Infrastructure Security Engineer
Security engineer job in Lenexa, KS
Infrastructure Security Engineer
Compensation: $40-50 /hour, depending on experience
Inceed has partnered with a great company to help find a skilled Infrastructure Security Engineer to join their team!
Join a dynamic team in a company that values culture and work-life balance. As an Infrastructure Engineer, you will play a crucial role in designing and maintaining a secure hybrid infrastructure. This is an exciting opportunity for someone who thrives in a technical environment and is passionate about security compliance. Enjoy working in a supportive and collaborative setting where your skills and expertise will make a significant impact.
Key Responsibilities & Duties:
Design and manage Azure environments and Azure Virtual Desktop.
Ensure compliance with security frameworks like CMMC and NIST.
Administer Windows Server and Active Directory.
Implement and monitor network security.
Translate compliance requirements into technical controls.
Collaborate with high-level executives and cross-functional teams.
Required Qualifications & Experience:
Bachelor's degree in IT or 10 years of IT experience.
Proven experience with cloud and on-premises environments.
Strong understanding of CMMC or NIST frameworks.
Excellent written and verbal communication skills.
Strong analytical and troubleshooting skills.
Nice to Have Skills & Experience:
Experience with Hyper-V and VMware.
Knowledge of PowerShell scripting and automation.
Familiarity with vulnerability management and incident response.
Perks & Benefits:
3 different medical health insurance plans, dental, and vision insurance
Voluntary and Long-term disability insurance
Paid time off, 401k, and holiday pay
Weekly direct deposit or pay card deposit
If you are interested in learning more about the Infrastructure Security Engineer opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time.
We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them.
Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.
#IND
Security Engineer - Threat & Vulnerability
Security engineer job in Saint Louis, MO
We are seeking a Security Engineer II to support threat and vulnerability management across on-premises and cloud environments. This role focuses on identifying security risks, assessing vulnerabilities, ensuring secure configurations, and driving remediation efforts to improve overall security posture.
Key Responsibilities:
Identify, assess, and remediate vulnerabilities across on-prem and cloud environments (AWS/Azure/GCP)
Monitor and analyze threat intelligence using frameworks such as MITRE ATT&CK, OWASP, and CVSS
Utilize vulnerability and cloud security tools (Tenable, Qualys, Rapid7, Prisma Cloud, Defender for Cloud, Wiz)
Perform secure configuration audits using CIS Benchmarks, NIST, and STIGs
Collaborate with IT, Cloud, and DevOps teams to implement remediation
Automate security processes using scripting (Python, PowerShell, Bash)
Track remediation progress and communicate risks to technical and non-technical stakeholders
Required Skills & Experience:
4+ years of experience in Cybersecurity or IT with exposure to vulnerability or cloud security
Hands-on experience with vulnerability management tools
Strong understanding of security controls, risk management, and compliance
Experience with scripting/automation and API integrations
Familiarity with SIEM, logging, monitoring, and ticketing systems
Endpoint Security Engineer #10904
Security engineer job in Kansas City, MO
ECCO Select is a talent acquisition and consulting company specializing in people, process and technology solutions. We provide the talent behind the technology enabling our clients to achieve their goals. For more information about ECCO Select, visit us at *******************
Position Title: Endpoint Security Engineer
Location Information Kansas City Metro (Onsite)
Position Responsibilities:
The Endpoint Security Engineer will play a critical role within the IT security and operations team, responsible for the administration, implementation, and continual improvement of endpoint security solutions-primarily utilizing Microsoft Intune. The ideal candidate must possess advanced expertise in Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM), and be prepared to respond to security incidents beyond regular business hours. Experience with Jamf in Apple environments is an advantage.
Design, deploy, and manage the organization's Microsoft Intune environment for both corporate-owned and BYOD (Bring Your Own Device) devices, ensuring a secure yet seamless user experience.
Develop and maintain solutions for device enrollment, authentication, and complete lifecycle management utilizing Intune, while leveraging Jamf for Apple device environments when required.
Configure, optimize, and monitor Microsoft Intune settings for MDM and MAM across Windows, Android, and iOS devices to ensure security and compliance.
Establish and enforce device compliance policies, security baselines, encryption protocols, and remote wipe capabilities for rapid incident response.
Manage application deployment, app protection policies, and conditional access requirements via Intune and related tools.
Continuously monitor the performance of security solutions via analytics, logs, and user feedback; proactively identify areas for improvement to enhance protection and efficiency.
Lead or contribute to large-scale device migrations, OS upgrades, and mobility transformation projects, ensuring minimal business impact and service continuity.
Regularly monitor, investigate, and respond to endpoint threats, vulnerabilities, and anomalies; promptly remediate endpoint security incidents and collaborate with SOC and IT support teams for escalated security issues and rapid resolution.
Ensure that endpoint security implementations meet regulatory standards and internal governance requirements; stay up to date with relevant compliance frameworks (HIPAA, GDPR, SOC 2, etc.).
Generate detailed reports on device compliance, application usage, and security incidents, supplying metrics and documentation for audits and stakeholders as required.
Develop, refine, and deliver training sessions and materials for end-users and IT helpdesk staff on device enrollment, usage, and security best practices.
Provide Tier 2/3 support for complex endpoint security, mobility, and compliance issues; serve as a subject matter expert for cross-functional teams implementing security initiatives.
Promote a culture of continuous improvement by researching and recommending new endpoint security technologies, trends, and best practices; implement process and tool enhancements as appropriate.
Essential Skills, Experience
3-5 years of hands-on experience in administering and supporting Microsoft Intune, Office 365, and enterprise device security solutions.
Strong proficiency in configuring, managing, and troubleshooting Intune, Microsoft Endpoint Manager, and Azure Active Directory settings.
Proven expertise in designing, deploying, and supporting MDM/MAM solutions for large enterprise environments.
Comprehensive understanding of endpoint security principles, including antivirus, EDR, encryption, secure authentication, and access controls.
Practical experience with endpoint compliance and governance requirements; strong working knowledge of frameworks such as HIPAA, GDPR, or SOC 2 and involvement in audit processes.
Familiarity with automation and scripting tools (e.g., PowerShell, Bash) for task automation, device management, and mobile application deployment.
Demonstrated ability to manage multiple complex projects simultaneously, with excellent organizational, analytical, and documentation skills.
Knowledge of Active Directory, Group Policy Objects (GPO), and remote support tools for user and device management.
Exceptional interpersonal and communication skills, with a proven track record of successful cross-functional collaboration and the ability to operate independently or as part of a team.
Preferred: Hands-on experience with Jamf administration for mac OS and iOS device management, including policy configuration and endpoint protection.
Preparedness to provide support and incident response outside normal business hours as needed.
Qualifications:
Bachelor's degree in Computer Science, Information Security, or a related field (advanced degrees or relevant certifications are a plus).
Preferred certifications: Microsoft Certified (Intune, Azure, or Endpoint Manager), Jamf Certification.
ECCO Select is committed to hiring and retaining a diverse workforce. Our policy is to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. Veterans of our United States Uniformed Services are specifically encouraged to apply for ECCO Select opportunities.
Equal Employment Opportunity is The Law
This Organization Participates in E-Verify
Senior Cloud Security Engineer
Security engineer job in Missouri
Immediate need for a talented Senior Cloud Security Engineer . This is a 04 months contract opportunity with long-term potential and is located in Elkhorn,NE(Remote). Please review the job description below and contact me ASAP if you are interested.
Job ID:25-94911
Pay Range: $90 - $91.19/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision), 401(k) plan, and paid sick leave (depending on work location).
Key Responsibilities:
Deploy and configure container scanning tools to ensure secure containerized environments.
Analyze vulnerabilities identified through SAST, DAST, SCA, and container scans, prioritizing remediation based on risk.
Develop and maintain custom scripts to automate security processes and enhance scanning capabilities.
Consult with development teams to provide secure coding guidance and assist with remediation strategies.
Onboard applications into DAST scanning workflows, ensuring proper configuration and coverage.
Configure and troubleshoot DAST scans, resolving issues related to application accessibility and scan accuracy.
Review and validate SAST and SCA findings, confirming or rejecting false positives and “mitigated by design” claims from development teams.
Document findings, create actionable reports, and communicate technical details effectively to stakeholders.
Key Requirements and Technology Experience:
Key Skills; Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk).
Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security).
Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration.
Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10).
Strong experience with application security tools: DAST (e.g., Burp Suite, OWASP ZAP), SAST (e.g., Checkmarx, Veracode), and SCA (e.g., Black Duck, Snyk).
Hands-on experience with container security and deployment of scanning tools (e.g., Wiz, Prisma, Aqua Security).
Proficiency in scripting languages (Python, Bash, or PowerShell) for automation and tool integration.
Deep understanding of secure software development lifecycle (SDLC) and common vulnerabilities (OWASP Top 10).
Ability to troubleshoot complex scanning issues and optimize configurations for accuracy and performance.
Strong analytical skills for vulnerability triage and risk prioritization.
Excellent communication skills for consulting with development teams and explaining technical findings.
Experience integrating security tools into CI/CD pipelines.
Familiarity with cloud-native security (AWS, Azure, GCP) and container orchestration (Kubernetes).
Knowledge of API security testing and microservices architecture.
Exposure to DevSecOps practices and security automation frameworks.
Relevant certifications such as OSWE, GWAPT, or CSSLP.
Our client is a leading Financial Industry, and we are currently interviewing to fill this and other similar contract positions. If you are interested in this position, please apply online for immediate consideration.
Pyramid Consulting, Inc. provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, colour, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.
By applying to our jobs you agree to receive calls, AI-generated calls, text messages, or emails from Pyramid Consulting, Inc. and its affiliates, and contracted partners. Frequency varies for text messages. Message and data rates may apply. Carriers are not liable for delayed or undelivered messages. You can reply STOP to cancel and HELP for help. You can access our privacy policy here.
Information Security Engineer
Security engineer job in Overland Park, KS
Akkodis
is seeking an
Information Security Engineer
for a
Contract
with a client located in
Overland Park, KS (Remote).
Pay Range:
$60/hr - $70/hr, The rate may be negotiable based on experience, education, geographic location, and other factors
Must come from the Financial industry, has experience implementing SIEM, SASE/SSE, EDR/MDR, etc, has AWS or Azure as a cloud, CIS, NIST, ISO 27001, Okta or IAM, and SentinelOne experience is preferred.
Job Description:
We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision.
If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture, you'll feel right at home here.
What You'll Do:
Engineer and operate modern security platforms.
Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies.
Conduct deep-dive security assessments.
Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions.
Cloud Platform Focus:
The client operates in a hybrid environment, primarily in Azure, with some AWS and on-prem infrastructure.
Core Security Tooling:
SentinelOne experience is preferred, but candidates with experience using other tools are strongly considered as long as they have solid, overarching experience across SIEM, EDR, and vulnerability management platforms.
Strengthen core security operations.
Support and mature processes such as:
Malware response and remediation
Vulnerability management and patch governance
SIEM log analysis, correlation, and monitoring
Incident documentation, reporting, and lifecycle management
Improve systems by design-not by accident.
Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations.
Contribute through data, insights, and experimentation.
Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement.
What Makes This Role Unique:
Technical leadership that “gets it.”
You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves.
Security is built on innovation, not stagnation.
Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls.
Access to state-of-the-art platforms.
Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry.
High-rigor environment with real impact.
Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction.
Collaboration with top industry partners.
Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program.
Opportunities for broad domain depth.
Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more.
What You Bring:
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience
3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus.
Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems.
Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions.
Ability to operate with autonomy, accountability, and comfort in fast-moving environments.
Exceptional communication and collaboration skills with the ability to influence across teams.
Analytical mindset with a high bar for detail, documentation, and operational excellence.
If you are interested in this role, then please click
APPLY NOW
. For other opportunities available at
Akkodis
, or any questions, please contact
Anirudh Srivastava at ************ or ***********************************.
Equal Opportunity Employer/Veterans/Disabled
Benefit offerings include medical, dental, vision, term life insurance, short-term disability insurance, additional voluntary benefits, commuter benefits, and a 401K plan. Our program provides employees the flexibility to choose the type of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria.
Disclaimer:
These benefit offerings do not apply to client-recruited jobs and jobs that are direct hires to a client.
To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit
******************************************
Cyber Security Operations Engineer
Security engineer job in Tulsa, OK
The CSOC Operations Engineer III position is a technical leader responsible for the tactical execution of incident response, threat detection and continuous improvement of solutions which defend and protect our computer systems, information, and networks from intentional or unintentional access, modification, or destruction. This position is responsible for technical leadership in the design, planning, documenting and support of projects and cyber security solutions for the company. This position needs to intently focus on prioritization and always seek the improvement of processes and tools, providing recommendations to engineering and architecture teams. A successful CSOC Operations Engineer III will have a multidisciplinary background beyond cyber security, with advanced knowledge in fields such as client and server systems, networking, and application development. This position will also be responsible for ensuring systems and processes follow regulatory requirements, such as PCI-DSS, HIPAA and SOX. This position is responsible for the mentorship of other IT staff and performs third level support for incidents and issues.
Major functions for this position
Cyber Security Incident Response - 15% of total job
Lead Cyber Security Incident Response as an incident owner, direct incident response activities, provide real-time decision making and communicate with the incident commander.
Function as a threat hunter, working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests and reviewing vulnerability assessments.
Continuously develop and improve security technologies, focusing on the development of automation and orchestration capabilities as it relates to incident response.
Coordinate documentation of activities during an incident and provide status updates to the incident commander during the life cycle of the incident.
Participate in post-mortem collections and after-action reviews to identify and remediate gaps in processes and technologies.
Participate in regular table-top sessions with the CSIRT and E-CSIRT teams to evaluate readiness, address changes in company, external cyber security threats and impact.
Participate in after action reviews to identify and remediate gaps in process or technologies.
Cyber Security Infrastructure Operations - 60% of total job
Serve as an escalation point for all cyber security infrastructure operational issues during business hours and on-call for junior members of the team.
Provide third tier support and subject matter expertise for all cyber security technologies and solutions.
Work with the CSOC Principal and Manager to provide the team with tactical direction of operational technology capabilities focused on continuous improvement.
Guide Security Engineering with necessary support as needed during IT projects with Cyber Security needs.
Ensure project transitions meet CSOC operational standards for needed functionality, prevention, monitoring, detection, and response.
Cyber Security Threat Operations - 15% of total job
Perform third tier analysis of exploits such as malware, network intrusions, and unauthorized use to help determine attack-surface, patient zero, and possible pivot-points for escalation.
Provide technical leadership to the team and guidance in investigating escalated notable/suspicious events and the latest investigation techniques, containment and mitigation methods, evidence handling standards, threat intelligence, playbook development and case documentation best practices.
Participate in the Cyber Security Risk Scoring process to include scoring risks, providing remediation or compensating control guidance and risk remediation/mitigation validation.
Stay current on monitoring, detection, prevention, analysis, and investigation techniques/tools and adversary techniques, to implement recommendations for improving cyber security event processes, procedures and tooling.
Participate in regular technical table-top sessions with the cyber security teams to evaluate readiness, address changes in company, external cyber security threats and impact.
Participate in after action reviews to identify and remediate gaps in process or technologies.
Technical Leadership - 10% of total job
Provide leadership and mentoring to IT staff in the following manner.
Coordinate or lead necessary training to develop staff.
Ensure that appropriate technology is implemented in the appropriate manner.
Provide timely and effective communication of changes to processes and technologies.
Maintain technical competence and relevance on existing and emerging cyber security, infrastructure, and automation technologies.
Conceive, define, develop, and deploy tools/processes which help automate our cyber security technologies to produce higher business value.
Help develop cyber security awareness content and provide education on security policies and practices both internal and external to the group.
Routinely evaluate documentation provided by Security Engineering staff to ensure complete coverage of required diagrams, support articles, and other necessary documentation.
Position Specifications:
The required specifications (education, experience, and skills) are those that the employee must have to hold the position. Applicants applying for this position must possess the required specifications in order to be considered for the job. The desired specifications are those that are not required for the employee to hold the position, but the employee should try to obtain the desired education, experience, and/or skills to be effective and successful in the position.
Required education:
Bachelors in relevant field or the equivalent combination of education and experience.
Desired education:
Bachelor's degree in Cyber Security or a degree in a technology related field.
Multiple industry certifications in Security, Systems Administration, and/or Networking, such as CISSP, GDSA, CCNP Security, or PCNSE.
Required experience:
Minimum of 8 years of progressive experience with cyber security technology design, administration or incident response in large, complex environments, particularly in multi-region retail.
Advanced expertise in cryptography, network defense, endpoint protection, forensics, data protection, and incident response.
Advanced understanding of data center technologies and concepts including services, security, infrastructure design, disaster recovery practices.
Advanced level troubleshooting of IT systems.
In depth knowledge of compliance standards such as HIPAA, PCI, and SOX.
Experience mentoring, training, and developing other IT staff.
Desired experience:
Advanced experience in all aspects of cyber security technologies and knowledge in supporting and building large, complex cyber security environments.
Experience planning and implementing a technical backlog to drive continuous improvement of technology and practices.
Required skills:
Advanced knowledge of multiple cyber security technologies, including next generation firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, data protection, credential vaulting, certificate management, Multi-Factor, access brokering, SIEM, public cloud compliance and Cybersecurity automation and orchestration technologies.
Advanced experience in planning and tracking the execution of large and complex projects or other efforts.
Experience in scripting or software development.
The ability to communicate effectively to both business and IT staff in a professional manner.
Desired skills:
Working experience with Active Directory and Microsoft
and/or Linux OS, networking, identity and access management, wireless networking and security, penetration testing, incident response, and application security methodologies.
Understanding of encryption systems and methodology.
Advanced experience in software development or secure coding techniques.
This position will require shift work that could include weekends and nights as dictated by support needs. On call 24/7. Must have knowledge of many areas and be able to switch between them rapidly. Must be able to work under pressure and provide guidance to Information Technology and business users during a crisis. This position will require ability to maintain absolute confidentiality of information or events due to the sensitivity of their natures.
Cyber Security Analyst
Security engineer job in Tulsa, OK
The Mid-Level Cyber Analyst plays a key role in securing enterprise systems through proactive monitoring, advanced threat analysis, and incident response. The role involves collaboration with IT, engineering, and compliance teams to improve the organization's overall security posture.
Key Responsibilities
Lead analysis of complex security incidents and drive incident response efforts.
Develop detection rules, tuning SIEM use cases, and creating actionable alerts.
Conduct vulnerability assessments and partner with infrastructure teams for remediation.
Support endpoint detection and response (EDR) and network intrusion detection (NIDS/NIPS) tuning.
Perform threat hunting and forensic analysis to identify indicators of compromise (IoCs).
Assist in designing and implementing security controls for new technologies or projects.
Mentor junior analysts and support continuous process improvement in SOC operations.
Qualifications
Bachelor's degree in Cybersecurity, Computer Science, or related discipline.
Must be a US Citizen or Permanent resident
3-5 years of experience in security operations, incident response, or network defense.
Expertise with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and vulnerability management platforms.
Knowledge of MITRE ATT&CK framework and common attack vectors.
Certifications such as CompTIA CySA+, CEH, GCIH, or CISSP (in progress) preferred.
Strong analytical, scripting (Python, PowerShell), and communication skills.
Ai Systems Engineer
Security engineer job in Springfield, MO
The DoD AI Program Office leads the integration of AI capabilities into the National Geospatial-Intelligence Agency (NGA) and the National System for Geospatial-Intelligence (NSG). This role ensures the end-to-end engineering and integration of AI-driven solutions, overseeing the development of systems infrastructure, including hardware and software implementation.
Responsibilities:
Lead requirements engineering, solutions development, and systems integration across NSG, ASG, and Federal Agencies.
Provide technical planning, scheduling, reliability, and resiliency analysis for enterprise AI solutions.
Support requirements traceability, architecture analysis, and workflow optimization, including cloud service capabilities.
Advise on solution design modifications based on evolving mission requirements and technology advancements.
Conduct Analysis of Alternatives (AoAs), Course of Action (CoA) assessments, Trade Studies, and Engineering Assessments.
Oversee operational technical planning, project management, performance engineering, risk management, and interface design.
Lead the integration of a DoD AI/ML program across NGA, Defense Intelligence Enterprise (DIE), and the Intelligence Community (IC).
Provide technical oversight to Mid- and Junior-level contractor Systems Engineers.
Demonstrate deep understanding of DIE, NSG, ASG, and NRO enterprises.
Required:
Education & Experience:
Bachelor's degree in Computer Science, Information Systems, or a related discipline.
6+ years of experience in the DoD and/or Intelligence Community.
12+ years of experience in government or industry supporting: § DoD/IC Acquisition Process, Requirements Process, PPBE Process, or § Systems engineering for large, complex System of Systems or Service-Oriented Architecture/Cloud environments.
Technical Expertise:
Strong understanding of the systems engineering lifecycle and SAFe development.
6+ years of experience working with Department of Defense Architectural Framework (DoDAF) standards.
Experience working with Model-Based Systems Engineering (MBSE).
Proficiency in systems engineering tools and methodologies.
Desired:
Advanced Education & Certifications:
Master's degree in Systems Engineering or a related STEM field.
Software Development Framework certification.
Technical Expertise & Tools:
Knowledge of Model-Based Systems Engineering (MBSE), tools, and languages.
Experience engineering solutions with: § Cloud-based technologies § Big Data (structured/unstructured) § Automation, Augmentation, and Artificial Intelligence
Expertise in geospatial intelligence and related disciplines.
Location:
Springfield, VA
This position is on site and there is no remote availability
Clearance Requirement:
Active TS/SCI and CI Polygraph
Applicant MUST hold a permanent U.S. citizenship for this position in accordance with government contract requirements.
Kavaliro provides Equal Employment Opportunities to all employees and applicants. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Kavaliro is committed to the full inclusion of all qualified individuals. In keeping with our commitment, Kavaliro will take the steps to assure that people with disabilities are provided reasonable accommodations. Accordingly, if reasonable accommodation is required to fully participate in the job application or interview process, to perform the essential functions of the position, and/or to receive all other benefits and privileges of employment, please respond to this posting to connect with a company representative.
System Engineer
Security engineer job in Saint Louis, MO
**** No 3rd party resumes or C2C****
Systems Engineer (Microsoft Engineer)
Pay Rate: $60-65/hr. ($125-130K when Direct-hire)
Full-time hours each week
Duration: 6 month contract-to-hire
Benefits offered
Hybrid Schedule: 2 days a week onsite, 3 days remote.
Location: St. Louis, MO
****Top Skills: Microsoft 365 environment-specifically Exchange, SharePoint, OneDrive, Teams
Job Summary
The Systems Microsoft Engineer will design, implement, manage, and support the organization's Microsoft 365 environment-specifically Exchange, SharePoint, OneDrive, Teams, and related compliance/governance tools. This role ensures high performance, security, and user adoption across the digital workplace. The engineer will handle daily administration, ticket requests, technical troubleshooting, data governance, analytics reporting, and serve as a subject matter expert during major incidents. Collaboration with IT, Security, Communications, and end users is key, along with providing training and guiding the business on best practices and new features.
Must-Have Skills & Experience
Strong knowledge and hands-on administration of Microsoft 365(SharePoint, OneDrive, Teams, Exchange, compliance/governance).
Advanced expertise in SharePoint, OneDrive, and Teams.
Proficiency in PowerShell scripting for automation and administration.
Experience managing users, groups, policies, and cloud storage in Microsoft 365.
Solid understanding of security best practices and compliance requirements (data retention, classification, governance).
Strong troubleshooting and diagnostic skills.
Experience working in hybrid cloud environments.
Nice to Have / Preferred
(Not essential but helpful)
Experience with Microsoft Entra, Purview, Defender.
Experience with Microsoft Copilot or other AI productivity tools.
Familiarity with data security tools like Varonis, Egnyte, Sentra.
Microsoft certifications (MS-900, MS-700, MS-203, MD-102, MS-102).
SAFe certifications.
Network Engineer (Cisco IOS and NX-OS Expert) - 3 Months (Short Term Contract)
Security engineer job in Kansas City, MO
Certifications (Highly Desired):
CCNA (Cisco Certified Network Associate): Often a minimum requirement.
CCNP (Cisco Certified Network Professional): Preferred for mid-to-senior roles.
Technical Expertise:
Deep knowledge of the TCP/IP suite and fundamental networking concepts.
Expertise in Cisco IOS and NX-OS.
Experience with WAN technologies (MPLS, VPNs) and wireless networking.
Familiarity with cloud networking concepts (AWS, Azure, or Cisco Meraki Cloud).
Soft Skills:
Strong Analytical and Problem-Solving Skills (critical for complex troubleshooting).
Excellent written and verbal communication.
Ability to manage multiple projects and priorities effective.
Manager of Information Security
Security engineer job in Kansas City, MO
Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives.
Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption.
Assists in audits of the Information Security program as needed at the request of management.
Uses leadership skills to train, motivate and direct assigned staff.
Provides technical expertise in the selection, testing, implementation and deployment of information security systems.
Provides technical guidance and direction in information security monitoring, assessment, auditing and testing.
Defines, develops and implements the firm's Information Protection Program security policy.
Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency.
Assists in determining department work procedures, plans, assigns and directs work as necessary.
Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner.
Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice.
Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame.
Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards.
Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected.
Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents or disaster recovery and business continuity operations.
Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
Cyber Security Operations Analyst
Security engineer job in Tulsa, OK
The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.)
DUTIES AND RESPONSIBILITIES
The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary.
1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action.
2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies.
3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team.
4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking.
5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting.
6. Assists with internal and external audits by collecting necessary documentation and evidence.
7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles.
8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs.
9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance.
10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists.
11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions.
12. Participates in a scheduled on-call rotation for after-hours and weekend security support.
REQUIREMENTS
· Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress).
Knowledge, Skills and Abilities
· Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company.
· Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements.
· Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration.
· Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools.
· Knowledge of TSA security requirements and regulations.
· Knowledge of identity management processes and procedures.
· Skill in project management.
· Ability to manage, track and analyze information.
· Ability to effectively work and cooperate with supervisors, co-workers, and vendors.
· Ability to follow corporate policies and the directions of supervisors.
· Ability to refrain from causing or contributing to the disruption of the workplace.
Manager - Security Architect
Security engineer job in Rogers, AR
At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.
**Manager - Security Architect**
**The opportunity**
We're hiring an experienced Security Architect that is an expert in the modern security threat and mitigation environment. Knowledge of the use of security in the development of applications (threat model development) best practices for security in the design architecture of applications. The use of AI in SEIM/MDR/MXDR and/or the analysis of behavioral threats. The successful candidate should have experience in the emerging area of AI based attack vectors and be able to devise successful mitigation. The candidate should thrive in fast-paced environments and are passionate about enabling scalable AI solutions.
**Your key responsibilities**
+ Develop effective security designs for implementation into enterprise applications and internal EY platforms.
+ Support security tool selection and verification.
+ Develop best practices for security design patterns in AI native applications.
+ Execute security assessments based on experience and select AI and conventional code analysis tools.
+ Assess new proposed projects to insure they are leveraging best security practices architecture design and implementation.
+ Collaborate with other architectural experts in AI, Data and Infrastructure to insure balanced and practical outcomes.
+ Support strategic business development activities for emerging technology.
**Skills and attributes for success**
+ Strong analytical and troubleshooting skills.
+ Ability to lead security architectural product functions and mentor junior engineers.
+ Comfortable working across cross-functional teams and managing competing priorities.
+ Build and manage strong internal and external partnerships by fostering trust, empathy, and mutual value.
+ Leverage emotional agility and hybrid collaboration to navigate diverse stakeholder needs and drive long-term engagement.
+ Use critical thinking and creative reasoning to address complex problems and exceed expectations.
+ Align cross-functional teams around shared goals, ensuring accountability and progress. Use emotional intelligence and hybrid collaboration to motivate others and deliver high-impact results.
**T** **o qualify you must have**
+ 5-10+ years of experience in security engineering and architecture for products.
+ Understand security and safety in an AI environment (Guardrails, Adversarial attacks, output validation etc..)
+ Use of security tooling for application verification in Github Advance Security, Checkmarx JFrog, DAST, etc..
+ Understand threat model development and verified implementation.
+ Familiarity with security certifications and appropriate use for best practices development OWASP etc....
+ Expertise in the assessment of security best practices of agile development process
+ Expertise in the development and adoption of security first best practices.
**Ideally, you'll also have**
+ Experience with large-scale cross functional software development projects.
+ Excellent communication and leadership abilities.
**What we offer you**
At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
+ We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $125,500 to $230,200. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $150,700 to $261,600. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
+ Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
+ Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
Ethical Hacker - Overland Park, KS ( Only Citizens )
Security engineer job in Overland Park, KS
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Information Security Specialist
Security engineer job in Saint Louis, MO
Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers.
Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations.
For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US.
Job Description
Responsibilities:
Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios.
Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
Qualifications
Required Skills/Experience
• 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role
• Knowledge of quantitative and qualitative risk evaluation methods
• An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
• Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
• An ability to effectively influence others to modify their opinions, plans, or behaviors
• An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
• Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
• An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
• Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement
Additional Information
To set up an inerview for this position, feel free to contact:
Imran Malek
************
*******************************
Easy ApplyData Security Analyst
Security engineer job in Saint Louis, MO
Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning.
What You'll Be Doing
Monitor security service performance and availability: Provide recommendations on security equipment, software, and services
On-going investigation: Inspect information security alarms and events to determine vulnerability and impact
Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk
Participate in architecture reviews: Ensure adherence to information security architecture
Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents
Design and deliver programs: Create education and training programs on information security and privacy matters
The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* *************************
"Delivering quality solutions through quality people"
Easy ApplyInformation Security Risk & Compliance Analyst
Security engineer job in Oklahoma City, OK
The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise.
The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment.
Key Result Areas:
Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including:
Develop and maintain enterprise security policies and procedures
Assist in the coordination and completion of information security risk assessments and documentation
Work with information security management to develop strategies and plans to enforce security requirements and address identified risks
Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance
Work with IT department and members of the information security team to identify, select and implement technical controls
Provide direct support to the business and IT staff for security related
Maintain an awareness of security and control issues in emerging technologies
Perform other duties as assigned
Knowledge, skills, and experience required:
Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience
Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.)
Strong analytical and problem-solving skills to enable effective security incident and problem resolution
Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously
Ability to work well under minimal supervision
Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel
Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting
Strong customer/client focus with the ability to manage expectations appropriately
General understanding of risk management
Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC
Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas)
Preferred Qualifications:
Understanding of enterprise risk management systems and automation platforms
Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions
*This position is on-site located in Oklahoma City, must reside within the area to be considered.
*Position requires a minimum of 3 years of relevant US based experience.
#LI-Onsite
#LI-DNI
AV & Security Systems Specialist
Security engineer job in Miami, OK
Full-time Description
The AV and Security Implementation Specialist is responsible for the installation, configuration, maintenance, and integration of audio-visual and surveillance systems. This role ensures high-quality, secure, and compliant technology deployments while consistently demonstrating professionalism, collaboration, and confidentiality.
Core Responsibilities
Installation & Setup
Install and configure CCTV systems, IP cameras, access control devices, alarm systems, and AV solutions such as projectors, microphones, TVs, video walls, video distribution systems, digital signage solutions, and conferencing systems.
Run and terminate cabling (Cat6, coaxial, fiber, etc.) for AV and surveillance installations.
Execute work within deadlines, ensuring tasks are completed with quality and precision, whether supervised or unsupervised.
System Integration & Implementation
Integrate AV and surveillance systems with network infrastructure and existing systems.
Customize system configurations for site-specific needs.
Conduct system testing, calibration, and assurance of full functionality before handoff.
Maintenance & Troubleshooting
Perform routine inspections, preventive maintenance, and reactive support.
Troubleshoot hardware/software issues independently and escalate when needed.
Document activity clearly and completely.
Professional Conduct & Collaboration
Interact professionally with coworkers, clients, vendors, and contractors.
Work both independently and as a team contributor on collaborative tasks.
Coordinate efforts across departments to support efficient project execution.
Uphold confidentiality standards for all proprietary, guest, and employer information.
Training & Documentation
Train users on equipment operation and basic troubleshooting procedures.
Prepare system guides, wiring diagrams, and documentation for internal use.
Project Coordination
Assist with AV and surveillance system rollout projects.
Support procurement efforts and liaise with vendors.
Follow all relevant work rules, safety standards, and company policies
Knowledge, Skills, and Abilities
Knowledge
Understanding of audio-visual systems, components, and integration techniques.
Familiarity with CCTV, IP camera, access control, and alarm systems technology.
Knowledge of network infrastructure, including IP configurations and routing principles.
Proficiency in reading and interpreting schematics, blueprints, and wiring diagrams.
Working knowledge of project management workflows and coordination best practices.
Skills
Strong technical troubleshooting and diagnostic ability across AV/security systems.
Proficient in cabling, wiring, and component installation (Cat6, coaxial, fiber).
Effective verbal and written communication, including documentation and reporting.
Skilled in conducting system testing, calibration, and configuration.
Adept at time management and meeting deadlines independently.
Competence in training users and explaining technical concepts in layman's terms.
Abilities
Work independently and prioritize tasks with minimal supervision.
Collaborate and contribute as a productive team member on diverse projects.
Maintain strict confidentiality of sensitive information and proprietary systems.
Professionally interact with clients, team members, and vendors.
Adhere to company policies, procedures, and workplace safety standards.
Flexibly adapt to changing technology, project needs, and field conditions.
Requirements
Education/Qualifications
Must be at least 21 years of age. High school diploma (or equivalent) required.
Requires strong PC and networking skills.
At least two years prior experience repairing and installing surveillance monitoring equipment or similar electronic components required.
Requires proficiency with Microsoft applications and electrical schematics and blueprints.
Requires a strong understanding of network infrastructure, including IP configuration and system integration.
Industry certifications preferred (e.g., CTS, CompTIA Network+, Axis Certified Professional)
Licensing
Must be able to obtain and maintain the required Gaming License.
Work Requirements
Requires problem solving skills, ability to multitask, strong math skills, computer skills, and the ability to communicate effectively orally and in writing. Position involves prolonged sitting, stooping or bending, climbing 10-foot ladders, using 30 foot lift, lifting or carrying up to 50 pounds, on a daily basis. Work is performed in a casino environment but is not limited to such, with varying levels of lighting, air quality, noise, and / or temperature.
Acknowledgment
I have read and understand the above . This job description is intended to describe the general nature and level of work being performed and not intended to be construed as an exhaustive list of all responsibilities, duties, and skills required. I assert that I can perform the essential duties, meet the physical requirements of this position, and satisfy the expectation for regular attendance.
Information Security Operations Analyst II
Security engineer job in OFallon, MO
Our Purpose
Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential.
Title and Summary
Information Security Operations Analyst IIOverview
The Security Awareness team is looking for an Information Security Operations Analyst II to drive continued improvements to the education and training offerings we have for our Mastercard colleagues. Our award winning SecurIT First program must continue to remain relevant and effective in how we keep security awareness top of mind for all employees and contingent staff.
The ideal candidate is passionate about the internal customer experience, is highly motivated, intellectually curious, analytical, and possesses an entrepreneurial mindset.
Role
In this Security Awareness position, you will:
• Liaise between the Security Awareness team and all others at Mastercard.
• Build new content and design awareness events to positively impact the security behaviors of Mastercard staff.
• Partner with external providers to deliver effectives solutions with quality and integrity.
• Manage our collaboration with the M&A Team and manage all Audit and Regulatory requests that come into our team.
All About You
The ideal candidate for this position should:
• Possess advanced knowledge in security awareness concepts and principals.
• Be comfortable meeting with business leaders to discuss and educate their teams about the desired security behaviors and how to influence and improve those behaviors.
• Be able to identify appropriate security awareness solutions to further reduce the human risk at Mastercard.
• Analyze, recognize and escalate trends in security behaviors and identify ways to improve our offerings.
• Lead vendor relationships with those providers of contract solutions for the Security Awareness program.
• A professional certification in Security Awareness is not required but highly encouraged.
Corporate Security Responsibility
Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must:
Abide by Mastercard's security policies and practices;
• Ensure the confidentiality and integrity of the information being accessed.
• Report any suspected information security violation or breach.
• Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly.
Corporate Security Responsibility
All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must:
Abide by Mastercard's security policies and practices;
Ensure the confidentiality and integrity of the information being accessed;
Report any suspected information security violation or breach, and
Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines.
In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations.
Pay Ranges
O'Fallon, Missouri: $76,000 - $127,000 USD
Auto-ApplyNetwork Engineer I
Security engineer job in Lowell, AR
Job Title:
Network Engineer I
Department:
IT, Telecom & Internet
Country:
United States of America
State/Province:
Arkansas
City:
Lowell
Full/Part Time:
Full time Under general supervision, this position provides first-line technical support for network issues, following defined processes for both internal and external connections. The incumbent will learn JB Hunt's network and grow an existing skillset to provide best-in-class support.
:
Key Responsibilities:
Delivers technical network support to clients local and remote
Monitors and addresses network alerts, outages, and concerns
Coordinates with Service Desk and other teams to resolve events
Completes tasks for network operations and new site startups, including contractor coordination and equipment setup
Ensures accurate documentation and monitoring for new sites
Assists on projects involving software-defined networking
Qualifications:
Minimum Qualification:
Bachelor's degree in Computer and Information Science, Engineering or other related fields of study, or foreign equivalent, or suitable combination of education, experience, and training, and/or military equivalent
Preferred Qualification:
Knowledge of basic routing and switching
Knowledge of any of the following: Cisco, Fortinet, Arista, F5 BigIP, Palo Alto, Juniper Mist, Azure or GCP
This position is not eligible for employment-based sponsorship.
Compensation:
Factors which may affect starting pay within this range may include skills, education, experience, geography, and other qualifications of the successful candidate. This position may be eligible for annual bonus and incentives based on profitability or volumes in accordance with the terms of the Company's bonus and incentive plans, as applicable and in effect from time to time.
Benefits:
The Company offers the following benefits for full-time positions, subject to applicable eligibility requirements, as may be in effect from time to time: medical benefit, dental benefit, vision benefit, 401(k) retirement plan, life insurance, short-term and long-term disability coverage, paid time off commensurate with tenure (includes vacation and sick time), six weeks of paid maternity leave along with two weeks of paid parental leave, and six paid holidays annually.
Education:
Bachelors: Chemical Engineering (Required), Bachelors: Civil Engineering (Required), Bachelors: Computer and Information Science (Required), Bachelors: Computer Engineering (Required), Bachelors: Electrical Engineering (Required), Bachelors: Industrial Engineering (Required), Bachelors: Mechanical Engineering (Required)
Work Experience:
Certifications:
Certified Network Associate (CCNA) - Cisco Systems, Inc., N+ (Network+) Certification - Computing Technology Industry Association (CompTIA)
Job Opening ID:
00609955 Network Engineer I (Open)
“This job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications required of employees assigned to this job.
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.”
J.B. Hunt Transport, Inc. is committed to basing employment decisions on the principles of equal employment opportunity without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, persons with disabilities, protected veterans or other bases by applicable law.
Auto-Apply