Post job

Security architect jobs in Shawnee, KS

- 30 jobs
All
Security Architect
Security Engineer
Senior Information Security Analyst
Senior Security Engineer
Information Security Manager
Information Security Engineer
Information Technology Security Manager
Information Security Officer
Senior Information Security Engineer
Cyber Security Analyst
Cyber Security Specialist
Network Security Consultant
  • Infrastructure Security Engineer

    Inceed 4.1company rating

    Security architect job in Lenexa, KS

    Infrastructure Security Engineer Compensation: $40-50 /hour, depending on experience Inceed has partnered with a great company to help find a skilled Infrastructure Security Engineer to join their team! Join a dynamic team in a company that values culture and work-life balance. As an Infrastructure Engineer, you will play a crucial role in designing and maintaining a secure hybrid infrastructure. This is an exciting opportunity for someone who thrives in a technical environment and is passionate about security compliance. Enjoy working in a supportive and collaborative setting where your skills and expertise will make a significant impact. Key Responsibilities & Duties: Design and manage Azure environments and Azure Virtual Desktop. Ensure compliance with security frameworks like CMMC and NIST. Administer Windows Server and Active Directory. Implement and monitor network security. Translate compliance requirements into technical controls. Collaborate with high-level executives and cross-functional teams. Required Qualifications & Experience: Bachelor's degree in IT or 10 years of IT experience. Proven experience with cloud and on-premises environments. Strong understanding of CMMC or NIST frameworks. Excellent written and verbal communication skills. Strong analytical and troubleshooting skills. Nice to Have Skills & Experience: Experience with Hyper-V and VMware. Knowledge of PowerShell scripting and automation. Familiarity with vulnerability management and incident response. Perks & Benefits: 3 different medical health insurance plans, dental, and vision insurance Voluntary and Long-term disability insurance Paid time off, 401k, and holiday pay Weekly direct deposit or pay card deposit If you are interested in learning more about the Infrastructure Security Engineer opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law. #IND
    $40-50 hourly 4d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security architect job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems. Bachelor's degree (B. A.) from four-year college or university; or three to five years advanced information security experience and/or training; or ten years of combined information systems and information security experience; and three to five years supervisory experience; and/or equivalent combination of education and experience. Professional certification of CISA or CISSP desirable. Must have advanced knowledge of general information security equipment and functionality. OR Professional certification of CISA or CISSP desirable. Must have advanced knowledge with PC and LAN servers, security firewalls, intrusion protection systems, cloud based security systems , and other Information Security related technologies.
    $118k-154k yearly est. 1d ago
  • Senior Information Security Engineer

    Federal Reserve Bank 4.7company rating

    Security architect job in Kansas City, MO

    Company Federal Reserve Bank of Chicago The Federal Reserve Bank of Chicago is one of 12 regional Reserve Banks that, along with the Board of Governors in Washington, D.C., make up our nation's central bank. Our work promotes a safe, sound, and stable financial system which fosters an economy that works for everyone, so people can find jobs and prices remain stable. Together, we serve in an innovative environment that values our employees and applies the highest ethical standards. Our culture is deeply rooted in our service to our nation and our organizational values of integrity, service, innovation, inclusion, growth, and development. As an employee with us, you'll find support to grow amongst a diverse team, while feeling united by our clear and common purpose. About FRFS The Federal Reserve Financial Services (FRFS) enterprise delivers a suite of payments services to financial institutions via FedLine Solutions, Fedwire, National Settlement Service (NSS), FedCash, FedACH (Automated Clearing House), and Check Services. The Customer Operations and Security team is responsible for the security of the FRFS aggregate infrastructure and production operating environment, including customer (e.g., depository institution) security. Our work spans incident response for customer security events, threat landscape and intel gathering, insider risk management, vulnerability management and technical currency coordination, and end-to-end observability of key security events across the FRFS infrastructure. This team builds and runs the real-time "common operating picture" capability for security end-to-end from the customer to the FRS. The Senior Information Security Engineer role includes the following responsibilities: * Manages and maintains the organization's vulnerability management program, including but not limited to: * compiling metrics and performance across the enterprise and its products; * improving and maintaining processes to categorize vulnerabilities and route to appropriate implementation teams for resolution; * supporting FRFS cyber risk assessment, evaluation and tolerance processes; * tracking and ongoing reporting of key performance and risk indicators; * serving as a liaison between FRFS IS and other key internal and external stakeholders (i.e., FRFS Enterprise Risk, FRFS Resiliency, auditors, and external customers and Financial Services industry partners, etc.). * Establishes and maintains end-to-end observability processes and improvements, including but not limited to: * defining key alerts and monitors in centralized tools to support an effective incident response process; * ensuring effective monitoring to support a robust end-to-end security posture; * collaborating with other shared services teams to bring the vision to reality in iterative and incremental fashion. * Key participant in cyber incident response processes and maintainer of associated processes and procedures. * Maintains relationships with business areas that interact with FRFS, District, and National governance processes in a moderately complex manner on a regular basis. * Supports the collection and tracking of cybersecurity and threat intelligence information via open-source and private partnerships. The primary desired work location for this position is Chicago, Kansas City, or New York, but candidates that live anywhere in the continental US will be considered. The level of work required is considered intermediate to advanced and staff must be able to work under general to limited supervision. This job does not have any direct reports. This position is full time in the office with flexibility and may require you to travel as much as 10% of the time. Your Background: * Experience supporting agile processes utilizing DevSecOps frameworks * Experience in end-to-end monitoring and alerting solutions, SIEMs, and equivalent technologies in support of anomalous activity monitoring/escalation/triage. * Familiarity with Splunk, DataDog, and related SIEM tools. * Familiarity with contemporary scripting tools such as Powershell, Unix shells, etc. * Familiarity with security orchestration and data transformation processes * Experience supporting cyber incident response activities. * Experience collaborating with senior management to define, track and manage key risk indicators (KRIs) used to assess security and operational posture. * Experience collaborating in cross-functional teams to implement industry best practices such as least-privilege enforcement, infrastructure segmentation, DNSSEC, and zero trust architecture. * Experience supporting open-source intel gathering and socialization to ensure situational awareness of key threats facing private and public organizations and the financial services industry. * Familiarity with cryptographic and public key technologies including, but not limited to, TLS, PKI, Multi-factor Authentication solutions, RSA, and Elliptic Curve Cryptography. * Familiarity in low-code/no-code workflow solutions and application lifecycle management solutions. * Bachelor's degree in computer science, information systems, business, or a related field; or the equivalent combination of education and experience. * 3+ years of demonstrated experience in program management, workflow automation, and/or incident response within an IT enterprise. * Strong oral and written communication skills to support engagement across technical and business stakeholders. * Learning mindset geared toward innovation and creativity for applying technology capabilities in new ways, necessary for both the delivery of effective technology and business solutions. * Existing SECRET security clearance or must meet eligibility requirements to apply for clearance. What we offer * Comprehensive benefits package include medical, dental, vision, prescription drug coverage, 401k savings plan, retirement plan, paid time off, transit benefit, onsite gym and subsidized cafeteria * A continuous learning environment with opportunities to gain new skills and grow your career * The Chicago Fed offers benefits to support overall health and financial security. Learn more about our benefits here: ********************************************** Other Requirements * Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. * This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take approximately two months to be completed. The screening covers areas such as education/employment verification, criminal history, credit history, and reaches out to your references and people that know you well. * As a condition of employment, Federal Reserve Bank of Chicago employees must comply with the Bank's ethics rules, which generally prohibit employees, their spouses/domestic partners, and minor children from owning securities, such as stock, of banks or savings associations or their affiliates, such as bank holding companies and savings and loan holding companies. If you or your spouse/domestic partner or minor child own such securities and would not be willing or able to divest them if you accepted an offer of Bank employment, you should raise this issue with the recruiter for this posting, who can provide you contact information for our ethics official if necessary. The expected starting salary range for this position is between $140,500 and $166,200 annually in addition to annual performance-based discretionary bonuses. Final salary and offer will be determined based on the applicant's relevant experience, skills, internal equity, and alignment with geographic and other market data. Always verify and apply to jobs on Federal Reserve System Careers or through verified Federal Reserve Bank social media channels. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, marital status, disability, gender, gender identity or expression, or veteran status. Full Time / Part Time Full time Regular / Temporary Regular Job Exempt (Yes / No) Yes Job Category Information Technology Family Group Work Shift First (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $140.5k-166.2k yearly 3d ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Security architect job in Kansas City, MO

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 57d ago
  • AI Governance & Security Architect

    Umb 4.6company rating

    Security architect job in Kansas City, MO

    UMB's Artificial Intelligence (AI) team is responsible for driving automation, data-driven decision making and software modernization using AI centric tools. Currently, we leverage machine learning, natural language processing, predictive analytics, and generative AI to enhance customer experience, and improve operational efficiency. This includes utilizing fraud protection software to ensure regulatory and system availability. As an AI Governance & Security Architect, you will be responsible for developing and leading enterprise frameworks that ensure the ethical, secure, and compliant adoption of AI within the financial organization. You will bridge cybersecurity, risk management, and AI lifecycle governance to safeguard sensitive data and models against threats, while meeting regulatory obligations. You will also provide strategic leadership across IT, risk, compliance, and business functions to embed responsible AI practices, strengthen resilience against AI-specific risks, and enable innovation in a secure and controlled manner. This is a subset of the overall responsibilities which will include multiple initiatives as assigned by IT leadership. This role is hybrid (Mon through Thu on-site / Fri remote) for candidates in the Kansas City metropolitan area and open to qualified remote candidates outside of the Kansas City area but only within the US. How you'll spend your time: Define and implement enterprise-wide AI governance frameworks to ensure responsible, ethical, and compliant use of AI in financial operations. Develop and enforce AI security standards aligned with regulatory requirements (e.g., FFIEC, OCC, GLBA, GDPR, ISO 42001, NIST AI RMF). Partner with risk, compliance, and legal teams to create policies covering AI model lifecycle management, bias detection, explainability, and auditability. Oversee secure AI/ML solution deployment in both on-premises and cloud environments (AWS, Azure, GCP), ensuring robust data protection and encryption practices. Conduct AI security risk assessments, threat modeling, and red team testing for generative AI and predictive models. Establish monitoring frameworks for AI systems to track drift, anomalies, and adversarial threats. Provide architectural guidance on integrating AI platforms with existing banking systems (ACH, RTP, Wires, Core Banking, Payment Hubs). Lead AI security incident response and ensure remediation processes meet financial regulatory standards. Serve as a subject matter expert for internal stakeholders on AI governance, regulatory compliance, and ethical AI adoption. Mentor junior architects and engineers in AI governance and cybersecurity best practices. We're excited to talk with you if: You have a Bachelor's degree in Computer Science, Cybersecurity, Data Science, or related field and at least 7 years of professional experience in enterprise architecture, information security, or technology governance in financial services, OR equivalent combination of education and work experience. You have a proven track record of implementing governance frameworks, risk management strategies, and compliance programs for emerging technologies. You have familiarity with financial services regulations and security requirements. You have experience collaborating with auditors, regulators, and compliance teams. You have strong understanding of AI/ML lifecycle management, including model development, validation, deployment, and monitoring. You have knowledge of data governance principles, MDM (Golden Record, Canonical Models), and regulatory compliance in financial services. You have proficiency in cloud-native AI/ML platforms (AWS SageMaker, Bedrock, Azure AI, GCP Vertex). You have familiarity with security frameworks (NIST, ISO 27001/42001, CIS Controls). You're able to translate complex AI and security concepts into business-friendly language. Bonus Points If: You have a Master's degree in Information Security, Artificial Intelligence, or related discipline. You have at least 10 years of experience in financial services or regulated industries. You have demonstrated leadership in AI governance, cybersecurity, or enterprise architecture initiatives. You have certifications such as CISSP, CISM, ISO 42001 Lead Auditor, or Certified AI Governance Professional. You have experience presenting to executive leadership and regulators. You have hands-on experience with AI observability tools (e.g., Fiddler, Arize, MLflow). You have familiarity with secure federated learning, differential privacy, and adversarial ML defenses. You have experience leading cross-functional AI security initiatives in regulated industries. You have advanced knowledge of cryptography, data anonymization, and AI-driven fraud detection techniques. Applicants must have legal authority to work in the United States. Work Visa sponsorship is not available for this position. Application Deadline: January 7, 2026 Compensation Range: $83,200.00 - $178,800.00 The posted compensation range on this listing represents UMB's standard for this role, but the actual compensation may vary by geographic location, experience level, and other job-related factors. In addition, this range does not encompass the full earning potential for this role. Please see the description of benefits included with this job posting for additional information. UMB offers competitive and varied benefits to eligible associates, such as Paid Time Off; a 401(k) matching program; annual incentive pay; paid holidays; a comprehensive company sponsored benefit plan including medical, dental, vision, and other insurance coverage; health savings, flexible spending, and dependent care accounts; adoption assistance; an employee assistance program; fitness reimbursement; tuition reimbursement; an associate wellbeing program; an associate emergency fund; and various associate banking benefits. Benefit offerings and eligibility requirements vary. Are you ready to be part of something more? You're more than a means to an end-a way to help us meet the bottom line. UMB isn't comprised of workers, but of people who care about their work, one another, and their community. Expect more than the status quo. At UMB, you can expect more heart. You'll be valued for exactly who you are and encouraged to support causes you care about. Expect more trust. We want you to do the right thing, no matter what. And, expect more opportunities. UMBers are known for having multiple careers here and having their voices heard. UMB and its affiliates are committed to inclusion and diversity and provide employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including gender, pregnancy, sexual orientation, and gender identity), national origin, age, disability, military service, veteran status, genetic information, or any other status protected by applicable federal, state, or local law. If you need accommodation for any part of the employment process because of a disability, please send an e-mail to ************************* to let us know the nature of your request. If you are a California resident, please visit our Privacy Notice for California Job Candidates to understand how we collect and use your personal information when you apply for employment with UMB.
    $83.2k-178.8k yearly Auto-Apply 40d ago
  • Engineer, Information Security

    Mariner High School 4.2company rating

    Security architect job in Overland Park, KS

    We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant. If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you. What You'll Do Implement, operate, and maintain enterprise-level information security tools and controls across the organization. Conduct security assessments and control testing to evaluate system performance and operational effectiveness. Support and mature core security processes, including: Malware response and remediation Vulnerability management and patch governance Security log analysis and monitoring Incident tracking, reporting, and documentation Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations. Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives. Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input What You Bring Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience. 3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus. Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Proven ability to operate with independence and accountability in a dynamic environment. Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority. Analytical mindset with strong attention to detail, organization, and documentation discipline. Why Join Us We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients. We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance. EOE/M/F/D/V
    $61k-76k yearly est. Auto-Apply 37d ago
  • Cyber Palo Alto Networks Security Operations Senior Consultant

    Deloitte 4.7company rating

    Security architect job in Kansas City, MO

    Cyber Palo Alto Networks Security Operations Senior Consultant Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success. Recruiting for this role ends on 12/31/25 The team Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions. Work You'll Do * Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion. * Integrate diverse log and telemetry sources, ensuring data quality and normalization. * Develop and optimize automated response workflows for incident containment and remediation. * Advise clients on advanced use cases, threat detection, and automation strategies. * Collaborate with cross-functional teams for solution enhancements and threat intelligence integration. * Present technical findings and recommendations to stakeholders. Required Qualifications * BA/BS degree in a technical field (e.g., Computer Science, Cyber Security) * 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time * 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies * 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies * 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools * 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data * 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike * 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks * Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications * Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve. * Limited immigration sponsorship may be available Preferred Qualifications * Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc. * Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions) * Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform * Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases * Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria * Previous consulting or "Big 4" experience * Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP) Information for applicants with a need for accommodation: ************************************************************************************************************ The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Recruiting tips From developing a stand out resume to putting your best foot forward in the interview, we want you to feel prepared and confident as you explore opportunities at Deloitte. Check out recruiting tips from Deloitte recruiters. Benefits At Deloitte, we know that great people make a great organization. We value our people and offer employees a broad range of benefits. Learn more about what working at Deloitte can mean for you. Our people and culture Our inclusive culture empowers our people to be who they are, contribute their unique perspectives, and make a difference individually and collectively. It enables us to leverage different ideas and perspectives, and bring more creativity and innovation to help solve our clients' most complex challenges. This makes Deloitte one of the most rewarding places to work. Our purpose Deloitte's purpose is to make an impact that matters for our people, clients, and communities. At Deloitte, purpose is synonymous with how we work every day. It defines who we are. Our purpose comes through in our work with clients that enables impact and value in their organizations, as well as through our own investments, commitments, and actions across areas that help drive positive outcomes for our communities. Learn more. Professional development From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to build new skills, take on leadership opportunities and connect and grow through mentorship. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their career. As used in this posting, "Deloitte" means Deloitte & Touche LLP, a subsidiary of Deloitte LLP. Please see ************************* for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. Qualified applicants with criminal histories, including arrest or conviction records, will be considered for employment in accordance with the requirements of applicable state and local laws, including the Los Angeles County Fair Chance Ordinance for Employers, City of Los Angeles's Fair Chance Initiative for Hiring Ordinance, San Francisco Fair Chance Ordinance, and the California Fair Chance Act. See notices of various fair chance hiring and ban-the-box laws where available. Fair Chance Hiring and Ban-the-Box Notices | Deloitte US Careers Requisition code: 314097 Job ID 314097
    $102.5k-188.9k yearly 11d ago
  • Information Security Officer

    State of Kansas

    Security architect job in Shawnee, KS

    Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team! Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position. E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here. Office of Information Technology Services About the Position: * Who can apply: Anyone * Classified/Unclassified Service: Unclassified * Full/Part-time: Full-Time * Regular/Temporary: Regular * Eligible to Receive Benefits: Yes * Veterans' Preference Eligible: Yes * This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule. Compensation: * Annual Salary/Hourly Rate: $85,000 - 95,000/Annually Note: Salary can vary depending upon education, experience, or qualifications. Position Summary: The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch. Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF). Key Responsibilities: * Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53). * Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure. * Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs. * Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others. * Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects. * Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans. * Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices. Required skills: * Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53. * Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences. * Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders. * Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment. * Ability to assess regulatory requirements and determine whether existing controls meet those requirements. * Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems. Minimum Qualifications: * Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security. Preferred: * One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year. * Familiarity with government and public sector environments * Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075. Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment. Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor). Employment Benefits: In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in: * Comprehensive medical, mental, dental, vision, and additional coverage * Sick & Vacation leave * Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave * Paid State Holidays * Employee discounts with the STAR Program * Retirement and deferred compensation programs * This benefits package represents additional annual compensation. Visit the Employee Benefits page for more information… Recruiter Contact Information: * Name: Brenda Cripps * Email: OITS_****************** * Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612 Required documents for this application to be complete: * On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed. * DD214 (if you are claiming Veteran's Preference) * Inside your Job Application upload these documents: * Resume (or choose existing if you have one) * Cover Letter Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents." Job Application Process * First Sign in or register as a New User * Complete or update your contact information on the: * Careers> My Contact Information page * NOTE: This information is included on all your job applications * Upload required documents listed above for the Careers> My Job Applications page * NOTE: This information is included on all your job applications * Start your draft job application, upload other required documents, and submit when it is complete. * Manage your draft and submitted applications on the Careers> My Job Applications page. * Check your email and My Job Notifications for written communications from the Recruiter * Email - sent to the Preferred email on the My Contact Information page * Notifications - view the Careers> My Job Notifications page Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions." How to Claim Veterans Preference Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager. How to Claim Disability Hiring Preference Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager. Learn more about claiming Disability Hiring Preference: Disability Hiring Preference | Kansas Department of Administration (ks.gov) Equal Employment Opportunity The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job. If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
    $85k-95k yearly 7d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Security architect job in Overland Park, KS

    We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience. 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. Why Join Us We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance. We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building. Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits. #LI-JS1 #LI-REMOTE EOE/M-F/D/V
    $99k-125k yearly Auto-Apply 37d ago
  • Security Engineer

    Foresite 4.3company rating

    Security architect job in Overland Park, KS

    Job Description Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply! What You'll Do: As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include: Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services. General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively. Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments. Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments. Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives. Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams. Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends. Who You Are: Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats. Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies. Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to: Google Cloud Security Command Center (SCC) Google Security Operations Google Threat Intelligence Cloud Logging and Monitoring for security Google Cloud Identity and Access Management (IAM) Google Cloud Armor Certifications: Possess one or more security certifications such as: CompTIA Security+ (ISC)² SSCP or CISSP (Associate of (ISC)²) Google Cloud Professional Cloud Security Engineer (highly preferred) Other relevant cloud security certifications Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences. Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail. Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment. Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
    $81k-110k yearly est. 15d ago
  • Security Engineer - Data Protection

    Lockton 4.5company rating

    Security architect job in Kansas City, MO

    Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure. Key Responsibilities: * Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal. * Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery. * Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications. * Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration. * Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls. * Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails. * Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response. * Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership. * Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform. * Actively coach and mentor other security and technology team members on data protection best practices. * Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
    $75k-96k yearly est. 40d ago
  • Security Engineer

    Quest Analytics

    Security architect job in Overland Park, KS

    Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will: Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives. Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards. Provides security support during vendor risk assessments. Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements. Owns, maintains and matures information security review processes and documentation. Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation. Partners with technology and business partners to ensure compliance with policies and standards. Determines security requirements for internal and external projects via interpretation of policies and standards. Evaluates new technologies, processes, standards, and frameworks on an ongoing basis. Ensures capability readiness for security controls (people, process, and technology). Evaluates gaps in existing technologies and processes. Assists with the implementation, configuration, and operations of various security tools as required. Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.). What we are looking for: Bachelor's Degree in Information Systems, Computer Science or related field preferred. Experience working in a security role for a SaaS organization is a must. Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development. 3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence. Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices. Experience working with application security vulnerabilities and technologies is required. Three or more years' participating in vendor and internal security assessments is required. Two or more years' experience working in a security operations role is desired. Certifications: CISSP, CISM, CEH or equivalent preferred. Has strong focus on business outcomes. Comfortable with collaboration, open communication and reaching across functional borders. Self-motivated and able to work in a fast-paced, deadline-oriented environment . Excellent troubleshooting, listening, and problem-solving skills. Proven ability to solve complex issues. Customer focused. Works well in a team environment. We are not currently engaging with outside agencies on this role. What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time. Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming. Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment. Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence ********************* NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $75k-101k yearly est. Auto-Apply 60d+ ago
  • IT Security Manager

    True North Consulting 4.4company rating

    Security architect job in Overland Park, KS

    This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization ·Ensures consistent and effective security practices ·Establishes appropriate Information Security procedures and governance ·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures ·Manages investigations into identified problematic activity and provides on-going communication with IT senior management ·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division ·Provides centralized guidance and governance of Information Security solutions ·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals ·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk ·Assist with Information Security awareness programs ·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management. ·Participates in annual and long-range planning activities to ensure Information Security needs are addressed Qualifications Must be open to travel approximately 35% of the time. A college degree in MIS, CIS, Business Management, or related field 5+ years of overall Information Security experience 1+ years working on an Information Security implementation team An Information Security industry certification is preferred Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks: CIS Critical Security Controls ISO 27000-series standards NIST SP800-53 and related standards Must have a working knowledge of the following Information Security practices, standards, and systems: Data Loss Prevention (DLP) systems Encryption technologies and standards Endpoint security software Governance, Risk, and Compliance (GRC) systems Identity and Access Management (IAM) Incident response practices Network security (e.g. firewalls, IDS/IPS, VPN, etc.…) Risk assessment practices Security Information Event Management (SIEM) systems Vulnerability management practices and scanning tools Additional Information Solid company with excellent track record of stability,.Great opportunities for growth and learning.
    $102k-138k yearly est. 7h ago
  • Sr. Engineer - Identity Security

    T-Mobile 4.5company rating

    Security architect job in Overland Park, KS

    At T-Mobile, we invest in YOU! Our Total Rewards Package ensures that employees get the same big love we give our customers. All team members receive a competitive base salary and compensation package - this is Total Rewards. Employees enjoy multiple wealth-building opportunities through our annual stock grant, employee stock purchase plan, 401(k), and access to free, year-round money coaches. That's how we're UNSTOPPABLE for our employees! Be unstoppable with us! T-Mobile is synonymous with innovation-and you could be part of the team that disrupted an entire industry! We reinvented customer service, brought real 5G to the nation, and now we're shaping the future of technology in wireless and beyond. The Cybersecurity Identity Engineer will help ensure that our software, systems, and infrastructure are designed and implemented to the highest security standards. This role focuses on designing and delivering secure, scalable identity verification and workforce IAM programs. The engineer partners across teams to implement modern identity assurance capabilities-supporting secure access to sensitive systems and data. This position is responsible for overseeing auditing, analyzing, coordinating, and implementing identity-focused security measures within enterprise applications, cloud, and mobile environments. The role involves collaboration with Engineering & Operations Teams and cross-functional partners including HR, Legal, Compliance, and IT to ensure secure and compliant identity practices. It also includes addressing vulnerabilities and supporting security best practices across identity systems. Job Responsibilities * Leads identity verification, compliance, and risk assessments for workforce IAM initiatives throughout the project lifecycle. * Improves process efficiency by implementing creative, sustainable improvements to identity workflows and deployment methodologies. * Leads identification of identity security needs and recommends strategic plans and scalable resolutions. * Implements, tests, and monitors identity verification systems (e.g., MFA, biometric tools, ID proofing). * Maintains visibility inside and outside of information security at the People management level. * Interfaces with application support, engineering ops, finance, privacy, risk management, HR, and legal teams to align identity assurance with business operations. * Leads lifecycle management of identity-related security policies, including intake, creation, review, approval, implementation, publishing, communication, and maintenance. * Executes identity-focused security projects driven by internal and external stakeholders. * Mentors team members on identity-centric technologies, user access architecture, and IAM program delivery. Education and Work Experience * Bachelor's Degree Computer Science or Information Technology or equivalent work experience (Preferred) * 4-7 years - Experience with security related software and/or business process design * 4-7 years - Experience in technical project management and leading cross-functional solution design teams * 4-7 years - Expertise in network information security, including Firewall policy design, SSL Certificate management, and vulnerability analysis mitigation * Preferred experience in IAM program delivery or identity verification technology integration. * Understanding of encryption, obfuscation, tokenization technologies, and identity protocols. Knowledge, Skills and Abilities * Cybersecurity Advanced understanding of security architecture, security technologies, systems design, integration, and networking. (Required) * Problem Solving Innovative problem-solving skills with the proven ability to exercise flexibility and judgment. (Required) * Communication Excellent executive communication skills (oral and written) including presentation skills and demonstrated ability to present at all organizational levels. (Required) Licenses and Certifications * Certified Information Systems Security Professional (CISSP) (Preferred) * Certified Information Security Manager (CISM) (Preferred) * Certified in Risk & Informational Systems Control (CRISC)(Preferred) * At least 18 years of age * Legally authorized to work in the United States Travel: Travel Required (Yes/No): No DOT Regulated: DOT Regulated Position (Yes/No): No Safety Sensitive Position (Yes/No): No Base Pay Range: $103,400 - $186,400 Corporate Bonus Target: 15% The pay range above is the general base pay range for a successful candidate in the role. The successful candidate's actual pay will be based on various factors, such as work location, qualifications, and experience, so the actual starting pay will vary within this range. At T-Mobile, employees in regular, non-temporary roles are eligible for an annual bonus or periodic sales incentive or bonus, based on their role. Most Corporate employees are eligible for a year-end bonus based on company and/or individual performance and which is set at a percentage of the employee's eligible earnings in the prior year. Certain positions in Customer Care are eligible for monthly bonuses based on individual and/or team performance. To find the pay range for this role based on hiring location, ******************************************** ID=REQ339613¶dox=1 At T-Mobile, our benefits exemplify the spirit of One Team, Together! A big part of how we care for one another is working to ensure our benefits evolve to meet the needs of our team members. Full and part-time employees have access to the same benefits when eligible. We cover all of the bases, offering medical, dental and vision insurance, a flexible spending account, 401(k), employee stock grants, employee stock purchase plan, paid time off and up to 12 paid holidays - which total about 4 weeks for new full-time employees and about 2.5 weeks for new part-time employees annually - paid parental and family leave, family building benefits, back-up care, enhanced family support, childcare subsidy, tuition assistance, college coaching, short- and long-term disability, voluntary AD&D coverage, voluntary accident coverage, voluntary life insurance, voluntary disability insurance, and voluntary long-term care insurance. We don't stop there - eligible employees can also receive mobile service & home internet discounts, pet insurance, and access to commuter and transit programs! To learn about T-Mobile's amazing benefits, check out ************************* Never stop growing! As part of the T-Mobile team, you know the Un-carrier doesn't have a corporate ladder-it's more like a jungle gym of possibilities! We love helping our employees grow in their careers, because it's that shared drive to aim high that drives our business and our culture forward. By applying for this career opportunity, you're living our values while investing in your career growth-and we applaud it. You're unstoppable! T-Mobile USA, Inc. is an Equal Opportunity Employer. All decisions concerning the employment relationship will be made without regard to age, race, ethnicity, color, religion, creed, sex, sexual orientation, gender identity or expression, national origin, religious affiliation, marital status, citizenship status, veteran status, the presence of any physical or mental disability, or any other status or characteristic protected by federal, state, or local law. Discrimination, retaliation or harassment based upon any of these factors is wholly inconsistent with how we do business and will not be tolerated. Talent comes in all forms at the Un-carrier. If you are an individual with a disability and need reasonable accommodation at any point in the application or interview process, please let us know by emailing ApplicantAccommodation@t-mobile.com or calling **************. Please note, this contact channel is not a means to apply for or inquire about a position and we are unable to respond to non-accommodation related requests.
    $53k-93k yearly est. Auto-Apply 12d ago
  • Infrastructure and Security Engineer

    Fellowship of Christian Athletes 4.3company rating

    Security architect job in Kansas City, MO

    As an Infrastructure and Security Engineer, you will be responsible for the comprehensive management and protection of the FCA's critical network and infrastructure, ensuring a secure and optimized digital environment that supports seamless ministry operations worldwide. Your role will involve maintaining essential servers, databases, and firewalls, implementing robust security measures, and continuously monitoring system performance to meet the needs of a global organization. You will lead the migration of key infrastructure from on-premises to Microsoft Azure, designing and managing scalable, secure systems utilizing both hybrid and Azure-native services such as Container Apps, Azure SQL, Key Vault, Application Gateway, and Entra ID. You will own and enhance the organization's security posture through network controls, VPN and firewall management, identity and access strategies, and compliance alignment, ensuring adherence to international standards and regulations. Additionally, you will develop automation solutions for deployment, monitoring, and scaling using tools like PowerShell, Python, Bicep, Logic Apps, and Terraform. Collaboration with developers, data teams, and global program stakeholders is essential to deliver secure, reliable, and purpose-driven solutions that advance FCA's international mission, alongside documenting best practices, architecture diagrams, and incident response processes. MINISTERIAL DUTIES These responsibilities are critical to the FCA mission, and this position plays a vital role in our ministry. FCA expects all functions and responsibilities outlined below to be carried out with a heart surrendered to serving God as a form of worship. Agree with, and abide by, FCA's Christian Community Statement. Follow a spiritual rhythm including daily prayer and Bible study to seek the Lord's will for FCA. Lead, conduct and provide spiritual leadership for staff, volunteers, coaches and athletes through prayer, Bible study, worship and living by example so they are equipped to serve others. Connect to and participate in a local church through worship and weekly involvement. Conduct yourself in a manner that affirms biblical standards of conduct in accordance with FCA's Christian beliefs (see FCA's Christian Community Statement) at all times. POSITION RESPONSIBILITIES Develop, implement, and maintain FCA's infrastructure. This includes an array of workloads, network devices, and data storage systems, all of which are pivotal to the ministry's operation. Bring to fruition and manage rigorous security measures that effectively protect FCA's data. In addition, ensure these measures are in compliance with all relevant regulations and industry standards. Regularly monitor and optimize system performance, taking immediate action to troubleshoot any issues that may arise, thereby ensuring minimal disruption to business operations. Collaborate closely with the Technology team, sharing knowledge, and working together to hone both infrastructure and security protocols and processes, thereby enhancing FCA's digital environment. Prepare and consistently maintain comprehensive documentation of the network infrastructure and the implemented security measures, ensuring up-to-date records are readily available. Manage relationships and administer agreements with technology vendors and service providers. Actively contribute to the overall Technology team and, consequently FCA's ministry, by willingly helping others in their duties when the need arises and offering positive suggestions for improvement in all areas. COMPETENCIES Technical knowledge: In-depth knowledge of security and infrastructure technologies, including network architecture, identity and access management, endpoint protection, cloud security, and more. You have hands-on experience with a wide range of infrastructure, networking, and application security concepts. Risk management: Ability to identify and assess security and availability risks - develop and implement effective risk management strategies. Compliance: Understanding of relevant regulations and compliance requirements, and ability to adopt and adhere as appropriate. Communication: Excellent communication skills, including the ability to clearly communicate technical concepts to non-technical peers or stakeholders who may have little domain knowledge. Collaboration: Ability to work effectively with other teams and stakeholders, including IT, development, and organizational teams. Problem solving: Ability to analyze complex problems and develop creative and stable solutions. You're deeply knowledgeable and broadly capable - a systems thinker with the technical chops to make things happen. EXPERIENCE Bachelor's degree in Computer Science, Information Technology, or a related field preferred 5-8 years of experience in IT Security and IT Infrastructure. Excellent communication and problem-solving skills. Professional-level certifications or skill levels equivalent to CCNP, CISSP, CEH, CySA, AWS/Microsoft Solutions Architect, etc. Practical experience leading or supporting cloud migration efforts, ideally into Microsoft Azure. You understand the technical, organizational, and operational challenges of migrating from on-premises to cloud platforms, and you know what success looks like in these transformations.
    $68k-87k yearly est. 7h ago
  • Senior Security Engineer

    Jedunn 4.6company rating

    Security architect job in Kansas City, MO

    Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years. Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection. Role Summary The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn. * Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor. * Career Path: Security Architect Key Role Responsibilities - Core KEY ROLE RESPONSIBILITIES SECURITY ENGINEER FAMILY - CORE * Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices. * Mentors team members on technical and security methodology characteristics. * Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness. * Acts as primary technical resource for design and implementation projects. * Drafts and recommends operating procedures and changes to information security practices and solutions. * Trains and engages operations and support personnel on security solutions. * Advise on trends, threats, and emerging security risks, relevant to the organization. * Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements. * May be a subject matter expert for a variety of security related systems or applications. * Communicates with operational groups for collaboration of security program management. * Advocates secure culture and provides education throughout the appropriate client group. * Improves maturity capability of processes, procedures, and operations of the security program. * Communicates intelligence and program effectiveness reports to supervision. Key Role Responsibilities - Additional Core SENIOR SECURITY ENGINEER In addition, this position will be responsible for the following: * Designs and implements security solutions for various platforms * Conducts comprehensive security assessments and audits to determine the effectiveness of security controls * Assists operations as needed in incident response and contribute to post-incident analysis * Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements * Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level * Implements and maintains access control system for any type of new enhancement opportunities * Collaborates with development teams to ensure secure software development practices * Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working * Designs and implements robust security ensuring alignment with industry best practices and organization configurations * Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration * May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks * Builds security automation scripts and tools to streamline security operations and improve efficiency * Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle * Plays an active role in contributing ideas for security innovations * Assists in the design and execution of incident response as it pertains to security engineering * Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program * Implements security technologies with full understanding on accountability and ownership for full deployment Knowledge, Skills & Abilities * * Ability to perform work accurately and completely, and in a timely manner * Communication skills, verbal and written - Intermediate * Ability to lead technical projects once assigned * Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX * Ability to solve technical issues - Advanced * Demonstrated expert knowledge of information security practices * Substantial knowledge of Python and Powershell scripting languages * Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers * Proficient with multiple cloud platforms * Technical writing and documentation skills * Organizational skills * Ability to quickly and effectively solve complex problems * Ability to deliver quality through attention to detail * Ability to work in team and independently * Ability to work a flexible schedule - might be on call in the evenings and weekends * Ability to build relationships and collaborate within a team, internally and externally Education * * Bachelor's degree in information security or related field (Preferred) * In lieu of the above requirements, equivalent relevant experience will be considered Experience * 5+ Years information security experience (Preferred) Working Environment * Must be able to lift up to 25 pounds * May require periods of overnight travel * Normal office environment * Frequent activity: Sitting, Viewing Computer Screen * Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling Benefits Information The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details. Click here for benefits details. This role is expected to accept applications for at least three business days and may continue to be posted until a qualified applicant is selected or the position has been cancelled. JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace. JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to accommodations@jedunn.com JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails. Why People Work Here At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them Building on our rich history, our employee owners are shaping the future of JE Dunn. In our team-focused environment we do life together and are generously rewarded for our efforts About JE Dunn For more information on who we are, click here. EEO NOTICES Know Your Rights: Workplace Discrimination is Illegal California Privacy Policy E-Verify JE Dunn participates in the Electronic Employment Eligibility Verification Program. E-Verify Participation (English and Spanish) Right to Work (English) Right to Work (Spanish)
    $74k-96k yearly est. 23d ago
  • Cyber Resilience Specialist

    Slalom 4.6company rating

    Security architect job in Kansas City, MO

    Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery. What You'll Do * Lead and facilitate Business Impact Assessments (BIAs) across business units * Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems * Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience * Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles * Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews * Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations * Support program governance, metrics, training, and awareness efforts What You'll Bring * 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting * Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning * Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms) * Experience supporting risk assessments and regulatory audits * Excellent facilitation and stakeholder management skills * Strong writing skills to produce clear, client-ready plans and reports About Us Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all. Compensation and Benefits Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance. Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time. We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************. EEO and Accommodations Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process. #LI-MS12
    $153k-186k yearly Easy Apply 17d ago
  • Cyber Security Training

    Learnkwik.com

    Security architect job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 7h ago
  • IT Security Manager

    Bluebird Network 3.8company rating

    Security architect job in Kansas City, MO

    DUTIES AND RESPONSIBILITIES: * The IT Security Manager will be responsible for leading the IT Security team; * Protecting the company's employees, customers, data, network, and all other assets from internal and external threats; * Managing IT Security vendor and partner relationships, including MSSPs; * Installing and Managing Palo Alto Firewalls and remote access solutions; * Designing and administering a vulnerability management program; * Developing and maintaining a Vendor Management program; * Managing on-premises and cloud Identity & Access Management platforms; * Designing and implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) for all possible systems. * Assisting with required compliance audits; * Performing regular access and system log reviews; * Researching and creating plans to implement advanced information security techniques; * Creating and maintaining Information security policy documentation; * Working with stakeholders during design and implementation of new technologies to ensure they are set up with security in mind upfront; * Handling IT Service Management trouble tickets as advanced-level support for internal users in security related matters; * Administering current backup and restore procedures with Dell Avamar; * And designing and leading internal security awareness training programs. ABOUT THE COMPANY: Bluebird Fiber is a premier fiber telecommunications provider of internet, data transport, and other services to carriers, businesses, schools, hospitals, and other enterprises in the Midwest. To learn more, please visit bluebirdfiber.com. Join an amazing team of telecommunication professionals! Bluebird is a dynamic growing company in need of a Data Architect to be a part of a collaborative team. This is a full-time, benefit eligible position in the Kansas City, Missouri area. All of us at Bluebird work hard to meet objectives for the organization and live the mission and values of this growing company to meet a common goal. Check out this video that highlights our amazing company culture. POSITION SUMMARY: We are seeking a highly skilled IT Security Manager to help secure the infrastructure, communications, and data within the organization. This important role will be responsible for designing the organization's cybersecurity defense-in-depth platform; leading the team responsible for implementing and monitoring those defenses; and ensuring that our systems are secure, reliable, safe, and accessible for business-critical functions. The ideal candidate is an experienced security practitioner and leader who can work with stakeholders to understand existing systems, networks, and technologies to secure them as the business grows. EDUCATION AND EXPERIENCE: * Bachelor's degree in Computer Science, Information Technology, or a related technical field. * 7+ years of hands-on experience in Cybersecurity, IT Service Management, Network Engineering, or related field, with a proven track record of building secure, friction-less experiences. * Proven experience (5+ years) designing and implementing enterprise-level cloud environments, preferably through Terraform. * Experience (3+ years) managing Palo Alto firewalls and related technology. * Experience (3+ years) managing Tenable.io or other Nessus vulnerability scanners. * Scripting experience (5+ years) with Python and Powershell to automate various Microsoft 365 or internal processes. * Experience (3+ years) with AWS technologies, including EC2, EKS, Fargate, and Cloudwatch. * Knowledge of how to design and implement network device access utilizing HPE Aruba Clearpass Policy Manager. * Experience (3+ years) developing Security Policy documentation; * Excellent written and verbal communication skills, with the ability to influence and build consensus with other business units. * Professional certifications in cybersecurity, networking, AWS, or Microsoft systems management preferred. * Telecommunications industry experience preferred. SKILLS AND ABILITIES: * Highly motivated, self-starter with a strong sense of duty * Continual learner, eager to engage with industry trends and new technologies * Critical thinking, analytical, and problem-solving skills with the ability to troubleshoot and devise a course of corrective action * Holds people accountable and can keep teams focused * Highly organized and efficient with the ability to multitask, prioritizes tasks appropriately * Goes above and beyond to solve complex problems * Productive without sacrificing quality, maintainability, accessibility, or performance; perform duties at a high degree of accuracy * Welcomes giving and receiving feedback, while handling such in a positive and respectful manner
    $100k-135k yearly est. 36d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security architect job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
    $118k-154k yearly est. 7h ago

Learn more about security architect jobs

How much does a security architect earn in Shawnee, KS?

The average security architect in Shawnee, KS earns between $80,000 and $162,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Shawnee, KS

$114,000
Job type you want
Full Time
Part Time
Internship
Temporary