Post job

Security architect jobs in Urban Honolulu, HI

- 57 jobs
All
Security Architect
Information Systems Security Officer
Security Engineer
Information Security Engineer
Information Systems Security Manager
Senior Information Security Analyst
Defense Analyst
Network Security Analyst
  • Security Architect

    Oracle 4.6company rating

    Security architect job in Urban Honolulu, HI

    As a Product Security architect, you will be performing security reviews and providing hands-on help to development teams to address security issues systematically. We're looking for passionate engineer who is able to consider business impact and risk to Oracle and its customers while dealing with any security issues. You will work a trusted partner with one or more SaaS product development teams, while simultaneously collaborating with your peers in evolving or creating new security patterns or standards to address any security issues/gaps in an efficient way. You will research the product security landscape and help steer product security architecture for solutions that will provide a competitive edge for Oracle SaaS. This position requires strong product security and application security experience. It will be highly valuable to have past experience in working in or with product development teams. **Responsibilities** **Key responsibilities:** + Evaluate existing and proposed SaaS Service architectures and perform security architecture reviews, threat modeling, risk assessment and provide guidance on mitigating the security risks. + Partner and collaborate with development teams for SaaS products and provide security expertise to product design conversations and implementation decisions. + Work with product teams and peers in security operations to analyze and triage security issues in production and deploy any mitigation such as WAF policies + Review and assess security posture and CVEs in third party libraries or products. + May perform source code review for vulnerability fixes by development teams. + Keep up to date on emerging threats and standards and translate into actionable guidance including but not limited to crypto, AI Security, Identity, Web security, multi-tenant deployment + Evolve security processes and integrate security architecture into SDLC leveraging AI and automation, as appropriate. + Engage in technical discussions, as needed and serve as a subject matter expert for security architecture and trusted advisor to executive leadership and key stakeholders. + Define and influence secure-by-design architecture standards, security patterns, and reference implementations for SaaS Services + May train and mentor team members **Qualifications:** + 7+ years of information security experience including product security, application security, security testing/offensive security, security tools and security architecture. + Experience in helping or leading a product security architecture and assurance effort in a large-scale IaaS/PaaS/SaaS Cloud Service Provider, or Fortune 500 company. + Expert knowledge of modern vulnerability types and threats including intelligence, discovery, mitigation, remediation, and root cause. + Understanding of security risks in AI based solutions including AI Agents, MCP, Generative AI and ML. + Hands-on experience with at-least one programming languages such as Java, Python. + Hands-on experience and knowledge of product development lifecycle in a large enterprise software company. + Understanding of industry standard frameworks such as OWASP, MITRE, NIST, PCI, FedRAMP, etc. + Ability to guide and engage individuals and development teams located across multiple geographies and or cultures. + Knowledge of Oracle Cloud Infrastructure or Oracle SaaS Services is a plus. + Excellent written and verbal communication skills, strong analytical and problem-solving skills. Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $96,800 to $251,600 per annum. May be eligible for bonus, equity, and compensation deferral. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC5 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $96.8k-251.6k yearly 55d ago
  • Manager - Security Architect

    EY 4.7company rating

    Security architect job in Urban Honolulu, HI

    At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. **Manager - Security Architect** **The opportunity** We're hiring an experienced Security Architect that is an expert in the modern security threat and mitigation environment. Knowledge of the use of security in the development of applications (threat model development) best practices for security in the design architecture of applications. The use of AI in SEIM/MDR/MXDR and/or the analysis of behavioral threats. The successful candidate should have experience in the emerging area of AI based attack vectors and be able to devise successful mitigation. The candidate should thrive in fast-paced environments and are passionate about enabling scalable AI solutions. **Your key responsibilities** + Develop effective security designs for implementation into enterprise applications and internal EY platforms. + Support security tool selection and verification. + Develop best practices for security design patterns in AI native applications. + Execute security assessments based on experience and select AI and conventional code analysis tools. + Assess new proposed projects to insure they are leveraging best security practices architecture design and implementation. + Collaborate with other architectural experts in AI, Data and Infrastructure to insure balanced and practical outcomes. + Support strategic business development activities for emerging technology. **Skills and attributes for success** + Strong analytical and troubleshooting skills. + Ability to lead security architectural product functions and mentor junior engineers. + Comfortable working across cross-functional teams and managing competing priorities. + Build and manage strong internal and external partnerships by fostering trust, empathy, and mutual value. + Leverage emotional agility and hybrid collaboration to navigate diverse stakeholder needs and drive long-term engagement. + Use critical thinking and creative reasoning to address complex problems and exceed expectations. + Align cross-functional teams around shared goals, ensuring accountability and progress. Use emotional intelligence and hybrid collaboration to motivate others and deliver high-impact results. **T** **o qualify you must have** + 5-10+ years of experience in security engineering and architecture for products. + Understand security and safety in an AI environment (Guardrails, Adversarial attacks, output validation etc..) + Use of security tooling for application verification in Github Advance Security, Checkmarx JFrog, DAST, etc.. + Understand threat model development and verified implementation. + Familiarity with security certifications and appropriate use for best practices development OWASP etc.... + Expertise in the assessment of security best practices of agile development process + Expertise in the development and adoption of security first best practices. **Ideally, you'll also have** + Experience with large-scale cross functional software development projects. + Excellent communication and leadership abilities. **What we offer you** At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more . + We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $125,500 to $230,200. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $150,700 to $261,600. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. + Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. + Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. **Are you ready to shape your future with confidence? Apply today.** EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. **EY | Building a better working world** EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
    $150.7k-261.6k yearly 7d ago
  • Cyber Security Architect

    Ike Group

    Security architect job in Urban Honolulu, HI

    Job Description Senior Cyber Security Architect The Senior Security Architect designs and drives the secure architecture of DataHouse platforms and client solutions across cloud and hybrid environments. This role leads threat modeling, control selection, and reference architectures aligned to ISO/IEC 27001, NIST, and HIPAA, partners with engineering to embed security in delivery pipelines, and advises public-sector and healthcare clients on compliance-aligned architectures. You'll be a senior individual contributor with broad influence-mentoring engineers, shaping standards, and participating in architecture reviews and program governance. *This position requires the candidate to be based in Hawaii and able to work on-site in Honolulu as needed. Primary Responsibilities and Duties Architecture & Design: Define secure reference architectures (network, identity, data, application, and cloud) for AWS/Azure; champion zero-trust and least-privilege patterns. Risk Management: Identify, assess, and mitigate security risks to protect company assets, data, and systems from external and internal threats. Security Strategy Development: Develop and implement comprehensive security strategies and roadmaps that include key policies, procedures, and practices to safeguard the company's information technology infrastructure. Security Compliance: Ensure that security architecture meets regulatory requirements and compliance standards, such as GDPR, HIPAA, or industry-specific regulations. Governance & Compliance: Translate ISO/IEC 27001, NIST (CSF/800-53/171), and HIPAA into practical architectures, patterns, and evidence requirements; support internal audits and renewals. Advisory & Reviews: Sit on internal and client architecture review boards; support executive-level guidance to SLED and healthcare clients. Collaborate with Leadership: Work closely with senior leadership, including the CTO, and other department heads, to ensure security strategies align with business priorities and technology initiatives. Incident Readiness: Partner with SecOps to refine detection logic, playbooks, and tabletop exercises; ensure architectures support rapid containment and recovery. Mentorship & Standards: Coach engineers; author standards, patterns, and runbooks; lead brown-bags and security awareness sessions for delivery teams. Vendor Management: Work with external vendors to evaluate and select security tools, technologies, and services to enhance the company's security posture. Specific Responsibilities and Duties Develop and implement frameworks for the secure design and deployment of cloud services, network infrastructure, and enterprise applications. Lead the evaluation and integration of new security technologies and methodologies to enhance the company's security infrastructure. Collaborate with the IT department to ensure security controls are integrated into all software development and systems engineering processes. Define and enforce standards and best practices for secure software development, network security, data protection, and vulnerability management. Implement and continually improve the organization's Information Security Management System (ISMS) to maintain ongoing ISO 27001 certification. Advise client leadership teams on IT governance, budget planning, security roadmaps, and risk management programs. Ensure security practices address requirements specific to healthcare, government, and other regulated industries. Qualifications Bachelor's degree in Computer Science, Information Security, or a related field. 6+ years of experience in information security, with at least 2 years in a senior security architecture role or similar management position. Proven experience in designing and implementing security architectures for large, complex systems across multiple platforms (cloud, on-premise, hybrid). Expert knowledge of security frameworks, such as NIST, CIS, ISO 27001, comparable ISMS frameworks, and experience with industry compliance standards. Strong understanding of network security, encryption technologies, access controls, threat modeling, and risk management. Experience with public sector and healthcare IT security requirements preferred. Experience with cloud security, including public cloud platforms such as AWS, Azure, or Google Cloud. Leadership and team management experience, with the ability to mentor and inspire a security team. Excellent problem-solving and analytical skills, with the ability to design secure systems and mitigate risks proactively. Proven track record delivering security services to external clients, including executive advisory and program governance. Strong ability to communicate risk and security strategy to executives, boards, and non-technical stakeholders. Certified Information Systems Security Professional (CISSP) or other relevant certifications (e.g., Certified Cloud Security Professional (CCSP), Certified Information Security Manager (CISM)) is preferred. AWS/Azure security certifications preferred.
    $94k-132k yearly est. 21d ago
  • Detection & Response Security Engineer, Threat Intelligence

    Meta 4.8company rating

    Security architect job in Urban Honolulu, HI

    Meta Security is looking for a threat intelligence investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a broad set of security threats, as well as tracking actor groups with an interest or capability to target Meta and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Meta's security posture. You will help the team establish, lead and execute multi-year roadmaps that improve research efficiency and quality across the team, and drive improvements to stakeholder management across a broad range of intelligence requirements. **Required Skills:** Detection & Response Security Engineer, Threat Intelligence Responsibilities: 1. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects 2. Build, cultivate, and maintain impactful relationships with intelligence stakeholders to identify and facilitate solutions to increase the impact of the team's work 3. Refine operational metrics, key performance indicators, and service level objectives to measure Intelligence research and services 4. Lead cross-functional projects to improve the security posture of Meta's infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions 5. Track threat clusters posing threats to Meta's infrastructure and employees, and identify, develop and implement countermeasures on our corporate network 6. Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences 7. Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations 8. Improve the tooling of threat cluster tracking and intelligence data integration to existing systems **Minimum Qualifications:** Minimum Qualifications: 9. 8+ years threat intelligence experience 10. B.S. or M.S. in Computer Science or related field, or equivalent experience 11. Be a technical and process subject matter expert regarding Security Operations and Threat Intelligence services 12. Experience developing and delivering information on threats, incidents and program status for leadership 13. Expertise with campaign tracking techniques and converting tracking results to long term countermeasures 14. Expertise with threat modeling frameworks, such as Diamond Model or/and MITRE ATT&CK framework 15. Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks 16. Proven track record of managing and executing on short term and long term projects 17. Ability to work with a team spanning multiple locations/time zones 18. Ability to prioritize and execute tasks with minimal direction or oversight 19. Ability to think critically and qualify assessments with solid communications skills 20. Coding or scripting experience in one or more scripting languages such as Python or PHP **Preferred Qualifications:** Preferred Qualifications: 21. Experience recruiting, building, and leading technical teams, including performance management 22. Experience close collaborating with incident responders on incident investigations 23. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigates suspicious behavior across networks and systems 24. Familiarity with malware analysis or network traffic analysis 25. Familiarity with nation-state, sophisticated criminal, or supply chain threats 26. Familiarity with file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort 27. Experience in one or more query languages such as SQL 28. Experience authoring production code for threat intelligence tooling 29. Experience conducting large scale data analysis 30. Experience working across the broader security community **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 54d ago
  • Senior Information Systems Security Officer (ISSO)

    SOSi

    Security architect job in Aiea, HI

    Founded in 1989, SOSi is among the largest private, founder-owned technology and services integrators in the defense and government services industry. We deliver tailored solutions, tested leadership, and trusted results to enable national security missions worldwide. Job Description Join SOSi and Shape the Future of Secure Networks in the Pacific! SOSi is seeking a Secret-cleared Senior Information Systems Security Officer (ISSO) to join our elite team at Hickam AFB, Hawaii. We design and deliver secure, resilient, and innovative network infrastructures that power USINDOPACOM's mission and connect 5,000+ customers across the Pacific theater. As part of our team, you'll tackle complex cybersecurity challenges, architect unique solutions, and help deploy a private cloud platform that empowers the warfighter. If you're ready to make an impact with cutting-edge technology and ensure the health and security of enterprise systems spanning hundreds of embedded devices, this is your opportunity to lead from the front. Principal Duties: Assist the ISSM in developing and maintaining a formal information system (IS) security program and policies for their assigned area of responsibility. Provide technical and procedural IS Security advice to engineering team and senior management regarding the RMF process. Establish and maintain computer systems and networks for classified processing, responsible for administration, maintenance, and security auditing. Develop and oversee operational information systems security implementation policy and guidelines. Maintain a repository using eMASS with all security authorizations for IS under their purview. Coordinate IS security inspections, tests, and reviews. Ensure proper measures are taken when an IS incident or vulnerability is discovered. Ensure development and implementation of an effective IS security education, training, and awareness program. Ensure Configuration Management policies and procedures for authorizing the use of hardware/software on an IS are followed. Any additions, changes or modifications to hardware, software, or firmware must be coordinated with the appropriate AO prior to the addition, change or modification. Maintain a working knowledge of system functions, security policies, technical security safeguards, and operational security measures. Manage, maintain, and execute the information security continuous monitoring plan. Ensure records are maintained of all security-related vulnerabilities and ensure serious or unresolved violations are reported to the AO/DAO. Assess changes to the system, its environment, and operational needs that could affect the security authorization. Qualifications Minimum Requirements Active Secret DoD security clearance. Bachelor's degree in a related field plus 4 years of related experience. DoD 8570 IAT-II compliant (Security+ CE, CCNA, CND, CySA+, GICSP, GSEC, or SSCP). Knowledge of NSA's Commercial Solution for Classified (CSfC) solution and Cross Domain Solutions (CDS). Thorough understanding of NIST Publication 800-53r5, Risk Management Framework, Executive Order 14028, and OMB Mandate M-22-09. Prior experience with eMASS. Strong communication skills and ability to coordinate tasks across functional groups. Preferred Qualifications Master's degree in Information Technology or related discipline Recent experience supporting system authorizations. Additional Information Work Environment: Working conditions are normal for an office environment. Fast paced, deadline-oriented environment. May require periods of non-traditional working hours including consecutive nights or weekends. Target Salary Range: $110,556 to $136,257. Working at SOSi: All interested individuals will receive consideration and will not be discriminated against for any reason.
    $110.6k-136.3k yearly 12d ago
  • Information System Security Officer (ISSO)

    Raft Company Website

    Security architect job in Urban Honolulu, HI

    Job Description This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S. Who we are: Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans. About the role: As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure. What we are looking for: • Minimum of 4 years' experience in ISSM/O roles • Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more • Skilled in crafting eMASS packages and implementing DISA STIGs • Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments • Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc. • Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK • Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc. • Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks • Track record of leading programs/projects in attaining ATO • Experience conducting internal self-assessments and audits with external assessors • In-depth understanding of Network Rules, Platforms, and Application development • Familiarity with cloud-native, scalable services • Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc. • Experience building and maintaining Standard Operating Procedures • Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft Highly preferred: • Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field. • CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications • Experience in a K8s DevSecOps environment, preferably with Platform One • Experience with FIPS (Federal Information Processing Standards) • Experience with writing/reviewing RMF control policies • Experience with Executive leadership (PMO office) • Knowledge of Cloud platforms and migrations • Previous experience as a Solution Architect • Engineering background • Experience in a software factory setting Clearance Requirements: Active Secret with the ability to obtain and maintain a Top Secret security clearance Work Type: Onsite in Honolulu, HI May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.) Salary Range: $180,000 - $220,000 The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities What we will offer you: Highly competitive salary Fully covered healthcare, dental, and vision coverage 401(k) and company match Take as you need PTO + 11 paid holidays Education & training benefits Generous Referral Bonuses And More! Our Vision Statement: We bridge the gap between humans and data through radical transparency and our obsession with the mission. Our Customer Obsession: We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies. How do we get there? Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm. Raft's core philosophy is Ubuntu: I Am, Because We are. We support our "nadi" by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration. We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
    $74k-95k yearly est. 2d ago
  • Information Systems Security Officer (ISSO)

    Cymertek

    Security architect job in Urban Honolulu, HI

    Information Systems Security Officer (ISSO) LOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a detail-oriented and proactive Information Systems Security Officer (ISSO) to support and maintain the security of our information systems. In this role, you will be responsible for ensuring systems operate in compliance with established security policies, procedures, and regulations. You will work closely with technical teams to identify and mitigate vulnerabilities, manage security documentation, and assist with audits and assessments. The ideal candidate will have a strong understanding of information security principles, excellent organizational skills, and the ability to manage multiple tasks in a dynamic environment. Join us to play a key role in safeguarding our organization's critical systems and data. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESInformation Systems Security Officer (ISSO), Cybersecurity Officer, Security Compliance Officer, IT Security Specialist, Information Assurance Officer, Network Security Analyst, Security Controls Assessor, System Security Administrator, Cyber Defense Analyst, Risk Management Framework Specialist, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Systems, Computer Science, Information Technology, Computer Engineering, Network Security, Information Assurance, Systems Engineering, Risk Management, Data Science, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Ensure compliance with security policies Maintain and update system security plans Monitor security controls for effectiveness Conduct regular vulnerability scans Support security audits and assessments Respond to and document security incidents REQUIRED SKILLS Proficiency in risk management frameworks Ability to perform security assessments Familiarity with security tools and technologies Strong documentation skills Understanding of access control mechanisms Expertise in vulnerability management DESIRED SKILLS Knowledge of cloud security practices Experience with automation tools for security tasks Familiarity with DevSecOps concepts Understanding of advanced persistent threats Proficiency in forensic analysis tools Knowledge of secure software development practices PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $74k-95k yearly est. Easy Apply 60d+ ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Security architect job in Urban Honolulu, HI

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Urban Honolulu, HI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 33d ago
  • Information Systems Security Officer (ISSO)

    Valiant Integrated Services

    Security architect job in Schofield Barracks, HI

    Valiant Integrated Services is seeking an experienced, highly skilled Information System Security Analyst to act as Information Systems Security Officer (ISSO) to join our professional team protecting mission training services for a Mission Training Complex (MTC) on Schofield Barracks, HI. Duties and Responsibilities Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures. Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave. Provide support to the customer on all matters involving the security of their information systems. Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system. Assist in the development of the system security policy and ensures compliance with that policy on a routine basis. Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization. Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes. Identify and mitigate security business and system risks. Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M. Maintain a repository for all organizational or system-level cybersecurity-related documentation such as DIACAP/RMF processes within eMASS or other automated process. Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software. Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively. Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation. Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems. In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered. Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM. Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms). Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides. Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA). Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe. Attend all Cybersecurity Workforce Meetings when requested. Required Education and Experiences A bachelor's degree plus 3 years of recent specialized experience OR an associate's degree plus 7 years of recent specialized experience OR a major certification plus 7 years of recent specialized experience OR 11 years of recent specialized experience. Required to have active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam. Baseline DoDI 8570 IA Certifications are required - a current CompTIA Security+ or greater certification. A higher level certification, such as GSLC, CAP, CASP, CISM, CISSP, is also appropriate. Desired Skills and Qualifications A working knowledge of RMF and the security authorization processes and procedures. Knowledge of NIST Special Publications and their counterparts, especially SP800-37, SP800-53, ICD 503, and CNSS 1253. Ability to communicate clearly and present information to the customer in a format they can understand. Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools. Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services. Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints. Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills. It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS). Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux. Experience with providing IA or IT support to a US Army client desirable, but not required. Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required. Completion of required certifications required within six (6) months of hire date. *****************************************
    $74k-95k yearly est. Auto-Apply 60d+ ago
  • Computer Network Defense (CND) Analyst 3 (CCAs Accepted)

    Wyetech

    Security architect job in Urban Honolulu, HI

    At Wyetech, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment. Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph). Required Qualifications TS/SCI with agency appropriate poly Ten (10) years of experience and an Associate's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Eight (8) years of experience and an Bachelor's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Six (6) years of experience and an Master's Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). OR Four (4) years of experience and an Doctorate Degree in Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Relevant Experience Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement (i.e., 20-24 week courses will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree Required Technical Skills Excellent communication and collaboration skills to interface across NSA Be able to ACTIVELY participate in leadership/IC exchanges Strong verbal and written communication skills Be able to identify intrusions and actors current intrusion sets commercial Cybersecurity Firms Need an understanding of Virtual Private Servers, VPNs, and The Diamond Model obfuscation networks Highly proficient Agency tools: DX, BuffaloBuffalo, CLEARVISION, CVEs, SSVE, VirusTotal Author and read highly technical reports The Benefits Package Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds. Additional benefits include: Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs. Full-time employees have the option to participate in a variety of voluntary benefit plans including: A Choice of Medical Plan Options, some with Health Savings Account (HSA) Vision and Dental Life and AD&D Benefits Short and Long-Term Disability Hospital Indemnity, Accident, and Critical Illness Insurances Optional Identity Theft and Legal Protection Services Company Environment & Perks Employee Referral Bonus Eligibility up to $10,000 Mobility Among Wyetech-supported Contracts Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party. Employees receive two complementary branded clothing orders annually. Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. Affirmative Action Statement: Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans. Accommodations: Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact Brittney Wood. at 844-WYETECH x727 or ********************. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
    $61k-77k yearly est. Auto-Apply 60d+ ago
  • Sr. IT Security Analyst - $5,000 Sign-On Bonus (Full-Time, 40 Hours, Day Shift)

    Queen's Health System 4.8company rating

    Security architect job in Urban Honolulu, HI

    RESPONSIBILITIES **A $5,000 one-time sign-on bonus is available to external candidates only in exchange for a two (2) year employment commitment.** I. JOB SUMMARY/RESPONSIBILITIES: - Serves as a lead in the support and maintenance of The Queen's Health Systems' (QHS) information security program. - Actively promotes awareness and training of QHS Security Policies and related security topics. - Key responsibilities include but are not limited to the following: o Management and support of QHS' information security technical controls, programs and policies. o Support QHS initiatives and projects by providing information security-related consultation and technical assistance. o Leads or assists in the design, planning, and implementation of security measures to ensure safety and security of all information systems assets and to enhance the security posture of the organization. o Serves as a subject matter expert in support of security risk management and the IT Risk Management Program. - Works closely with leadership, including the privacy, risk and compliance functions, to ensure compliance with regulatory requirements. - Works closely with leadership in developing short and long term strategic plans. - Supervises and directs work of assigned staff. - Monitors activities to ensure coordination and management of projects and work assignments meet established dates and timelines. II. TYPICAL PHYSICAL DEMANDS: - Seeing, hearing, speaking, finger dexterity. - Constant: sitting. - Frequent: standing, walking. - Occasional: stooping/bending, carrying usual weight of 12 pounds, reaching above shoulder level. III. TYPICAL WORKING CONDITIONS: - Not substantially subjected to adverse environmental conditions. - Work schedule includes providing 24 hours/7 days a week support as required. IV. MINIMUM QUALIFICATIONS: A. EDUCATION/CERTIFICATION AND LICENSURE: - Bachelor's degree in Information Technology (IT) or related field; or four (4) years experience in information technology and/or information security may be substituted for the educational requirement. - Current certification in at least one (1) of the following highly preferred: o Global Information Assurance Certifications (GIAC) o Certified Information Security Manager (CISSP) o Certified Information Security Manager (CISM) B. EXPERIENCE: - In addition to the educational requirement, six (6) years of information security experience, preferably in healthcare, demonstrating in-depth knowledge and ability to independently design and manage complex security controls and processes. - Two (2) years IT project management experience preferred. - Prior supervisory/management experience. - Experience to demonstrate the following IT Security Management experience: o Security architecture design and implementation. o Security appliances & tools including IDS, IPS, web/e-mail filtering, DLP, etc. o Data encryption technology. o Identity and privileged access management technology. o Security monitoring and alerting technology. o Threat and incident response management. o Programming and/or scripting. - Knowledge and ability to lead projects/initiatives of moderate complexity. Equal Opportunity Employer/Disability/Vet
    $83k-103k yearly est. 60d+ ago
  • Security Engineer II

    Trustmark 4.6company rating

    Security architect job in Urban Honolulu, HI

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $92k-115k yearly est. 60d+ ago
  • Security Architect - Secure Technology, Architecture and Safety

    Oracle 4.6company rating

    Security architect job in Urban Honolulu, HI

    **About the role** You will design and govern security reference architectures, standards, and controls for cloud primitives (compute, network, storage), identity and access, data protection, container/Kubernetes platforms, AI/ML systems, and developer platforms. You will lead high-impact design reviews, threat modeling, and cryptographic strategy; guide zero-trust adoption; and drive detection, response, and resilience patterns at scale. You will collaborate with senior leaders and product teams, mentor engineers, and influence roadmaps through clear writing, principled prioritization, and metrics. Ideal candidates bring deep experience "building clouds," large-scale distributed systems, and security-by-design, with a track record of shipping secure platforms. You are practical, inclusive, and customer-obsessed, balancing rigor with velocity. If you thrive at the intersection of architecture, hands-on engineering, and incident leadership-and want to make a broad impact across Oracle's cloud-this role is for you. **About the business** Oracle's Secure Technology, Architecture and Safety (STAS) group sets the strategic technical direction for security across Oracle, shaping the future of secure cloud computing while partnering deeply with engineering and operations. We are seeking a Security Architect (Architect/Distinguished Engineer caliber) to define end-to-end security architecture for hyperscale cloud platforms and services, raise the security bar across the software lifecycle, and lead response to complex security incidents. **What you'll do** + Set strategy: Define multi-year security architecture strategy and roadmaps for cloud foundations, identity, data protection, platform security, AI/ML safety, and secure supply chain. + Authoritative design: Publish security reference architectures, control baselines, patterns, and design blueprints; lead cross-org design reviews and bar-raising architecture councils. + Build the cloud securely: Advise and co-design core cloud services (compute, networking, storage, virtualization, container/ orchestration, service mesh) with secure-by-default configurations. + Identity and zero trust: Advance strong identity, least privilege, policy-as-code, workload identity, and continuous verification aligned to zero-trust principles. + Cryptography and data protection: Drive KMS/HSM strategy, key lifecycle, envelope encryption, tokenization, privacy-enhancing technologies, and data governance at scale. + Secure SDLC: Embed threat modeling, secure coding, SAST/DAST/IAST, fuzzing, software provenance/SBOMs, signing, and deployment gates into developer platforms and CI/CD. + Detection and response: Partner with SOC and service teams on high-signal detection, telemetry standards, adversary emulation, incident response playbooks, and chaos/resilience testing. + Risk, compliance, and safety: Translate regulatory and customer requirements into engineering-ready controls and evidence; integrate safety-by-design for emerging technologies. + Incident leadership: Lead or advise on significant incidents; perform post-incident reviews, drive systemic fixes, and establish preventative guardrails and metrics. + Influence at scale: Produce clear design docs and RFCs; mentor senior engineers; run architecture reviews; build communities of practice; create learning pathways and reusable assets. **Responsibilities** **What you'll bring** + 12+ years in security architecture/engineering for large-scale distributed systems; significant experience "building clouds" (IaaS/PaaS) or platform engineering. + Expertise in at least three: identity and access management; network and micro segmentation; container/Kubernetes security; virtualization/compute; data protection/crypto; detection/response; supply chain security. + Hands-on depth with one or more: OCI, AWS, Azure, GCP; Kubernetes; service mesh; Terraform/Policy-as-Code; CI/CD; Linux hardening; observability stacks. + Demonstrated ability to lead cross-org initiatives, influence without authority, and deliver secure-by-default solutions at scale. + Strong written and verbal communication; ability to produce clear design docs, threat models, and executive narratives. + Commitment to inclusive collaboration and mentoring. **Preferred Qualifications:** + Experience designing KMS/HSM services, workload identity, confidential computing/TEE, or privacy-enhancing technologies. + Proven leadership in major incident response and post-incident systemic improvements. + Track record of published standards, OSS contributions, or patents in cloud security. + Advanced degree in Computer Science, Engineering, or related field (or equivalent experience). **Leadership competencies** + Performance, drive, and execution You'll deliver value and shape a performance-driven culture while ensuring accountability and communicating expectations. + Collaboration You understand and promote the value of collaboration and inclusivity and can align strategic aims with organizational goals. + Communicating for impact You inspire confidence by championing a clear understanding and support of organizational strategy and objectives. + Inspirational leadership You build a reputation for strategy by inspiring and empowering others while showing leadership internally and externally. + Competitive edge You anticipate changes in customer needs and seize opportunities to build value, encourage innovation, and meet objectives. Disclaimer: **Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.** **Range and benefit information provided in this posting are specific to the stated locations only** US: Hiring Range in USD from: $136,600 to $338,500 per annum. May be eligible for bonus, equity, and compensation deferral. Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business. Candidates are typically placed into the range based on the preceding factors as well as internal peer equity. Oracle US offers a comprehensive benefits package which includes the following: 1. Medical, dental, and vision insurance, including expert medical opinion 2. Short term disability and long term disability 3. Life insurance and AD&D 4. Supplemental life insurance (Employee/Spouse/Child) 5. Health care and dependent care Flexible Spending Accounts 6. Pre-tax commuter and parking benefits 7. 401(k) Savings and Investment Plan with company match 8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation. 9. 11 paid holidays 10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours. 11. Paid parental leave 12. Adoption assistance 13. Employee Stock Purchase Plan 14. Financial planning and group legal 15. Voluntary benefits including auto, homeowner and pet insurance The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted. Career Level - IC6 **About Us** As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
    $102k-126k yearly est. 54d ago
  • Cyber Security Architect

    Ike Group

    Security architect job in Urban Honolulu, HI

    Senior Cyber Security Architect The Senior Security Architect designs and drives the secure architecture of DataHouse platforms and client solutions across cloud and hybrid environments. This role leads threat modeling, control selection, and reference architectures aligned to ISO/IEC 27001, NIST, and HIPAA, partners with engineering to embed security in delivery pipelines, and advises public-sector and healthcare clients on compliance-aligned architectures. You ll be a senior individual contributor with broad influence mentoring engineers, shaping standards, and participating in architecture reviews and program governance. *This position requires the candidate to be based in Hawaii and able to work on-site in Honolulu as needed. Primary Responsibilities and Duties Architecture & Design: Define secure reference architectures (network, identity, data, application, and cloud) for AWS/Azure; champion zero-trust and least-privilege patterns. Risk Management: Identify, assess, and mitigate security risks to protect company assets, data, and systems from external and internal threats. Security Strategy Development: Develop and implement comprehensive security strategies and roadmaps that include key policies, procedures, and practices to safeguard the company s information technology infrastructure. Security Compliance: Ensure that security architecture meets regulatory requirements and compliance standards, such as GDPR, HIPAA, or industry-specific regulations. Governance & Compliance: Translate ISO/IEC 27001, NIST (CSF/800-53/171), and HIPAA into practical architectures, patterns, and evidence requirements; support internal audits and renewals. Advisory & Reviews: Sit on internal and client architecture review boards; support executive-level guidance to SLED and healthcare clients. Collaborate with Leadership: Work closely with senior leadership, including the CTO, and other department heads, to ensure security strategies align with business priorities and technology initiatives. Incident Readiness: Partner with SecOps to refine detection logic, playbooks, and tabletop exercises; ensure architectures support rapid containment and recovery. Mentorship & Standards: Coach engineers; author standards, patterns, and runbooks; lead brown-bags and security awareness sessions for delivery teams. Vendor Management: Work with external vendors to evaluate and select security tools, technologies, and services to enhance the company s security posture. Specific Responsibilities and Duties Develop and implement frameworks for the secure design and deployment of cloud services, network infrastructure, and enterprise applications. Lead the evaluation and integration of new security technologies and methodologies to enhance the company s security infrastructure. Collaborate with the IT department to ensure security controls are integrated into all software development and systems engineering processes. Define and enforce standards and best practices for secure software development, network security, data protection, and vulnerability management. Implement and continually improve the organization s Information Security Management System (ISMS) to maintain ongoing ISO 27001 certification. Advise client leadership teams on IT governance, budget planning, security roadmaps, and risk management programs. Ensure security practices address requirements specific to healthcare, government, and other regulated industries. Qualifications Bachelor s degree in Computer Science, Information Security, or a related field. 6+ years of experience in information security, with at least 2 years in a senior security architecture role or similar management position. Proven experience in designing and implementing security architectures for large, complex systems across multiple platforms (cloud, on-premise, hybrid). Expert knowledge of security frameworks, such as NIST, CIS, ISO 27001, comparable ISMS frameworks, and experience with industry compliance standards. Strong understanding of network security, encryption technologies, access controls, threat modeling, and risk management. Experience with public sector and healthcare IT security requirements preferred. Experience with cloud security, including public cloud platforms such as AWS, Azure, or Google Cloud. Leadership and team management experience, with the ability to mentor and inspire a security team. Excellent problem-solving and analytical skills, with the ability to design secure systems and mitigate risks proactively. Proven track record delivering security services to external clients, including executive advisory and program governance. Strong ability to communicate risk and security strategy to executives, boards, and non-technical stakeholders. Certified Information Systems Security Professional (CISSP) or other relevant certifications (e.g., Certified Cloud Security Professional (CCSP), Certified Information Security Manager (CISM)) is preferred. AWS/Azure security certifications preferred.
    $94k-132k yearly est. 60d+ ago
  • Product Security Engineer, AI

    Meta 4.8company rating

    Security architect job in Urban Honolulu, HI

    Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys. **Required Skills:** Product Security Engineer, AI Responsibilities: 1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more 2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities 3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products **Minimum Qualifications:** Minimum Qualifications: 4. BS or MS in Computer Science or a related field, or equivalent experience 5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development 6. Experience with exploiting common security vulnerabilities 7. Knowledge of common exploit mitigations and how they work 8. Coding and scripting experience in one or more general purpose languages **Preferred Qualifications:** Preferred Qualifications: 9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation 10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling 11. Experience creating software that enables security processes 12. 8+ years of experience finding vulnerabilities in C/C++ code 13. Contributions to the security community (public research, blogging, presentations, bug bounty) 14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Information Systems Security Officer (ISSO)

    Cymertek

    Security architect job in Urban Honolulu, HI

    Information Systems Security Officer (ISSO) LOCATIONHonolulu, HI 96815CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a dedicated and detail-oriented **Information Systems Security Officer (ISSO)** to join our team and take ownership of ensuring the security and integrity of our information systems. In this role, you will be responsible for implementing and overseeing security policies, managing risk assessments, and ensuring compliance with relevant regulations and standards. You will work closely with other IT teams to identify vulnerabilities, develop security protocols, and monitor systems for potential security threats. The ideal candidate is proactive, highly organized, and has a strong understanding of cybersecurity principles, with the ability to respond quickly and effectively to security incidents. Join us to play a key role in safeguarding our systems and data while maintaining a secure and compliant IT environment. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESInformation Security Officer, Cybersecurity Officer, Security Analyst, Information Assurance Officer, Security Architect, Security Engineer, IT Security Manager, Risk Management Officer, Network Security Engineer, Security Compliance Analyst, ect.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Information Technology, Computer Science, Information Systems, Network Engineering, Systems Engineering, Digital Forensics, Risk Management, Computer Engineering, Data Privacy, ect.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Develop and implement information security policies Conduct risk assessments and vulnerability assessments Monitor security systems for potential threats Ensure compliance with security standards and regulations Manage security incidents and investigations Provide recommendations for improving security posture REQUIRED SKILLS Proficiency in security frameworks (e.g., NIST, ISO 27001) Knowledge of cybersecurity tools (e.g., firewalls, antivirus) Experience with incident response and handling breaches Strong understanding of encryption methods and protocols Familiarity with regulatory compliance standards (e.g., GDPR, HIPAA) Ability to conduct network security analysis DESIRED SKILLS Experience with cloud security models Knowledge of identity and access management (IAM) Familiarity with penetration testing tools Understanding of secure software development practices Proficiency in scripting for security automation (e.g., Python, Bash) Experience with security audits and assessments PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $74k-95k yearly est. Easy Apply 60d+ ago
  • Information System Security Officer (ISSO)

    Raft Company Website

    Security architect job in Urban Honolulu, HI

    This is a U.S. based position. All of the programs we support require U.S. citizenship to be eligible for employment. All work must be conducted within the continental U.S. Who we are: Raft (********************* is a customer-obsessed non-traditional small business with a purposeful focus on Distributed Data Systems, Platforms at Scale, and Complex Application Development, with headquarters in McLean, VA. Our range of clients includes innovative federal and public agencies leveraging design thinking, cutting-edge tech stack, and cloud-native ecosystem. We build digital solutions that impact the lives of millions of Americans. About the role: As an Information System Security Officer (ISSO), you will expertly manage the security aspects of our cutting-edge platforms and systems designed for our esteemed clients. The ISSO will play an instrumental role in generating and maintaining the necessary artifacts to achieve and sustain Authority to Operate (ATO) while working in close collaboration with our development team. This collaboration ensures the seamless integration of security controls early in the development lifecycle. You will audit and monitor all of the platforms & tooling across the customer environment. This role requires a deep understanding of cybersecurity principles, federal compliance requirements, and a passion for safeguarding national security infrastructure. What we are looking for: • Minimum of 4 years' experience in ISSM/O roles • Proven experience in obtaining and maintaining ATO for classified government cloud systems, adhering to DoD policies such as Risk Management Framework (RMF), NIST 800-53 Rev 4 and 5, NIST 800-37, NIST 800-60 and more • Skilled in crafting eMASS packages and implementing DISA STIGs • Proficient in conducting risk assessments, audits, and compliance monitoring within DoD environments • Demonstrated proficiency in managing and creating Body of Evidence (BOE) artifacts, including POA&Ms, SSPs, RARs, Vulnerability Assessments, Security Assessment Plans, etc. • Understanding of and experience with SIEM tools such as Splunk, Grafana, or ELK • Proficient in conducting continuous monitoring activities such as auditing, configuration reviews, policy & procedure reviews, etc. • Demonstrated experience managing compliance activities for both on-prem & cloud-based (AWS) systems & networks • Track record of leading programs/projects in attaining ATO • Experience conducting internal self-assessments and audits with external assessors • In-depth understanding of Network Rules, Platforms, and Application development • Familiarity with cloud-native, scalable services • Experience with common cybersecurity tools and technologies such as vulnerability & compliance scanners, anti-malware, code analyzers, IDS/IPS, DLP, SBOM, etc. • Experience building and maintaining Standard Operating Procedures • Obtain Security+ or other DoD 8570 IAT Level II or higher certification within 6 months of employment with Raft Highly preferred: • Bachelor's degree in Cybersecurity, Information Assurance, Information Technology, or a related field. • CISSP, CISM, CISA, CGRC, or other DoD 8570 IAM Level 2 or higher certifications • Experience in a K8s DevSecOps environment, preferably with Platform One • Experience with FIPS (Federal Information Processing Standards) • Experience with writing/reviewing RMF control policies • Experience with Executive leadership (PMO office) • Knowledge of Cloud platforms and migrations • Previous experience as a Solution Architect • Engineering background • Experience in a software factory setting Clearance Requirements: Active Secret with the ability to obtain and maintain a Top Secret security clearance Work Type: Onsite in Honolulu, HI May require up to 35% travel to both CONUS and OCONUS locations (Must possess a valid, active US passport with at least six months validity beyond intended period of employment to facilitate international travel and meet security requirements for government contracts.) Salary Range: $180,000 - $220,000 The determination of compensation is predicated upon a candidate's comprehensive experience, demonstrated skill, and proven abilities What we will offer you: Highly competitive salary Fully covered healthcare, dental, and vision coverage 401(k) and company match Take as you need PTO + 11 paid holidays Education & training benefits Generous Referral Bonuses And More! Our Vision Statement: We bridge the gap between humans and data through radical transparency and our obsession with the mission. Our Customer Obsession: We will approach every deliverable like it's a product. We will adopt a customer-obsessed mentality. As we grow, and our footprint becomes larger, teams and employees will treat each other not only as teammates but customers. We must live the customer-obsessed mindset, always. This will help us scale and it will translate to the interactions that our Rafters have with their clients and other product teams that they integrate with. Our culture will enable our success and set us apart from other companies. How do we get there? Public-sector modernization is critical for us to live in a better world. We, at Raft, want to innovate and solve complex problems. And, if we are successful, our generation and the ones that follow us will live in a delightful, efficient, and accessible world where out-of-box thinking, and collaboration is a norm. Raft's core philosophy is Ubuntu: I Am, Because We are. We support our “nadi” by elevating the other Rafters. We work as a hyper collaborative team where each team member brings a unique perspective, adding value that did not exist before. People make Raft special. We celebrate each other and our cognitive and cultural diversity. We are devoted to our practice of innovation and collaboration. We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
    $74k-95k yearly est. Auto-Apply 1d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Urban Honolulu, HI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 33d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security architect job in Urban Honolulu, HI

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 33d ago

Learn more about security architect jobs

How much does a security architect earn in Urban Honolulu, HI?

The average security architect in Urban Honolulu, HI earns between $81,000 and $153,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Urban Honolulu, HI

$111,000

What are the biggest employers of Security Architects in Urban Honolulu, HI?

The biggest employers of Security Architects in Urban Honolulu, HI are:
  1. Oracle
  2. Ike Group
  3. Ernst & Young
  4. TEKsystems
Job type you want
Full Time
Part Time
Internship
Temporary