Pay rate- $50 to $60/hr
Duration: 06 + months (With Possible Extension)
Must Have' skills and experiences:
Responsible for designing, developing, integrating, and verifying control systems for Auxiliary Power Units (APUs) in the Engines & Power Systems (EPS) business unit.
Key Responsibilities:
• Control System requirements analysis and decomposition (DOORS/MATLAB)
• Control System requirements verification
• Develop and implement control algorithms and software for APUs
• Control system design, integration, and validation
• Model-based development system design (MATLAB)
• Collaboration with cross-functional teams
• Troubleshoot and resolve control system issues
• Ensure compliance with industry standards and regulations
You Must Have:
• Bachelor's degree from an accredited institution in a technical discipline such as electrical engineering, mechanical engineering, or aerospace engineering
• 6+ years of systems engineering experience in support of safety-critical aerospace development
• Strong knowledge and understanding of control systems engineering principles
• Excellent problem-solving and troubleshooting abilities
• Experience with control system design, implementation, and testing
$50-60 hourly 4d ago
Looking for a job?
Let Zippia find it for you.
Cyber Security Analyst - Vulnerability Management
Runbuggy OMI, Inc.
Security engineer job in Tempe, AZ
About Us: RunBuggy is the most technically advanced automotive logistics platform on the market. Period. Backed by Porsche Ventures and Hearst Ventures, RunBuggy is transforming the way cars move. Our cutting-edge technology is trusted by some of the largest OEMs, captive finance companies, and automotive lenders in the world to streamline vehicle transportation at scale.
RunBuggy's end-to-end platform connects car shippers and haulers in real time - eliminating the friction of traditional load boards and costly custom software. For shippers, RunBuggy integrates directly into existing management systems, reducing transportation costs and accelerating delivery timelines. For transporters, we offer a smarter, more profitable way to find, accept, and manage loads - all from a single app.
Since launching in 2019, RunBuggy has grown to over 150 team members, facilitated the movement of hundreds of thousands of vehicles, and attracted tens of thousands of transporters across the U.S.
We're not just building a better logistics platform - we're redefining the future of automotive transportation.
About the Role:
The Cybersecurity Analyst - Vulnerability Management plays a critical role in safeguarding our products and supporting infrastructure. This position is responsible for identifying and mitigating emerging threats, managing product-related security issues, and leading the vulnerability management program across the product lifecycle.
Candidates must be authorized to work in the US for any employer and must be within a commutable distance of Tempe, AZ. Please do not apply if you do not meet these requirements.
Candidates who include a cover letter explaining how their experience aligns with the position will receive priority in the review and interview process.
Requirements
What You Will Be Doing::
* Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
* Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
* Ensure that releases and product changes are reviewed and approved by the Security Team.
* Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
* Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
* Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
* Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
* Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
* Oversee and help execute manual code review of key product components for security improvements.
* Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap.
* Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security.
* Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
* Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
* Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
* Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures.
* Other duties as assigned.
What You Bring to the Team by Way of Skills and Experience:
* Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
* 3+ years' relevant experience as a Vulnerability Analyst required.
* A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred.
* Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc.
* Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc.
* Knowledge of containerized web application architecture and related vulnerabilities and issues.
* Deep understanding of vulnerability management, including risk assessment and remediation planning.
* Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
* Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB.
* Experience with software development and delivery for a SaaS company.
* Familiarity with cybersecurity frameworks, such as NIST CSF.
* Attention to detail, QA skills, the ability to "think forward," adept at problem solving and addressing issues and complications before they expand.
Certificates, Licenses, and/or Registrations:
* Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred.
What is in it for You and Why you Should Apply:
* Market-competitive pay based on education, experience, and location.
* Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan.
* Employee wellness program.
* Employee rewards, discounts, and recognition programs.
* Generous company-paid holidays (12 per year), vacation, and sick time.
* Paid paternity/maternity leave.
* Monthly connectivity/home office stipend if working from home 5 days a week.
* A supportive and positive space for you to grow and expand your career.
Pay Range Disclosure:
The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law.
Applicants must be currently authorized to work in the United States.
Please, no agencies.
Salary Description
$90k/yr.-$110k, DOE
$90k-110k yearly 41d ago
Certified Ethical Hacker
DMC Strategic It
Security engineer job in Gold Canyon, AZ
Job Brief: We are looking for a talented and trustworthy certified ethical hacker to conduct in-depth penetration tests on our customer's computer systems. As a certified ethical hacker, you will be required to research the type of system being used, find ways to penetrate the system and identify any weaknesses. You may also be required to create penetration test reports and advise on security upgrades.
To ensure success as a certified ethical hacker, you should have advanced knowledge of computer and internet security systems, high-level hacking skills, and the ability to create clear and concise reports. A top-notch certified ethical hacker quickly identifies security flaws and provides useful advice on how to improve the system.
Responsibilities:
Meeting with clients to discuss the security system currently in place.
Researching the company's system, network structure, and possible penetration sites.
Conducting multiple penetration tests on the system.
Identifying and recording security flaws and breaches.
Identifying areas of high-level security.
Reviewing and rating the security network.
Creating suggestions for security upgrades.
Compiling penetration test reports for the client.
Conducting penetration tests once new security features have been implemented.
Suggesting alternate upgrades.
Skills Required:
Bachelor's degree in information technology or computer science.
CEH Certification.
Proven work experience as a certified ethical hacker.
Advanced knowledge of networking systems and security software.
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Technical knowledge of routers, firewalls, and server systems.
Good written and verbal communication skills.
Good troubleshooting skills.
Ability to see big-picture system flaws.
$76k-117k yearly est. 60d+ ago
Cyber Security Analyst
Insight Global
Security engineer job in Phoenix, AZ
This is a rare opportunity to join a fast-growing team of information security experts as we transform, enhance, and expand the security program for one of the largest information technology providers in the world. You will join the United States Global Technology Operations (US GTO) Security Strategy and Solutions team supporting governance, risk, and compliance consulting services as well as security service delivery across one or more US-based industries.
The successful candidate will have a broad knowledge of current security practices, knowledge of specific Security Tools, as well as the ability to identify and apply legal, regulatory, and industry-specific security requirements.
You will help our client deploy effective security solutions and strategies. You must be able to collaborate with a variety of technical and management disciplines including infrastructure and security architecture, security operations, application development, project managers, product owners, and others.
Future duties and responsibilities
. Incident Response
. Security Investigations
. SecurityEngineering
. GRC
. Tools validation
. Vulnerability Management
. Reporting
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
. Clear written and verbal communication skills
. Ability to communicate with executive team
. Splunk- 3 years of experience
. Qualys- 2 years of experience
. Vulnerability Management-2 years of experience
. Governance-2 years of experience
. Risk Management-2 years of experience
. Incident Management-3 years of experience
. Education: Associate or bachelor's degree preferred
. Cyber Security Certification - Minimum Security+, but CISSP or CISM is preferred
$75k-104k yearly est. 13d ago
Engineer, Information Security and Risk
Cardinal Health 4.4
Security engineer job in Phoenix, AZ
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
$94.9k-135.6k yearly 60d+ ago
Cyber Security Analyst - 26-00507
Navitaspartners
Security engineer job in Glendale, AZ
Job DescriptionJob Title: Cyber Security AnalystLocation: Phoenix, AZ (Onsite/Hybrid as applicable) Duration: 6-Month ContractRole Overview
We are seeking an experienced Cyber Security Analyst to support the security, stability, and operational readiness of a newly implemented recording system within a complex IT infrastructure. The system operates on a Kubernetes-based, containerized platform, and this role plays a critical part in ensuring the environment is securely designed, properly configured, continuously monitored, and defensible from both a technical and governance perspective.
This position focuses on security oversight and operational assurance, rather than building the platform from the ground up. The analyst will collaborate closely with internal technical teams and external vendors to evaluate architecture, enforce security controls, and support ongoing operations in a highly regulated public-sector environment.
Key Responsibilities
Support the design review, security implementation, and operational readiness of a containerized recording system
Evaluate system architecture to ensure secure, stable, and compliant configurations
Implement and maintain security best practices across Kubernetes-based environments
Configure and manage access controls, monitoring, and logging mechanisms
Assist with vulnerability assessment, risk mitigation, and security hardening activities
Monitor system health, security events, and operational logs to identify and respond to potential risks
Collaborate with internal teams and third-party vendors to resolve security and operational issues
Ensure the platform meets reliability, security, and compliance expectations
Support governance, audit readiness, and documentation efforts as required
Contribute to maintaining a defensible security posture in a regulated public-sector environment
Required Skills & Experience
Practical, hands-on experience with Kubernetes and containerized platforms
Strong foundation in cybersecurity principles and best practices
Experience working in cloud or hybrid environments
Knowledge of:
Access control mechanisms
System monitoring and alerting
Centralized logging and log analysis
General infrastructure and application security
Ability to assess and secure systems without direct responsibility for platform build-out
Strong collaboration and communication skills
Preferred Skills & Experience
Experience supporting government systems or other highly regulated environments
Familiarity with compliance, governance, and audit requirements
Exposure to election infrastructure, public-sector IT, or similarly sensitive systems
Education Requirements
Bachelor's degree in a related field (e.g., Cybersecurity, Co
$75k-104k yearly est. 15d ago
SAP GRC/Security Consultant
Turnkey Consulting
Security engineer job in Phoenix, AZ
Job Title: SAP GRC/Security Consultant Company: Turnkey Consulting
Turnkey Consulting is a leading advisory and implementation organization with deep expertise in risk management, governance, and compliance & security. Having the ability to provide end-to-end solutions that integrate technology, process, and people. Our business started within the SAP ecosystem, however expansion into being an agnostic partner, now gives us a wider range of solutions to support our customers, while securing their wider estate. Turnkey Consulting helps businesses optimize their risk management, security and compliance programs, protect against Cyber threats, reduce costs, and improve their operational efficiency. With a team of seasoned risk professionals and a commitment to excellence, we empower businesses to proactively protect their critical assets and stay ahead of evolving threats.
Job Summary
The candidate will play a key role in handling client engagements, as well as utilizing strong technical experience to find solutions that best fit our clients' needs. We are looking for a team-player and strong all-rounder with at least 2 implementations and 2 years of practical experience in the following areas
Detailed understanding of the SAP authorization concept in one or more of the following areas: ECC, SAP S/4 HANA, HCM, CRM, SRM, BW, BI, BPC, SAP HANA
Experience of designing, building and implementing SAP security and authorization solutions
Exposure to various system user interfaces (UI), including SAP but also other relevant SaaS products
Detailed understanding of SAP GRC suite of applications, with a demonstrable specialism in core modules contained within (ideally v12 onward)
Experience of IDM solutions, either SAP's IDM solution, or non-SAP, such as SailPoint or Saviynt would be of advantage.
Experience of third-party solutions to secure SAP estates also an advantage
Experience of SAP Fiori catalogs, groups, pages and spaces
Experience of SAP IAG solutions would be an advantage, both IAS and IPS
Our experienced consultants are a key driver of our success as one of the most trusted names in the end-to-end security arena and we are committed to delivering to a consistently high standard. Key responsibilities of the role are:
Task management of large / complex implementations, especially in Application security or enterprise risk/identity projects
Implementation of GRC technology and supporting modules
Work with clients to understand "why" they're in need of such solutions, define requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving relevant application systems and processes
Advise clients on controls in their enterprise systems relating to regulatory or legislative compliance
Review and advise on security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are looking ideally for someone with the following attributes:
The ability to troubleshoot and diagnose problems / issues and provide prompt, robust resolution
An enquiring mind to discover "why" clients need to introduce the controlling measures.
The ability to manage projects within varied client engagements and lead reviews and implementations
Knowledge of corporate business processes and their control points
Good understanding of various IT regulations and standards, including: Sarbanes Oxley, COBIT, ISO series & the GDPR
Bachelor's degree
Professional certification (e.g. CISA, M.Inst.ISP, CISSP, ISO)
SAP certification (Security, GRC)
Consulting background
Strong written and verbal communication skills
Integration experience
Ability to act as an SME to install, design, engineer and configure security solutions to meet client needs
Ability to effectively manage own time and priorities effectively and to work both as part of a team and individually.
Able to communicate technical and functional requirements to both the business and IT
Key responsibilities of the role will include:
Project manage large / complex SAP Security implementations, especially for S/4 HANA projects
Implementation of GRC Access Controls and supporting modules
Work with clients to understand requirements and configure solutions to best fit those needs
Perform controls and configuration reviews involving SAP systems
Advise clients on controls in SAP relating to regulatory or legislative compliance
Review and advise on SAP security redesign and remediation projects
Provide a broader range of information risk management solutions to clients as required
Build relationships with new clients and maintain good relations with our existing client base
Integrate solutions into wider cybersecurity controls estates
We are an Equal Opportunity Employer and do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity and/or expression, status as a veteran, and basis of disability or any other federal, state or local protected class. When we collect your personal information as part of a job application or offer of employment, we do so in accordance with industry standards and best practices and in compliance with applicable privacy laws.
$83k-115k yearly est. 60d+ ago
Cyber Security Analyst
Washington Elementary School District 6 4.6
Security engineer job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System)
Department: Management Information Systems (MIS)
Accountable To: Administrator of MIS
FLSA Status: Non-Exempt
Calendar: 261 Days
Summary:
Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
High School diploma or equivalent (G.E.D.) prior to being hired;
Valid Arizona Department of Transportation Driver's License;
Minimum of one year of experience in information security, network security, or a related technology field.
Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
Experience working in an educational or public sector environment.
Knowledge of emerging security technologies and trends.
Experience administering a Cisco Local and Wide area networking environment;
Experience with border network security devices such as Email filters and Firewalls;
Experience administering Windows Server and Active Directory.
Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
Ability to work independently and collaboratively in a team environment.
Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
Familiarity with scripting languages like Python or PowerShell for automating security tasks.
Knowledge of common security frameworks, such as NIST.
Understanding of networking concepts, firewalls, and data encryption techniques.
Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
$48k-60k yearly est. 51d ago
Security Engineer
The Sundt Companies 4.8
Security engineer job in Tempe, AZ
JobID: 9112 JobSchedule: Full time JobShift: : As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do.
At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America.
Job Summary
As a SecurityEngineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy.
Key Responsibilities
1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls.
2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks.
3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices.
4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly.
5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications.
6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans.
7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations.
8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews.
Minimum Job Requirements
1. Ability to work independently and manage multiple tasks in a fast-paced environment.
2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience.
3. Excellent problem-solving skills and attention to detail.
4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration.
5. Minimum of 3-5 years of experience in cybersecurity or a related field.
6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint.
7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred.
8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams.
9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002).
Note: Job Description is subject to change at any time and may include other duties as assigned.
Physical Requirements
1. May stoop, kneel, or bend, on an occasional basis
2. Must be able to comply with all safety standards and procedures
3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis
4. Will interact with people and technology frequently during a shift/work day
5. Will lift, push or pull objects up to 50Ibs on an occasional basis.
6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day.
7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors
Safety Level
Non-Safety Sensitive
Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials.
Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws.
Benefit list:
Market Competitive Salary (paid weekly)
Bonus Eligibility based on company, group, and individual performance
Employee Stock Ownership Plan & 401K
Industry Leading Health Coverage Starting Your First Day
Flexible Time Off (FTO)
Medical, Health Savings, and Wellness credits
Flexible Spending Accounts
Employee Assistance Program
Workplace Wellness Programs
Mental Health Program
Life and Disability Insurance
Employee-Owner Perks
Educational Assistance
Sundt Foundation - Charitable Employee-Owner's program
$87k-115k yearly est. Auto-Apply 50d ago
IT Security Engineer (Tempe)
Arizona Department of Education 4.3
Security engineer job in Tempe, AZ
IT SecurityEngineer (Tempe) Type: Charter Job ID: 131811 County: East Maricopa Contact Information: ASU Preparatory Academy 1130 E University Dr. #230 Tempe, Arizona 85044 District Website Contact: Kathy Piippo Phone: ************ Fax: District Email
:
Salary Range:
$60,000.00 - $69,500.00 USD annually.
As part of Arizona State University's charter to provide access and excellence, ASU Preparatory Academy (ASU Prep) shares this commitment by demonstrating all students can achieve at the highest levels, regardless of their background. To scale our current impact, ASU Prep is advancing a major expansion program taking fundamental responsibility for the communities we serve.
The IT SecurityEngineer provides technical support for the school network infrastructure, ensuring reliable connectivity, server operations, and user access across all campuses. This position plays a key role in maintaining stable, secure, and efficient network systems to support teaching, learning, and administrative operations.
QUALIFICATIONS:
* Bachelor's degree in Computer Science, Information Technology or a related field, or an Associate's Degree, preferred.
* Certifications such as Security+, Cysa+, CISSP or equivalent are strongly preferred.
* 3+ years of progressive IT experience, including networking and infrastructure support.
* 3+ years of experience delivering excellent customer service.
* Knowledge of basic networking principles and troubleshooting.
* Understanding of cybersecurity best practices, CIPA/FERPA compliance, and basic IAM principles.
* Active AZ Department of Public Safety (DPS) IVP Fingerprint Clearance Card.
* Any equivalent combination of experience, training and/or education from which comparable knowledge, skills and abilities may be considered.
DUTIES AND RESPONSIBILITIES:
* Work closely with IT teams, developers, and management to embed security into all aspects of technology operations.
* Implement a user awareness program to reduce phish prone behavior among staff and students.
* Conduct risk assessments and develop mitigation strategies to reduce exposure.
* Manage and maintain security tools like antivirus software, SIEM (Security Information and Event Management) systems, and endpoint protection platforms.
* Identify, design and implement security solutions like IDS, EDR, OS hardening, patch management, etc.
* Proactively monitor network/software security events and assist teams to troubleshoot and mitigate.
* Lead efforts to detect and manage vulnerabilities across the organization.
* Conduct security audits to uncover weaknesses.
* Collaborate with teams and leadership to develop and disseminate security policies, standards, and procedures.
* Support content filtering tools and ensure compliance with CIPA, FERPA, and cybersecurity policies.
* Maintain detailed documentation for security related activities.
* Participate in IT planning sessions to align infrastructure decisions with instructional and organizational needs.
* Coordinate with service providers and vendors including Arizona State University Enterprise Technology for security related advanced troubleshooting of network issues.
* Additional duties will be assigned as needed.
KNOWLEDGE, SKILLS AND ABILITIES:
* Strong diagnostic and troubleshooting skills.
* Effective communication and interpersonal skills, especially in high-stakes or customer-facing scenarios.
* Strong organizational skills and a solution-focused attitude.
* Knowledge of common information systems, connectivity, integrations from a security perspective.
* Effective organizational skills.
* Effective written and oral communication.
* Demonstrated knowledge in Edtech is a plus.
* Demonstrated knowledge with common e-learning tools and platforms is a plus.
PHYSICAL DEMANDS:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is frequently required to stand and talk or hear and sometimes walk and sit. The employee must use hands, arms and fingers to input data, handle, feel or reach. While performing the duties of this job, the employee may occasionally push or lift up to 30 lbs. such as boxes, supplies, etc. Specific vision abilities required by this job include close vision such as to read handwritten or typed material, and the ability to adjust focus, close vision, distance vision, color vision, peripheral vision and depth perception.
LOCATION:
UCENT - Hybrid
TRAVEL:
Travel required to all sites, meetings, trainings and/or conferences and occasional overnight travel may be required.
This job description is subject to change at any time.
Other:
What about learning drives us to do more than deliver the lesson? Maybe we're overachievers. Or maybe we just know what real impact looks like. Each one of us has seen passion win over fear, vision become relentless focus and belief in human potential make it all the way to the finish line.
Our mission is to design new models for educational success and raise academic achievement for all learners. Are you ready to find a career with a company whose mission, vision, and values align with yours? Can you see yourself fitting into this mission with us?
For more information please visit: ********************************
$60k-69.5k yearly 35d ago
Senior Security Analyst (L2)
Lumifi Cyber
Security engineer job in Scottsdale, AZ
Job Description
L2 Security Analyst
Full-Time, Exempt
We are looking for a Senior Security Analyst (L2) to join the Lumifi Cyber SOC team. Senior Security Analysts are expected to handle customer facing investigations, mentoring, and training of fellow analysts, and to participate in interaction with customers and other teams through email or phone. This position is located on-site at our SOC in Scottsdale, AZ.
Primary Duties
Triage alerts and determine if further investigation or action is required by the customer
Assist customers with the investigation and response of incidents throughout the incident response process
Perform investigations of customer requests and be able to provide further contextual information along with recommended actions
Proactively threat hunt using network and host data within customer environments
Mentor junior analysts
Required Qualifications
Ability to analyze packet captures/data and logs to perform incident response and identify potential compromises to customer networks
Possesses a solid understanding of the TCP/IP protocol suite, security architecture, and common TTP's (tactics, techniques, and procedures) used by threat actors
Experience analyzing both log and packet data in a SIEM (RSA NetWitness, Azure Sentinel, Splunk, etc.)
Strong understanding of incident response methodologies and reporting
Experience using ticketing systems for tracking (JIRA, Remedy, ServiceNow, etc.)
Strong verbal/written communication and interpersonal skills are required to document and communicate findings, escalate critical incidents, and interact with customers
Preferred Qualifications
Minimum of 3+ years of experience performing triage/incident response in enterprise environments
Minimum of 3+ years of experience performing forensic analysis of logs and packet captures to identify malicious artifacts
Higher level security certifications (CEH, GCIH, GCFA, GCFE, GCTI, GCIA, GREM, GPEN, GFNA, OCSP)
Strong research background and an analytical approach, especially with respect to event classification, event correlation, and root cause analysis
A mentoring/leadership background including mentoring other analysts and orchestrating team efforts for problem solving
Ability to manage projects to completion both individually and in a group
Benefits Include:
Health Insurance 80% paid by employer
Dental Insurance 80% paid by employer
Vision Insurance 80% paid by employer
Self- Managed vacation leave
Paid sick leave
Paid holiday leave
All candidates must be eligible to work in the U.S. for any employer. We are an E-Verify employer.
Lumifi welcomes and encourages diversity in our workplace. All qualified applicants will receive consideration for employment without regard to race color, religion, sex, sexual orientation, gender identity, national origin or disability.
Powered by JazzHR
6oXedfgOJk
$87k-119k yearly est. 20d ago
Information Security Analyst - IAM / CyberArk
Stratacuity
Security engineer job in Chandler, AZ
Job Title: Information Security Analyst - IAM / CyberArk Client: Large Financial Services Institution Pay Range: $53.60 - $56.60/hr Contract Length: 18 months * Manage customer tickets in JIRA (approx. 300+ per month).
* Review submitted service accounts and determine eligibility for vaulting in CyberArk based on predefined criteria.
* Process involves cross-referencing multiple source files and following documented procedures.
Key Skills & Experience:
* 4+ years of Information Security Analysis experience (or equivalent).
* Advanced Microsoft Office skills (Excel - VLOOKUPs, data connections, Power Query; PowerPoint).
* Experience with IAM tools (CyberArk, PAM solutions, HashiCorp).
* Familiarity with Tableau for reporting and analysis.
* Strong troubleshooting ability and attention to detail.
Advanced Microsoft Office Skills (PowerPoint, Excel - VLookups, data/connections, power queries) Experience with IAM Tools (CyberArk, PAM solutions, HashiCorp) Familiarity with Tableau
* MS Office Word, Excel, PowerPoint
2 - 4 Years
Cloud
2 - 4 Years
Cloud Security
2 - 4 Years
Cyber Security
2 - 4 Years
PowerBI and Tableau
2 - 4 Years
Tableau
2 - 4 Years
EEO Employer
Apex Systems is an equal opportunity employer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law. Apex will consider qualified applicants with criminal histories in a manner consistent with the requirements of applicable law. If you have visited our website in search of information on employment opportunities or to apply for a position, and you require an accommodation in using our website for a search or application, please contact our Employee Services Department at [email protected] or ************.
Apex Systems is a world-class IT services company that serves thousands of clients across the globe. When you join Apex, you become part of a team that values innovation, collaboration, and continuous learning. We offer quality career resources, training, certifications, development opportunities, and a comprehensive benefits package. Our commitment to excellence is reflected in many awards, including ClearlyRated's Best of Staffing in Talent Satisfaction in the United States and Great Place to Work in the United Kingdom and Mexico. Apex uses a virtual recruiter as part of the application process. Click here for more details.
Apex Benefits Overview: Apex offers a range of supplemental benefits, including medical, dental, vision, life, disability, and other insurance plans that offer an optional layer of financial protection. We offer an ESPP (employee stock purchase program) and a 401K program which allows you to contribute typically within 30 days of starting, with a company match after 12 months of tenure. Apex also offers a HSA (Health Savings Account on the HDHP plan), a SupportLinc Employee Assistance Program (EAP) with up to 8 free counseling sessions, a corporate discount savings program and other discounts. In terms of professional development, Apex hosts an on-demand training program, provides access to certification prep and a library of technical and leadership courses/books/seminars once you have 6+ months of tenure, and certification discounts and other perks to associations that include CompTIA and IIBA. Apex has a dedicated customer service team for our Consultants that can address questions around benefits and other resources, as well as a certified Career Coach. You can access a full list of our benefits, programs, support teams and resources within our 'Welcome Packet' as well, which an Apex team member can provide.
Employee Type:
Contract
Location:
Chandler, AZ, US
Job Type:
Date Posted:
January 14, 2026
Similar Jobs
* Information Security Data Analyst
* Principal SecurityEngineer, IAM
* Information Systems Analyst
* IAM Engineer
* Sr. GCS Cloud Security Analyst
$53.6-56.6 hourly 12d ago
Lead Information Security Analyst - GRC Project Leadership - Chandler
Msccn
Security engineer job in Chandler, AZ
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps. All positions are onsite, unless otherwise stated.
About this role:
Wells Fargo is seeking a Lead Information Security Analyst to join a dynamic team dedicated to safeguarding our customers and the company's most critical assets. In this pivotal role, you will provide technical leadership in Cybersecurity Governance, Risk, and Compliance while driving projects and mentoring team members to achieve exceptional results. You're the kind of person who can lead, is coachable and enjoys partnering with others to complete projects.
The position requires deep expertise in policy compliance and vulnerability management, with a strong focus on cryptography, encryption key lifecycle management, and digital certificate governance. The ideal candidate will have demonstrated experience in designing and implementing policy compliance or vulnerability management programs and leading initiatives or teams to successful completion. Most of all we need a person who can manage cyber projects, has keen organizational skills and is highly collaborative.
This is a hybrid role at Wells Fargo.
There is no Visa sponsorship or Visa Transfers.
The position is seated in the location posted on the requisition.
In this role, you will:
Provide advanced information security consultation for policy compliance, risk management, security controls and remediation monitoring
Lead projects and coordinate team efforts to ensure timely delivery of security initiatives
Direct information security risk assessment and research, and recommend remediation plans and strategies
Perform Governance, Risk, and Compliance activities to identify and prioritize key risk areas, monitor remediation, and escalate critical risks to senior management
Conduct user engagement on vulnerabilities and identified areas of policy non-adherence, report and advise on moderately complex remediation or mitigation plans
Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, encryption keys and digital certificates
Review and correlate technical data such as vulnerability or endpoint scanning reports (e.g., Qualys, Tanium), key and certificate management reports, and security logs
Analyze identified vulnerabilities, assess their potential impact, and prioritize remediation efforts based on risk levels
Develop and maintain security policies and procedures related to information protection, encryption, and certificate management
Create detailed process documentation and governance artifacts for security controls, metrics, and escalation routines
Desired Qualifications:
IT Security certification (CISSP, CRISC, GIAC, Cloud, etc)
Required Qualifications:
5+ years of Information Security experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
4+ years in a vulnerability management or governance, risk and compliance role, identifying and prioritizing areas of policy non-adherence, report development, remediation monitoring and escalation to senior management
Strong experience with vulnerability or endpoint scanning tools (e.g., Qualys, Tanium)
Solid understanding of cryptography, encryption key management, and digital certificate lifecycle
Proven ability to lead projects and/or teams, including planning, coordination, and delivery
Desired Qualifications:
IT Security certification (CISSP, CRISC, GIAC, Cloud, etc)
Demonstrated expertise of Governance, Risk and Compliance principles for monitoring adherence to Information Security policies
Experience with or strong conceptual understanding of data protection principles, frameworks and technologies
Knowledge of Cloud service providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) or MS Azure
Documentation skills including design diagrams, process flows, security controls and evidence archival
Proven ability to plan, manage, and deliver complex projects or security initiatives, including defining scope, setting timelines, coordinating resources, and ensuring successful outcomes
Knowledge of financial institution security procedures and data protection principles
Experience with Agile methodology and product delivery
Ability to communicate confidently and professionally
Ability to negotiate, influence, and collaborate to build successful relationships
Strong time management skills including the ability to handle multiple deliverables concurrently
Ability to influence across all organizational levels
Job Expectations:
Work independently and lead governance routines on a regular cadence
Identify security vulnerabilities, perform product mapping, conduct trend analysis, perform risk assessments, and evaluate remediation alternatives
Engage with stakeholders to monitor remediation and escalate critical risks
Prepare executive ready
Develop and maintain documentation for security controls and metrics, governance routines, escalation events, and consequence model
Drive continuous improvement in policy adherence monitoring, vulnerability management and cryptographic security processes
Posting End Date:
1 Feb 2026
*Job posting may come down early due to volume of applicants.
$78k-114k yearly est. 3d ago
Information Security Analyst 2
Rogers Corporation 4.8
Security engineer job in Chandler, AZ
This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
- Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
- Support data and asset risk.
- Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
- Address various security problems across a disperse set of assets.
- Other duties as assigned.
Qualifications:
- Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
- 2+ years of progressive cybersecurity experience
- Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
Full-Time
Rogers Corporation ("Rogers") maintains a continuing policy of non-discrimination in
employment. It is Rogers policy to provide equal opportunity and access for all persons, without
regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age,
disability, or status as a disabled veteran or other protected veteran, in all phases of the
employment process and in compliance with applicable federal, state, and local laws and
regulations.
$81k-124k yearly est. 43d ago
Lead Information Security Analyst - GRC Project Leadership
Wells Fargo 4.6
Security engineer job in Chandler, AZ
About this role: Wells Fargo is seeking a Lead Information Security Analyst to join a dynamic team dedicated to safeguarding our customers and the company's most critical assets. In this pivotal role, you will provide technical leadership in Cybersecurity Governance, Risk, and Compliance while driving projects and mentoring team members to achieve exceptional results. You're the kind of person who can lead, is coachable and enjoys partnering with others to complete projects.
The position requires deep expertise in policy compliance and vulnerability management, with a strong focus on cryptography, encryption key lifecycle management, and digital certificate governance. The ideal candidate will have demonstrated experience in designing and implementing policy compliance or vulnerability management programs and leading initiatives or teams to successful completion. Most of all we need a person who can manage cyber projects, has keen organizational skills and is highly collaborative.
This is a hybrid role at Wells Fargo.
There is no Visa sponsorship or Visa Transfers.
The position is seated in the location posted on the requisition.
In this role, you will:
* Provide advanced information security consultation for policy compliance, risk management, security controls and remediation monitoring
* Lead projects and coordinate team efforts to ensure timely delivery of security initiatives
* Direct information security risk assessment and research, and recommend remediation plans and strategies
* Perform Governance, Risk, and Compliance activities to identify and prioritize key risk areas, monitor remediation, and escalate critical risks to senior management
* Conduct user engagement on vulnerabilities and identified areas of policy non-adherence, report and advise on moderately complex remediation or mitigation plans
* Design, document, test, maintain, and provide issue resolution recommendations for moderately complex security solutions related to networking, cryptography, encryption keys and digital certificates
* Review and correlate technical data such as vulnerability or endpoint scanning reports (e.g., Qualys, Tanium), key and certificate management reports, and security logs
* Analyze identified vulnerabilities, assess their potential impact, and prioritize remediation efforts based on risk levels
* Develop and maintain security policies and procedures related to information protection, encryption, and certificate management
* Create detailed process documentation and governance artifacts for security controls, metrics, and escalation routines
Required Qualifications:
* 5+ years of Information Security experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
* 4+ years in a vulnerability management or governance, risk and compliance role, identifying and prioritizing areas of policy non-adherence, report development, remediation monitoring and escalation to senior management
* Strong experience with vulnerability or endpoint scanning tools (e.g., Qualys, Tanium)
* Solid understanding of cryptography, encryption key management, and digital certificate lifecycle
* Proven ability to lead projects and/or teams, including planning, coordination, and delivery
Desired Qualifications:
* IT Security certification (CISSP, CRISC, GIAC, Cloud, etc)
* Demonstrated expertise of Governance, Risk and Compliance principles for monitoring adherence to Information Security policies
* Experience with or strong conceptual understanding of data protection principles, frameworks and technologies
* Knowledge of Cloud service providers such as Amazon Web Services (AWS), Google Cloud Platform (GCP) or MS Azure
* Documentation skills including design diagrams, process flows, security controls and evidence archival
* Proven ability to plan, manage, and deliver complex projects or security initiatives, including defining scope, setting timelines, coordinating resources, and ensuring successful outcomes
* Knowledge of financial institution security procedures and data protection principles
* Experience with Agile methodology and product delivery
* Ability to communicate confidently and professionally
* Ability to negotiate, influence, and collaborate to build successful relationships
* Strong time management skills including the ability to handle multiple deliverables concurrently
* Ability to influence across all organizational levels
Job Expectations:
* Work independently and lead governance routines on a regular cadence
* Identify security vulnerabilities, perform product mapping, conduct trend analysis, perform risk assessments, and evaluate remediation alternatives
* Engage with stakeholders to monitor remediation and escalate critical risks
* Prepare executive ready
* Develop and maintain documentation for security controls and metrics, governance routines, escalation events, and consequence model
* Drive continuous improvement in policy adherence monitoring, vulnerability management and cryptographic security processes
Posting End Date:
2 Feb 2026
* Job posting may come down early due to volume of applicants.
We Value Equal Opportunity
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
Applicants with Disabilities
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo.
Drug and Alcohol Policy
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy to learn more.
Wells Fargo Recruitment and Hiring Requirements:
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
$81k-112k yearly est. 2d ago
Cyber Security Analyst - Vulnerability Management
Runbuggy Inc.
Security engineer job in Tempe, AZ
Requirements
What You Will Be Doing::
Responsible primarily for day-to-day product vulnerability management services and supporting infrastructure.
Ensure product vulnerabilities are identified, prioritized, and remediated, particularly by reducing the backlog of existing product vulnerabilities.
Ensure that releases and product changes are reviewed and approved by the Security Team.
Collaborate with engineering teams to understand product vulnerability management needs and assist with remediation and mitigation strategies.
Build relationships with various teams and technology owners to decrease the likelihood of friction or roadblocks.
Schedule and assist with remediation efforts from external and internal penetration tests and assessments.
Perform analysis of scan results, assign risk ratings for product vulnerabilities, and help prioritize remediation efforts.
Help establish and operationalize key performance indicators, reporting, and metrics to track the maturity of the product vulnerability program.
Oversee and help execute manual code review of key product components for security improvements.
Help drive the security and privacy product requirements process across RunBuggy's product lines, implementing security early in the product roadmap.
Execute on an agreed-upon risk prioritization framework in conjunction with engineering, product, development, operations, and the Sr. Director of Security and Audit who outlines the highest risk items for action to improve RunBuggy's product security.
Collaborate with product and sales engineering teams for hardening applications, APIs, and micro services with security built into the services.
Help influence new deployment models, including containers, cloud platforms, SaaS, etc., with security built into the platform.
Help drive identification of software security findings throughout the lifecycle and the reduction of risk, working with relevant stakeholders.
Maintain current knowledge of the RunBuggy threat landscape, including attacker tactics, techniques, and procedures.
Other duties as assigned.
What You Bring to the Team by Way of Skills and Experience:
Demonstrated understanding of cybersecurity threats and vulnerability management and related IT domains.
3+ years' relevant experience as a Vulnerability Analyst required.
A degree in Computer Science, IT, Systems Engineering, or a cybersecurity-related qualification is preferred.
Experienced as a security analyst supporting product vulnerability management processes in a cloud environment, such as AWS, EKS, Docker, etc.
Hands-on experience with vulnerability management tools such as AWS Inspector, SonarCube, etc.
Knowledge of containerized web application architecture and related vulnerabilities and issues.
Deep understanding of vulnerability management, including risk assessment and remediation planning.
Knowledge of the latest trends and awareness of current hacking techniques and cybercrime.
Understanding of secure cloud network architectures, including CloudFormation, Kubernetes, and MongoDB.
Experience with software development and delivery for a SaaS company.
Familiarity with cybersecurity frameworks, such as NIST CSF.
Attention to detail, QA skills, the ability to “think forward,” adept at problem solving and addressing issues and complications before they expand.
Certificates, Licenses, and/or Registrations:
Professional certifications such as Certified Ethical Hacker (CEH), Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or Certified Cloud Security Professional (CCSP) are preferred.
What is in it for You and Why you Should Apply:
Market-competitive pay based on education, experience, and location.
Highly competitive medical, dental, vision, Life w/ AD&D, Short-Term Disability insurance, Long-Term Disability insurance, pet insurance, identity theft protection, and a 401(k) retirement savings plan.
Employee wellness program.
Employee rewards, discounts, and recognition programs.
Generous company-paid holidays (12 per year), vacation, and sick time.
Paid paternity/maternity leave.
Monthly connectivity/home office stipend if working from home 5 days a week.
A supportive and positive space for you to grow and expand your career.
Pay Range Disclosure:
The advertised range represents the expected pay range for this position at the time of posting based on education, experience, skills, location, and other factors.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
RunBuggy is an equal-opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination, harassment, and retaliation on the basis of race, color, religion, sex (including gender identity and sexual orientation), pregnancy, parental status, national origin, age, disability, genetic information, or any other status protected under federal, state, or local law.
Applicants must be currently authorized to work in the United States.
Please, no agencies.
Salary Description $90k/yr.-$110k, DOE
$90k-110k yearly 22d ago
Cyber Security Analyst - 26-00507
Navitaspartners
Security engineer job in Mesa, AZ
Job DescriptionJob Title: Cyber Security AnalystLocation: Phoenix, AZ (Onsite/Hybrid as applicable) Duration: 6-Month ContractRole Overview
We are seeking an experienced Cyber Security Analyst to support the security, stability, and operational readiness of a newly implemented recording system within a complex IT infrastructure. The system operates on a Kubernetes-based, containerized platform, and this role plays a critical part in ensuring the environment is securely designed, properly configured, continuously monitored, and defensible from both a technical and governance perspective.
This position focuses on security oversight and operational assurance, rather than building the platform from the ground up. The analyst will collaborate closely with internal technical teams and external vendors to evaluate architecture, enforce security controls, and support ongoing operations in a highly regulated public-sector environment.
Key Responsibilities
Support the design review, security implementation, and operational readiness of a containerized recording system
Evaluate system architecture to ensure secure, stable, and compliant configurations
Implement and maintain security best practices across Kubernetes-based environments
Configure and manage access controls, monitoring, and logging mechanisms
Assist with vulnerability assessment, risk mitigation, and security hardening activities
Monitor system health, security events, and operational logs to identify and respond to potential risks
Collaborate with internal teams and third-party vendors to resolve security and operational issues
Ensure the platform meets reliability, security, and compliance expectations
Support governance, audit readiness, and documentation efforts as required
Contribute to maintaining a defensible security posture in a regulated public-sector environment
Required Skills & Experience
Practical, hands-on experience with Kubernetes and containerized platforms
Strong foundation in cybersecurity principles and best practices
Experience working in cloud or hybrid environments
Knowledge of:
Access control mechanisms
System monitoring and alerting
Centralized logging and log analysis
General infrastructure and application security
Ability to assess and secure systems without direct responsibility for platform build-out
Strong collaboration and communication skills
Preferred Skills & Experience
Experience supporting government systems or other highly regulated environments
Familiarity with compliance, governance, and audit requirements
Exposure to election infrastructure, public-sector IT, or similarly sensitive systems
Education Requirements
Bachelor's degree in a related field (e.g., Cybersecurity, Co
$75k-104k yearly est. 15d ago
Cyber Security Analyst
Washington Elementary School District 4.6
Security engineer job in Phoenix, AZ
Pay Grade: PP (Non-Exempt Support Staff Salary System) Department: Management Information Systems (MIS) Accountable To: Administrator of MIS FLSA Status: Non-Exempt Calendar: 261 Days Under general direction, incumbent is responsible for protecting the school district's
technology systems, networks, and data from unauthorized access and malicious threats. This includes monitoring security incidents, responding to breaches, managing security controls, and ensuring compliance with all relevant security protocols. The analyst also plays a role in fostering a security conscious culture among students and staff. Incumbent may travel to the various district sites.
Essential Functions:
* Threat detection and analysis: Actively monitor security alerts from various sources, including Security Information and Event Management (SIEM) systems, endpoint detection tools, and firewalls, etc.
* Incident response: Investigate and respond to security incidents such as malware infections, data breaches, and phishing attempts. Document root cause/incident response and report on all efforts.
* Security management: Assist in the management of security measures, including firewalls, endpoint protection, intrusion detection systems, and access controls.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Vulnerability management: Conduct regular vulnerability scans and risk assessments to identify weaknesses in the district's IT infrastructure. Research and recommend solutions to mitigate identified vulnerabilities and work with staff to address them.
* Security strategy: Contribute to the development and implementation of the district's overall cybersecurity strategy, including disaster recovery and backup methodologies.
* User education and awareness: Develop and deliver security awareness training to faculty, staff, and students. Promote security best practices for handling sensitive information across the district. Communicate with users regarding potential security violations and new security products or procedures.
* Collaboration: Work collaboratively with other IT staff, administrators, and external vendors to maintain a secure and efficient technology environment.
* Performs other job related duties as assigned.
Required Qualifications:
To be eligible for this position, an applicant must meet the following required qualifications. Verification of these required qualifications is necessary.
* High School diploma or equivalent (G.E.D.) prior to being hired;
* Valid Arizona Department of Transportation Driver's License;
* Minimum of one year of experience in information security, network security, or a related technology field.
* Strong understanding of network protocols, operating systems (Windows, mac OS, Chrome OS), and cloud services.
* Experience with security tools, including SIEM, antivirus software, and intrusion detection systems.
* Obtain and maintain a valid Arizona IVP Fingerprint Clearance Card.
Preferred Qualifications:
It is preferred that applicant possesses the following preferred qualifications; however, the following qualifications are not required to be eligible for this position.
* Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field; or an equivalent combination of education and experience demonstrating the necessary expertise.
* Relevant cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or CISSP.
* Experience working in an educational or public sector environment.
* Knowledge of emerging security technologies and trends.
* Experience administering a Cisco Local and Wide area networking environment;
* Experience with border network security devices such as Email filters and Firewalls;
* Experience administering Windows Server and Active Directory.
* Experience with VMWare and Veeam (or other backup and recovery platform)
Knowledge and Skills Required:
To perform the job successfully, an individual must be able to perform each essential duty satisfactorily. The qualifications for this job description are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Skills required, but not limited to, for this position include:
* Ability to work independently and collaboratively in a team environment.
* Proficiency with a range of security tools, such as SIEMs (e.g., Splunk), intrusion detection/prevention systems (IDS/IPS), and endpoint security solutions.
* Familiarity with scripting languages like Python or PowerShell for automating security tasks.
* Knowledge of common security frameworks, such as NIST.
* Understanding of networking concepts, firewalls, and data encryption techniques.
* Strong communication skills are essential for explaining complex technical topics to both technical and non-technical audiences.
* Excellent analytical, problem-solving, and communication skills, both written and verbal are critical for investigating security alerts and identifying vulnerabilities.
* Strong attention to detail is necessary for detecting subtle changes in network performance that may indicate a cyberattack.
Physical Requirements:
The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee is regularly required to sit; use hands to finger, handle, or feel; reach with hands and arms; and talk or hear. The employee frequently is required to walk. The employee is occasionally required to stand; climb or balance; stoop, kneel, crouch, or crawl; and taste or smell. The employee must regularly lift and/or move up to 10 pounds and frequently lift and/or move up to 50 pounds. Specific vision abilities required by this job include close vision, color vision, and ability to adjust focus.
Working Conditions:
The working environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
While performing the duties of this job, the employee can be exposed to varying extremes of temperatures. The noise level in the work environment is usually quiet, but in some areas like mechanical and data center rooms, the noise level can be elevated to loud levels.
The Washington Elementary School District is an Equal Employment Opportunity Employer in compliance with Title VI of the Civil Rights Act of 1964, Civil Rights Act Title VII of 1972, Title IX of the Education Amendments of 1972, Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act (ADA) of 1990. Washington Elementary School District does not discriminate on the basis of race, color, religion, national origin, sex, sexual orientation, gender identify or expression, disability or age in employment or in any of its educational programs or in the provisions of benefits and services to students. For information regarding discrimination grievance or complaint procedures contact the Executive Director for Human Resources at ************.
$48k-60k yearly est. 53d ago
Security Engineer
Sundt Construction 4.8
Security engineer job in Tempe, AZ
As a 100% employee-owned contractor, when you work at Sundt, you're not just hiring on at a company, you're joining a culture. Because everyone at Sundt is part owner, you'll join a team of people who are deeply invested in their work. From apprentices to managers, we're passionate about the details and deliberate in everything we do.
At Sundt we focus on building long-term prosperity for our clients, communities, and employee-owners. We offer competitive pay, industry-leading benefits including a 401k and employee stock ownership plan, incentive programs for craft and administrative employees as well as training that focuses on your personal and professional growth. We're driven by skill, grit and purpose. Join us as we strive to be the most skilled builder in America.
Job Summary
As a SecurityEngineer, you will play a crucial role in safeguarding our organization's digital assets and infrastructure. You will be responsible for implementing, managing, and maintaining security solutions and practices to protect against threats and vulnerabilities. Your role will involve close collaboration with various teams to ensure the security of our systems, applications, and data. This position is generally more focused on implementation and maintenance rather than strategy.
Key Responsibilities
1. Asset Security: Protect organizational assets, including data, hardware, and software, through the implementation of security policies and controls.
2. Communication and Network Security: Provide guidance on secure communication protocols and network infrastructure. Ensure the integrity and confidentiality of data transmitted across networks.
3. Identity and Access Management (IAM): Implement and manage IAM solutions to enforce access controls, authentication mechanisms, and user privileges. Ensure compliance with security policies and best practices.
4. Security Architecture and Engineering: Design and implement secure network and system architectures. Stay updated on emerging threats and technologies, and apply security measures accordingly.
5. Security Assessment and Testing: Perform regular vulnerability assessments, penetration testing, and security audits. Identify and remediate security weaknesses in systems and applications.
6. Security Operations: Monitor security alerts and incidents, analyze potential threats, and respond promptly to mitigate risks. Conduct root cause analysis and develop incident response plans.
7. Security and Risk Management: Evaluate and manage security risks. Develop and implement risk mitigation strategies and ensure compliance with relevant security standards and regulations.
8. Software Development Security: Collaborate with software development teams to integrate security practices into the software development lifecycle. Ensure secure coding practices and conduct security reviews.
Minimum Job Requirements
1. Ability to work independently and manage multiple tasks in a fast-paced environment.
2. Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent work experience.
3. Excellent problem-solving skills and attention to detail.
4. Experience with scripting and programming languages (e.g., Python, PowerShell) for automation and integration.
5. Minimum of 3-5 years of experience in cybersecurity or a related field.
6. Proficiency in security tools and technologies such as Office 365, Azure, Sentinel One EDR & XOR, Tenable Nessus, Microsoft Defender, and Proofpoint.
7. Relevant certifications such as CISSP, CISM, CEH, or equivalent preferred.
8. Strong communication and interpersonal skills for effective collaboration with cross-functional teams.
9. Strong knowledge of security frameworks and standards (e.g., CMMC, NIST, ISO 27001/27002).
Note: Job Description is subject to change at any time and may include other duties as assigned.
Physical Requirements
1. May stoop, kneel, or bend, on an occasional basis
2. Must be able to comply with all safety standards and procedures
3. Required to use hands to grasp, lift, handle, carry or feel objects on a frequent basis
4. Will interact with people and technology frequently during a shift/work day
5. Will lift, push or pull objects up to 50Ibs on an occasional basis.
6. Will sit, stand or walk short distances for up to the entire duration of a shift/work day.
7. Will use telephone, computer system, email, and other electronic devices on a frequent basis to communicate with internal and external customers or vendors
Safety Level
Non-Safety Sensitive
Note: Jobs with the Safety-Sensitive designation are those that include tasks or duties that the employer reasonably believes could affect the safety and health of the employee performing the task or others such as operating a vehicle, operating equipment, operating machinery or power tools, repairing/maintaining the operation of any vehicle/equipment, the handling/disposal/transport of hazardous materials, or the handling/treatment/disposal of potentially flammable/combustible materials.
Equal Opportunity Employer Statement: Sundt is committed to the equal treatment of all employees, and/or applicants for employment, and prohibits discrimination based on race, religion, sex (including pregnancy), sexual orientation, gender identity, color, age, disability, national origin, covered veteran status, genetic information; or any other classification protected by applicable Federal, state, or local laws.
Benefit list:
Market Competitive Salary (paid weekly)
Bonus Eligibility based on company, group, and individual performance
Employee Stock Ownership Plan & 401K
Industry Leading Health Coverage Starting Your First Day
Flexible Time Off (FTO)
Medical, Health Savings, and Wellness credits
Flexible Spending Accounts
Employee Assistance Program
Workplace Wellness Programs
Mental Health Program
Life and Disability Insurance
Employee-Owner Perks
Educational Assistance
Sundt Foundation - Charitable Employee-Owner's program
$87k-115k yearly est. Auto-Apply 50d ago
Information Security Analyst 2
Rogers Corporation 4.8
Security engineer job in Chandler, AZ
This role will provide information security direction, configuration, and operational support of key security tools, as well as broader interactions with enterprise staff to help mitigate security risks and advise the organization on security best practices.
Essential Functions:
* Defend against and/or mitigate system vulnerabilities related to network infrastructure devices and boundary defense through network and endpoint solution configuration.
* Support data and asset risk.
* Use data collected from a variety of cyber defense tools (e.g., Intrusion Detection System (IDS) alerts, firewalls, network traffic logs) to analyze events that occur within specific environments for the purposes of mitigating threats.
* Address various security problems across a disperse set of assets.
* Other duties as assigned.
Qualifications:
* Bachelor's Degree in Computer Science, Computer Information Systems or related field. May consider equivalent work experience in lieu of degree
* 2+ years of progressive cybersecurity experience
* Sound comprehension of Information Security practices, concepts, and theories for traditional Information Technology (IT) assets
How much does a security engineer earn in Avondale, AZ?
The average security engineer in Avondale, AZ earns between $74,000 and $143,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.