance policy
401(k) with up to 4% employer match and profit-sharing contributions
3 weeks PTO to start, increasing with tenure
Monthly stipend if opting out of company healthcare plans
Flexible scheduling with a 4-day in-office workweek and optional remote half-day Fridays
About Our Client:
Addison Group is partnering with a highly respected architectural firm with decades of experience delivering creative, functional, and lasting designs for a diverse range of commercial projects. The team values collaboration, innovation, and work-life balance, offering a supportive culture with long-term growth potential.
Job Description:
The Architect will lead or support design efforts across a range of commercial projects from concept to completion. This role requires advanced technical and design skills, the ability to collaborate with multidisciplinary teams, and confidence in presenting work to colleagues and clients.
Key Responsibilities:
Design and develop project concepts that align with client goals and requirements
Prepare layouts, specifications, reports, and technical documentation
Conduct planning studies, site visits, and occupancy analyses
Coordinate with internal teams and external consultants to deliver cohesive project outcomes
Provide technical guidance to junior staff (for more experienced hires)
Present work to stakeholders, both internally and externally
Qualifications:
Bachelor's degree in Architecture (required)
Licensed Architect (required)
3-8 years of professional experience in commercial architecture
Advanced Revit proficiency (must be highly efficient)
Experience with Enscape, Creative Cloud, and/or Lumion
Strong communication skills, both verbal and written
Preferred: Knowledge of Rhino or SketchUp, advanced building code knowledge, familiarity with AI tools, and professional association involvement
Additional Details:
Employment Type: Full-time, Direct Hire
Start Date: Immediate
Hours: Monday-Thursday in-office (core hours 9-4), optional remote half-day Friday
Locations: Phoenix preferred; Tucson considered with occasional travel to Phoenix
Interview Process: 1-2 in-person interviews
Perks:
Monthly outdoor BBQs during cooler months
Fall tailgates and family-friendly events
Flexible work schedule
Strong team tenure with a blend of experienced and new talent
Balanced workload - occasional busy periods but not excessive overtime
Information Security Architect
Security architect job in Phoenix, AZ
Job Description
We are looking for a Lead Information Security Architect who will be responsible for developing and maintaining a comprehensive information security architecture program and representing information security requirements for all technology solutions and business processes covering multiple technical disciplines, such as systems & networking infrastructure, DevOps, security, business applications, cloud security, and data architecture. The role oversees cybersecurity for our company's digital products, including software, firmware or products that contain code. This includes implementing a product security program designed to address cybersecurity across all stages of the product life cycle. This role identifies and oversees the mitigation of technical and operational threats; analyzes the security, supportability, and feasibility of new technology; and ensures conformance with regulatory guidelines and industry best practices.
This position requires an extremely high level of analytical problem-solving skills to diagnose and resolve complex technical issues in addition to superlative process management and communication skills.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
To be Successful in this Role
Develop an architectural vision to support the continued growth of the product suite
Working knowledge of Data Security Best Practices: At Rest, In Flight, In Use
Experience with privacy-enhancing technologies and encryption techniques.
Working knowledge of cloud security architecture strategies, frameworks, and reference models
Proven ability to develop effective partnerships with senior management and peer organizations. Must be able to explain technical concepts and problems to nontechnical senior executives
Ability to build Risk Models and analyze security weaknesses in complex technology deployments.
Provide security expertise and direction on projects related to cloud architecture and design, implementation, maintenance, governance, and risk management
Work with governance teams to establish automated processes and best practices for AWS, Azure IAM policies, roles, identity federation, etc.
Conduct automated (preferred) or manual security validation of cloud templates and/or cloud infrastructure
Collaborate with business units and corporate partners to ensure they build solutions consistent with the organization's policies, programs, architectural recommendations, and information security standards
Develop, establish, enforce, and sustain the Information Security Architecture, including standards and guidelines for infrastructure solutions and technologies, integration methodologies and practices, development processes, hardware platforms, and enterprise data design.
Partner with stakeholders in building and implementing a robust, scalable, and agile information security architecture
Partner with stakeholders in assessing the IT application & infrastructure portfolios today and design and execute the future state strategy to meet business objectives going forward.
Make recommendations on the strategic use of technology for leveraging business results and work with stakeholders to incorporate these recommendations into appropriate roadmaps and life cycle plans.
Anticipate and ensure alignment with long-term business requirements, ensuring identified change is reflected in the appropriate roadmaps, providing thought leadership both internally and externally
Minimize the number of architectural components and total cost of ownership while maintaining maximum of functional flexibility, reliability, and security.
Must be able to balance the role of strategist with urgency while simultaneously managing and delivering results in a growing and fast-paced environment.
Must demonstrate the ability to manage via influence and have the credibility and interpersonal skills to become respected as a thought leader. Must be capable of articulating pragmatic, sensible, and simple solutions while executing across multiple business and technical perspectives.
Act as a role model for service mentality, building long-term relationships with key internal customers and stakeholders, while remaining receptive to the customer's needs
Facilitate and steward the documenting of the architecture design and analysis work, including the capture and mapping of the relationships between architecture components.
You Will Have
8+ years' experience dedicated to information security architecture required with expert knowledge in building defense in-depth reference architecture
Required industry security certification (e.g., CISSP, CISM, CISA, CCSP, etc.)
Familiarity with information management practices, system development life cycle management, IT services management, agile and lean methodologies, infrastructure, and operations.
Knowledge of business ecosystems, SaaS, infrastructure as a service (IaaS), platform as a service (PaaS), SOA, APIs, open data, microservices, event-driven IT and predictive analytics.
Hands-on experience with Cloud Technologies AWS, Azure & GCP
Good understanding of security management solutions, including IDS, IPS, SIEM, Vulnerability Scanning, Denial of Service, and Continued Compliance
Experience with attacks and mitigation methods, with experience working in two or more of the following: Network protocols and secure network design; Operating system internals and hardening (e.g. Windows, Linux, OS X, Android); Web application and browser security; Security assessments and penetration testing; Authentication and access control; Applied cryptography and security protocols; Security monitoring and intrusion detection, Incident response and forensics; Development of security tools, automation or frameworks
Experience in managing and contributing to incident response
Extensive experience in developing strategic information security plans, including the development of baseline security standards, information system hardening guides, and information security requirements documentation.
Excellent analytical skills, organizational, time management, and problem-solving skills are essential.is work, including the capture and mapping of the relationships between architecture components.
Application Security Architect
Security architect job in Tempe, AZ
Summary of This Role Responsibilities range from auditing code, architecture and databases used in custom-developed web and cloud applications, to testing for common application level vulnerabilities, weaknesses, and providing both vulnerability analysis and development advise for application hardening.
Applicant must possess a strong background in software development, secure coding techniques, secure architecture, software security frameworks, common weaknesses and vulnerability analysis. Candidate should have experience securing web and mobile applications, APIs, micro-services, containers, cloud and cloud-hybrid architectures.
Responsibilities include:
• Working with application development and QA teams across multiple products to: Review, evaluate and prioritize vulnerability findings
• Provide SME support on secure code implementation, design and architecture.
• Threat-modeling & risk analysis
• Training
• Participate in providing annual OWASP & PCI training for developers
• Helps maintain updated Secure Coding Best Practices
• Common application level vulnerabilities
• Risk Management
• Findings/vulnerability prioritization
• Mitigation strategy
• Controls Evaluation - Review, validate, recommend and create standards
• Review of open-source development libraries for security risks
• Web application firewall (WAF) rule development and implementation
• Security technologies review and recommendations
REQUIREMENTS
• Qualifications: Bachelors of Computer Science or similar - 6 or more years of experience in applying Information Security best practices to Information Technology assets plus 5 or more years of experience with software development.
• Experience with static and dynamic vulnerability identification using industry leading scanning tools and manual code reviews -
• Experience with the Top 10 OWASP (Open Web Application Security Project) vulnerabilities (most critical web vulnerabilities) and how to identify and remediate them - Solid understanding of Information Security in general and the specific behaviors that would secure TSYS information assets -
• Ability to translate Information Security policies and procedures into language that a business and/or technical person can understand; and ability to effectively communicate with both non-technical and technical people -
• Strong problem solving with the ability to methodically and objectively analyze and resolve Information Security challenges - Ability to work well inside and outside the team.
******Please be inform that at this time all the positions do not have any relocation package, or the flexibility to work remotely, and do not offer any work permit, all the candidates must have their own authorization paper work.
Interested! Send your updated CV and answer the questions below:
1) Have you ever worked or applied to this company before?
2) How far are you from the location? Where are you located?
3) What are your salary expectations for this position?
4) Are you a US citizen or a green card holder? (the company will not provide any work visa, they must have their own)
5) How many years of experience do you have in this industry?
6) Why are you looking for a new opportunity
Infrastructure Security Architect
Security architect job in Las Vegas, NV
Job DescriptionInfrastructure Security Architect
At TensorWave, we're leading the charge in AI compute, building a versatile cloud platform that's driving the next generation of AI innovation. We're focused on creating a foundation that empowers cutting-edge advancements in intelligent computing, pushing the boundaries of what's possible in the AI landscape.
About the Role
The Sr. Infrastructure Security Architect is a critical, high-impact role responsible for building and enforcing a unified security architecture across High Performance Compute (HPC), cloud environments, and core organizational systems. This hybrid position combines security architecture, DevSecOps engineering, offensive security, and cross-organizational alignment, ensuring that security is integrated at the design phase-not bolted on as an afterthought.
This role will establish the enterprise-wide security architecture strategy, implement automated controls, validate safeguards through ethical hacking techniques, and ensure alignment between Infrastructure, IT, Security, Engineering, Software Development, and Compliance.
Responsibilities
1. Strategic Architecture & Long-Term Security Design
Develop and maintain a holistic security architecture roadmap spanning HPC, cloud platforms, on-prem infrastructure, and internal applications.
Architect solutions aligned with NIST 800-53, NIST CSF, CIS benchmarks, and other relevant frameworks.
Establish and evangelize a Security-by-Design culture across engineering and operational teams.
2. Automation & Engineering (DevSecOps)
Build automated pipelines for security controls, monitoring, evidence collection, and audit readiness.
Engineer automated hardening, patching, and configuration management solutions across infrastructure and cloud assets.
Integrate security directly into CI/CD workflows, cloud provisioning, and infrastructure-as-code (IaC).
3. Offensive Security & Risk Validation
Conduct hands-on ethical hacking, security testing, threat modeling, and adversarial simulations to validate security controls.
Identify systemic weaknesses, prioritize risks, and define technical mitigation strategies.
Lead or support purple-team activities with Security, Infrastructure, and Software Engineering.
4. Cross-Functional Leadership & Alignment
Partner with Infrastructure, IT, Engineering, Software Development, Security, and Compliance to ensure unified execution of security policies.
Translate regulatory and audit requirements into actionable engineering tasks.
Act as a key technical advisor during audits to ensure evidence, control operation, and documentation meet standards.
5. Governance, Policy, & Audit Support
Architect scalable processes that ensure continuous audit readiness and reduce manual evidence creation.
Define baseline security standards, technical controls, and operational guardrails.
Support certifications, assessments, and customer security reviews.
Who You Are
Required:
7+ years in Infrastructure Security, DevSecOps, or Security Architecture
Expertise in security frameworks: NIST 800-53, NIST CSF, CIS
Extensive experience designing secure cloud and HPC environments
Strong automation and engineering background (IaC, CI/CD, cloud-native security tooling)
Offensive security experience (ethical hacking, red/purple team, threat modeling)
Proven ability to lead cross-functional teams and drive organizational alignment
Experience supporting audits, governance, and compliance initiatives
Preferred
Certifications: OSCP, CISSP, GIAC (GCSA, GMOB, GCPN), or similar
Experience with SOC 2, HIPAA, PCI, or other regulated environments
Experience with GPU clusters, HPC environments, or high-throughput compute systems
Deep familiarity with cloud security (AWS, GCP, Azure)
What We Bring
Stock Options
100% paid Medical, Dental, and Vision insurance
Life and Voluntary Supplemental Insurance
Short Term Disability Insurance
Flexible Spending Account
401(k)
Flexible PTO
Paid Holidays
Parental Leave
Mental Health Benefits through Spring Health
Cloud Security Architect
Security architect job in Phoenix, AZ
Job Title : Cloud Security Architect - Service Cert Threat Modeling Experience Required - 7+ Years Must Have Technical/Functional Skills The Cloud Security Pattern Architect provides expertise to assess and certify cloud services for secure use within the organization. The role is responsible for documenting approved security patterns and embedding them into the threat modelling platform. This work ensures that cloud services are consistently evaluated, aligned with security and compliance requirements, and supported by reusable patterns.
Strong understanding of cloud security architectures across AWS, GCP, or Azure.
* Familiarity with application security and security control frameworks such as MITRE CAPEC and CWE, NIST 800-53, ISO 27001, or CIS Controls.
* Practical experience in threat modeling
Roles & Responsibilities
1. Cloud Service Assessment and Certification
* Evaluate cloud services against internal and external security requirements and control frameworks.
* Identify relevant threats, mitigations, and assurance evidence.
* Support the formal certification of services by producing assessment documentation.
2. Security Pattern Development
* Develop security patterns for approved cloud services and configurations.
* Ensure each pattern includes defined threats, mitigations, and implementation guidance.
* Structure patterns for consistency, clarity, and ease of consumption.
3. Threat Modeling Platform Integration
* Model patterns in the threat modeling tool, for the target audience, maintaining data quality and traceability.
* Align threat and control mappings within the tool to the organization's assurance framework.
4. Collaboration and Continuous Improvement
* Work with architecture, security, and compliance teams to streamline service certification. • Review updates from cloud providers and revise patterns as required.
* Provide knowledge transfer and guidance on using patterns effectively.
Cloud security certifications (e.g., AWS Certified Security - Specialty, Azure Security Engineer Associate).
* Prior work developing or maintaining threat libraries or security control mappings.
Salary Range - $100,000 to $130,000 per year
TCS Employee Benefits Summary:
Discretionary Annual Incentive.
Comprehensive Medical Coverage: Medical & amp; Health, Dental & Vision, Disability Planning & Insurance, Pet Insurance Plans.
Family Support: Maternal & Parental Leaves.
Insurance Options: Auto & Home Insurance, Identity Theft Protection.
Convenience & Professional Growth: Commuter Benefits & Certification & Training Reimbursement.
Time Off: Vacation, Time Off, Sick Leave & Holidays.
Legal & Financial Assistance: Legal Assistance, 401K Plan, Performance Bonus, College Fund, Student Loan Refinancing.
#LI-JS2
Security Architect / Head of Security
Security architect job in Draper, UT
Redo is building the most comprehensive platform for ecommerce growth. We help merchants personalize every step of the buyer journey to maximize profit and lifetime value. From returns to warranties, order tracking, post-purchase comms, and beyond, our AI-native suite replaces fragmented point solutions with a unified platform that boosts customer experience, retention, and revenue.Position Title: Security Architect / Head of SecurityPosition Overview: We are seeking a talented Security Architect to join our team at Redo. In this role, you will take ownership of designing and growing our security architecture, security compliance, and risk management strategy. You will champion security best practices across engineering, product, and legal functions, and lead efforts to ensure threats are proactively identified and mitigated.
Responsibilities:
Establish and evolve Redo's security architecture across infrastructure, applications, and data flows
Partner with engineering and product to embed security by design and default throughout our development lifecycle
Lead threat modeling, risk assessments, and architectural reviews for new features and systems
Design and implement tools and processes for security monitoring, incident detection, response, and prevention
Define and drive secure coding standards, development workflows, and security automation
Educate and influence teams across the company on security principles and secure development practices
Lead internal compliance initiatives aligned with relevant security frameworks and policies
Qualifications:
4+ years experience architecting secure systems in cloud-native environments (e.g., AWS, GCP, Azure)
Proven track record of building security programs and practices in high-growth product companies
Deep knowledge of threat modeling, system hardening, incident response, and security tooling
Strong programming or scripting skills
Excellent communication and collaboration skills, able to work effectively with product, legal, and engineering partners
Demonstrated ability to operate autonomously while offering mentorship and guidance to others
Preferred Qualifications:
Security leadership experience in early-stage or fast-growing startup environments
Familiarity with SaaS-relevant compliance frameworks (e.g. SOC 2, GDPR, ISO 27001)
Experience securing IaC and CI/CD pipelines with infrastructure security best practices
Familiarity with infrastructure-as-code tools such as Terraform or CDK
Contributions to open-source security tooling or industry security standards initiatives
Redo benefits and perks:
Opportunity to work with a dynamic and innovative team in the fast-growing e-commerce industry
Career growth and advancement
On-site gym with showers, pickleball, and basketball
Flexible PTO & company holidays
Redo perks, monthly allowance to make purchases from ecommerce stores to support both existing and potential customers
Company HSA contributions
Weekly lunches & fully stocked break room
$100 monthly babysitting perk reimbursement
Office is minutes from biking and running trails
Sentinel - Systems Security Engineer - 16416
Security architect job in Roy, UT
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Join Northrop Grumman on our continued mission to push the boundaries of possible across land, sea, air, space, and cyberspace. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today.
Northrop Grumman Defense Systems is seeking a Systems Security Engineer, (Level 2), that will support the Sentinel (GBSD) program performing Hardware Assurance.
This position will be located in Roy, UT and will support the Ground Based Strategic Deterrent (GBSD) program.
The Mission Defense Team (MDT) is seeking a highly motivated and qualified system engineer to serve as a Hardware Assurance Engineer, Level 2. You will be responsible for assessing and prioritizing a broad spectrum of hardware security threats. Key protection activities will involve vendor research, hardware assurance, program protection, counterfeit prevention, and supply chain security.
Additional Responsibilities include:
Assessment and analysis of threats, vulnerabilities, and risk for identified mission-critical functions and critical components
Support courses of action based on knowledge and experience, initiative, guidance, and established regulations and policies
Research, analyze data, and derive facts per identified vulnerabilities
Participate in a variety of working groups and customer meetings; ensure communication of risk environment with stakeholders
Contributes to program plans, goals, objectives, and milestones to for Hardware Assurance
Review technical security assessments of SSE environments to identify points of vulnerability, non-compliance with established standards and regulations and recommended mitigation strategies
Execute completion Statement of Work requirements, Program Milestone Exit Criteria, and program maturity commitments
Ensure the architecture and design of systems are functional and secure; support the design, development, implementation, and integration of security systems and system components
Self-starters compelled to take action in the workplace without requiring prompting from supervisors
Support MDT with other duties as assigned
In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well
Basic Qualifications
Must be a US Citizen with an active DoD Secret Clearance, at time of application, current and within scope, with an investigation date within the last 6 years
Must have the ability to obtain and maintain Special Access Program (SAP) approval within a reasonable period of time, as determined by the company to meet its business need
Requires a bachelor's degree in a STEM (Science, Technology, Engineering or Mathematics) discipline from an accredited university and 2 years of related experience; or a master's degree with 1 year
Minimum 2 years of applying and understanding Systems Security Engineering principles applicable to US Government Defense Programs
Minimum 2 years in showing the ability to communicate effectively and clearly present technical approaches and findings
Experience in any of the full product life cycles of: ASIC Design, FPGA Design
Experience in HDL (VHDL/Verilog), implementing designs using RTL
Ability to show self as team player, able to multi-task, able to generate quality work products independently, able to make excellent judgement and show interpersonal skills
Preferred Qualifications
Degree in Aerospace Engineering, Systems Engineering, Mechanical Engineering, Software Engineering, or similar
ICBM Experience
Experience developing Systems Security Engineering requirements for hardware and software assurance
Evaluating program processes and compliance strategies for large, complex multi-site programs
Demonstrated experience and familiarity with vulnerability management
Experience with Model-based Systems Engineering (MBSE) concepts and tools
A solid understanding of Program Protection applicable to US Government Defense Programs and applied knowledge in the application of SSE principles across a broad spectrum of security measures (Cybersecurity, Counterfeit Awareness, Anti-Tamper, HW/SW Assurance, OPSEC, etc.) to protect critical program information (CPI)
Top Secret clearance
Position Benefits
As a full-time employee of Northrop Grumman, you are eligible for our robust benefits package including:
Medical, Dental & Vision coverage
401k
Educational Assistance
Life Insurance
Employee Assistance Programs & Work/Life Solutions
Paid Time Off
Health & Wellness Resources
Employee Discounts
******************************************************************
This position's standard work schedule is a 9/80. The 9/80 schedule allows employees who work a nine-hour day Monday through Thursday to take every other Friday off.
This role may offer a competitive relocation assistance package.
#Sentinelsystems
Primary Level Salary Range: $77,200.00 - $115,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyDirector of Information Security
Security architect job in Pleasant Grove, UT
at our UT HQ
We are seeking an experienced Director of Information Security to lead our comprehensive security program across our diverse technology portfolio. This role requires a strategic leader capable of managing security and compliance initiatives across cloud environments, on-premises data centers, unified communications platforms, and customer-deployed solutions. The ideal candidate will bring deep expertise in regulatory compliance frameworks and emerging AI governance while building and maintaining a security culture that enables business growth. This position will report to the Vice President of Operations & Security.
Key Responsibilities
Strategic Security Leadership
Develop and execute a comprehensive information security strategy that addresses the unique requirements of cloud-based services, on-premises infrastructure, and customer-deployed solutions
Establish security governance frameworks that scale across multiple deployment models while maintaining consistent security posture
Partner with executive leadership to align security initiatives with business objectives and risk tolerance
Lead security architecture reviews for new products and features across all platforms
Multi-Environment Security Management
Oversee security operations across hybrid cloud environments and proprietary data centers
Implement and maintain security controls for unified communications platforms, including softphone applications and mobile/desktop clients
Design security frameworks for products deployed within customer premises that balance security requirements with customer autonomy
Manage vulnerability assessment and remediation programs across all infrastructure types
Compliance and Risk Management
Maintain and expand compliance certifications including SOC 2 Type 2, ISO 27001, HIPAA, PCI DSS, FedRAMP, and so on
Lead annual audits and assessments, coordinating with internal teams and external auditors
Develop and maintain comprehensive risk registers and treatment plans
Ensure compliance with industry-specific regulations relevant to our diverse customer base
Establish and maintain AI governance policies and ethical use frameworks for AI-enabled features
Security Operations and Incident Response
Develop incident response plans that address the unique challenges of distributed architectures
Coordinate security incident response across cloud, on-premises, and customer-deployed environments
Establish threat intelligence programs to proactively identify and mitigate emerging risks
Team Development and Collaboration
Guide, mentor, and retain a high-performing security team
Foster security awareness and best practices across the organization through training and communication programs
Collaborate with engineering, product, and operations teams to embed security into development lifecycles
Serve as the primary security liaison with customers, partners, and regulatory bodies
Required Qualifications
Experience
5+ years of progressive experience in information security, with at least 2 years in a senior leadership role
Proven track record managing security for organizations with hybrid cloud/on-premises architectures
Direct experience securing unified communications platforms, VoIP systems, or similar real-time communication technologies
Demonstrated success achieving and maintaining SOC 2 Type 2 and ISO 27001 certifications
Experience developing and implementing AI governance policies and responsible AI frameworks
Background in securing multi-tenant SaaS platforms and customer-deployed enterprise software
Technical Expertise
Deep understanding of cloud security architectures (AWS, Azure, GCP)
Expertise in network security, identity and access management, and data protection
Knowledge of secure software development practices and DevSecOps methodologies
Familiarity with telecommunications security standards and unified communications protocols
Understanding of zero-trust architectures and modern security frameworks
Leadership and Communication
Exceptional ability to communicate complex security concepts to technical and non-technical stakeholders
Experience presenting to boards, executive committees, and external auditors
Proven ability to influence and drive security initiatives across diverse teams
Track record of building collaborative relationships with engineering and product organizations
Preferred Qualifications
Advanced degree in Computer Science, Information Security, or related field
Professional certifications such as CISSP, CISM, or CRISC
Experience with privacy regulations including GDPR, CCPA, and HIPAA
Background in telecommunications or unified communications industry
Experience with FedRAMP or other government compliance frameworks
Knowledge of container security and microservices architectures
Auto-ApplySAP GRC/Security Consultant
Security architect job in Phoenix, AZ
Job Title: SAP GRC/Security Consultant Company: Turnkey Consulting
Turnkey Consulting is a leading advisory and implementation organization with deep expertise in risk management, governance, and compliance & security. Having the ability to provide end-to-end solutions that integrate technology, process, and people. Our business started within the SAP ecosystem, however expansion into being an agnostic partner, now gives us a wider range of solutions to support our customers, while securing their wider estate. Turnkey Consulting helps businesses optimize their risk management, security and compliance programs, protect against Cyber threats, reduce costs, and improve their operational efficiency. With a team of seasoned risk professionals and a commitment to excellence, we empower businesses to proactively protect their critical assets and stay ahead of evolving threats.
Job Summary
The candidate will play a key role in handling client engagements, as well as utilizing strong technical experience to find solutions that best fit our clients' needs. We are looking for a team-player and strong all-rounder with at least 2 implementations and 2 years of practical experience in the following areas
Detailed understanding of the SAP authorization concept in one or more of the following areas: ECC, SAP S/4 HANA, HCM, CRM, SRM, BW, BI, BPC, SAP HANA
Experience of designing, building and implementing SAP security and authorization solutions
Exposure to various system user interfaces (UI), including SAP but also other relevant SaaS products
Detailed understanding of SAP GRC suite of applications, with a demonstrable specialism in core modules contained within (ideally v12 onward)
Experience of IDM solutions, either SAP's IDM solution, or non-SAP, such as SailPoint or Saviynt would be of advantage.
Experience of third-party solutions to secure SAP estates also an advantage
Experience of SAP Fiori catalogs, groups, pages and spaces
Experience of SAP IAG solutions would be an advantage, both IAS and IPS
Our experienced consultants are a key driver of our success as one of the most trusted names in the end-to-end security arena and we are committed to delivering to a consistently high standard. Key responsibilities of the role are:
Task management of large / complex implementations, especially in Application security or enterprise risk/identity projects
Implementation of GRC technology and supporting modules
Work with clients to understand "why" they're in need of such solutions, define requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving relevant application systems and processes
Advise clients on controls in their enterprise systems relating to regulatory or legislative compliance
Review and advise on security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are looking ideally for someone with the following attributes:
The ability to troubleshoot and diagnose problems / issues and provide prompt, robust resolution
An enquiring mind to discover "why" clients need to introduce the controlling measures.
The ability to manage projects within varied client engagements and lead reviews and implementations
Knowledge of corporate business processes and their control points
Good understanding of various IT regulations and standards, including: Sarbanes Oxley, COBIT, ISO series & the GDPR
Bachelor's degree
Professional certification (e.g. CISA, M.Inst.ISP, CISSP, ISO)
SAP certification (Security, GRC)
Consulting background
Strong written and verbal communication skills
Integration experience
Ability to act as an SME to install, design, engineer and configure security solutions to meet client needs
Ability to effectively manage own time and priorities effectively and to work both as part of a team and individually.
Able to communicate technical and functional requirements to both the business and IT
Key responsibilities of the role will include:
Project manage large / complex SAP Security implementations, especially for S/4 HANA projects
Implementation of GRC Access Controls and supporting modules
Work with clients to understand requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving SAP systems
Advise clients on controls in SAP relating to regulatory or legislative compliance
Review and advise on SAP security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.
Senior Analyst Info Security
Security architect job in Las Vegas, NV
The Senior Analyst Info Security is responsible for leading and supporting both short-term and long-term cybersecurity initiatives across the enterprise. This includes managing and maintaining secure systems, data, and network infrastructure, as well as conducting enterprise-wide security gap assessments, vulnerability remediation, and implementation of security controls. The role also encompasses the development and enforcement of compensating controls and exception management processes to ensure the organization's security posture remains resilient and compliant with industry standards. This role promotes a security-first mindset across the organization and contributes to the continuous improvement of the enterprise's security posture through proactive monitoring, technical support, and training initiatives.
Essential Functions & Responsibilities:
Manage the full lifecycle of cybersecurity toolsets, including planning, acquisition, deployment, administration, monitoring, and decommissioning.
Provide incident response and issue management for security investigations, including intrusion detection, malware, denial of service attacks, and privileged account misuse.
Develop and maintain standard operating procedures and training materials.
Monitor security alerts and logs to identify and investigate potential threats, reducing incident response time and improving detection accuracy.
Collaborate with IT and business units to ensure security controls are implemented and maintained across enterprise systems.
Provide high-level technical support, including configuration changes, policy recommendations, and diagnostics of network security issues.
Maintain awareness of regulatory gaming requirements, internal control standards (MICS), and enterprise policies related to information security.
Manages and maintains PCI compliance. This includes implementing PCI policy, standards, and procedures, assigning training and tracking to completion, and working with PCI assessors in assuring compliance.
Participate in operational planning and contribute to strategic security initiatives.
Promote a culture of security awareness and operational excellence across departments.
Emergency on-call to support after-hours security incidents and operational support.
Perform other duties as assigned to support the efficient operation of the department.
Required Qualifications:
Ability to secure and maintain a Nevada Gaming Registration.
High School diploma or GED required.
Bachelor's degree in information technology, Information Security, or a related field preferred.
Minimum of 6 years of experience in information security or related roles.
Experience in casino environments is strongly preferred.
Familiarity with the following technologies and practices:
Data Loss Protection
Forensic Software Suites
Network Infrastructure
Virtualization Platform Security
Operating Systems Security
Access Management and Privileged Access Management
Security Information and Event Monitoring (SIEM)
Incident Response Programs
PCI (Payment Card Industry)
Strong communication and presentation skills.
Ability to troubleshoot using the OSI model and analyze network traffic.
Understanding of standards, policies, procedures, and operational effectiveness.
Ability to work in a fast-paced, high-demand environment.
Certifications from organizations such as ISC2, CompTIA, ISACA, GIAC, or equivalent preferred (e.g., CISSP, Security+, CISM).
Physical Demands & Work Environment:
The physical demands and working environment described here are representative of those that an employee encounters and must be met by an employee to successfully perform the essential functions of this job.
Primary work environment is in a climate-controlled office setting.
Work requires travel to attend meetings, trade shows, and conferences.
Incumbents may be required to work evening, weekend and holiday shifts.
Must be able to work in a fast-paced, high-demand environment.
Strength sufficient to exert up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects and/or move up to 40 pounds occasionally.
Sedentary work: involves sitting most of the time. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine, and computer printer.
Physical activities that apply to the essential functions of the position are balancing, stooping, kneeling, crouching, reaching, pushing, pulling, lifting, grasping, talking, hearing, and repetitive motions.
Hearing sufficient to hear conversational levels in person, via videoconference and over the telephone.
Speech sufficient to make oneself heard and understood in person, in front of groups, in meetings, via videoconference and over the telephone.
Visual acuity that meets the requirements of the position: The worker is required to have close visual acuity to perform an activity such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading and visual inspection of employees, visitors or facility.
Mobility sufficient to safely move in an office environment, walk, stoop, bend and kneel, and enter, exit and operate a motor vehicle in the course of travel to promotional events, meetings, conferences, trade shows and San Manuel properties.
Endurance sufficient to sit, walk and stand for extended periods, and maintain efficiency throughout the entire work shift and during extended work hours.
The employee may be exposed to fumes or airborne particles including secondhand smoke.
Equal Opportunity Employer:
Palms Casino Resort provides equal employment opportunities to all team members and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws.
Palms Casino Resort, its affiliates and subsidiaries, will make reasonable accommodations in compliance with applicable law.
We are committed to creating a work environment where the growth and well-being of our team members is the top priority. Join our team today!
Auto-ApplySenior Security Engineer - Application
Security architect job in Saint George, UT
Job Description
Vasion is seeking a Senior Security Engineer - Application who embodies our core values and is eager to join our dynamic team. We are dedicated to enabling digital transformation for everyone by providing an affordable, integrated SaaS solution that simplifies business operations. Vasion offers a flexible working environment for our 400+ employees around the globe, including at our headquarters in St. George, Utah, and offices in the UK, Germany, and Lehi, Utah.
Role Overview
As a Senior Security Engineer-Application Security, you will be responsible for safeguarding our software applications from security vulnerabilities and threats. You will work closely with development teams to integrate security best practices throughout the software development lifecycle, perform security assessments, and respond to emerging threats. Your role is crucial in ensuring our applications remain secure and compliant with industry standards.
Responsibilities
Analyze code from penetration test and make security recommendations to improve the security posture of the application.
Analyze security systems and seek improvements on a continuous basis
Report possible threats or software issues
Research weaknesses and find ways to counter them
Find cost-effective solutions to cybersecurity problems
Understand software, hardware and internet needs while adjusting them according to our business environment
Develop best practices and security standards for the organization
Test company software, firmware and firewalls
Monitor production networks for security issues.
Investigate security breaches and other cybersecurity incidents.
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
Document security breaches and assess the damage they cause.
Work with the security team to perform tests and uncover network vulnerabilities.
Fix detected vulnerabilities to maintain a high-security standard.
Develop company-wide best practices for IT security.
Perform penetration testing.
Help colleagues install security software and understand information security management.
Research security enhancements and make recommendations to management.
Stay up-to-date on Cybersecurity trends and security standards.
Requirements
Bachelor's degree in computer science or cyber security or equivalent job experience
3 + years experience in information security or related fields.
Proven experience in conducting security assessments, code reviews, and penetration testing.
Familiarity with secure software development practices and tools.
Strong understanding of web and mobile application security vulnerabilities (e.g., OWASP Top Ten).
Familiarity with programming languages such as Go, PHP, Python, or JavaScript.
Experience with security tools such as Burp Suite, OWASP ZAP, static and dynamic analysis tools.
Knowledge of cloud security (e.g., AWS, Azure) and container security (e.g., Docker) is desirable.
Excellent problem-solving skills and attention to detail.
Strong communication skills, with the ability to explain complex security issues to non-technical stakeholders.
Ability to work independently and collaboratively in a team environment.
Benefits
Flexible work environment
Discretionary Vacation Bonus
Flexible paid time off
Paid parental leave
Competitive pay
A full suite of traditional benefits
Training/Advancement opportunities
401k with company match and immediate vesting
Financial wellness education
Company-contributed HSA
Onsite perks include gym, pickleball, snacks & drinks, arcade, theater room, etc.
Our Core Values
Vasion looks for people who will exemplify its four core values and are driven to become:
Action Owners, with principles drawn from Extreme Ownership by Jocko Willink and Leif Babin
Candor Seekers, illustrated in Radical Candor by Kim Scott
People Builders, as detailed in Leadership and Self-deception by The Arbinger Institute
Storytellers, guided by principles from Building a StoryBrand: Clarify Your Message So Customers Will Listen by Donald Miller
WE ARE CURRENTLY HIRING REMOTELY IN THE FOLLOWING STATES: AL, AR, AZ, CA, CO, FL, GA, ID, IL, IN, KY, MA, MD, MI, MN, MO, MT, NC, NE, NJ, NM, NV, NY, OH, OR, PA, TN, TX, UT, VA, VT, WA, WY
More about Vasion
Visit ********************** to learn more about Vasion.
Additional Information
Vasion is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, national origin, disability, veteran status, gender identity, sexual orientation and other legally protected characteristics.
Virtual Chief Information Security Officer
Security architect job in Flagstaff, AZ
OverviewWe are a managed service provider specializing in Department of Defense contractor environments and CMMC 2.0 compliance. The vCISO will lead client security programs end-to-end, aligning cybersecurity strategy with CMMC requirements (Levels 1-3), NIST SP 800-171/172, and DFARS ************. This role is responsible for designing and governing right-sized security programs for small to mid-sized organizations handling FCI and CUI, ensuring audit readiness, measurable risk reduction, and sustainable compliance.
Key Responsibilities
Program Leadership and Governance
Serve as the executive security leader for multiple client accounts; establish governance, KPIs, and roadmaps aligned to CMMC and business objectives.
Chair client security steering meetings and deliver QBRs, risk reports, and executive briefings.
CMMC Strategy and Readiness
Perform gap assessments against CMMC 2.0 practices and processes; produce SSPs, POA&Ms, and remediation plans.
Guide clients through SPRS scoring, readiness for C3PAO assessments, and ongoing compliance maintenance.
Advise on CUI data lifecycle, scoping and boundary definition, enclave strategies, and inheritance from MSP/MSSP services.
Risk Management and Policy Framework
Build and maintain risk registers; conduct risk assessments and business impact analyses.
Author and maintain policy, standards, and procedures mapped to CMMC, NIST SP 800-171, and applicable customer contracts.
Security Architecture and Controls Implementation
Design pragmatic control architectures for SMB environments leveraging Microsoft 365 (E5), Azure AD/Entra, Intune, Defender, Sentinel, and GCC High where appropriate.
Oversee implementation of access control, logging/monitoring, vulnerability management, patching, backup/restore, DLP, email security, endpoint hardening, and zero trust principles aligned to CMMC practices.
Incident Preparedness and Response
Establish IR plans/playbooks, conduct tabletop exercises, and coordinate response with clients and MSP/MSSP partners.
Ensure DFARS ************ cyber incident reporting readiness and evidence collection procedures.
Audit and Evidence Management
Build evidence catalogs and objective artifacts mapped to CMMC assessment objectives.
Coordinate internal readiness reviews and act as liaison with C3PAOs, RPOs, and assessors.
Third-Party and Supply Chain
Assess and manage third-party risks, flow-down requirements, and sub-contractor compliance related to CUI handling.
Client Advisory and Enablement
Educate executives and technical teams on CMMC nuances, including scoping pitfalls, inheritance, assessment objectives, and sustainment.
Develop program budgets, roadmaps, and SOWs; prioritize remediation to maximize SPRS score improvements and audit outcomes.
Qualifications
7+ years in cybersecurity with 3+ years in a CISO, vCISO, or senior security leadership capacity serving multiple clients.
Proven, hands-on experience building and sustaining CMMC 2.0 and NIST SP 800-171-aligned programs, including SSP/POA&M development, evidence management, and audit readiness.
Deep understanding of CMMC 2.0 levels, domains/practices, assessment objectives, and the DoD ecosystem (C3PAO process, RPO role, SPRS, eMASS concepts).
Demonstrated success leading security programs in SMB/manufacturing/DoD supplier environments handling FCI/CUI and DFARS ************ requirements.
Bachelor's degree in Information Security, Computer Science, or related field; equivalent experience considered.
Relevant certifications strongly preferred:
CISSP, CISM, CCISO, or CISA
CMMC-focused credentials such as CCP, RP, or CCA
Additional: ISO 27001 Lead Implementer/Auditor, CEH, GCCC/GCIH/GCLD (nice to have)
U.S. citizenship required; ability to work with ITAR/EAR-restricted information. Security clearance a plus but not required.
Consulting/MSP experience managing multiple concurrent client programs.
Core Skills
CMMC/NIST Expertise
CMMC 2.0 scoping, boundary definition, inheritance, assessment objectives, and POA&M constraints.
NIST SP 800-171/172 control interpretation and practical implementation in SMB environments.
DFARS cyber clauses, incident reporting expectations, and contractual flow-downs.
Technical Leadership
Designing and governing security controls across Microsoft 365, Azure/Entra, GCC High, SIEM/SOAR (e.g., Sentinel), EDR/XDR, vulnerability management, identity, and zero trust.
Data protection for CUI: data flow mapping, labeling/marking, DLP, encryption, key management, and secure enclaves.
Governance, Risk, and Compliance (GRC)
Policy/standard/procedure authoring; evidence collection; audit liaison; risk quantification; metrics/KPIs.
Hands-on with GRC platforms and evidence workflows.
Communication and Stakeholder Management
Executive-level storytelling, board-ready reporting, and the ability to translate assessment objectives into actionable workstreams.
Vendor management, SOW creation, and prioritization under budget/time constraints.
Operational Excellence
Building repeatable program playbooks for SSP/POA&M, change management, vulnerability/Patch SLAs, logging/retention, and backup testing.
Incident response readiness, tabletop execution, and post-incident corrective action governance.
Auto-Apply