Post job

Security engineer jobs in Arizona - 364 jobs

  • System Engineer

    Mindsource

    Security engineer job in Tucson, AZ

    Experience writing SW requirements and completing risk analysis. Ability to work independently and cross-functionally with many different groups to solicit needs and complete trade off analyses. Experience in a regulated medical device industry. The Position: Systems Engineer (SW Requirements and Risk) Location: Tucson, AZ Long Term Contract We are seeking a Systems Engineer to drive software product definition, including requirements, system architecture design, risk analysis, and solution implementation to meet IVD standards. This role focuses on advancing cancer diagnostics through state-of-the-art testing automation, providing over 250 cancer tests and associated instruments globally. Responsibilities: --System Lifecycle Management: Apply Systems Engineering to SW product definition, requirements, risk analysis, and testing. --Project Execution: Manage software requirements, risk analysis, configuration, defect management, and verification/validation. --Industry and Technology Analysis: Research trends, emerging technologies, and competitive products for software differentiation. --Cross-functional Collaboration: Work with R&D, Marketing, Operations, Quality, and Regulatory teams to ensure alignment. --Customer-Focused Innovation: Engage with business leaders and VoC representatives to align technical solutions with customer needs. --Technical Problem Solving: Analyze complex technical challenges, present solutions, and facilitate informed decision-making. Who You Are: Educational Background: Bachelor's degree in Engineering, Biomedical Sciences, or related technical field with 4 years of experience (or Master's with 2 years, or PhD). Systems Engineering Expertise: Demonstrated knowledge in software integration and testing, including requirements engineering, tradeoff analysis, risk management, configuration management, and verification/validation. Regulatory Familiarity: Experience in a regulated environment, familiar with FDA, ISO, and other relevant diagnostic product standards. Strategic Mindset: Interest in innovative technologies and understanding of the IVD competitive landscape. Preferred: Specialized Skills: Deep knowledge in software reliability, manufacturability, and usability. Leadership and Communication: Proven ability to build authority and accountability within a team, with strong collaboration and communication skills. Organizational Skills: Excellent organizational skills, capable of evaluating, prioritizing, and managing multiple projects efficiently.
    $66k-90k yearly est. 2d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Analyst (Mid-Level)

    Peraton 3.2company rating

    Security engineer job in Tucson, AZ

    Responsibilities We are seeking a highly skilled and motivated Cyber Analyst to join our team at Davis-Monthan AFB supporting the Air Combat Command (ACC) Intelligence Directorate (A2). The Cyber Analyst will play a critical role in cryptologic support, cybersecurity operations, and system administration to protect mission-critical systems and networks. This position requires expertise in cyber threat analysis, cryptologic operations, and the ability to work in a fast-paced, mission-driven environment. Key Responsibilities: Perform cryptologic support and cybersecurity operations to safeguard sensitive information and mission-critical systems. Conduct cyber threat analysis to identify vulnerabilities, assess risks, and recommend mitigation strategies. Support the development and implementation of cyber defense measures to protect against emerging threats. Monitor, analyze, and respond to cyber incidents, ensuring timely resolution and reporting. Provide system administration support, including configuration, maintenance, and troubleshooting of enterprise and local network devices. Collaborate with cross-functional teams to integrate cybersecurity measures into ISR operations. Liaise with the Enterprise Service Desk (ESD) and Enterprise Service Center (ESC) to resolve technical issues and ensure system availability. Maintain compliance with all security protocols, policies, and regulatory requirements. Qualifications Required Qualifications: Required Experience: At least 6 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years. Required Education: Bachelor's degree from a college or university accredited by an agency recognized by the U.S. Department of Education or have associate's degree from a college or university accredited by an agency recognized by the U.S. Department of Education and an additional 4 years of related experience, for a total of 10 years, as a substitute to the bachelor's degree. Technical Expertise: Proficiency in cryptologic support, cybersecurity operations, and system administration. Completion of a commercial, military, or U.S. Government cybersecurity training course or specialized certification. Familiarity with cyber defense tools, network security, and incident response methodologies. Strong understanding of cyber threat analysis and mitigation strategies. Skills: Exceptional analytical and problem-solving skills. Strong written and verbal communication skills for producing reports and collaborating with teams. Ability to work effectively in a high-pressure, mission-critical environment. Security Clearance: Active Top Secret/SCI clearance is . Preferred Qualifications: Experience at Air Force Major Command (MAJCOM) Intelligence Directorate or similar military organization. Knowledge of cryptologic systems, tools, and methodologies. Familiarity with Air Force cybersecurity policies and procedures. Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or equivalent. Why Join Us? Be part of a mission-critical team supporting the U.S. Air Force's ISR and cybersecurity operations. Work in a dynamic and collaborative environment at Davis-Monthan AFB, a hub for Air Force intelligence and operational excellence. Access to professional development opportunities and career growth within the intelligence and cybersecurity community. #AFACC Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure. Target Salary Range $104,000 - $166,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual's experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. EEO EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
    $104k-166k yearly Auto-Apply 9d ago
  • Certified Ethical Hacker

    DMC Strategic It

    Security engineer job in Gold Canyon, AZ

    Job Brief: We are looking for a talented and trustworthy certified ethical hacker to conduct in-depth penetration tests on our customer's computer systems. As a certified ethical hacker, you will be required to research the type of system being used, find ways to penetrate the system and identify any weaknesses. You may also be required to create penetration test reports and advise on security upgrades. To ensure success as a certified ethical hacker, you should have advanced knowledge of computer and internet security systems, high-level hacking skills, and the ability to create clear and concise reports. A top-notch certified ethical hacker quickly identifies security flaws and provides useful advice on how to improve the system. Responsibilities: Meeting with clients to discuss the security system currently in place. Researching the company's system, network structure, and possible penetration sites. Conducting multiple penetration tests on the system. Identifying and recording security flaws and breaches. Identifying areas of high-level security. Reviewing and rating the security network. Creating suggestions for security upgrades. Compiling penetration test reports for the client. Conducting penetration tests once new security features have been implemented. Suggesting alternate upgrades. Skills Required: Bachelor's degree in information technology or computer science. CEH Certification. Proven work experience as a certified ethical hacker. Advanced knowledge of networking systems and security software. In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting. Technical knowledge of routers, firewalls, and server systems. Good written and verbal communication skills. Good troubleshooting skills. Ability to see big-picture system flaws.
    $76k-117k yearly est. 60d+ ago
  • Information Security Analyst

    Deem 4.7company rating

    Security engineer job in Arizona

    Our mission is simple. We make business travel less complicated for travelers, less costly for employers and more profitable for service providers. Using our industry-leading software solutions, employees book travel and car service and report those expenses faster and more easily than ever before. Corporations control costs more effectively. Travel management companies deliver more engaging customer experiences. Car service operators benefit from new efficiencies and widen their customer reach. In other words, everybody wins. We've helped thousands of forward-thinking companies modernize their systems, improve travel management and save money. Deem is backed by leading venture capital funds as well as corporate and private equity investors. The company is headquartered in San Francisco, CA and has an office in Bangalore, India. We are seeking an experienced, talented, energetic, hands-on, and proactive Information Security Analyst to maintain and operate Deem's Information Security programs. You will be responsible for developing policies and driving processes based on a combination of threat intelligence and regulatory compliance. Responsibilities Advise senior management in the development, implementation and maintenance of a company-wide information security infrastructure, and ensure appropriate control objectives for system integrity, confidentiality, accountability and assurance within the context of the company's risk tolerance. Ensure conformance with enterprise policy standards, which include monitoring metrics, response integration and escalation, and various risk analysis. Maintain internal governance and recommend adjustments as threats and practices evolve. Operate the information protection effort to comply with industry standard audits including (SSAE-18, SOC , PCI 3.2). Determine security violations and inefficiencies by conducting periodic internal audits. Develop a prioritized plan to close security gaps. Work with engineering teams (product & operations) to implement solutions. Be hands-on where/when appropriate, in installing and evaluating security tools. Install and maintain security management and monitoring tools in corporate and production environments, including vulnerability scanning, SEIM, IDS, etc. Make sound, well-reasoned recommendations on vendor and tool selection. Provide security consultation as needed for product development and industry marketing solutions. Manage Internal Penetration Testing & Vulnerability Assessment Tools and Programs. Investigate security incidents and recommend actions needed to resolve situations. Work with product engineering to test for and fix vulnerabilities in the product code. Develop content for and administer Employee Security Training Programs. Qualifications 3+ years in the technology industry, 3+ in an information security role Expert knowledge of identity management, IDS, SEM/SIEM, WAF Industry-standard certifications: CISSP, or equivalent Expertise in compliance standards, most notably PCI and SSAE16 Experience leading security and compliance audits Thorough understanding and up-to-date knowledge of the web security threats (XSS, code injection, etc.) Strong troubleshooting and forensic skills and ability to effectively work in cross functional teams as needed to resolve issues Strong written, oral, and interpersonal communications skills Capable of performing penetration tests and collaborating with Engineering on the static security analysis and remediation Coding experience with Ruby, Java, Python, Javascript, Bash, or C# are nice to have
    $81k-117k yearly est. 60d+ ago
  • Staff Security Engineer

    Illumio 4.5company rating

    Security engineer job in Arizona

    Onwards Together! Illumio is the leader in ransomware and breach containment, redefining how organizations contain cyberattacks and enable operational resilience. Powered by the Illumio AI Security Graph, our breach containment platform identifies and contains threats across hybrid multi-cloud environments - stopping the spread of attacks before they become disasters. Recognized as a Leader in the Forrester Wave™ for Microsegmentation, Illumio enables Zero Trust, strengthening cyber resilience for the infrastructure, systems, and organizations that keep the world running. Our Team's Vision: The Office of the CTO and Security team sets the strategic technical direction of the company while keeping both Illumio and our customers secure. Those who join us represent the leader in Zero Trust Segmentation and maintain Illumio's competitive advantage by exploring new technologies while collaborating with Engineering and Product Management. We are looking for people who leverage differences and push the pace of innovation in a time when the world faces its greatest cybersecurity threats in history. Your Impact: Leverage Illumio Insights as an everyday tool to protect the company, as well as providing input and feedback to the product teams Collaborate cross-functionally to protect the Illumio's production and corporate environments Build, deploy, and automate security solutions to support our defense-in-depth strategy, using a mixture of commercial, open-source, and in-house tools Continually improve the effectiveness of our tools, and implement new approaches to address the changing threat landscape Perform other activities in support of the Security team's charter Mentor others as you yourself gain knowledge and experience Participate in weekly on-call rotations Your Toolkit: 7+ years of experience doing the following: Building and operating enterprise security tools Securing multi-cloud environments Network Security Application Security Both Red and Blue team experience Working knowledge of Illumio CloudSecure and Insights Demonstrable Incident Response experience Strong scripting and automation skills A data-driven, analytical mindset The ability to express yourself clearly when communicating Our Commitment: Illumio believes that an environment of unique backgrounds, experiences, viewpoints, and individual contributions drives our success and makes us stronger together. We are dedicated to creating and maintaining a diverse culture and emphasizing inclusion and belonging. #LI-TD1 #LI-REMOTE All official job offers from our company are extended directly by our recruitment team and will be sent through an official E-Signature document for your review and signature. Please be aware that we do not ask for any personal information in the process of extending offers of employment, such as financial details or social security numbers. Upon acceptance of any offer, we will request such information as part of the onboarding process prior to or on your first day of employment, and only after completing a background check through an authorized third-party vendor. If you receive any communication asking for personal details outside of these processes, please contact us immediately to verify the authenticity of the request. Your security is important to us, and we are committed to a safe and transparent hiring experience. For roles in San Francisco and Los Angeles: Pursuant to the San Francisco Fair Chance Ordinance and the Los Angeles Fair Chance Initiative for Hiring, Illumio will consider for employment qualified applicants with arrest and conviction records.
    $94k-122k yearly est. Auto-Apply 28d ago
  • Senior Defense Assessment Analyst (Penetration Tester)

    Chenega MIOS

    Security engineer job in Sierra Vista, AZ

    Senior Defense Assessment Analyst (Penetration Tester) Ft. Huachuca, AZ Are you ready to enhance your skills and build your career in a rapidly evolving business climate? Are you looking for a career where professional development is embedded in your employer's core culture? If so, Chenega Military, Intelligence & Operations Support (MIOS) could be the place for you! Join our team of professionals who support large-scale government operations by leveraging cutting-edge technology and take your career to the next level! Chenega IT Enterprise Services (CITES) offers forward-thinking technology solutions to federal agencies and the DoD. Formed in 2016 to serve federal customers CONUS, CITES has grown quickly into a best practices leader for the modern federal enterprise. The Senior Defense Assessment Analyst (Penetration Tester) shall plan for and conduct OT&E cyber survivability assessments on operationally representative system configurations, operated within operationally representative environments that include the coordinated involvement of NSA-certified Red Teams. In accordance with DOT&E cyber policies, the Contractor shall perform T&E planning, execution, data collection, analysis, and reporting for the conduct of cyber survivability assessment activities. This position is 100% on-site in a government facility. Responsibilities Cooperative Vulnerability and Penetration Assessment (CVPA) performed with the objective of identifying and providing a comprehensive characterization of the cybersecurity status of the SUT in an operational context for purposes of helping to mitigate the cybersecurity risks associated with that system. The Contractor shall review applicable system RMF information to identify the residual risks to be verified through the CVPA process. Adversarial Assessment (AA) performed following a CVPA that utilize a NSA-certified Red Team to validate the operational significance of remaining system vulnerabilities for purposes of arriving at a system cyber survivability determination. Cyber Economic Vulnerability Assessment performed as part of or following an AA to address DOT&E cybersecurity requirements for the OT&E of DoD financial and business systems. Develop and present TCBs Perform OTRR Reporting Develop Cybersecurity T&E Plans Develop Cybersecurity Quick Look Reports Develop Cybersecurity Operational Assessments Develop Cybersecurity T&E Reports Qualifications BA/BS from an accredited university required Minimum of 12+ years of related IT experience Substitution Allowance (MA/MS with 10+ years' experience can be substituted for the above requirements) Must meet DoD 8140 DCWF 511 requirements (B.S., CySA+ or CBROPS or CFR or FITSP-O or GCIA or GDSA or GICSP or GCFA) GIAC Certified Penetration Tester (GPEN) EC Council Licensed Penetration Tester (LPT) Certified Ethical Hacker (CEH) An IAT II certification (CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, or SSCP) TS/SCI clearance required Knowledge, Skills and Abilities: Excellent written and verbal communication and customer service skills. Ability to work independently and as a team member. Ability to handle large, complex workloads, effectively coordinate multiple resources, and multi-task in a fast-paced environment. Knowledge and skill in applying analytical and evaluation methods and techniques. Ability to handle controversial situations with tact and diplomacy. Knowledge of cybersecurity and privacy principles. Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. How you'll grow At Chenega MIOS, our professional development plan focuses on helping our team members at every level of their careers to identify and use their strengths to do their best work every day. From entry-level employees to senior leaders, we believe there's always room to learn. We offer opportunities to help sharpen skills in addition to hands-on experience in the global, fast-changing business world. From on-the-job learning experiences to formal development programs, our professionals have a variety of opportunities to continue to grow throughout their careers. Benefits At Chenega MIOS, we know that great people make a great organization. We value our team members and offer them a broad range of benefits. Learn more about what working at Chenega MIOS can mean for you. Chenega MIOS's culture Our positive and supportive culture encourages our team members to do their best work every day. We celebrate individuals by recognizing their uniqueness and offering them the flexibility to make daily choices that can help them be healthy, centered, confident, and aware. We offer well-being programs and continuously look for new ways to maintain a culture where we excel and lead healthy, happy lives. Corporate citizenship Chenega MIOS is led by a purpose to make an impact that matters. This purpose defines who we are and extends to relationships with our clients, our team members, and our communities. We believe that business has the power to inspire and transform. We focus on education, giving, skill-based volunteerism, and leadership to help drive positive social impact in our communities. Learn more about Chenega's impact on the world. Chenega MIOS News- ***************************** Tips from your Talent Acquisition Team We want job seekers exploring opportunities at Chenega MIOS to feel prepared and confident. To help you with your research, we suggest you review the following links: Chenega MIOS web site - ******************* Glassdoor - ******************************************************************************** LinkedIn - ***************************************** Facebook - ************************************* #Chenega IT Enterprise Services, LLC Our wide range of benefit options is designed to support and protect employees and their families. Based on eligibility, benefits include medical, dental, vision, prescription plans, wellness programs, income protection, paid leave, and retirement. Positions covered by the McNamara-O'Hara Service Contract Act, Davis-Bacon Act, or a Collective Bargaining Agreement (CBA) will comply with the statute or CBA requirements. Chenega Corporation and family of companies is an EOE. Equal Opportunity Employer/Veterans/Disabled Native preference under PL 93-638. We participate in the E-Verify Employment Verification Program
    $75k-104k yearly est. 60d+ ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy Inc.

    Security engineer job in Tempe, AZ

    Requirements What You Will Be Doing:: Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. Ensure that releases and product changes are reviewed and approved by the Security Team. Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. Schedule and assist with remediation efforts from external and internal penetration tests and assessments. Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. Oversee and help execute manual code review of key product components for security improvements. Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. 3+ years' relevant experience as a Vulnerability Analyst required. A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. Knowledge of containerized web application architecture and related vulnerabilities and issues. Deep understanding of vulnerability management, including risk assessment and remediation planning. Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. Experience with software development and delivery for a SaaS company. Familiarity with cybersecurity frameworks, such as NIST CSF. Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: Market-competitive pay based on education, experience, and location. Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. Employee wellness program. Employee rewards, discounts, and recognition programs. Generous company-paid holidays (12 per year), vacation, and sick time. Paid paternity/maternity leave. Monthly connectivity/home office stipend if working from home 5 days a week. A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 7d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Phoenix, AZ

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 56d ago
  • Security Engineer

    Sundt Construction 4.8company rating

    Security engineer job in Tempe, AZ

    As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do. At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America. Job Summary As a Security Engineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy. Key Responsibilities 1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls. 2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks. 3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices. 4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly. 5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications. 6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans. 7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations. 8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews. Minimum Job Requirements 1. Ability to work independently and manage multiple tasks in a fast-paced environment. 2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience. 3. Excellent problem-solving skills and attention to detail. 4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration. 5. Minimum of 3-5 years of experience in cybersecurity or a related field. 6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint. 7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred. 8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams. 9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002). Note: Job Description is subject to change at any time and may include other duties as assigned. Physical Requirements 1. May stoop, kneel, or bend, on an occasional basis 2. Must be able to comply with all safety standards and procedures 3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis 4. Will interact with people and technology frequently during a shift/work day 5. Will lift, push or pull objects up to 50Ibs on an occasional basis. 6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day. 7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors Safety Level Non-Safety Sensitive Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials. Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws. Benefit list: Market Competitive Salary (paid weekly) Bonus Eligibility based on company, group, and individual performance Employee Stock Ownership Plan & 401K Industry Leading Health Coverage Starting Your First Day Flexible Time Off (FTO) Medical, Health Savings, and Wellness credits Flexible Spending Accounts Employee Assistance Program Workplace Wellness Programs Mental Health Program Life and Disability Insurance Employee-Owner Perks Educational Assistance Sundt Foundation - Charitable Employee-Owner's program
    $87k-115k yearly est. Auto-Apply 35d ago
  • Cyber Security Analyst

    TPI Global (Formerly Tech Providers, Inc.

    Security engineer job in Phoenix, AZ

    We are seeking an experienced IT professional to support the design, implementation, and security of a new recording system that is part of our infrastructure. This system will operate on a Kubernetes-based, containerized platform, and this role is essential to ensuring the environment is stable, secure, and operationally sound. The individual will work closely with internal staff and external vendors to evaluate system architecture, implement and maintain secure configurations, and support ongoing operations. The focus of the role is not on building the platform from scratch, but on ensuring it is properly designed, securely configured, monitored, and defensible from both a technical and governance perspective. The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. Skills Required Kubernetes, Cybersecurity Skills Preferred Experience Required Practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices. Experience Preferred Experience supporting government systems or other regulated environments is strongly preferred Education Required Bachelors in related field of study Education Preferred Bachelors in related field of study Additional Information
    $75k-104k yearly est. 1d ago
  • Cyber Security Analyst with Kubernetes-Independent visa/consultants only - No C2C-Local candidates only

    Ajna Infotech

    Security engineer job in Phoenix, AZ

    Non-Locals will not be considered. Independent visa/consultants only - No C2C Must have kubernetes experience Role: Cyber Security Analyst Type: Contract Description We are seeking an experienced IT professional to support the design, implementation, and security of a new recording system that is part of our infrastructure. This system will operate on a Kubernetes-based, containerized platform, and this role is essential to ensuring the environment is stable, secure, and operationally sound. The individual will work closely with internal staff and external vendors to evaluate system architecture, implement and maintain secure configurations, and support ongoing operations. The focus of the role is not on building the platform from scratch, but on ensuring it is properly designed, securely configured, monitored, and defensible from both a technical and governance perspective. The position requires practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices, and will help ensure the system meets the reliability, security, and compliance expectations of a regulated public sector and election environment. Skills Required Practical experience with Kubernetes, cloud or hybrid environments, access controls, monitoring, logging, and general cybersecurity best practices. Experience Preferred Experience supporting government systems or other regulated environments is strongly preferred Education Required Bachelors in related field of study Additional Information All your information will be kept confidential according to EEO guidelines.
    $75k-104k yearly est. 7m ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Security engineer job in Phoenix, AZ

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client.* Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $97k-131k yearly est. Easy Apply 2d ago
  • SAP GRC/Security Consultant

    Turnkey Consulting

    Security engineer job in Phoenix, AZ

    Job Title: SAP GRC/Security Consultant Company: Turnkey Consulting Turnkey Consulting is a leading advisory and implementation organization with deep expertise in risk management, governance, and compliance & security. Having the ability to provide end-to-end solutions that integrate technology, process, and people. Our business started within the SAP ecosystem, however expansion into being an agnostic partner, now gives us a wider range of solutions to support our customers, while securing their wider estate. Turnkey Consulting helps businesses optimize their risk management, security and compliance programs, protect against Cyber threats, reduce costs, and improve their operational efficiency. With a team of seasoned risk professionals and a commitment to excellence, we empower businesses to proactively protect their critical assets and stay ahead of evolving threats. Job Summary The candidate will play a key role in handling client engagements, as well as utilizing strong technical experience to find solutions that best fit our clients' needs. We are looking for a team-player and strong all-rounder with at least 2 implementations and 2 years of practical experience in the following areas Detailed understanding of the SAP authorization concept in one or more of the following areas: ECC, SAP S/4 HANA, HCM, CRM, SRM, BW, BI, BPC, SAP HANA Experience of designing, building and implementing SAP security and authorization solutions Exposure to various system user interfaces (UI), including SAP but also other relevant SaaS products Detailed understanding of SAP GRC suite of applications, with a demonstrable specialism in core modules contained within (ideally v12 onward) Experience of IDM solutions, either SAP's IDM solution, or non-SAP, such as SailPoint or Saviynt would be of advantage. Experience of third-party solutions to secure SAP estates also an advantage Experience of SAP Fiori catalogs, groups, pages and spaces Experience of SAP IAG solutions would be an advantage, both IAS and IPS Our experienced consultants are a key driver of our success as one of the most trusted names in the end-to-end security arena and we are committed to delivering to a consistently high standard. Key responsibilities of the role are: Task management of large / complex implementations, especially in Application security or enterprise risk/identity projects Implementation of GRC technology and supporting modules Work with clients to understand "why" they're in need of such solutions, define requirements and configure solutions to best fit those needs Perform controls and configuration reviews involving relevant application systems and processes Advise clients on controls in their enterprise systems relating to regulatory or legislative compliance Review and advise on security redesign and remediation projects Provide a broader range of information risk management solutions to clients as required Build relationships with new clients and maintain good relations with our existing client base Integrate solutions into wider cybersecurity controls estates We are looking ideally for someone with the following attributes: The ability to troubleshoot and diagnose problems / issues and provide prompt, robust resolution An enquiring mind to discover "why" clients need to introduce the controlling measures. The ability to manage projects within varied client engagements and lead reviews and implementations Knowledge of corporate business processes and their control points Good understanding of various IT regulations and standards, including: Sarbanes Oxley, COBIT, ISO series & the GDPR Bachelor's degree Professional certification (e.g. CISA, M.Inst.ISP, CISSP, ISO) SAP certification (Security, GRC) Consulting background Strong written and verbal communication skills Integration experience Ability to act as an SME to install, design, engineer and configure security solutions to meet client needs Ability to effectively manage own time and priorities effectively and to work both as part of a team and individually. Able to communicate technical and functional requirements to both the business and IT Key responsibilities of the role will include: Project manage large / complex SAP Security implementations, especially for S/4 HANA projects Implementation of GRC Access Controls and supporting modules Work with clients to understand requirements and configure solutions to best fit those needs Perform controls and configuration reviews involving SAP systems Advise clients on controls in SAP relating to regulatory or legislative compliance Review and advise on SAP security redesign and remediation projects Provide a broader range of information risk management solutions to clients as required Build relationships with new clients and maintain good relations with our existing client base Integrate solutions into wider cybersecurity controls estates We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.
    $83k-115k yearly est. 60d+ ago
  • Cyber Security Analyst

    Washington Elementary School District 4.6company rating

    Security engineer job in Phoenix, AZ

    Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites. Essential Functions: * Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc. * Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts. * Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them. * Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies. * User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures. * Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment. * Performs other job related duties as assigned. Required Qualifications: To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary. * High School diploma or equivalent (G.E.D.) prior to being hired; * Valid Arizona Department of Transportation Driver's License; * Minimum of one year of experience in information security, network security, or a related technology field. * Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services. * Experience with security tools, including SIEM, antivirus software, and intrusion detection systems. * Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card. Preferred Qualifications: It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position. * Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise. * Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP. * Experience working in an educational or public sector environment. * Knowledge of emerging security technologies and trends. * Experience administering a Cisco Local and Wide area networking environment; * Experience with border network security devices such as Email filters and Firewalls; * Experience administering Windows Server and Active Directory. * Experience with VMWare and Veeam (or other backup and recovery platform) Knowledge and Skills Required: To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Skills required, but not limited to, for this position include: * Ability to work independently and collaboratively in a team environment. * Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions. * Familiarity with scripting languages like Python or PowerShell for automating security tasks. * Knowledge of common security frameworks, such as NIST. * Understanding of networking concepts, firewalls, and data encryption techniques. * Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences. * Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities. * Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack. Physical Requirements: The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus. Working Conditions: The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels. The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
    $48k-60k yearly est. 38d ago
  • IT Security Engineer (Tempe)

    Arizona Department of Education 4.3company rating

    Security engineer job in Tempe, AZ

    IT Security Engineer (Tempe) Type: Charter Job ID: 131811 County: East Maricopa Contact Information: ASU Preparatory Academy 1130 E University Dr. #230 Tempe, Arizona 85044 District Website Contact: Kathy Piippo Phone: ************ Fax: District Email : Salary Range: $60,000.00 - $69,500.00 USD annually. As part of Arizona State University's charter to provide access and excellence, ASU Preparatory Academy (ASU Prep) shares this commitment by demonstrating all students can achieve at the highest levels, regardless of their background. To scale our current impact, ASU Prep is advancing a major expansion program taking fundamental responsibility for the communities we serve. The IT Security Engineer provides technical support for the school network infrastructure, ensuring reliable connectivity, server operations, and user access across all campuses. This position plays a key role in maintaining stable, secure, and efficient network systems to support teaching, learning, and administrative operations. QUALIFICATIONS: * Bachelor's degree in Computer Science, Information Technology or a related field, or an Associate's Degree, preferred. * Certifications such as Security+, Cysa+, CISSP or equivalent are strongly preferred. * 3+ years of progressive IT experience, including networking and infrastructure support. * 3+ years of experience delivering excellent customer service. * Knowledge of basic networking principles and troubleshooting. * Understanding of cybersecurity best practices, CIPA/FERPA compliance, and basic IAM principles. * Active AZ Department of Public Safety (DPS) IVP Fingerprint Clearance Card. * Any equivalent combination of experience, training and/or education from which comparable knowledge, skills and abilities may be considered. DUTIES AND RESPONSIBILITIES: * Work closely with IT teams, developers, and management to embed security into all aspects of technology operations. * Implement a user awareness program to reduce phish prone behavior among staff and students. * Conduct risk assessments and develop mitigation strategies to reduce exposure. * Manage and maintain security tools like antivirus software, SIEM (Security Information and Event Management) systems, and endpoint protection platforms. * Identify, design and implement security solutions like IDS, EDR, OS hardening, patch management, etc. * Proactively monitor network/software security events and assist teams to troubleshoot and mitigate. * Lead efforts to detect and manage vulnerabilities across the organization. * Conduct security audits to uncover weaknesses. * Collaborate with teams and leadership to develop and disseminate security policies, standards, and procedures. * Support content filtering tools and ensure compliance with CIPA, FERPA, and cybersecurity policies. * Maintain detailed documentation for security related activities. * Participate in IT planning sessions to align infrastructure decisions with instructional and organizational needs. * Coordinate with service providers and vendors including Arizona State University Enterprise Technology for security related advanced troubleshooting of network issues. * Additional duties will be assigned as needed. KNOWLEDGE, SKILLS AND ABILITIES: * Strong diagnostic and troubleshooting skills. * Effective communication and interpersonal skills, especially in high-stakes or customer-facing scenarios. * Strong organizational skills and a solution-focused attitude. * Knowledge of common information systems, connectivity, integrations from a security perspective. * Effective organizational skills. * Effective written and oral communication. * Demonstrated knowledge in Edtech is a plus. * Demonstrated knowledge with common e-learning tools and platforms is a plus. PHYSICAL DEMANDS: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand and talk or hear and sometimes walk and sit. The employee must use hands, arms and fingers to input data, handle, feel or reach. While performing the duties of this job, the employee may occasionally push or lift up to 30 lbs. such as boxes, supplies, etc. Specific vision abilities required by this job include close vision such as to read handwritten or typed material, and the ability to adjust focus, close vision, distance vision, color vision, peripheral vision and depth perception. LOCATION: UCENT - Hybrid TRAVEL: Travel required to all sites, meetings, trainings and/or conferences and occasional overnight travel may be required. This job description is subject to change at any time. Other: What about learning drives us to do more than deliver the lesson? Maybe we're overachievers. Or maybe we just know what real impact looks like. Each one of us has seen passion win over fear, vision become relentless focus and belief in human potential make it all the way to the finish line. Our mission is to design new models for educational success and raise academic achievement for all learners. Are you ready to find a career with a company whose mission, vision, and values align with yours? Can you see yourself fitting into this mission with us? For more information please visit: ********************************
    $60k-69.5k yearly 20d ago
  • Security Systems Engineer

    Exyte Group

    Security engineer job in Chandler, AZ

    Discover your exciting role The Security Systems Engineer designs and implements security solutions to protect facilities, identifies vulnerabilities, and develops strategies to prevent unauthorized access, ensuring effective risk mitigation and compliance with security standards. Explore your tasks and responsibilities * Design and implement integrated security systems tailored for advanced technology and cleanroom environments. * Identify and assess vulnerabilities specific to sensitive facility operations and controlled environments. * Conduct comprehensive threat, risk, and vulnerability assessments for high-value assets and critical infrastructure. * Specify and deploy appropriate security devices and controls that do not compromise cleanroom protocols. * Consult with stakeholders on security requirements, best practices, and regulatory compliance. * Develop strategies to prevent unauthorized access while maintaining operational continuity. * Ensure all security solutions meet industry standards, facility-specific guidelines, and cleanroom requirements. * Collaborate with internal teams, external vendors, and facility managers to deliver effective technical solutions. * Support both large-scale and small-scale security projects, from design through commissioning and validation. * Prepare and maintain detailed documentation for security system designs, installations, and compliance audits. * Other duties as assigned Show your expertise Minimum Required * Bachelor's degree in Engineering or a related field. * 2-5 years of experience as a Security Systems Engineer or in a similar role, preferably in advanced technology or cleanroom facilities. Preferred * Relevant certifications (e.g., CISSP, PSP, or similar) are highly desirable. * Prior experience as a consulting engineer preferred * Prior experience with Advanced Technology * Experience working within a team environment * Experience in the quality control review process * Experience contributing to continuous improvement processes Applicants must be authorized to work for ANY employer in the U.S. We are unable to sponsor or take over sponsorship of an employment Visa at this time. Non-Solicitation: We are not currently accepting third-party agency candidates for this position. Any agency candidate submitted to any employee of Exyte may be contacted by Exyte without obligation to the third-party agency. Exyte US, Inc. is proud to be an Affirmative Action and Equal Employment Opportunity employer that is committed to celebrating diversity and supporting an inclusive workplace where associates excel based on personal merit, qualifications, experience, ability, and job performance. We prohibit discrimination and harassment of any kind based on race, color, religion, age, sex (e.g., pregnancy, childbirth and related medical conditions, sexual orientation, gender identity or expression), national origin, disability status, genetic information, protected veteran status, or any other protected characteristic as outlined by federal, state, or local laws. Contact: You want to be part of the Exyte team? We look forward to receiving your application! For further questions and information, please do not hesitate to contact Phillip Turner via E-Mail at ************************ Please note that we only consider applications submitted through our application portal. Applications sent via email will not be considered due to data protection regulations.
    $78k-112k yearly est. Easy Apply 4d ago
  • Senior Security Analyst (L2)

    Lumifi Cyber

    Security engineer job in Scottsdale, AZ

    L2 Security Analyst Full-Time, Exempt We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ. Primary Duties Triage alerts and determine if further investigation or action is required by the customer Assist customers with the investigation and response of incidents throughout the incident response process Perform investigations of customer requests and be able to provide further contextual information along with recommended actions Proactively threat hunt using network and host data within customer environments Mentor junior analysts Required Qualifications Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.) Strong understanding of incident response methodologies and reporting Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.) Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers Preferred Qualifications Minimum of 3+ years of experience performing triage/incident response in enterprise environments Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP) Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving Ability to manage projects to completion both individually and in a group Benefits Include: Health Insurance 80% paid by employer Dental Insurance 80% paid by employer Vision Insurance 80% paid by employer Self- Managed vacation leave Paid sick leave Paid holiday leave All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer. Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
    $87k-119k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst 2

    Rogers Corporation 4.8company rating

    Security engineer job in Chandler, AZ

    This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices. Essential Functions: * Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration. * Support data and asset risk. * Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats. * Address various security problems across a disperse set of assets. * Other duties as assigned. Qualifications: * Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree * 2+ years of progressive cybersecurity experience * Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
    $81k-124k yearly est. 29d ago
  • Information Security Analyst - IAM / CyberArk

    Stratacuity

    Security engineer job in Chandler, AZ

    Job Title: Information Security Analyst - IAM / CyberArk Client: Large Financial Services Institution Pay Range: $53.60 - $56.60/hr Contract Length: 18 months * Manage customer tickets in JIRA (approx. 300+ per month). * Review submitted service accounts and determine eligibility for vaulting in CyberArk based on predefined criteria. * Process involves cross-referencing multiple source files and following documented procedures. Key Skills & Experience: * 4+ years of Information Security Analysis experience (or equivalent). * Advanced Microsoft Office skills (Excel - VLOOKUPs, data connections, Power Query; PowerPoint). * Experience with IAM tools (CyberArk, PAM solutions, HashiCorp). * Familiarity with Tableau for reporting and analysis. * Strong troubleshooting ability and attention to detail. Advanced Microsoft Office Skills (PowerPoint, Excel - VLookups, data/connections, power queries) Experience with IAM Tools (CyberArk, PAM solutions, HashiCorp) Familiarity with Tableau * MS Office Word, Excel, PowerPoint 2 - 4 Years Cloud 2 - 4 Years Cloud Security 2 - 4 Years Cyber Security 2 - 4 Years PowerBI and Tableau 2 - 4 Years Tableau 2 - 4 Years EEO Employer Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************. Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details. Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide. Employee Type: Contract Location: Chandler, AZ, US Job Type: Date Posted: January 14, 2026 Similar Jobs * Information Security Data Analyst * Information Systems Security Officer * IAM Delivery and Escalation Manager * Information Systems Analyst * Sr. GCS Cloud Security Analyst
    $53.6-56.6 hourly 1d ago
  • Cyber Security Analyst - Vulnerability Management

    Runbuggy OMI, Inc.

    Security engineer job in Tempe, AZ

    About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale. RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app. Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S. We're not just building a better logistics platform - we're redefining the future of automotive transportation. About the Role: The Cybersecurity Analyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle. Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements. Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process. Requirements What You Will Be Doing:: * Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure. * Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities. * Ensure that releases and product changes are reviewed and approved by the Security Team. * Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies. * Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks. * Schedule and assist with remediation efforts from external and internal penetration tests and assessments. * Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts. * Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program. * Oversee and help execute manual code review of key product components for security improvements. * Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap. * Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security. * Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services. * Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform. * Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders. * Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures. * Other duties as assigned. What You Bring to the Team by Way of Skills and Experience: * Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains. * 3+ years' relevant experience as a Vulnerability Analyst required. * A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred. * Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc. * Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc. * Knowledge of containerized web application architecture and related vulnerabilities and issues. * Deep understanding of vulnerability management, including risk assessment and remediation planning. * Knowledge of the latest trends and awareness of current hacking techniques and cybercrime. * Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB. * Experience with software development and delivery for a SaaS company. * Familiarity with cybersecurity frameworks, such as NIST CSF. * Attention to detail, QA skills, the ability to "think forward," adept at problem solving and addressing issues and complications before they expand. Certificates, Licenses, and/or Registrations: * Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred. What is in it for You and Why you Should Apply: * Market-competitive pay based on education, experience, and location. * Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan. * Employee wellness program. * Employee rewards, discounts, and recognition programs. * Generous company-paid holidays (12 per year), vacation, and sick time. * Paid paternity/maternity leave. * Monthly connectivity/home office stipend if working from home 5 days a week. * A supportive and positive space for you to grow and expand your career. Pay Range Disclosure: The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law. Applicants must be currently authorized to work in the United States. Please, no agencies. Salary Description $90k/yr.-$110k, DOE
    $90k-110k yearly 26d ago

Learn more about security engineer jobs

Do you work as a security engineer?

What are the top employers for security engineer in AZ?

Idealforce

Ron Turley Associates

Top 10 Security Engineer companies in AZ

  1. Sedgwick LLP

  2. Oracle

  3. Idealforce

  4. Ron Turley Associates

  5. Meta

  6. Concentrix

  7. Trustmark

  8. UMB Bank

  9. Illumio

  10. Coinbase

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security engineer jobs in arizona by city

All security engineer jobs

Jobs in Arizona