Architect
Security Architect Job In Tulsa, OK
Senior Architect
REPORTS TO | Director of Architecture
TEAM | Architecture
EDUCATION | Bachelor's Degree in Architecture or Equivalent Experience
EXPERIENCE | 15+ years, Licensed Architect Preferred
POSITION SUMMARY
The Senior Architect position will operate within Cyntergy's architecture team, and would oversee and plan all architectural aspects of building design and construction projects, employing industry standard concepts, practices, procedures and coordination of associated engineering disciplines. This role performs a variety of complex tasks, relying on extensive experience and judgment to plan and accomplish goals. This person will lead and direct the work of others with a wide degree of creativity and latitude. This role requires capabilities of overseeing entire projects through the architectural design and the architectural document production process.
RESPONSIBILITIES
Interacts with Clients in coordinating project and program requirements.
Makes decisions in significant architectural design problems and methods.
Regularly interprets and applies relevant codes, criteria, jurisdictional or other project factors into project documentation.
Actively supervises project budgets, schedules and programs, project communications and documentation, and project team assignments to ensure the most efficient, cost-effective and timely execution of assigned projects.
Interfaces with other in-house project disciplines to ensure cohesive and coordinated design documentation and solutions.
Estimates or oversees development of design fees, and determines scope of work in preparation of proposals and contracts for assigned project work.
Is responsible for coordination and assembly of accurate project specifications.
Works closely with Quality Control Manager to ensure projects meet standards and accuracy.
May participate in client presentations before or during project delivery.
May perform project or program management on selected projects or programs as needed.
May participate in marketing activities.
May participate in employee recruitment activities.
REQUIRED SKILLS
Familiarity with current design trends, materials, detailing and construction practices.
Working and/or advanced knowledge of Revit and AutoCAD software preferred.
Strong verbal and written communication skills to communicate well internally and externally.
Working knowledge of Sketchup and/or other associated rendering software.
Knowledge in sustainable design practices and/or LEED rating system.
Experienced using Outlook and other MS Office software.
CYNTERGY
Cyntergy has a beautiful work facility, excellent compensation and benefits, a team culture that encourages personal development, is community oriented and supports volunteer work. We are an EEO employer.
END OF JOB POSTING
Requirements:
PIbfd05f00c345-26***********7
Principal Security Architect - OASE
Security Architect Job 97 miles from Tulsa
Oracle Analytics organization plays a critical role in delivering and supporting best-of-breed cloud solutions to Oracle customers. The Service Excellence team at Oracle Analytics Cloud (OAC) is on the verge of transforming the development paradigms at the 42 year old software giant. With the world moving towards the Cloud, Oracle is at the forefront with tremendous portfolio of Cloud offerings.
However, this transformation happens not just at the product level, but also the process of developing, deploying, and operating these products in the Cloud. Using a combination of cutting-edge technologies, continuous process improvements and innovative business transformation methodologies, a small group of us are blazing the trail on the Service Excellence philosophy.
We are currently looking for a highly motivated architect with security knowledge to work in the Oracle Analytics Security team. This person would be involved in architecture, design, prototype and development of the security aspects of Oracle Analytics services releases.
You should be a security-minded leader who can work with a development teams as they design new capabilities to ensure that security requirements are clear and the design implements the necessary controls to increase security posture for the service. As architect you will require a firm grasp on security technologies, trends in cloud security practices, and ability to communicate complex technical security requirements clearly to the development team with whom they work. You are experienced and understand how to design test specifications for the feature they support during architecture design so that security requirements can be tested with automated tooling to insure against regressions.
**Qualifications and experience:** BS (Computer Sc., Electronics or Electrical Eng)
A minimum of 10+ years of experience with at least 5+ years in Cloud technologies is required. Experience in architecture, design, deployment and handling of standard security practices and security aspects of industry standard external audit compliance is required.
+ Experience as a security leader for a cloud product or set of cloud services, Familiarity with PaaS and SaaS.
+ Experience architecting security for products or services operating in a cloud environment
+ Experience operating within and supporting a security assurance and assessment program
+ Concepts of multi-tenancy, cloud security and virtualization
+ Expertise in User, Group and Password Management, OAuth, Cloud SSO, Strong Authentication, Identity Provisioning, Identity Governance, Privileged Access and Identity services.
+ Expertise in encryption and key management technologies, deployment methodologies, and security standards compliance (STIG, FedRAMP, PCI-DSS) / certification process.
+ Expertise on operating systems and databases from a security perspective
+ Network security experience for LAN/WAN technologies, TCP/IP Protocols, IP Routing, 802.11 standards and protocols. Security VPN/Firewalls and software-defined networking experience is an advantage
+ Ability to design large, scalable systems for enterprise customers with focus on security
+ Competency in programming with Java, PERL or Python and static security analysis using tools like Fortify etc.
+ REST architecture, programming and security practices
+ Working knowledge of relational databases and administration - Oracle product knowledge preferred, Exadata knowledge is desirable
Career Level - IC4
**Responsibilities**
Work on design and architecture for features on Cloud Platforms, which includes but may not be limited to the following:
+ Work closely with senior developers and other architects as well as Product Management, IT and Operations teams for architecting, designing and developing Database Cloud products from perspective of security areas
+ Ensure that security requirements are met by the architecture chosen during the design phase of new projects and features
+ Work with internal security team including corporate security architecture leads and database security leads for service architecture, implementations and approvals
+ Help establish new and update existing security standards and programming practices for internal service development & service security operational processes
+ Work with development and operations for security issues review and resolution
+ Development contributions to projects to deliver secure, scalable, extensible and differentiated Platform-as-a-Service on the Cloud
+ Ability to lead architecture discussions and security assessments related to software services in a cloud environment
+ Coordinate meetings between IT stakeholders and drive adoption of improved security solutions
+ Identify gaps and weaknesses in proposed designs, identify compensating controls and approve remediation planning
+ Advocate and architect new security requirements and solutions for next generation cloud capabilities and services
+ Collaborate with other developers, engineers, architects, and compliance analysts to harden complex PaaS, offerings
+ Experience working with regulated environments covered by PCI, HIPAA, and FedRAMP
+ Working knowledge of PCI control and requirements
+ Working knowledge of HIPAA controls and requirements
+ Working knowledge of FedRAMP controls and requirements
Duties and tasks are varied and complex, requiring independent judgment. Fully competent in own area of expertise. May have project lead role and/or supervise lower level personnel. BS or MS degree or equivalent experience relevant to functional area. 10+ years of software engineering or related experience.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's problems. True innovation starts with diverse perspectives and various abilities and backgrounds.
When everyone's voice is heard, we're inspired to go beyond what's been done before. It's why we're committed to expanding our inclusive workforce that promotes diverse insights and perspectives.
We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer a highly competitive suite of employee benefits designed on the principles of parity and consistency. We put our people first with flexible medical, life insurance and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by calling ***************, option one.
**Disclaimer:**
Oracle is an Equal Employment Opportunity Employer*. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
*** Which includes being a United States Affirmative Action Employer**
Zero Trust Security Architect
Security Architect Job 60 miles from Tulsa
Details Req ID: req19093 Zero Trust Security Architect Staff Full-Time AS7850 OSU Campus: Stillwater Department: Information Security Services IT Building, Stillwater 74078 USA Hiring Supervisor:
Matt Barnes
Hiring Range:
(Contingent upon available funding):
77,000.00 - 110,000.00, Salary
Work Schedule:
8 am - 5 pm
Faculty Appt Period:
Job Summary:
The Zero Trust Architect within the OSU Information Security Services team will lead the strategic security initiatives focused on digital identity management, ensuring alignment with the NIST Cybersecurity Framework (CSF) and zero trust methodology. This role is critical in maintaining the robustness, efficiency, and user-friendly nature of our Identity Management System (IDMS) while adhering to regulatory requirements within a higher education environment. The successful candidate will be responsible for designing, implementing, and maintaining a secure, zero-trust digital environment that supports both enterprise IT system environment and institutional research IT infrastructure.
The ideal candidate should possess a deep understanding of Identity and Access Management (IAM) concepts, Microsoft Azure Active Directory (AD), and Active Directory architecture. They will be proficient in developing and managing Multi-Factor Authentication (MFA) solutions, Entra ID systems, and Azure Self Service Password Reset (SSPR) or similar technologies. Expertise in protocols such as SAML, OAuth, and OpenID Connect is essential. The Zero Trust Architect will leverage their extensive experience to create a secure platform that safeguards digital identities and enhances user satisfaction.
This position requires maintaining a secret security clearance and involves collaborating with various roles across the system to maintain a secure research environment. The Zero Trust Architect will play a support role in architecting the security of the institutional research environment, ensuring the success of our strategic security initiatives. This role will add significant value to our organization's operations and contribute to the university's research mission.
Must be able to communicate verbally and in writing with clear, grammatically correct English. Requires interaction with supervisors, colleagues, and students using tact, discretion, and independent judgement.
This position is eligible for hybrid work with a requirement of one day in the office per week. Regular schedule is 8AM-5PM, Monday-Friday. Some evenings and weekends may be required.
Work is in both controlled and uncontrolled environmental areas. Work may require access to hospitals, clinics, and related health care facilities, and University research laboratories.
Must be able to lift and carry 25 pounds, as required to move computers.
Special Instructions to Applicants
Please attach resume, cover letter and list of references. OSU offers a generous benefits package for continuous, regular positions, including but not limited to health, life, and retirement benefits, paid leave, and 13 paid holidays per year. Other benefits include employee and dependent tuition waivers, free gym memberships, a free, confidential employee assistance program, and much, much more!
Education & Experience
Position Qualifications:
Minimum Qualifications:
High School/GED
Six years related work experience
Post-secondary education may be substituted for years of experience
CASP+ or CISSP
The candidate must obtain and maintain a Secret Security Clearance throughout the duration of their employment. This includes successfully completing the initial clearance process and adhering to all ongoing requirements to ensure the clearance remains active and in good standing.
Preferred Qualifications:
Master's degree in Technology or Business-related field
Ten years of information technology experience in a higher education setting.
CIAM
* Proficiency in Identity and Access Management (IAM) concepts: Understanding of IAM principles, strategies, and technologies is crucial for managing and securing digital identities.
* Knowledge of Entra ID system: Familiarity with the Entra ID system can be beneficial for managing and securing digital identities.
* Deep understanding of Active Directory architecture: Knowledge of AD architecture is important for managing and securing digital identities within a network.
* Deep understanding of digital identity and protocols like SAML, OAuth, and OpenID Connect: Knowledge of these protocols is essential for secure authentication and authorization.
* Knowledge of Azure Self Service Password Reset (SSPR): Familiarity with Azure SSPR can enhance user experience by allowing users to reset their passwords without IT intervention.
* Proficiency in designing, engineering, and governance of a Multi-Factor Authentication (MFA) solution: Experience in MFA can add an extra layer of security by requiring multiple forms of verification.
* O365 Security Center engineering experience: Experience with O365 Security Center can provide insights into the security posture of the organization.
* Knowledge of the NIST Cybersecurity Framework (CSF): Understanding of the NIST CSF to align security practices with industry standards.
* Regulatory compliance: Familiarity with regulatory requirements and best practices for managing and securing digital identities in a higher education environment.
* Experience in confidential unclassified environments: Understanding of how to work within confidential unclassified environments, ensuring the security and integrity of sensitive information.
Knowledge of the Entra ID system and proficient in designing, engineering, and governing a Multi-Factor Authentication (MFA) solution.
Substantial experience with the O365 Security Center, focusing on monitoring and managing security metrics, setting up alerts for unusual activity, and implementing security protocols to protect the organization's digital assets. Proficiency in MS Defender Engineering, which involves configuring and managing security policies, as well as responding to and mitigating security threats. Understanding of the benefits and orchestration of Sentinel, Microsoft's cloud-native SIEM solution, as it provides intelligent security analytics and threat intelligence.
Oklahoma State University (OSU) strives to provide a safe study, work, and living environment for its faculty, staff, volunteers and students. To support this environment and comply with applicable laws and regulations, OSU conducts pre-employment background checks on final candidates. Offers of employment are contingent upon the successful completion of a background check. The type of background check conducted varies by position and can include, but is not limited to, criminal (felony and misdemeanor) history, sex offender registry, motor vehicle history, financial history, and/or education verification. Background checks will be conducted when required by law or contract and when, in the discretion of the university, it is reasonable and prudent to do so.
Oklahoma State University, as an equal opportunity employer, complies with all applicable federal and state laws regarding non-discrimination and affirmative action. Oklahoma State University is committed to a policy of equal opportunity for all individuals and does not discriminate based on race, religion, age, sex, color, national origin, marital status, sexual orientation, gender identity/expression, disability, or veteran status with regard to employment, educational programs and activities, and/or admissions. For more information, visit eeo.okstate.edu.
Security Architect
Security Architect Job 97 miles from Tulsa
About the Role
We are seeking an experienced and visionary Security Architect to lead the design and implementation of enterprise-wide security solutions. You will develop security strategies, create frameworks, and ensure alignment with organizational goals and compliance standards. This role requires a deep understanding of cybersecurity principles and the ability to drive strategic security initiatives.
Key Responsibilities
Security Design: Develop and implement comprehensive security architectures for IT systems and applications.
Strategic Planning: Align security initiatives with business goals and regulatory requirements.
Risk Management: Identify and mitigate security risks through detailed analysis and planning.
Framework Development: Create and enforce security frameworks, policies, and procedures.
Technology Integration: Evaluate and integrate security technologies into the existing IT ecosystem.
Collaboration: Work closely with IT, legal, and business teams to address security needs.
Compliance Oversight: Ensure adherence to security standards such as NIST, ISO 27001, and GDPR.
Emerging Threats: Stay ahead of emerging cybersecurity threats and adapt strategies as necessary.
Qualifications and Skills Education
Bachelors or Masters degree in Cybersecurity, Information Systems, or a related field.
Experience
5+ years of experience in cybersecurity roles, with a focus on architecture and strategy.
Proven ability to design and implement enterprise security solutions.
Technical Skills
Expertise in network security, application security, and identity management.
Proficiency in data encryption, access control, and vulnerability management.
Familiarity with cloud security frameworks and tools.
Security Engineer, Incident Response
Security Architect Job 97 miles from Tulsa
Meta Security is looking for an Incident Response Engineer with experience in the identification, containment, and mitigation of security incidents. You will be analyzing different data sources to detect, investigate and respond to internal and external threats. You will also be working with our software and production engineering teams to develop scalable systems to automate detection and remediation and help us build the next generation of security operations and response platforms.
**Required Skills:**
Security Engineer, Incident Response Responsibilities:
1. Lead security incident response in a cross-functional environment and drive incident resolution
2. Lead and develop incident response initiatives that improve Meta's capabilities to effectively respond and remediate security incidents
3. Perform digital forensic acquisition and analysis of a wide variety of assets including endpoints, mobile, servers and networking equipment
4. Perform log analysis from a variety of sources (e.g., individual host logs, network traffic logs) to identify potential threats
5. Perform root cause analysis and drive implementation of containment and mitigation strategies
6. Build automation for response and remediation of malicious activity
**Minimum Qualifications:**
Minimum Qualifications:
7. 7+ years of experience in Security Incident Response, Investigations and Response Engineering
8. Knowledge of networking technologies and experience analyzing network-based security events
9. Knowledge of operating systems, file systems, and memory structures as well as experience in host and memory forensics (including live response) on Windows, mac OS and Linux
10. Experience investigating and responding to both external and insider threats
11. Coding/scripting experience in one or more general purpose languages
12. Experience with attacker tactics, techniques, and procedures
13. Bachelor's degree or equivalent experience in Security
**Preferred Qualifications:**
Preferred Qualifications:
14. Experience as a Lead Security Incident Responder and Investigator in a large and regulated organization
15. Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence
16. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems
17. Broad knowledge across the Security domain, as well as deep focus in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Security Architect
Security Architect Job 86 miles from Tulsa
The Security Architect is primarily responsible for designing and implementing the security architecture for YouVersion's technology, ensuring that security is seamlessly integrated into the design and development of YouVersion applications and platforms. This role will define and implement the security framework for our Bible mobile applications, platform, and infrastructure. The Security Architect will collaborate with cross-functional teams to integrate security into every stage of the software development lifecycle, ensuring our applications are robust, compliant, and resilient against security threats. The Security Architect utilizes their skills to deliver technical outcomes that align with the direction of their team to further Life.Church's mission and to reach people for Christ.
YouVersion was created by the local church in 2007 and remains a ministry of Life.Church today. At Life.Church, our mission is to lead people to become fully devoted followers of Christ. Our team is committed to reaching people worldwide through innovative technology. And YouVersion is one of the ways we get to do that. Life.Church is a multi-site Christian church meeting in the United States and globally at Life.Church Online.
We wholeheartedly believe a daily rhythm of seeking intimacy with God has the power to transform lives. That's why YouVersion creates biblically-based experiences that encourage and challenge people to seek God. We hope everyone in our community is on an active journey to become who God made them to be, abiding in Him, and drawing closer every day.
What You'll DoDevelop and integrate the strategy and plan for a secure mobile and backend systems architecture.Identify security gaps and implement threat modeling, risk assessments, and vulnerability analyses.Adhere to data protection regulations such as GDPR, CCPA, and PCI-DSS and maintain policies aligned with industry security standards (e.g., OWASP, NIST).Design and oversee tools and processes for monitoring and responding to potential threats.Lead and manage the development and execution of incident detection, analysis, and response strategies.Implement security training and awareness programs for developers and stakeholders.Collaborate with developers to incorporate security best practices in coding, testing, and deployment and promote a security culture throughout the organization.Collaborate with SRE, CyberSecurity, and IT teams to ensure secure infrastructure practices.Collaborate with YouVersion leadership to align technology roadmaps with security objectives.
Skills Needed to SucceedAbility to self-motivate, make independent decisions, and solve problems with innovation.Effective at multi-tasking and time management to meet strict deadlines while remaining flexible and open to change.Excellent verbal, written, and interpersonal communication skills to clearly explain complicated processes and foster partnerships.Effective at process and organizational management to coordinate, structure, and provide vision to projects.Strong analytical skills, with the ability to balance short-term deliverables and long-term technical goals.Strong leadership skills and understanding of developing and guiding others.In-depth knowledge of security principles, authentication mechanisms, and encryption.Ability to influence and guide development teams towards secure practices.Bachelor'sor Master's degree in Computer Science, Information Security, or related field.Relevant certifications such as CISSP, CSSLP, or CEH.8+ years of experience in software development, with 4+ years in security-focused role.Proficiency in mobile security frameworks and tools, such as OWASP MASVS and Mobile AppSec.Proficiency in identifying and mitigating application vulnerabilities (e.g., SQL injection, XSS).Experience with cloud security in platforms like AWS, Azure, or GCP.Experience in influencing and guiding development teams toward secure practices.Experience with zero-trust architecture and secure DevOps practices.Familiarity with security automation and orchestration tools.
Benefits We Offer
- Paid parental leave, including maternity, paternity, and adoption leave.
- Generous employer-paid leave for the use of vacation, sick time, and other qualifying reasons.
- Innovative and comprehensive Medical, Dental, and Vision insurance that provides team members with useful resources and savings to navigate their holistic health.
- Life insurance policy provided for all staff members at 2x annual salary at no cost. Additional life insurance coverage is available to purchase.
- Short-Term and Long-Term disability is covered at 100% for full-time qualified staff members.
- Comprehensive wellness and mental health benefits allow staff to proactively invest in their physical and emotional health.
- Generous 401(k) retirement plan allowing a team member to have up to 12.5% (including employee contribution, employer match, and employer discretionary contribution) contributed into their account in their first year. It doesn't stop there-the more years on staff, the greater the investment!
-$160 annually in development dollars for team members to invest in their professional growth.
- Casual dress and work environment.
- And much more!
Our Beliefs, Culture, and Commitment to Diversity
At Life.Church, every staff member, and intern is a minister and is expected to engage in the church's ministry fully. We consider ministry readiness and an individual's capacity to represent Life.Church's beliefs as a minister during the selection process for all staff and intern positions. An essential function within every position held by a staff member or intern at Life.Church is to uphold and represent the beliefs of Life.Church. Learn more about what we believe at Life.Church.
While we unite around our mission, we know unity doesn't mean uniformity. Our calling is too great, and our mission is too important not to be intentional about strengthening our team through diversity. We know that diverse perspectives in race, ethnicity, background, age, and gender are essential to reaching the world for Christ. To learn more about how we strengthen our team through diversity, visit our careers page.
All data collected in our application process, from resume collection to application questions, is used for recruitment purposes only.
Vice President, Cybersecurity-Chief Information Security Officer
Security Architect Job 97 miles from Tulsa
Amentum is a global leader in advanced engineering and innovative technology solutions, trusted by the United States and its allies to address their most significant and complex challenges in science, security and sustainability. Headquartered in Virginia, we have more than 53,000 employees in approximately 80 countries across all 7 continents.
The **Vice President of Cybersecurity-** **Chief Information Security Officer** **(CISO)** will define, implement and maintain global information security management policies and programs for Amentum. The ideal candidate will be an expert in information security and risk management with both strong technical skills and the ability to serve as an advisor on all matters relating to policy and governance. This position reports to the CIO and will manage a team of security professionals who will support the **CISO** in executing the cybersecurity mission and efforts. **A minimum active Secret level security clearance is required, US Citizenship is required. This is a remote-telework role.** We would **prefer** that a candidate be within driving distance to one of our Amentum facilities (Chantilly, VA or Las Vegas, NV or Fort Worth, TX).
**Responsibilities** :
+ Defines and implements a comprehensive security program that supports corporate business objectives, ensures compliance with regulatory requirements, and continually focuses on improving security and processes.
+ Briefs executive leadership on the effectiveness and alignment of the Amentum cybersecurity program with business objectives supported by key performance indicators.
+ Manages contractual relationships with external security service providers, maximizing value for Amentum while effectively protecting its information assets.
+ Responsible for governance of the information security function for all of Amentum, leads the creation of policy and the education, training, and change management initiatives involved in maturing this function.
+ Maintains compliance with applicable data security laws, regulations, and customer requirements.
+ Authorizes Amentum approved information security solutions.
+ Defines a secure architecture that incorporates zero trust concepts, supports company requirements, and is interoperable with the Amentum environment.
+ Leads cross-functional teams in implementing information security solutions throughout the enterprise.
+ Monitors the external threat environment for emerging threats, conducts information security risk assessments, tests for vulnerabilities, and designs and implements solutions to strengthen defenses and optimize security architecture.
+ Mitigates system vulnerabilities and reduces attack surface vectors identified through risk assessment and threat modeling.
+ Oversees business continuity and disaster recovery policies and standards.
+ Provides strategic risk guidance to executive leadership and provides direction of technical controls and solutions.
+ Reviews customer security requirements and liaises with customers regarding Amentum's security architecture.
**Knowledge, Skills and Abilities:**
+ Ability to lead and motivate cross-functional, interdisciplinary teams to achieve tactical and strategic goals.
+ Exceptional ability to collaborate with, influence and partner with Functional and Business Group leaders and multiple stakeholders across the organization at all levels.
+ Ability to motivate team members through effective monitoring, coaching, counseling and providing a positive working environment.
+ Strong executive presence to be able to present analysis and recommendations in a clear and compelling manner to both technical and non-technical audiences, including executive management and customers.
+ Proven track record and experience in developing information security policies and procedures, as well as successfully executing programs that meet the objectives of excellence in a dynamic environment.
+ Must be a strategic thinker, with strong multi-tasking, problem-solving and technical skills.
+ Ability to articulate ideas clearly, effectively present information, and convey complex concepts in verbal and written form.
+ Knowledge of relevant legal/regulatory requirements and common information security management frameworks such as ISO 27001, NIST, CMMC, SOX, FedRamp, and data privacy directives.
+ Experience running and directing a security incident response team.
+ Knowledge of common cloud environments and government cloud capabilities and restrictions.
**Qualifications:**
+ Bachelor's degree in computer science, information security, information management systems, or related field experience. Advanced degree preferred.
+ Typically fifteen or more years of progressive experience in a combination of information security and risk management, with experience in leadership roles.
+ **Certified Information Systems Security Professional (CISSP).**
+ **A minimum of an active Secret level clearance required to start; a Top-Secret level clearance is preferred.**
+ **US Citizenship is required.**
Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran's status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans (******************************************* and Labor Laws Posters (********************************************************* .
Threat Hunt Security Engineer
Security Architect Job 97 miles from Tulsa
Lumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're invested in providing the flexibility you need to thrive and deliver lasting impact. Apply now to continue digitally connecting the world and shaping the future.
**The Role**
The Lead Information Security Engineer primary function is to contribute to a team of SOC analysts to provide continuous monitoring, incident response, remediation support, and threat hunting services. This role also provides professional security operations center (SOC) analysis associated with customer monitoring activities through the processing and management of incidents and request tickets, as they are assigned. The role is responsible for investigating novel and complex threats, developing knowledge, playbooks, and automation. Deeper dives into threat hunting are also in scope. The responsibilities include receiving and managing escalations from other Analysts, customers, and other internal groups, as well as contributing to the full incident handling lifecycle with customers. The engineer is expected to contribute to internal documentation and adherence to SLA targets and requirements. Tier 3 engineers are expected to participate in and contribute to planning and implementation of strategic and operational projects in efforts to achieve overall PSS goals. Tier 3 engineers are expected to be able to troubleshoot complex problems with minimal input from peers and leadership. Tier 3 engineers will significantly contribute to an incident handling team for clients with the additional level of service.
**The Main Responsibilities**
+ Continue analysis of the alert queue events/incidents escalated by tier 1; advanced triage of security alerts; collects data and context necessary to resolve the incident or escalate to customer for explanation
+ Conduct Threat Hunting in customer environments leveraging structured frameworks; create future detections based on threat hunting recommendations; provide written reports to customers and be prepared to provide briefings as needed.
+ Trend and Pattern analysis of incidents to expedite current and future incident response efforts, assist customers with response playbooks as needed.
+ Regularly perform tuning and filtering of SIEM alerts and monitor components to ensure only relevant security data is being gathered.
+ Contribute to incident response efforts to identify, investigate, mitigate, and respond to security events and incidents during live incidents, red team incidents, purple team exercises, or tabletop exercises within the customer's environment and otherwise mentor junior analysts.
+ Investigate novel and complex threats, then develop detection logic, playbooks, automation, and any other necessary documentation for reoccurring incidents and incident tasks.
+ Contribute to the creation of temporary or permanent reports for customers, as requested
+ Provide professional recommendations to incident response leadership in incident remediation.
+ Provide technical recommendations to improve incident response frameworks and plans for SOC customers based on industry standards, guidelines, and best practices.
+ Document incident response process and create reports for incident stakeholders and facilitate lessons learned.
+ Collaborate with technical and business SMEs including internal leadership to provide technical assistance in identifying gaps to enhance security monitoring and response actions.
+ Work closely with Tier 1 teams to identify and implement automation solutions that enhance the efficiency of triage processes.
+ Participate in a 24x7 Rotating On-Call Schedule.
**What We Look For in a Candidate**
+ 3-5 years of Managed Security Service Provider (preferred)
+ Strong understanding of security principles such as attack frameworks, threat landscapes, attacker TTPs, etc.
+ Knowledge of new and evolving technologies
+ Working experience and knowledge of SOAR platforms and solutions
+ Excellent writing, communications, and presentation skills
+ Familiarization with a variety of information and network security monitoring tools (specifically Securonix SIEM, QRadar SIEM, Splunk, FortiSIEM, Microsoft Sentinel, Falcon Crowdstrike Carbon Black, among others)
+ Ability to work in a dynamic team-centered environment
+ Proven ability to multitask among multiple customers to meet all customer needs outside of a single pane of glass
+ Threat Intelligence or Forensic background is a plus
All Analysts should possess the background and experience necessary to obtain Industry or SOC specific certifications as instructed by management. Possible applicable certifications include, but are not limited to:
+ Certified Information Systems Security Professional (CISSP)
+ Information Systems Security Engineering Professional (CISSP-ISSEP)
+ Systems Security Certified Practitioner (SSCP)
+ Certified Ethical Hacker (CEH)
+ GIAC Certified Security Analyst (GCSA)
+ GIAC Certified Incident Handler (GCIH)
+ GIAC Certified Forensic Analyst (GCFA)
+ GIAC Certified Intrusion Analyst (GCIA)
+ GIAC Certified Forensic Examiner (GCFE)
+ Information Technology Infrastructure Library (ITIL)
**Compensation**
This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors.
Location Based Pay Ranges:
$103,711 - $138,281 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY.
$108,896 - $145,195 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI.
$114,082 - $152,109 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA.
Lumen offers a comprehensive package featuring a broad range of Health, Life, Voluntary Lifestyle benefits and other perks that enhance your physical, mental, emotional and financial wellbeing. We're able to answer any additional questions you may have about our bonus structure (short-term incentives, long-term incentives and/or sales compensation) as you move through the selection process.
Learn more about Lumen's:
+ Benefits (***************************************************
+ Bonus Structure
Requisition #: 336343
**Background Screening**
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page (**************************************** . Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
**Equal Employment Opportunities**
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, "protected statuses"). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
**Disclaimer**
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
**Application Deadline**
02/15/2025
Senior Security Engineer, Cyber Risk Management
Security Architect Job 97 miles from Tulsa
Headquartered in Dublin, Ohio, Cardinal Health, Inc. (NYSE: CAH) is a global, integrated healthcare services and products company, providing customized solutions for hospitals, health systems, pharmacies, ambulatory surgery centers, clinical laboratories and physician offices worldwide.
The company provides clinically-proven medical products and pharmaceuticals and cost-effective solutions that enhance supply chain efficiency from hospital to home. Cardinal Health connects patients, providers, payers, pharmacists and manufacturers for integrated care coordination and better patient management. Backed by nearly 100 years of experience, with approximately 50,000 employees in 46 countries, Cardinal Health ranks among the top 15 on the Fortune 500.
We currently have a full-time job opening for a Senior Security Engineer of Cyber Risk Management
_Department overview:_
Information Security and Risk Management (ISRM) at Cardinal Health enables Cardinal Health to securely deliver healthcare products and solutions that improve the lives of people every day by ensuring security and controls are embedded into Cardinal Health's people, process and technology. The Cyber Risk and Customer Security Assurance team fulfils our mission to strengthen our shield against cyber threats by providing a framework of processes and methodologies to manage Cardinal Health's cybersecurity risks through issue and exception management, cyber risk management, and customer third party risk assessment engagement.
Job Summary
Sr. Engineer, Cyber Risk Management, applies knowledge of Information Security, Risk Management, and Information Technology to lead the maturity of our Cyber Risk program. The primary responsibility of this role is to collaborate across the enterprise to measure the impact and likelihood of a variety of Cyber Risks.
This role is a senior position within the team and will work with all members of the Information Security team as well as Senior Leadership, Enterprise Risk Management, Business leaders, and IT teams.
Responsibilities:
+ Provide senior leaders and executives with information summarized at the correct level to make efficient, cost-effective, risk management decisions about the technology and information processing supporting their business functions
+ Work with all members of the Information Security team to drive information risk governance processes throughout the Cardinal Health enterprise
+ Implement the information risk management framework and related governance processes to cover not just the IT function, but all technology and information processing regardless of where the processing is in the enterprise (e.g., "shadow IT", manufacturing systems, operational technology, etc.)
+ Leverage and integrate with existing IT risk management and risk escalation / approval processes
+ Create an information risk register that catalogs key IT risks through an ongoing "top-down" risk assessment process
+ Define processes for summarizing "bottom-up" risk identified throughout various risk and compliance activities to add to risk register
+ Define and measure risk metrics that can be used to evaluate risk trends
_Qualifications:_
+ Excellent written and verbal communication skills
+ Experience in Information Technology, Information Security, and Risk Management
+ Experience implementing and maintaining processes at large enterprises
+ Experience with IT security principles, practices, technologies, programs and procedures, accompanied by an understanding of risk management methodologies and cybersecurity assessment frameworks
+ High-quality analytical skills, relationship management competencies
+ Relevant Information Security Certifications
**Anticipated salary range:** $121,600 - $182,385
**Bonus eligible:** Yes
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 2/27/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Manager, Information Security
Security Architect Job 97 miles from Tulsa
Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services. Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results. We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions. Join our dynamic team and make your mark on the payments technology landscape of tomorrow.
Summary of This Role
Develops and leads one or more of the following highly technical and specialized areas within information security: Security Engineering, Security Architecture, Forensics Analysis, Threat Analysis, Threat Hunting and Penetration Testing. Manages the development, deployment and execution of enterprise security controls and defenses. Monitors, analyzes and exploits system vulnerabilities to detect potential threats. Executes containment, mitigation and protection processes to safeguard against real time threats while maintaining critical documentation and evidence. Determines risk and exposure from security breaches and resolves incidents while providing guidance to business decision-makers.
What Part Will You Play?
Tracks and supports the delivery of information security solutions. Manages the tactical activities of installing and configuring of security systems, software and applications. Coordinates responses to intrusions and provide remediation guidance and support.
Coordinates resources on highly complex development projects including approval of design specifications and scope. Provides input to short-term security technology roadmaps regarding applicability of new technologies. Disseminates updates to InfoSec Architectural policies, standards and guidelines to team members.
Reviews forensic investigations and analysis of reported cyber incidents to evaluate root cause vectors and necessary control measures needed to prevent future occurrence. Implements appropriate countermeasures to recover deleted, hidden or lost user data.
Coordinates research and analysis of threat actor profiles and associated indicators to detect potential threats. Implements recommended actions and security tools to identify, monitor and mitigate attacks. Coordinates with external security organizations to exchange threat intelligence.
Coordinates complex threat assessment to evaluate incident impact and risk exposure. Reviews cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies), and draws conclusions on possible implications or applicability. Guides the threat intelligence collection process to enhance analytical capabilities.
Manages execution of penetration testing activities on core systems. Articulates the outcome of stimulated attacks and underlying security issues or system weaknesses. Recommends and institutes remediation techniques or improvements to protect and maintain security frameworks and controls.
Supports the evaluation and selection of security applications and systems. Manages the implementation of access control defenses. Provides quality review on the evaluation and documentation of team procedures. Manages development, deployment and support activities for multiple critical security technologies to include problem resolution and management, application maintenance, project requests and system enhancements.
Not an exhaustive list; other duties as assigned.
What Are We Looking For in This Role?
Minimum Qualifications
Bachelor's Degree
Relevant Experience or Degree in: Information Security or Computer Science preferred. Other majors will be considered.
Typically a minimum of 6 years
related professional experience and prefer a minimum of 1-2 years experience in a supervisory position.
One or more of the following-CISSP, CISA, CISM, PCI-QSA, PA-QSA, PCIP, CRISC, CGEIT, Certified Forensic Computer Examiner (CFCE), Certified Cyber Threat Analyst (CCTA), Certified Computer Examiner (CCE)
Preferred Qualifications
Prior Global Payments, payment or technology industry experience is preferred.
Master's Degree in a related field of study from an accredited university.
What Are Our Desired Skills and Capabilities?
None Identified
Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact ******************.
Cybersecurity Architect
Security Architect Job In Tulsa, OK
Job Title: Cybersecurity Architect
Salary Range: $131,200 - $164,000
Overview: The Cybersecurity Architect is a key technical leader responsible for strategic planning and guidance for technology solutions to protect computer systems, information, and networks from various threats. This role offers a unique opportunity to drive enterprise-wide cybersecurity initiatives, mentor IT staff, and ensure regulatory compliance.
Key Responsibilities:
Strategic Leadership: Provide strategic planning and guidance for technology solutions that defend and protect their computer systems, information, and networks from intentional or unintentional access, modification, or destruction.
Subject Matter Expert: Serve as a Cybersecurity subject matter expert informing Enterprise Architecture, guiding Engineering teams in the application of practical controls, and ensuring the operational readiness of related technologies.
Multidisciplinary Expertise: Leverage expertise in fields such as client and server systems, networking, and application development to develop comprehensive cybersecurity strategies.
Regulatory Compliance: Ensure that technologies and processes are compliant with regulatory requirements such as PCI-DSS, HIPAA, and SOX.
Mentorship and Collaboration: Mentor other IT staff and assist IT Managers in coordinating workloads to foster a collaborative and knowledgeable team environment.
Qualifications:
Experience:
Proven experience in cybersecurity architecture and strategic planning.
Expertise in client and server systems, networking, and application development.
Familiarity with regulatory requirements including PCI-DSS, HIPAA, and SOX.
Skills:
Strong leadership and mentoring capabilities.
Excellent problem-solving and communication skills.
Ability to work collaboratively in a team environment.
Why Join:
Impactful Role: Be a crucial part of safeguarding technology infrastructure and shaping cybersecurity strategy.
Professional Growth: Opportunities for mentorship, professional development, and leadership in a supportive and dynamic environment.
Competitive Compensation: Attractive salary range and benefits package.
Application Process: Interested candidates are encouraged to apply by submitting their resume and cover letter detailing their relevant experience and qualifications.
HPC & AI Architect
Security Architect Job In Tulsa, OK
**General Information** Req # WD00075967 Career area: Sales Country/Region: United States of America State: North Carolina City: Morrisville Working time: Full-time **Additional Locations** : * United States of America - California - Los Angeles * United States of America - Florida - Miami
* United States of America - Texas - Dallas
* United States of America - Pennsylvania - Philadelphia
* United States of America - Texas - Houston
* United States of America - Georgia - Atlanta
* United States of America - District of Columbia - Washington
* United States of America - Massachusetts - Boston
* United States of America - Arizona - Phoenix
* United States of America - Washington - Seattle
* United States of America - California - San Francisco
* United States of America - Michigan - Detroit
* United States of America - California - San Diego
* United States of America - Minnesota - Minneapolis
* United States of America - Florida - Tampa
* United States of America - Colorado - Denver
* United States of America - California - Riverside
* United States of America - Maryland - Baltimore
* United States of America - Nevada - Las Vegas
* United States of America - Texas - San Antonio
* United States of America - California - Sacramento
* United States of America - Florida - Orlando
* United States of America - California - San Jose
* United States of America - Ohio - Cleveland
* United States of America - Pennsylvania - Pittsburgh
* United States of America - Texas - Austin
* United States of America - Ohio - Cincinnati
* United States of America - Indiana - Indianapolis
* United States of America - Ohio - Columbus
* United States of America - North Carolina - Charlotte
* United States of America - Virginia - Virginia Beach
* United States of America - Rhode Island - Providence
* United States of America - Florida - Jacksonville
* United States of America - Utah - Salt Lake City
* United States of America - Virginia - Richmond
* United States of America - North Carolina - Raleigh
* United States of America - Louisiana - New Orleans
* United States of America - Oklahoma - Oklahoma City
* United States of America - Texas - Fort Worth
* United States of America - Arizona - Tucson
* United States of America - Nebraska - Omaha
* United States of America - Texas - El Paso
* United States of America - Hawaii - Honolulu
* United States of America - Texas - McAllen
* United States of America - Florida - Sarasota
* United States of America - Ohio - Dayton
* United States of America - California - Fresno
* United States of America - Oklahoma - Tulsa
* United States of America - South Carolina - Charleston
* United States of America - Michigan - Grand Rapids
**Why Work at Lenovo**
We are Lenovo. We do what we say. We own what we do. We WOW our customers.
Lenovo is a US$57 billion revenue global technology powerhouse, ranked #248 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world's largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo's continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY).
This transformation together with Lenovo's world-changing innovation is building a more inclusive, trustworthy, and smarter future for everyone, everywhere. To find out more visit ************** , and read about the latest news via our StoryHub (************************* .
**Description and Requirements**
Are you passionate by High Performance Computing and Artificial Intelligence? Artificial Intelligence is set to revolutionize the world we live. Do you want to be part of the fastest HPC & AI growing company? Do you want to help solving humanities' s greatest challenges? Come join the Lenovo North America HPC & AI Sales team. Lenovo is looking for a highly skilled architect specialized in high performance computing and artificial intelligence.
**Responsibilities:**
+ Drive technical conversation with customer around HPC & AI
+ Support the sales team for all technical aspect of the sales
+ Develop technical documentation/ write-ups
+ Present technical paper at conferences/shows
+ Understand customers' challenges in adopting AI
+ Position yourself as a trusted advisor to our customers
+ Educate the extended team on HPC&AI
+ Identify emerging industry markets
+ Establish and maintain a professional, working and consultative relationships with clients
+ Interface with our WW organization to identify our customer's need
+ Ensure the timely and successful post-sales delivery of AI solutions according to customer needs and objectives
+ Travel to customer sites to present HPC & AI
+ Present AI solutions in a professional manner to customers in-person, via email, and by phone
**Basic Qualifications:**
+ Bachelor of Science or higher in a technical field or equivalent experience in Engineering, Business or Information Technology is required
+ 5+ years of experience selling high tech, big-ticket products or solutions with a strong sales expertise in AI
**Preferred Qualifications:**
+ Expertise of AI frameworks
+ Expertise around GPU and FPGA accelerators
+ Designing AI solutions
+ Expertise in HPC cluster design (CPU, accelerators, storage, high speed interconnect)
+ Demonstrated ability to communicate, present and influence credibly and effectively at all levels of the organization, including executive and C-level
+ Passionate self-starter and self-learner with initiative and motivation
+ Expertise using consultative solution selling and business development skills to align the client's business needs with the solution
+ Experience with successful partner engagement
+ Strong presentation, negotiation and closing skills
+ Strong communication and collaboration skills with internal teams, customers, vendors and delivery partners
+ Ability to work from a home office with up to 50% travel
**_California candidates: The base salary range budgeted for this position is $224,000 - $296,000 (plus commission of 20%). Individuals may also be considered for bonuses and/or commissions. Lenovo's various benefits can be found at_** **_************************* **_._**
**NON - California Candidates:** **_The base salary range budgeted for this position is $184,000 - $236,000 (plus commission of 20%). Individuals may also be considered for bonuses and/or commissions. Lenovo's various benefits can be found at_** **_************************* **_._**
In compliance with Colorado's EPEWA, the expected Application Deadline for this position is 12/31/2024 this applies to both internal and external candidates.
_We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, religion, sexual orientation, gender identity, national origin, status as a veteran, and basis of disability or any federal, state, or local protected class._
**Additional Locations** :
* United States of America - California - Los Angeles
* United States of America - Florida - Miami
* United States of America - Texas - Dallas
* United States of America - Pennsylvania - Philadelphia
* United States of America - Texas - Houston
* United States of America - Georgia - Atlanta
* United States of America - District of Columbia - Washington
* United States of America - Massachusetts - Boston
* United States of America - Arizona - Phoenix
* United States of America - Washington - Seattle
* United States of America - California - San Francisco
* United States of America - Michigan - Detroit
* United States of America - California - San Diego
* United States of America - Minnesota - Minneapolis
* United States of America - Florida - Tampa
* United States of America - Colorado - Denver
* United States of America - California - Riverside
* United States of America - Maryland - Baltimore
* United States of America - Nevada - Las Vegas
* United States of America - Texas - San Antonio
* United States of America - California - Sacramento
* United States of America - Florida - Orlando
* United States of America - California - San Jose
* United States of America - Ohio - Cleveland
* United States of America - Pennsylvania - Pittsburgh
* United States of America - Texas - Austin
* United States of America - Ohio - Cincinnati
* United States of America - Indiana - Indianapolis
* United States of America - Ohio - Columbus
* United States of America - North Carolina - Charlotte
* United States of America - Virginia - Virginia Beach
* United States of America - Rhode Island - Providence
* United States of America - Florida - Jacksonville
* United States of America - Utah - Salt Lake City
* United States of America - Virginia - Richmond
* United States of America - North Carolina - Raleigh
* United States of America - Louisiana - New Orleans
* United States of America - Oklahoma - Oklahoma City
* United States of America - Texas - Fort Worth
* United States of America - Arizona - Tucson
* United States of America - Nebraska - Omaha
* United States of America - Texas - El Paso
* United States of America - Hawaii - Honolulu
* United States of America - Texas - McAllen
* United States of America - Florida - Sarasota
* United States of America - Ohio - Dayton
* United States of America - California - Fresno
* United States of America - Oklahoma - Tulsa
* United States of America - South Carolina - Charleston
* United States of America - Michigan - Grand Rapids
* United States of America
* United States of America - Alaska , * United States of America - Arizona , * United States of America - California , * United States of America - Colorado , * United States of America - Delaware , * United States of America - District of Columbia , * United States of America - Florida , * United States of America - Georgia , * United States of America - Hawaii , * United States of America - Idaho , * United States of America - Indiana , * United States of America - Iowa , * United States of America - Kansas , * United States of America - Louisiana , * United States of America - Maine , * United States of America - Maryland , * United States of America - Massachusetts , * United States of America - Michigan , * United States of America - Minnesota , * United States of America - Montana , * United States of America - Nebraska , * United States of America - Nevada , * United States of America - New Hampshire , * United States of America - North Carolina , * United States of America - North Dakota , * United States of America - Ohio , * United States of America - Oklahoma , * United States of America - Pennsylvania , * United States of America - Rhode Island , * United States of America - South Carolina , * United States of America - South Dakota , * United States of America - Texas , * United States of America - Utah , * United States of America - Virginia , * United States of America - Washington , * United States of America - West Virginia
* United States of America - California - Los Angeles , * United States of America - Florida - Miami , * United States of America - Texas - Dallas , * United States of America - Pennsylvania - Philadelphia , * United States of America - Texas - Houston , * United States of America - Georgia - Atlanta , * United States of America - District of Columbia - Washington , * United States of America - Massachusetts - Boston , * United States of America - Arizona - Phoenix , * United States of America - Washington - Seattle , * United States of America - California - San Francisco , * United States of America - Michigan - Detroit , * United States of America - California - San Diego , * United States of America - Minnesota - Minneapolis , * United States of America - Florida - Tampa , * United States of America - Colorado - Denver , * United States of America - California - Riverside , * United States of America - Maryland - Baltimore , * United States of America - Nevada - Las Vegas , * United States of America - Texas - San Antonio , * United States of America - California - Sacramento , * United States of America - Florida - Orlando , * United States of America - California - San Jose , * United States of America - Ohio - Cleveland , * United States of America - Pennsylvania - Pittsburgh , * United States of America - Texas - Austin , * United States of America - Ohio - Cincinnati , * United States of America - Indiana - Indianapolis , * United States of America - Ohio - Columbus , * United States of America - North Carolina - Charlotte , * United States of America - Virginia - Virginia Beach , * United States of America - Rhode Island - Providence , * United States of America - Florida - Jacksonville , * United States of America - Utah - Salt Lake City , * United States of America - Virginia - Richmond , * United States of America - North Carolina - Raleigh , * United States of America - Louisiana - New Orleans , * United States of America - Oklahoma - Oklahoma City , * United States of America - Texas - Fort Worth , * United States of America - Arizona - Tucson , * United States of America - Nebraska - Omaha , * United States of America - Texas - El Paso , * United States of America - Hawaii - Honolulu , * United States of America - Texas - McAllen , * United States of America - Florida - Sarasota , * United States of America - Ohio - Dayton , * United States of America - California - Fresno , * United States of America - Oklahoma - Tulsa , * United States of America - South Carolina - Charleston , * United States of America - Michigan - Grand Rapids
Director IT Security
Security Architect Job In Tulsa, OK
Provide cybersecurity leadership over the Cherokee Nation Business, in partnership with CNB's VP CIO/CISO including but not limited to cybersecurity strategy, including the design, implementation, and maintenance of security protocols to protect critical data and infrastructure, managing a team of security professionals, and ensuring compliance with industry regulations. Remain updated on emerging cyber threats and vulnerabilities to ensure the organization's digital assets are safeguarded against identified threats.
Evaluate, develop, coordinate, and oversee the implementation and execution of security policies, procedures, and cybersecurity programming. Manage the day-to-day 24x7 security operations in partnership with designated 3
rd
party managed services partners. Provide regular reporting on the state of our cybersecurity readiness to management, lead the enterprise cybersecurity incident response activities, coordinate cybersecurity awareness programming, and keep current the enterprise cybersecurity risk register.
Responsibilities
ESSENTIAL DUTIES AND RESPONSIBILITIES
Includes the following:
Provides ‘hands on' leadership to direct cybersecurity resources and managed services vendors to provide identification, protection and response for cybersecurity functions.
Provides resource and vendor management to ensure cybersecurity operational SLAs are adhered to, continuous business operations, and projects are completed on time and within budget.
Leads cybersecurity resources in the protection and sustainment of a secured environment through documented remediations and review of current protocols for effectiveness to cybersecurity protection, detection, and response,
Provides technical leadership in the design/implementation of security architecture technology including but not limited to network, workstations, applications, and cloud services.
Leads event/incident response related to cybersecurity including but not limited to breach investigations, containment, forensic, and after-action writeup/review.
Develops and implements, in partnership with other departments and business units, employee cybersecurity awareness training programs.
Maintains, revises, and develops as needed, processes, procedures, and policies for areas of responsibilities to mitigate emerging threats and ensure a secure operational environment.
Focuses on aligning IT cybersecurity operations and resources to meet established cybersecurity objectives, projects, and priorities.
Oversees regular cybersecurity exercises, pen tests, and 3
rd
party assessments.
Advises VP CIO/CISO on all matters related to cybersecurity and ensures timely communication regarding all cybersecurity operational issues and project status.
Manages assigned budget for operations or projects.
Required to be on call 24x7x365.
Performs other job-related duties as assigned.
Develops, publishes, educates, and maintains comprehensive enterprise-wide information security strategy, plans, policies, procedures, and guidelines.
Recruits, mentors, develops, and retains a staff of security minded technology security professionals fostering a culture of collaboration and accountability.
SUPERVISORY/MANAGEMENT AUTHORITY
Supervise/manages staff having authority over hiring/firing/performance decisions.
Qualifications
EDUCATION AND EXPERIENCE
Bachelor's degree in information technology or related field and 13 years of Cybersecurity/IT leadership experience in a mid/large-sized environment or an equivalent combination of education and experience. Must have10+ years in technology management with 5+ years management of cybersecurity teams and projects. Must also have 4+ years' experience in Azure cloud security, and 5+ years' experience in establishing cybersecurity baselines and associated cybersecurity programs, and 5+ years of proven security architecture experience. Master's degree in information security or related degree preferred.
KNOWLEDGE, SKILLS AND ABILITIES
Proven experience in being self-motivated and directed with ability to effectively prioritize and execute tasks in a fast-paced and time sensitive environment.
Demonstrated leadership abilities with strong verbal, written, collaboration, and presentation skills to leadership and cross functional teams.
High level of integrity, professionalism, and attention to detail.
Strong analytical and problem-solving skills to identify and respond to potential cyber threats.
Proven knowledge of cybersecurity for enterprise-wide multi-platform operating system security, network security, application security, database security, regulatory compliance, and risk management.
Deep understanding of cybersecurity principles and frameworks including but not limited to network, application, threat intelligence, incident response, vulnerability management, risk management, and reporting.
Ability to lead cybersecurity assessments, compliance management, and risk assessments.
Knowledge of emerging cybersecurity threats, services, technologies, and tools.
WORK ENVIRONMENT
Work is primarily performed in a climate-controlled office setting. Some travel required.
Senior Security Analyst
Security Architect Job 97 miles from Tulsa
Posting Number Staff_0403344 Classification Title Staff Working Title Senior Security Analyst Datatel Position ID INTE3SRSECUR1A Annual Hours 2080 Placement Range $75,448 - $84,879 Position Type Regular Job Category Exempt General Description This position is responsible for monitoring and the analysis of cyber threats to assist in the defense of OCCC cyber systems and operations. The position will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context, will generate reports for upper management based on data, information, and intelligence and must understand the MITRE attack framework and be able to integrate the framework in the reporting. The position will develop, and document threat hunt activities based on intelligence, scenarios, and observations, develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the position performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP and NIST. The position performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The position will participate in in-house, regulatory, and industry teams including working groups, committees, incident response teams, and business continuity teams as required. In addition, the position will participate in exercises that test policies, procedures, and skills which are required by business and critical operations and responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
Reports To Director of Information Technology Infrastructure What position(s) reports to this position?
None
Minimum Education/Experience
Minimum (4) years' experience in information security or a related role.
Professional certifications such as CCNA, CCNP, CompTIA Network +, CompTIA Security +, CISSP, GIAC, CEH or Engineer-level Operating System certifications is required.
Required Knowledge, Skills & Abilities
Knowledge:
Knowledge of information security, digital networking, computing, telecommunications operations
Understanding of current cybersecurity threats, vulnerabilities, and attack methods, including malware, phishing, ransomware, and advanced persistent threats (APT)
Knowledge of any of the following software/tools: DUO, Palo Alto Firewall, CISCO Secure E-mail Threat Defense, LogRhythm, PaloAlto Cortex XDR, Cisco XDR, Virtual Desktop Infrastructure and Umbrella
Extensive knowledge of TCP/IP and Cisco routing and switching, as well as proven experience with firewall and VPN appliances
Knowledge and experience using Microsoft Office products is required.
Expertise in incident detection, analysis, and response procedure
Knowledge of relevant cybersecurity laws and regulations
Experience with securing cloud environments such as AWS, Azure, or Google Cloud, including IAM, security policies, and monitoring
Understanding of OS security (Windows, Linux, mac OS) including patch management, hardening, and endpoint protection
Skills:
Strong verbal and written communication skills to convey security information to both technical and non-technical stakeholders
Skill in handling cybersecurity incidents, including triage, analysis, containment, and recovery
Expertise in conducting internal and external security audits, including gap analysis and security assessment
Abilities:
Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures, or governmental regulations
Ability to write reports, business correspondence and procedure manuals
Ability to effectively present information and respond to questions from groups of employees, managers, clients or customers
Ability to work with mathematical concepts such as probability and statistical inference, fundamentals of plane and solid geometry, trigonometry, calculus, and differential equations
Ability to apply concepts such as fractions, percentages, ratios, and proportions to practical situations
Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists
Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form
Physical Demands/Working Conditions
PHYSICAL/MENTAL DEMANDS AND WORKING CONDITIONS:
The work is medium work which requires the person in this position to exert up to 50 pounds of force occasionally, and/or up to 20 pounds of force frequently, and/or up to 10 pounds of force constantly to move objects. Additionally, the following physical abilities are required:
This position requires the person to be able to move objects weighing 50 pounds or more short distances.
Work is performed in a relatively safe, and secure office work environment.
Work is performed in a dynamic environment that requires sensitivity to change and responsiveness to changing goals, priorities, and needs.
Work is performed during office hours; works occasional evenings or weekends.
Preferred Qualifications
Bachelor's degree in Computer Science, Information Security, or a related field.
Minimum (4) or more years of experience in information security or a related role at an institution of higher education.
Required Training
Quarterly compliance training as assigned by institution
Work Hours
Monday - Friday; 8am to 5pm
Weekends, holidays, and after hours as required.
Department Telecommunications & Network Services Job Open Date 01/14/2025 Job Close Date Open Until Filled No HR Contact Latrina Rich Special Instructions to Applicants
Applicants are to thoroughly complete the online application and attach the following required documents: cover letter, resume, and transcript conferring highest degree if meeting the minimum requirement with degree.
Applicants who do not attach the required documents will not be considered for the position.
For application assistance, please contact Human Resources at **************, Monday through Friday between the hours of 8:00 AM and 5:00 PM.
Job Duties
Job Duties (Position Specific)
To perform this job successfully, an individual must be able to perform the essential job functions satisfactorily. Reasonable accommodations may be made to enable individuals with disabilities to perform the primary job functions herein described. Since every duty associated with this position may not be described herein, employees may be required to perform duties not specifically spelled out in the , but which may be reasonably considered to be incidental in the performing of their duties just as though they were actually written out in this job description.
Job Duties (Duties Assignment Statement)
Synthesizes complex or diverse information; collects and researches data; uses experience to complement data; designs workflows and procedures; generates creative solutions; translates concepts and information into images; uses feedback to modify designs; applies design principles; demonstrates attention to detail.
Identifies and resolves problems in a timely manner; Gathers and analyzes information skillfully; Develops alternative solutions; Works well in group problem solving situations; Uses reason even when dealing with emotional topics.
Generates creative solutions; translates concepts and information into applications; uses feedback to modify recommendations; pursues training and development opportunities; strives to continuously build knowledge and skills; shares expertise with others.
Speaks clearly and persuasively in positive or negative situations; listens and gets clarification; responds well to questions; demonstrates group presentation skills; participates in meetings; writes clearly and informatively; varies writing style to meet needs; presents numerical data effectively; able to read and interpret written information.
Balances team and individual responsibilities; exhibits objectivity and openness to others' views; gives and welcomes feedback; able to build morale and group commitments to goals and objectives; supports everyone's efforts to succeed.
Prioritizes and plans work activities; uses time efficiently; sets goals and objectives; develops realistic action plans.
Develops project plans; coordinates projects effectively; communicates changes and progress; completes projects on time and budget; manages project team activities.
Adapts to changes in the work environment; manages competing demands; changes approach or method to best fit the situation; able to deal with frequent change, delays or unexpected outcomes.
Manages difficult or emotional customer situations; responds promptly to customer needs; solicits customer feedback to improve service; responds to requests for service and assistance; meets commitments to customers.
Works within approved budget; develops and implements cost saving measures; conserves organizational resources.
Job Duties (Safety / Policy & Procedures)
Abide by the policies and procedures published in the Board of Regents Policies and College Policies & Procedures
Contribute to a safe educational & working environment.
Adhere to established safety and health procedures and practices for the purpose of providing injury and illness prevention for self and others.
Complete quarterly health and safety training pursuant to OCCC's established safety and health procedures and practices.
Participate in all applicable OCCC emergency, evacuation, shelter in place drills, and be prepared to take action and assist others in taking appropriate action should a health or safety emergency occur.
Senior Security Engineer 3 - Infrastructure and Automation
Security Architect Job 97 miles from Tulsa
PagerDuty empowers teams of all kinds to do the critical work that moves business forward through the PagerDuty Operations Cloud. Visit our careers site (*********************************** to explore life at PagerDuty, discover opportunities, and sign-up for job alerts!
PagerDuty is seeking a **Senior Security Engineer (Infrastructure & Automation)** to join our diverse, customer-focused team! As a **Senior Security Engineer** , you will be a key contributor leading security initiatives around foundational infrastructure supporting PagerDuty's SaaS offerings. Your primary focus will be on infrastructure security through architecture reviews, threat modeling, and security tool implementations, while leveraging automation to scale security solutions. Since we own and operate what we build, you'll collaborate closely with engineers across many teams to ensure we deliver secure, highly reliable, and scalable solutions to our customers.
This is an exciting opportunity to build lovable security solutions that make developers and customers happy. The ideal candidate believes in securing infrastructure at scale and creating automated solutions that make security the easiest choice.
**KEY RESPONSIBILITIES**
+ Lead technical security initiatives by conducting architecture reviews and threat modeling sessions for new and existing services
+ Design and implement security controls for cloud infrastructure and containerized environments
+ Work closely with Product Engineering teams to review service designs (full stack) and provide security-focused recommendations
+ Resolve technical ambiguity in system designs, collaborating with engineering management and staff engineers
+ Monitor and maintain security tooling supporting infrastructure security controls
+ Design and implement security automations and tool integrations to scale security operations
+ Build and maintain security guardrails and automated compliance controls
+ Develop automated vulnerability management workflows to drive timely remediation
+ Create security relevant alerting and metrics for visibility and reporting
+ Implement automated incident response playbooks
+ Mentor and guide team members on security best practices and implementation approaches
+ Participate in our team's on-call rotation, triaging and addressing security issues as they arise.
+ Contribute to roadmap and annual planning discussions
**BASIC QUALIFICATIONS**
+ 5+ years of experience as a full-stack Security Engineer in a AWS native, micro-service SaaS environment
+ Strong expertise in cloud security, particularly AWS services including but not limited to:
+ GuardDuty, CloudTrail, Secrets Manager
+ EKS/ECR, IAM family, Config
+ Service Mesh architectures
+ Proficiency with security tools:
+ Vulnerability Management & EDR: Wiz, Snyk, Qualys/Nessus, Crowdstrike
+ SIEM: SumoLogic or Splunk
+ Experience with Infrastructure as Code and CI/CD:
+ Terraform, Helm, Chef, Ansible, Buildkite, Jenkins, ArgoCD
+ 4+ years of experience and proficiency in at least one programming language and framework (Python, Bash, Ruby on Rails, Elixir, or Java)
+ Strong understanding of Threat Modeling principles
+ Experience with Security Incident Response & Risk Management
+ High appetite for challenging problems with a high degree of ownership.
**PREFERRED QUALIFICATIONS**
+ Current or past experience with obtaining and maintaining FedRAMP authorization
+ Experience working at a SaaS company larger than 1000 employees and 100M in revenue
+ Strong problem-solving abilities with effective change management skills
+ Possesses a strong sense of ownership and a keen discernment for excellence in security systems within a SaaS environment, demonstrating the ability to distinguish what constitutes a truly robust and effective safeguarding infrastructure.
+ Demonstrated history of mentoring and coaching
+ Experience building Security Orchestration, Automation, and Response (SOAR) playbooks
+ Strong written and verbal communication skills
+ Working knowledge and experience with PagerDuty Incident Management and Process Automation products.
+ Familiarity with Corporate security needs and solutions, and ability to provide oversight and mentorship to the Corporate Security team to ensure alignment with CISO strategic initiatives and mandates.
The base salary range for this position is 152,000 - 248,000 USD. This role may also be eligible for bonus, commission, equity, and/or benefits.
Our base salary ranges are determined by role, level, and location. The range, which is subject to change based on primary work location, reflects the minimum and maximum base salary we expect to pay newly hired employees for the position. Within the range, we determine pay for an individual based on a number of factors including market location, job-related knowledge, skills/competencies and experience.
Your recruiter can share more about the specific offerings for this role, as well as the salary range for your primary work location during the hiring process.
The successful applicant will be performing work in FedRAMP environments, and therefore, must be a U.S. Person (i.e. U.S. citizen, U.S. national, lawful permanent resident, asylee, or refugee). **This position may also perform work that the U.S. government has specified can only be performed by a U.S. citizen on U.S. soil.**
**Not sure if you qualify?**
Apply anyway! We extend opportunities to a broad array of candidates, including those with diverse workplace experiences and backgrounds. Whether you're new to the corporate world, returning to work after a gap in employment, or simply looking to take the next step in your career path, we are excited to connect with you.
**Where we work**
PagerDuty currently has offices in Atlanta, Lisbon, London, San Francisco, Santiago, Sydney, Tokyo, and Toronto. We offer a hybrid, flexible workplace. We also provide ample opportunities for in-person and virtual connection, like team offsites and volunteering events.
**How we work**
Our values are deeply embedded in how we operate and the people we bring on board. You will see our values ingrained in how we support our customers, collaborate with our colleagues, develop our products and foster an inclusive and empathetic work culture.
+ Champion the Customer | Put users first to design great products and experiences.
+ Run Together | Build strong teams that amplify our impact on users.
+ Take the Lead | Disrupt and invent to be the first choice for users.
+ Ack + Own | Take ownership and action to deliver more efficiently to users.
+ Bring Your Self | Bring your best self to build empathy and trust with users.
**What we offer**
**One way we ensure our employees are inspired to do their best is through a comprehensive total rewards approach that supports them and their loved ones. As a global organization, our programs are competitive with industry standards and aligned with local laws and regulations. Learn more, including country-specific offerings, on our** benefits site (********************************************** **.**
**Your package may include:**
+ Competitive salary
+ Comprehensive benefits package from day one
+ Flexible work arrangements
+ Generous paid vacation time
+ Paid holidays and sick leave
+ Dutonian Wellness Days - scheduled company-wide paid days off in addition to PTO
+ Company equity*
+ ESPP (Employee Stock Purchase Program)*
+ Retirement or pension plan*
+ Paid parental leave - up to 22 weeks for pregnant parent, up to 12 weeks for non-pregnant parent (some countries have longer leave standards and we comply with local laws)*
+ HibernationDuty - an annual company paid week off when everyone at PagerDuty, with the exception of a small, coverage crew, is asked to take a much needed break to truly disconnect and recharge
+ Paid volunteer time off - 20 hours per year
+ Company-wide hack weeks
+ Mental wellness programs
_*Eligibility may vary by role, region, and tenure_
**About PagerDuty**
PagerDuty, Inc. (NYSE:PD) is a global leader in digital operations management. The PagerDuty Operations Cloud revolutionizes how critical work gets done, and powers the agility that drives digital transformation. Customers rely on the PagerDuty Operations Cloud to compress costs, accelerate productivity, win revenue, sustain seamless digital experiences, and earn customer trust. More than half of the Fortune 500 and more than two thirds of the Fortune 100 trust PagerDuty including Cisco, Cox Automotive, DoorDash, Electronic Arts, Genentech, Shopify, Zoom and more.
Led by CEO Jennifer Tejada, PagerDuty's Board of Directors is 50% female and 62% URP representation. We strive to build a more equitable world by investing 1% each of company equity, product, and employee volunteer time.
PagerDuty is Great Place to Work-certified, a Fortune Best Workplace for Millennials, a Fortune Best Medium Workplace, a Fortune Best Workplace in Technology, and a top rated product on TrustRadius and G2.
Go behind-the-scenes on our careers site (*********************************** and @pagerduty on Instagram.
**Additional Information**
PagerDuty is committed to creating a diverse environment and is an equal opportunity employer. PagerDuty does not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, parental status, veteran status, or disability status.
PagerDuty is committed to providing reasonable accommodations for qualified individuals with disabilities in our job application process. Should you require accommodation, please email accommodation@pagerduty.com and we will work with you to meet your accessibility needs.
PagerDuty uses the E-Verify employment verification program.
Security Engineer II
Security Architect Job 97 miles from Tulsa
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Lead Analyst-Information Security ISSO
Security Architect Job In Tulsa, OK
Description & Requirements Reporting to the Sr. Manager for the Program Security Services team (US Services), the Lead Analyst-ISSO is responsible for managing the overall security posture of their assigned projects. Acting as an independent contributor, the Lead Analyst-ISSO will document and validate security compliance requirements, as defined in client contracts and established regulatory frameworks (NIST 800-53, HIPAA, IRS 1075, CMS MARS-E/ARC-AMPE, PCI-DSS). This position requires broad knowledge of Information Technology, including cloud providers such as Azure and AWS. This role will also manage stakeholder relationships with both internal and external customers.
Travel up to 10% nationally.
Additional Requirements as per contract/client: Must be a US Citizen.
Essential Duties and Responsibilities:
-Responsible for ensuring information security for an assigned area of Business / Project focusing on key areas of risk, outlined in the Information Security policy, under the direction of the Information Security management team.
- Conduct Information Security risk assessments and compliance evaluations for infrastructure and application assets within required timeframes and to industry standards and regulatory specifications.
- Ensure controls implementation for identified Information Security risks for business area of responsibility.
- Define, create and maintain the documentation for certification and accreditation of each information system in accordance with regulatory requirements.
- Support audit and client engagements, coordinate the collection, review and submission of Information Security deliverables and coordinate the remediation of audit concerns.
- Manage expectations with multiple stakeholders on projects and programs in conjunction with the Information Security team.
- Promotion of Information Security awareness through various communication channels within the organization.
- Collaborate with the Information Security team members on process improvements, secure design and recertification of MAXIMUS assets.
- Travel required up to 25%.
- Other duties as assigned.
Develop Plan of Action and Milestones (POA&M) as necessary
Manage exceptions to policies and procedures
Minimum Requirements
- Please refer to the additional information section of the job requisition for this opening to determine clearance eligibility required.
- Bachelor's Degree
- 7+ of security or technology related experience
- Works on complex issues where analysis of situations or data requires an in depth evaluation of variable factors.
- Exercises judgement in selecting methods, techniques, and evaluation criteria for obtaining results.
- Networks with key contacts outside own area of expertise.
- Develops solutions to a variety of complex problems.
- Work requires considerable judgment and initiative.
- Ability to communicate technical information in understandable business terms
- Excellent interpersonal skills, presentation skills, and verbal / written communication skills
- Strong customer service abilities required.
- Ability to work collaboratively with a broad range of staff. Skilled in Microsoft Office software including Word, Excel, Visio, MS Project, and PowerPoint
- Ability to perform comfortably in a fast-paced, deadline-oriented work environment
- Ability to execute many complex tasks simultaneously, and work as a team member as well as independently
Travel is up to 10%
At least one of the following certifications is REQUIRED: CISSP, CISA or CISM.
Experience with NIST 800-53 and HIPAA is REQUIRED.
Experience with Cloud providers, such as Azure and AWS.
Knowledge of any of the following security frameworks is preferred: IRS 1075, CMS MARS-E/ARC-AMPE, PCI-DS
Smartsheet experience preferred.
#LeadAnalyst #maxcorp #LI-JH1 #HighlightedJobs1224LI #HighlightedJobs1224FB #HighlightedJobs1224X
EEO Statement
Active military service members, their spouses, and veteran candidates often embody the core competencies Maximus deems essential, and bring a resiliency and dependability that greatly enhances our workforce. We recognize your unique skills and experiences, and want to provide you with a career path that allows you to continue making a difference for our country. We're proud of our connections to organizations dedicated to serving veterans and their families. If you are transitioning from military to civilian life, have prior service, are a retired veteran or a member of the National Guard or Reserves, or a spouse of an active military service member, we have challenging and rewarding career opportunities available for you. A committed and diverse workforce is our most important resource. Maximus is an Affirmative Action/Equal Opportunity Employer. Maximus provides equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disabled status.
Pay Transparency
Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances.
Minimum Salary
$
108,375.00
Maximum Salary
$
140,000.00
C2ISR Information System Security Manager
Security Architect Job 90 miles from Tulsa
At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training...everyday...across the globe.
As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture.
GENERAL DESCRIPTION
The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Manager (ISSM) Is responsible for ensuring the appropriate operational security posture in support of Joint Theater Air-to-Ground Simulation Systems (JTAGSS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSM must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include the development of a formal Information Systems Security Program, setting policies, and oversight of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. The ISSM is responsible for coordination with the cognizant security officials and approval of external Information Systems, oversees Information Systems Security Officers to ensure they follow established policies and procedures, and is responsible for developing and updating the SSP, managing and controlling changes to the system, and assessing the security impact of those changes. Duties also include physical and environmental protection, personnel security, and incident handling. This position will report to the Corporate Information Assurance Manager (CIAM) and coordinate with the Facility Security Officer (FSO) and Corporate Program Security Officer. This position may serve as an alternate in their absence and work closely with the Government ISSO/ISSM. The ISSM will also coordinate with Wing/AP and the Software Engineering Squadrons as required. The ISSM must have or obtain DoD 8570-compliant certifications for IAM II.
Duties & Responsibilities
+ Lead the information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems across the C2ISR enterprise
+ Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations
+ Develop, implement, and maintain security emergency action plans
+ Provide security education and training to local employees
+ Maintain administrative security records and documents for local employees
+ Conduct self-inspections to ensure current security measures and policies are effective
+ Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees
+ Manage system audits in accordance with System Security Plan requirements
+ Ensure networks, systems, and hardware are compliant with corporate and contract requirements
+ Develop and update required Authority to Operate (ATO) artifacts
+ Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements
+ Ensure a record is maintained of all security related vulnerabilities and that serious or unresolved violations are reported to the FSO and AO/DAO
+ Provide oversight, training, and guidance to the enterprise C2ISR ISSO workforce
+ May lead ATO artifact development and maintenance
+ Works with upper management to determine acceptable level of risk for enterprise computing platforms.
+ Gives input into developing the Security budget
+ Capable of resolving escalated issues arising from operations and requiring coordination with other departments
+ Other duties as assigned
REQUIREMENTS
+ Bachelor's degree in related field or 2 years' experience in related field
+ Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Red Hat Linux software and virtualization
+ Specialized computer training in networking and active directory
+ Experience with security audits for information systems
+ Strong communication and problem-solving skill.
+ Ability to work in both a team environment as well as independently
+ Must be organized and detail orientated
+ Current DoD 8570 IAT Level II and IAM Level II or higher certification
+ Must have or be able to obtain a Top-Secret clearance and approval for SAP/SCI access
DESIRABLE
+ Experience with DoD Security Regulations and Policies
+ Experience with Type 1 and/or Type 2 virtualization platforms
+ Experience managing system security in an enterprise environment
+ Strong system documentation skills
+ Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS)
AUTHORITY
+ Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access
PERKS
As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals.
+ Medical/Vision/Prescription/Dental Benefits
+ Life, AD&D and Long Term Disability Coverage
+ Paid Holidays, Military Leave, and Paid Time Off
+ 401k Plan with eligibility from first day of employment
+ Education reimbursement for job-related courses for full-time employees
+ PriceClub/COSTCO/Sam's Club annual membership
PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Department
Company Site Operations OKC
Employment Type
Full-Time
Minimum Experience
Manager/Supervisor
Identity and Access Management (IAM) Architect
Security Architect Job In Oklahoma
IT accelerates the success of IDEXX employees and customers by providing scalable and innovative solutions and leadership. We are a global organization that supports all technology needed to deliver products and solutions to customers enabling them to focus on delivering high quality patient care. We strive to provide exceptional customer service and experience in the most efficient means possible, requiring alignment and cross-functional communication.
The Identity and Access Management (IAM) Architect will be responsible for designing, implementing, and overseeing the organization's IAM strategy. This role focuses on ensuring secure, efficient, and compliant access to various systems and applications. Leveraging Microsoft Active Directory (on-premises and Azure), the IAM Architect will develop and enforce policies related to Application Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC). The architect will also ensure adherence to audit requirements and collaborate with cross-functional teams to align IAM initiatives with business objectives.
As the IAM Architect, you will play a critical role in shaping the security posture of our organization. This position offers the opportunity to work with cutting-edge technologies and to lead initiatives that have a significant impact on our business operations and security. If you are passionate about IAM and looking for a challenging role where you can make a difference, we encourage you to apply.
In this role, you will be responsible for:
Direct leadership: leading 3 systems administrators and the day-to-day management of network access tasks. This newly formed role will have the opportunity to assess IDEXX's existing domain structure and user policies and lead the effort to enhance, as well as design, and implement Role-Based Access Control (RBAC) policies with a focus on Zero Trust.
Strategic Planning and Design: Develop and implement an enterprise-wide IAM strategy that aligns with business goals and security requirements. Design and architect IAM solutions, including SSO, MFA, and identity federation.
Policy Development and Enforcement: Create and enforce IAM policies, procedures, and standards, particularly focusing on RBAC frameworks. Ensure compliance with regulatory requirements and internal security policies.
Technology Implementation: Lead the deployment and integration of IAM technologies, leveraging Microsoft Active Directory (on-premises and Azure). Evaluate and select appropriate IAM tools and solutions to enhance security and user experience.
Collaboration and Leadership: Work closely with IT, security, and business teams to understand access requirements and implement appropriate controls. Provide expert guidance and mentorship to IAM team members and other IT staff.
Automation and Optimization: Develop automation scripts and workflows (e.g., using PowerShell) to streamline provisioning and de-provisioning processes. Optimize existing IAM processes for efficiency and effectiveness.
Incident Management and Support: Act as the highest escalation point for complex access issues not resolved by the IT Help Desk. Oversee the resolution of IAM-related incidents and problems.
Audit and Compliance: Ensure that IAM practices meet audit requirements and assist in audit activities. Continuously monitor and improve IAM controls to mitigate risks.
What You Will Need to Succeed:
Technical Expertise: Extensive experience in IAM architecture and strategy development. Deep understanding of IAM principles and technologies, including MFA, OAuth, SSO, SAML, and OpenID Connect. Proficient with Microsoft Active Directory (on-premises and Azure) and Azure AD Connect.
Scripting and Automation: Advanced proficiency in scripting tools, such as Microsoft PowerShell, for automation and management tasks. Experience with automation tools and frameworks relevant to IAM.
Platform Knowledge: Desired experience with ServiceNow ITSM platform and its integration with IAM processes.
Soft Skills: Excellent leadership and communication skills, with the ability to articulate complex IAM concepts to non-technical stakeholders. Strong analytical and problem-solving abilities. Proven track record of working collaboratively across departments.
Compliance and Security: Familiarity with compliance standards such as ISO 27001, NIST, GDPR, and SOX. Experience in conducting IAM audits and implementing controls to meet regulatory requirements.
Why IDEXX?
We're proud of the work we do, because our work matters. An innovation leader in every industry we serve, we follow our Purpose and Guiding Principles to help pet owners worldwide keep their companion animals healthy and happy, to ensure safe drinking water for billions, and to help farmers protect livestock and poultry from diseases. We have customers in over 175 countries and a global workforce of over 10,000 talented people.
So, what does that mean for you? We enrich the livelihoods of our employees with a positive and respectful work culture that embraces challenges and encourages learning and discovery. At IDEXX, you will be supported by competitive compensation, incentives, and benefits while enjoying purposeful work that drives improvement.
Let's pursue what matters together.
IDEXX values a diverse workforce and workplace and strongly encourages women, people of color, LGBTQ+ individuals, people with disabilities, members of ethnic minorities, foreign-born residents, and veterans to apply.
IDEXX is an equal opportunity employer. Applicants will not be discriminated against because of race, color, creed, sex, sexual orientation, gender identity or expression, age, religion, national origin, citizenship status, disability, ancestry, marital status, veteran status, medical condition, or any protected category prohibited by local, state, or federal laws.
#LI-EV1
Information Security & Compliance Analyst (12 mo. contract)
Security Architect Job 97 miles from Tulsa
**Title:** Information Security & Compliance Analyst - 12 mo. contract **_About PSI_** _We are PSI Services. We power world leading tests. Delivered with trusted science and the very best test taker experience. PSI supports test-takers on their journey to pursuing dreams and gaining certifications that are important to them. They believe that their dreams are worth working for; that their dreams are worth the effort. And we believe that too. This is our core purpose, to empower people to achieve their dreams. We do this by being the best provider of workforce solutions, which foster both technology and science to deliver the best solutions for our test takers._
_We are searching for top talent to join our PSI team and help grow our products and services. We have a creative, supportive and inclusive culture where we empower people in their careers to be their authentic self and make the most of their great talent._
_At PSI, we are committed to helping people meet their potential and we believe that promoting diversity, equity and inclusion is critical to our success. That's why you'll find these ideals are intrinsic to our company culture and applied throughout the employee lifecycle._
_Learn more about what we do at:_ _***************************
**About the Role**
The Information Security, Governance, Risk and Compliance Analyst role works collaboratively with stakeholders across the business on various activities related to Quality, Environmental Sustainability, Business Continuity, Information Security and Privacy with the aim of ensuring compliance with ISO, SOC2, NIST, PCI and other industry standard frameworks.
This role will collaborate with process owners, internal auditors, external auditors, and other stakeholders in order to assist in reviewing, monitoring, and resolving findings.
This includes helping the team manage ISO27001, SOC 2, ISO14001, ISO22301, ISO9001 Compliance programs.
By supporting the implementation of internal and external assessments, responding to and managing the full lifecycle of compliance audits, and ensuring compliance with existing and emerging regulations and standards including SOC2, ISO 27001, NIST CSF, PCI, SOX, and other GRC activities, the GRC Analyst will also contribute to the transformation of the company's compliance program.
This is a full time, permanent position, Monday to Friday with flexible hours around a standard 0900-1700. The role can be performed remotely, with occasional travel to offices and test centres globally to support with audits.
**Role Responsibilities**
+ Manage risk and vulnerability assessments, validation testing, compliance reviews, and audits in accordance with agreed standards.
+ Manage and support internal and external audits
+ Support the continuation of ISO 27001, ISO 9001, ISO 14001, ISO 22301, SOC2 and PCI certifications.
+ Support the development and maintenance of the Global ISMS Management Committee, including governance related responsibilities.
+ Maintain and monitor a central repository for audit evidence.
+ Inform the proper stakeholders of important concerns and hazards
+ Maintain up-to-date knowledge of procedures and methods that serve to broaden team knowledge and industry expertise
+ Supporting the development, documentation and maintenance of policies, procedures, and standards across the organisation, ranging from Information Security and Data Protection to Quality Management and Environmental Management.
+ Assist the department in responding to inquiries from the business units about ongoing operational compliance
+ Be proactive in seeking out areas for improvement and offer insightful advice and value-added guidance on process and control enhancements
+ Share information with managers to avoid surprises, draw attention to problems, and guarantee delivery on time
+ Champion Compliance by promoting and developing awareness of different security and compliance risks and best practices across the company.
+ Assist with the development of GRC related newsletters and training.
**Knowledge, Skills and Experience Requirements**
+ 2+ years of direct experience in Governance, Risk & Compliance
+ 1+ year expertise conducting ISO 27001 and SOC 2 audits, as well as handling audit responses
+ **Thorough understanding of regulatory compliance requirements (ISO27001,ISO22301, SOC 2 , NIST, FedRamp, CMMC, PCI, GDPR, etc.)**
+ Knowledge of GRC tool techniques and best practices (ZenGRC, OneTrust, Archer)
+ Proven track record of organizing and carrying out several risk and compliance projects
+ Ability to successfully manage third-party audits, compile evidence, and organize audit responses
+ Keen attention to detail
+ Effective written and verbal communication skills and the capability to communicate with cross-functional teams
+ Proven analytical and problem-solving abilities for managing initiatives that advance corporate goals
+ Certifications (Preferred):
+ GRC Professional (GRCP)
+ Certified in Governance, Risk & Compliance (CGRC)
+ Certified in Cybersecurity (CC)
**_Benefits & Culture_**
_At PSI, our culture is to be transparent and fair. That's why all of our roles have been benchmarked at a competitive rate against the local market they are based in. To be transparent all of our adverts now include the salary so you can see if we align with your expectations when looking for your next role._
_In addition to a competitive salary, we offer a comprehensive benefits package and supportive culture when you join us. This includes;_
+ _401k/Pension/Retirement Plan - with country specific employer %_
+ _Enhanced PTO/Annual Leave_
+ _Medical insurance - country specific_
+ _Dental, Vision, Life and Short Term Disability for US_
+ _Flexible Spending Accounts - for the US_
+ _Medical Cashback plan covering vision, dental and income protection for UK_
+ _Employee Assistance Programme_
+ _Commitment and understanding of work/life balance_
+ _Dedicated DE&I group that drive core people initiatives_
+ _A culture of embracing wellness, including regular global initiatives_
+ _Access to supportive and professional mechanisms to help you plan for your future_
+ _Volunteer Day and a culture of giving back to our community and industry through volunteering opportunities_
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)