Cyber Security Engineer
Security engineer job in Milwaukee, WI
We're seeking a senior cybersecurity engineer to design, build, and operationalize enterprise grade data protection capabilities anchored in Microsoft E5. You will lead engineering for Microsoft Purview (Information Protection & DLP, eDiscovery/Audit), Sensitivity Labels, and related guardrails-integrating telemetry and enforcement through Zscaler, CrowdStrike, and Splunk. This role bridges secure-by-default platform engineering with pragmatic automation to protect regulated data (e.g., PHI/PII) at scale. Senior leadership has prioritized accelerating Copilot and E5 controls adoption, creating a high impact opportunity to shape how we protect data across SaaS and AI workloads.
What You'll Do
Engineer secure-by-default E5 data protection
• Design and implement Microsoft Purview DLP policies (endpoint, Exchange, SharePoint, OneDrive, Teams) and Sensitivity Label taxonomy with automated enforcement paths.
• Build policy-as-code pipelines (CI/CD) to version, test, and deploy DLP rules, label configs, and governance artifacts in multiple environments.
Integrate Zscaler, CrowdStrike, and Splunk
• Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics, dashboards, and detections that close visibility and enforcement loops.
• Leverage CrowdStrike telemetry (e.g., Falcon/Shield) to correlate endpoint behaviors with data movement signals for insider risk and exfiltration use cases.
Build automations & guardrails
• Develop services and workflows (e.g., Azure Functions, Logic Apps, Graph API) to auto remediate mislabels, revoke risky shares, and notify data owners.
• Implement secure-by-default configuration baselines and drift detection for E5 security controls (MCAS/Defender for Cloud Apps, Conditional Access, etc.).
Operate and continuously improve
• Own reliability for data protection pipelines: SLIs/SLOs, runbooks, and incident playbooks in partnership with Insider Risk team.
• Create Splunk content (data models, dashboards, correlation searches) aligned to exfiltration, anomalous access, and label violations.
• Partner with Privacy and Compliance for audit ready controls (eDiscovery/Audit), evidence, and exception processes.
Collaborate across security & platform teams
• Work with PSO, IAM, and Insider Risk to align label taxonomy and enforcement with business workflows and least privilege access.
• Provide technical leadership and mentoring for engineers/analysts rolling out new E5 features and operational support.
Required Qualifications
• 5+ years engineering experience in enterprise security or platform engineering; hands-on with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery).
• Proven expertise building policy as code for DLP/labels (GitHub/Azure DevOps), and automating Graph/PowerShell administration.
• Demonstrated ability to design secure-by-default guardrails and support rapid SaaS/AI adoption (including Copilot) without compromising compliance.
Nice to Have
• Strong background in data protection for regulated data (PII/PHI), insider risk detection, and evidence driven investigations.
• Production experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (TA configs, CIM, correlation searches).
• Experience migrating from legacy DLP (e.g., Forcepoint) to Microsoft DLP; building vendor neutral dictionaries and detection logic.
• Familiarity with MCAS/Defender for Cloud Apps, conditional access policies, and SSPM evaluations.
• Background in HIPAA/PHI audit support and exception governance workflows.
Success Metrics (first 6-12 months)
• DLP policy efficacy: reduction in unauthorized shares/exports; mean time to remediate violations.
• Label coverage & accuracy: % of sensitive content labelled; false positive/negative rate trends.
• Telemetry integration: end-to-end event flow (Purview → Zscaler/CrowdStrike → Splunk) with actionable detections.
• Secure-by-default adoption: # of guardrails implemented; drift detected/resolved; Copilot controls baselined.
• Audit readiness: evidence completeness for eDiscovery/Audit; exception closure rates.
Tools & Technologies (primary)
• Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk
• Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES)
• Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
• Data flows: Exchange/SharePoint/OneDrive/Slack, endpoints, web proxies, CASB/SSE
Senior Cyber Security Engineer - 4825
Security engineer job in Milwaukee, WI
About the Role
Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale.
Key Responsibilities
Engineer Secure-by-Default E5 Data Protection
Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams.
Develop and maintain Sensitivity Label taxonomy with automated enforcement paths.
Build Policy-as-Code Pipelines
Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments.
Integrate Security Telemetry
Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection.
Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios.
Develop Automations & Guardrails
Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners.
Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.).
Operate and Continuously Improve
Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks.
Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations.
Collaborate Across Teams
Partner with Privacy and Compliance for audit-ready controls and evidence processes.
Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows.
Provide technical leadership and mentorship for engineers and analysts implementing new E5 features.
Required Qualifications
5+ years of experience in enterprise security or platform engineering.
Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery).
Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell.
Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot.
Preferred Qualifications
Strong background in data protection for regulated data (PII/PHI) and insider-risk detection.
Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches).
Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies.
Knowledge of HIPAA/PHI audit support and exception governance workflows.
Success Metrics (First 6-12 Months)
Improved DLP policy efficacy and reduced unauthorized data movement.
Increased label coverage and accuracy for sensitive content.
End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk.
Secure-by-default adoption and Copilot controls baselined.
Audit readiness with complete evidence and exception closure rates.
Tools & Technologies
Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk
Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES)
Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
Cyber Palo Alto Networks Security Operations Senior Consultant
Security engineer job in Milwaukee, WI
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
+ Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
+ Integrate diverse log and telemetry sources, ensuring data quality and normalization.
+ Develop and optimize automated response workflows for incident containment and remediation.
+ Advise clients on advanced use cases, threat detection, and automation strategies.
+ Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
+ Present technical findings and recommendations to stakeholders.
Required Qualifications
+ BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
+ 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
+ 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
+ 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
+ 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
+ 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
+ 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
+ 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
+ Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
+ Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
+ Limited immigration sponsorship may be available
Preferred Qualifications
+ Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
+ Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
+ Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
+ Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
+ Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
+ Previous consulting or "Big 4" experience
+ Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
HPC System Security Engineer
Security engineer job in Park City, IL
Department
Provost Research Computing Center
About the Department
The University of Chicago Research Computing Center (RCC), a unit in the Office of Research, provides high-end research computing resources to researchers at the University of Chicago. It is dedicated to enabling research by providing access to centrally managed High-Performance Computing (HPC), storage, and visualization resources. These resources include hardware, software, high-level scientific and technical user support, and the education and training required to help researchers make full use of modern HPC technology and local and national supercomputing resources. The Office of Research oversees the conduct of sponsored research, research program development, and contract management functions.
Job Summary
The job participates in the design of automated, scalable, and rapidly deployable solutions to systems infrastructure and server configuration. Installs, configures, and maintains operating systems, monitoring and alerting systems, utility software, and firewalls. Plans and executes hands-on maintenance for production servers as well as Windows and Linux servers.
The University of Chicago is seeking a highly qualified HPC Systems Security Engineer to join the HPC Systems and Operations team that builds and manages RCC's HPC infrastructure. The individual in this position will be involved in the operation, maintenance, security, and compliance of large-scale complex HPC systems primarily used for research.
Responsibilities
Design, deploy, configure, and administer HPC clusters, including management and compute nodes, storage infrastructure, interconnects (e.g., InfiniBand), and related systems.
Develop, maintain, and enforce security procedures and system documentation for operational and compliance purposes.
Implement infrastructure and security monitoring and detection systems to identify failures, unusual activity and respond to automated alerts.
Tune, secure, and maintain the HPC job scheduling environment, including fair-sharing, accounting, and policy enforcement.
Troubleshoot and resolve operational, performance, and security-related issues across HPC hardware and software stacks. Coordinate with hardware and software vendors to address defects, vulnerabilities, and performance issues. Assist Computational Scientists team with user support and helpdesk tickets, including elevated support for security-protected environments.
Implement and maintain secure and reliable backup, archival, disaster-recovery, and restore capabilities for systems and research data.
Perform vulnerability scanning, patch management, system and firmware updates across the infrastructure.
Maintain complex system and network administration functions. Works with moderated guidance to administer simple systems and assists in the administration of larger systems.
Maintains all supporting documentation for comprehensive operating system, hardware and software configuration. Monitors primary responses for information technology related security incidents and violations. Keeps current with new security and network monitoring technologies, applicable laws and regulations.
Performs other related work as needed.
Minimum Qualifications
Education:
Minimum requirements include a college or university degree in related field.
Work Experience:
Minimum requirements include knowledge and skills developed through 2-5 years of work experience in a related job discipline.
Certifications:
---
Preferred Qualifications
Experience:
Linux system administration experience in a large, distributed computing environment.
Demonstrated experience and knowledge of system security and best practices.
Technical Skills or Knowledge:
Knowledge of Linux administration required, RHEL.
Experience and advanced skills in scripting with Python or Bash.
Experience installing, configuring, and managing job schedulers (e.g., Slurm, Torque, PBS, LSF).
Experience with automation tools such as Ansible, Puppet, Chef, Salt.
Experience with provisioning tools (e.g., xCAT, Confluent, Warewulf).
Experience implementing monitoring tools (e.g., CheckMK, Zabbix, Nagios).
Knowledge of frameworks and federal regulations to protect regulated systems and data (e.g., HIPAA, FISMA, NIST CSF).
Experience working, documenting and enforcing controls required to protect controlled unclassified information (e.g., NIST 800-53, NIST 800-171, NIST SP 800-223, FIPS).
Knowledge of at least one distributed storage system (e.g., Storage Scale, Lustre, Gluster, BeeGFS, Ceph) and practical experience.
Experience with InfiniBand (must at least be able to demonstrate a working knowledge of concepts)
Experience in writing precise and concise documentation, standard operating procedures.
Preferred Competencies
Understand and translate researchers' scientific goals into computational requirements.
Work well with faculty and researchers.
Identify and gain expertise in appropriate new technologies and/or software tools.
Function as part of an interactive team while demonstrating self-initiative to achieve project's goals and Research Computing Center's mission.
Strong analytical skills and problem-solving ability.
Application Documents
Resume or C/V (required)
Cover letter (preferred)
When applying, the document(s) MUST be uploaded via the My Experience page, in the section titled Application Documents of the application.
Job Family
Information Technology
Role Impact
Individual Contributor
Scheduled Weekly Hours
37.5
Drug Test Required
No
Health Screen Required
No
Motor Vehicle Record Inquiry Required
No
Pay Rate Type
Salary
FLSA Status
Exempt
Pay Range
$91,800.00 - $116,000.00
The included pay rate or range represents the University's good faith estimate of the possible compensation offer for this role at the time of posting.
Benefits Eligible
Yes
The University of Chicago offers a wide range of benefits programs and resources for eligible employees, including health, retirement, and paid time off. Information about the benefit offerings can be found in the Benefits Guidebook.
Posting Statement
The University of Chicago is an equal opportunity employer and does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender, gender identity, or expression, national or ethnic origin, shared ancestry, age, status as an individual with a disability, military or veteran status, genetic information, or other protected classes under the law. For additional information please see the University's Notice of Nondiscrimination.
Job seekers in need of a reasonable accommodation to complete the application process should call ************ or submit a request via Applicant Inquiry Form.
All offers of employment are contingent upon a background check that includes a review of conviction history. A conviction does not automatically preclude University employment. Rather, the University considers conviction information on a case-by-case basis and assesses the nature of the offense, the circumstances surrounding it, the proximity in time of the conviction, and its relevance to the position.
The University of Chicago's Annual Security & Fire Safety Report (Report) provides information about University offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: *********************************** Paper copies of the Report are available, upon request, from the University of Chicago Police Department, 850 E. 61st Street, Chicago, IL 60637.
Auto-ApplyCyber Security Engineer
Security engineer job in Milwaukee, WI
We are looking for a skilled and motivated Cyber Security Engineer to join our team in Milwaukee, Wisconsin. In this role, you will play a pivotal part in safeguarding our organization's IT infrastructure and ensuring compliance with cybersecurity standards. The ideal candidate will possess strong technical expertise, excellent communication skills, and a collaborative mindset to effectively contribute to our innovative and supportive work environment. The role is hybrid to Milwaukee and applicants must be eligible to work in the U.S., no third-party candidates will be considered.
Responsibilities:
- Develop, implement, and maintain cybersecurity policies and procedures to protect digital assets.
- Conduct regular cybersecurity audits and address findings to enhance security and ensure compliance with industry standards.
- Collaborate with cross-functional teams to support IT initiatives and foster a cohesive working environment.
- Communicate effectively with stakeholders, team members, and vendors to ensure alignment on project goals.
- Identify and resolve cybersecurity and infrastructure issues using analytical and problem-solving skills.
- Manage cybersecurity projects from planning to execution, ensuring deadlines and budgets are met.
- Build and maintain strong relationships with vendors to guarantee high-quality service delivery.
- Provide expertise in managing IT infrastructure, including networks, servers, and cloud services.
- Monitor and configure firewall technologies, including Checkpoint and Cisco ASA, to enhance network security.
- Administer Office 365 and Azure platforms while ensuring their security and functionality.
Requirements - Proven experience in IT infrastructure management, including networks, servers, and cloud services.
- Strong knowledge of cybersecurity strategies, best practices, and vulnerability assessments.
- Proficiency in Windows Server and Client operating systems.
- Expertise in networking concepts and terminology, as well as hardware management.
- Hands-on experience with Office 365 and Azure administration.
- Ability to lead long-term projects with guidance from senior IT staff.
- Excellent verbal and written communication skills to convey technical concepts to non-technical stakeholders.
- Strong collaboration and problem-solving abilities with a proactive approach to addressing challenges. Technology Doesn't Change the World, People Do.
Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.
Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.
All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.
© 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
Cyber Security Engineer
Security engineer job in Milwaukee, WI
WHO WE ARE: Douglas Dynamics is North Americas premier manufacturer and upfitter of work truck attachments and equipment. Our belief is that our employees and culture are just as important to the company as serving our customers. We place a high value on building a team and working environment where individuals can succeed professionally and personally. As a team member at Douglas Dynamics, you can expect to make a difference through your work, to have a direct impact on the achievement of a very meaningful mission to serve our customers, to advance your career, and to have room for fun and fulfillment in your daily life.
We would love to have you join our team, where we offer top notch benefits, multiple avenues for advancement and a great working environment.
HOW WE DO IT:
Grow, Improve, and Engage is our focus as an organization to ensure we succeed by executing the right things. These are our Core Values and are How We Win in the marketplace. The Winning Behaviors are what each Douglas Dynamics employee does to support the success of our company. They are the expectations of all of us to help ensure we focus on winning as an organization the right way! Our Winning Behaviors are:
* Be Customer & Results Driven
* Anticipate the Possibilities
* Collaborate & Care
* Communicate Responsibly
* Develop Self & Others
* Get Better Every Day
We are seeking an IT Cybersecurity Engineer
HOW YOU WILL CONTRIBUTE:
Douglas Dynamics is a dynamic and innovative company dedicated to providing top-notch IT solutions. We are looking for an experienced IT Cybersecurity Engineer who not only has technical expertise but also excels in soft skills to lead our team effectively.
WHAT WE OFFER YOU:
* Fulfilling career: Opportunity to contribute to an Industry leader
* Supportive Culture: Work in a supportive and inclusive environment that values diversity and teamwork.
* Professional Growth: Opportunities for continuous learning and career advancement.
* Innovative Environment: Be part of a forward-thinking company that values creativity and innovation.
* Competitive Salary: Commensurate with experience
* Comprehensive Benefits: Including generous 401k matching and profit sharing for all full-time employees
HOW YOU'LL MAKE A DIFFERENCE:
* Cybersecurity: Support the implementation and execution of cybersecurity policies and procedures. Assist in conducting periodic cybersecurity audits and addressing findings to ensure compliance and security enhancements. This role is critical to safeguarding Douglas Dynamics digital assets and ensuring compliance with industry standards.
* Team Work: Actively participate in divisional and company-wide IT Team initiatives. Be an active participant in a collaborative and supportive work environment.
* Communication: Effectively communicate with team members, stakeholders, and vendors to ensure clear understanding and alignment on projects and goals.
* Problem-Solving: Utilize strong analytical skills to identify and resolve cybersecurity and infrastructure issues promptly and efficiently.
* Project Management: Oversee cybersecurity projects from inception to completion, ensuring timely delivery and adherence to budget.
* Vendor Management: Build and maintain strong relationships with vendors and service providers to ensure high-quality service delivery.
WHAT THIS ROLE NEEDS:
* Technical Expertise: Proven experience in managing IT infrastructure, including networks, servers, and cloud services.
* Knowledge of cybersecurity strategies, best practices, and vulnerabilities.
* Strong knowledge of Windows Server and Client operating systems
* Proficient with networking terminology and networking concepts.
* Knowledge of computer and networking hardware.
* Experience administering Office 365 and Azure.
* Communication Skills: Strong verbal and written communication skills, with the ability to convey complex technical information to non-technical stakeholders.
* Problem-Solving Abilities: Critical thinking and problem-solving skills, with a proactive approach to identifying and addressing issues.
* Project Work: Ability to lead long-term projects with guidance from senior IT staff.
Soft Skills:
* Collaboration: Strong team player with the ability to work collaboratively across departments while forging positive relationships with colleagues, stakeholders, and vendors.
* Continuous Learner: Self-motivated individual who anticipates possibilities and values continuous improvement
* Time Management: Excellent organizational skills and the ability to prioritize tasks effectively.
* Adaptability: Flexibility to adapt to changing priorities and environments.
* Conflict Resolution: Skilled in resolving conflicts and fostering a positive work environment.
Our focus on integrity, teamwork, and high performance creates an ideal work environment for every one of our employees.
We offer competitive salaries, benefits, and opportunities for personal and professional growth. Discover our opportunities and come see all the ways you can do more at Douglas Dynamics.
As an Equal Opportunity Employer, Douglas Dynamics, LLC does not discriminate against qualified applicants in hiring based on race, color, sex, age, sexual orientation, gender identity, national origin, disability or any other characteristic protected by law.
Manager - Security Architect
Security engineer job in Milwaukee, WI
At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world.
**Manager - Security Architect**
**The opportunity**
We're hiring an experienced Security Architect that is an expert in the modern security threat and mitigation environment. Knowledge of the use of security in the development of applications (threat model development) best practices for security in the design architecture of applications. The use of AI in SEIM/MDR/MXDR and/or the analysis of behavioral threats. The successful candidate should have experience in the emerging area of AI based attack vectors and be able to devise successful mitigation. The candidate should thrive in fast-paced environments and are passionate about enabling scalable AI solutions.
**Your key responsibilities**
+ Develop effective security designs for implementation into enterprise applications and internal EY platforms.
+ Support security tool selection and verification.
+ Develop best practices for security design patterns in AI native applications.
+ Execute security assessments based on experience and select AI and conventional code analysis tools.
+ Assess new proposed projects to insure they are leveraging best security practices architecture design and implementation.
+ Collaborate with other architectural experts in AI, Data and Infrastructure to insure balanced and practical outcomes.
+ Support strategic business development activities for emerging technology.
**Skills and attributes for success**
+ Strong analytical and troubleshooting skills.
+ Ability to lead security architectural product functions and mentor junior engineers.
+ Comfortable working across cross-functional teams and managing competing priorities.
+ Build and manage strong internal and external partnerships by fostering trust, empathy, and mutual value.
+ Leverage emotional agility and hybrid collaboration to navigate diverse stakeholder needs and drive long-term engagement.
+ Use critical thinking and creative reasoning to address complex problems and exceed expectations.
+ Align cross-functional teams around shared goals, ensuring accountability and progress. Use emotional intelligence and hybrid collaboration to motivate others and deliver high-impact results.
**T** **o qualify you must have**
+ 5-10+ years of experience in security engineering and architecture for products.
+ Understand security and safety in an AI environment (Guardrails, Adversarial attacks, output validation etc..)
+ Use of security tooling for application verification in Github Advance Security, Checkmarx JFrog, DAST, etc..
+ Understand threat model development and verified implementation.
+ Familiarity with security certifications and appropriate use for best practices development OWASP etc....
+ Expertise in the assessment of security best practices of agile development process
+ Expertise in the development and adoption of security first best practices.
**Ideally, you'll also have**
+ Experience with large-scale cross functional software development projects.
+ Excellent communication and leadership abilities.
**What we offer you**
At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more .
+ We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $125,500 to $230,200. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $150,700 to $261,600. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options.
+ Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year.
+ Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
**Are you ready to shape your future with confidence? Apply today.**
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
**EY | Building a better working world**
EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at ************************** .
Lead AI Security Architect
Security engineer job in Milwaukee, WI
Rockwell Automation is a global technology leader focused on helping the world's manufacturers be more productive, sustainable, and agile. With more than 28,000 employees who make the world better every day, we know we have something special. Behind our customers - amazing companies that help feed the world, provide life-saving medicine on a global scale, and focus on clean water and green mobility - our people are energized problem solvers that take pride in how the work we do changes the world for the better.
We welcome all makers, forward thinkers, and problem solvers who are looking for a place to do their best work. And if that's you we would love to have you join us!
Position Summary:
The Lead AI Security Architect defines and inspires the security architecture strategy for artificial intelligence (AI) and machine learning (ML) systems across the enterprise. You will design the security of AI-enabled platforms, data pipelines, and models with corporate cybersecurity, privacy, and compliance frameworks in mind. You will be an expert, ensuring AI projects meet secure-by-design principles, while mitigating risks associated with generative AI, large language models (LLMs), and autonomous systems.
You will balance innovation in AI with risk. You influence secure development of AI systems and ensure responsible adoption of advanced technologies across the enterprise.
Your Responsibilities:
Strategy & Architecture
Develop the enterprise AI security architecture. Align it with our goals, AI governance frameworks (e.g., NIST AI RMF, ISO/IEC 42001), and cybersecurity standards (e.g., NIST CSF, ISO 27001, IEC 62443).
Define secure architectures for AI/ML model development, deployment, and integration with enterprise data and cloud platforms.
Establish security reference architectures for GenAI, LLMOps, MLOps, and AI-driven automation.
Risk Management & Governance
Conduct AI threat modeling, risk assessments, and red teaming for AI/ML systems.
Find and address AI-specific risks such as model inversion, prompt injection, data poisoning, and adversarial attacks.
Support compliance with the latest AI security and ethics regulations (e.g., EU AI Act, U.S. Executive Orders on AI, sector-specific standards).
Technical Leadership
Guide data scientists and developers on implementing secure model training, validation, and inference pipelines.
Partner with enterprise architects to integrate AI trust controls (authenticity, traceability, explainability, and accountability) into platforms and services.
Evaluate and deploy AI security tools for model protection, data governance, and AI behavior monitoring.
Collaboration & Enablement
Collaborate with product security, DevSecOps, and data engineering teams to embed AI security into the SDLC and CI/CD pipelines.
Work with legal, risk, and compliance teams to establish AI acceptable use, data residency, and model governance policies.
Lead security reviews and architecture boards for AI-enabled projects.
Innovation & Continuous Improvement
Stay current on AI cybersecurity research, frameworks, and the latest AI threats.
Develop best practices and strategies for responsible AI security and assurance.
Mentor junior architects and engineers in AI and cybersecurity principles.
Core Competencies
Technical depth in both cybersecurity and AI domains.
Ability to translate complex concepts to executives and technical teams both verbally and in writing.
Expertise in emerging AI security trends and best practices.
Collaborative and mentoring approach with cross-functional teams.
The Essentials - You Will Have:
Bachelor's Degree or equivalent years of relevant work experience.
Legal authorization to work in the U.S. We will not sponsor individuals for employment visas, now or in the future, for this job opening.
Ability to travel up to 10%.
The Preferred - You Might Also Have:
Typically requires 12+ years of relevant experience in cybersecurity architecture.
3+ years focused on AI/ML or data science security.
Advanced degree in Computer Science, Engineering, Cybersecurity, or related field
Experience with AI/ML pipelines, MLOps, Model Context Protocol (MPC), Agentic Identity, and cloud-native architectures (AWS SageMaker, Azure ML, GCP Vertex AI).
Expertise in data protection, identity and access management, encryption, and secure software development.
Knowledge of AI threat landscapes, adversarial machine learning, and model integrity protection.
Experience with compliance frameworks such as NIST AI RMF, ISO/IEC 42001, and data privacy regulations (GDPR, CCPA).
Professional certifications such as CISSP, CISM, CCSP and enterprise architecture certifications.
AI/ML certifications (e.g., TensorFlow, AWS ML Specialty, Microsoft Azure AI Engineer).
Hands-on experience with secure LLM deployments and GenAI security testing.
Experience in OT or industrial AI environments (IEC 62443 knowledge).
What We Offer:
Health Insurance including Medical, Dental and Vision
401k
Paid Time off
Parental and Caregiver Leave
Flexible Work Schedule where you will work with your manager to enjoy a work schedule that can be flexible with your personal life.
To learn more about our benefits package, please visit at ********************
At Rockwell Automation we are dedicated to building a diverse, inclusive and authentic workplace, so if you're excited about this role but your experience doesn't align perfectly with every qualification in the job description, we encourage you to apply anyway. You may be just the right person for this or other roles.
#LI-Hybrid
#LI-LifeAtROK
#LI-MG4
We are an Equal Opportunity Employer including disability and veterans.
If you are an individual with a disability and you need assistance or a reasonable accommodation during the application process, please contact our services team at *****************.
Rockwell Automation's hybrid policy aligns that employees are expected to work at a Rockwell location at least Mondays, Tuesdays, and Thursdays unless they have a business obligation out of the office.
Auto-ApplyCyber Security Training
Security engineer job in Milwaukee, WI
We at Agap Technologies Inc. help our clients build successful businesses by enabling them to synergize state-of-the-art technology with exceptional talent. We offer a full suite of IT solutions and services, from custom software development to staffing. Our multidisciplinary team of experts in areas like data analysis, automation, personnel development and management, and project management helps us offer a unique set of tech-driven solutions and services that allow our clients to achieve their business objectives in the most efficient way possible.
Our technical competence is further built upon by our high standards of professionalism, diligence, and ethics, which has enabled us to deliver top-notch services to our clients and exceed expectations every time.
Job Description
Our Training Features:
· You will receive top quality instruction that is famous for Online IT training.
· Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue.
· Training sessions are conducted by real-time instructor with real-time examples.
· Every training session is recorded and posted to the batch after each weekend class.
· We are offering online training on Cyber Security.
.
Provide OPT Stem Ext.:
Guidance and support for applying for the 24-month OPT STEM extension
Help with OPT Employment letter:
Help with drafting and obtaining OPT employment letters that meet USCIS requirements.
· We provide training in technology of your choice.
· Good online training virtual class room environment.
· Highly qualified and experienced trainers.
· Professional environment.
· Special interview training
· Training for skill enhancement.
· Study material and Lab material provided.
· E-Verified company.
If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates.
Thanks
Additional Information
All your information will be kept confidential according to EEO guidelines.
Identity & Access Management Security - Ping Identity/ForgeRock Consultant
Security engineer job in Milwaukee, WI
We Are Accenture Cybersecurity helps organizations prepare, protect, detect, respond, and recover along with all points of the security lifecycle. Cybersecurity challenges are different for every business in every industry. Leveraging our global resources and advanced technologies, we create integrated, turnkey solutions tailored to our client's needs across their entire value chain. Whether we're defending against known cyberattacks, detecting and responding to the unknown, or running an entire security operations center, we will help companies build cyber resilience to grow with confidence. Our team of the security sector's brightest people uses the coolest tech to out-hack the hackers and help clients build resilience from within. We blend risk strategy, digital identity, cyber defense, application security, and managed service solutions to rethink the entire security lifecycle.
Do you have the deep functional and technical experience to help implement security solutions that align with our clients' business objectives? Do you have the expertise to design and deliver solutions for establishing system user's credentials, and processes for applying those credentials to access enterprise systems and applications?If so, read on and apply. Accenture's more than 2,000 security professionals deliver holistic and proactive security solutions in 47 countries, and we'd love to discuss our open Identity and Access Management (I&AM) Security role with you
You Are
A cyber security savant. You've got the skills and experience to keep data safe from black hat hackers or other threats, whether by coding a threat intrusion module or sharing your latest ideas with the team. Day-to-day, you're all about solving security problems for clients and using your people skills to make sure everyone on your team is working well and happily.
You are passionate about security, love what you do and have a genuine desire to outsmart the bad guys. You have the experience to analyze a clients' security posture, anticipate security requirements and help find right-sized solutions based on industry leading practices. You have a proven track record working successfully in a fast-paced, team-oriented environment. You're a creative, analytical problem solver with above average documentation skills who can speak to both technical and non-technical audiences. You are eager to put your skills to use by helping us help our clients inject security at every level of their organization.
The Work
Working directly with clients and Accenture teams in a multi-disciplined team structure, you will design and implement I&AM solutions using ForgeRock and Ping Identity products. You will develop deep working relationships with Senior Executives and Senior Managers across the client account team and client, understanding the business direction of companies and creating optimized I&AM architectures to meet their business needs.
As a Ping Identity/ForgeRock Consultant, you will:
+ Design, configure, and implement Ping Advanced Identity platform components including Ping AM, Ping IDM, Ping DS, and Ping Identity Gateway, and Ping Advanced Identity Cloud and Remote Connector Server
+ Lead and manage multiple workstreams
+ Design and code custom decision nodes using JavaScript and/or Java
+ Implement custom object models based on client requirements
+ Configure user stores with custom attributes and policies
+ Develop implementation and migration plans focusing on service continuity
+ Implement and configure Single Sign-On (SSO) solutions across diverse application portfolios
+ Understand and advise clients on secure communication techniques; requires an understanding of SSH, TLS
+ Work with application owners to integrate applications onto the SSO platform using factory models and bespoke integration techniques
+ Work with directory services and identity provisioning platforms
+ Collaborate with cross-functional teams to integrate IAM solutions with existing enterprise systems
+ Provide technical leadership and guidance on IAM best practices and industry standards
+ Create comprehensive technical documentation and knowledge transfer materials
+ Troubleshoot complex IAM issues and provide production support
+ Work with clients and Accenture colleagues to understand requirements and estimate work efforts
+ Develop and maintain an implementation work plan using Agile and waterfall methodologies
Travel may be required for this role. The amount of travel will vary from 0 to 100% depending on business need and client requirements.
Here's What You Need
+ Bachelor's degree or equivalent (minimum 12 years) work experience. (If Associate's Degree, must have minimum 6 years work experience)
+ Minimum of 3 years of experience with Ping Identity (formerly ForgeRock) and specific platforms, Ping AM (Access Management), Ping IDM (Identity Management), Ping DS (Directory Services), Ping Identity Gateway (Identity Gateway) and Ping Advanced Identity Cloud
+ Minimum of 3 years of experience with IAM Functional Skills Access Management, Identity Governance, Directory Services, Identity Provisioning, Identity Management and Identity Management as a Service.
+ Minimum of 3 years of experience with identity standards and protocols (SAML, OAuth 2.0, OpenID Connect, LDAP, SCIM)
+ Minimum of 3 years of experience with scripting and programming skills (Java, JavaScript, Groovy, Python, Shell scripting)
Bonus points if you have:
+ Experience with other IAM platforms (Ping Identity suite: PingFederate, PingAccess, PingDirectory, PingID, PingOne)
+ Strong functional understanding of CIAM or Workforce Access Management
+ Industry-adopted security certifications (e.g., CISSP, CISM) or IAM vendor certifications
+ Understanding of DevOps and CI/CD practices for IAM deployments
+ Experience with API development and integration
+ Knowledge of containerization and orchestration technologies (Docker, Kubernetes)
+ Mobile development knowledge with experience in iOS and Android platforms
+ Front development experience
+ Demonstrate success building and scaling SaaS products with a focus on customer experience and operational efficiency.
+ Strong understanding of cloud-based systems and integrations (e.g., APIs, microservices architecture).
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below.We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here. (************************************************************
Role Location Annual Salary Range
California $63,800 to $205,800
Cleveland $59,100 to $164,600
Colorado $63,800 to $177,800
District of Columbia $68,000 to $189,300
Illinois $59,100 to $177,800
Maryland $63,800 to $177,800
Massachusetts $63,800 to $189,300
Minnesota $63,800 to $177,800
New York/New Jersey $59,100 to $205,800
Washington $68,000 to $189,300
Requesting an Accommodation
Accenture is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired.
If you would like to be considered for employment opportunities with Accenture and have accommodation needs such as for a disability or religious observance, please call us toll free at **************** or send us an email or speak with your recruiter.
Equal Employment Opportunity Statement
We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, or local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities.
For details, view a copy of the Accenture Equal Opportunity Statement (********************************************************************************************************************************************
Accenture is an EEO and Affirmative Action Employer of Veterans/Individuals with Disabilities.
Accenture is committed to providing veteran employment opportunities to our service men and women.
Other Employment Statements
Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States.
Candidates who are currently employed by a client of Accenture or an affiliated Accenture business may not be eligible for consideration.
Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. Further, at Accenture a criminal conviction history is not an absolute bar to employment.
The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information.
California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here for additional important information.
Please read Accenture's Recruiting and Hiring Statement for more information on how we process your data during the Recruiting and Hiring process.
Information Security Engineering & Operations Analyst
Security engineer job in Racine, WI
The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role.
This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.)
KEY RESPONSIBILITIES:
* Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment.
* Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies.
* Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities.
* Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting.
* Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting).
* Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access.
* Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards.
* Assist with maintaining the Cybersecurity Incident Response Plan.
* Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks).
* Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress.
JOB REQUIREMENTS:
* Associates degree in Information Security, Cybersecurity preferred
* 0-2 years' experience
* Types of certification preferred: Security+, CEH, SSCP
* Experience with Python and PowerShell scripting languages for automation preferred
* Good report writing and communication skills
* Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments
Come as you are.
Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
Auto-ApplySenior Security Architect - SAP
Security engineer job in Waukegan, IL
Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting
Scope of Services:
The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy.
This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape.
Role, Responsibilities, and Deliverables:
Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs.
Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements.
Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks.
GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations.
Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements.
Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy.
Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions.
Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs.
Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time.
Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner.
Experience & Skills:
SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations.
GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred.
Security Tools: Proficiency in SAP Security, GRC, and SOD management.
Leadership: Previous experience managing cross-functional teams and leading security projects.
Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations.
Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions.
Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms.
Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals.
Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills.
Education & Certifications:
Degree: A degree in IT, Computer Science, Business, or a complementary field is required.
Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.
Information System Epic Security Analyst
Security engineer job in Milwaukee, WI
At Children's Wisconsin, we believe kids deserve the best.
Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country.
We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today.
Please follow this link for a closer look at what it's like to work at Children's Wisconsin:
***********************************
Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team!
Location: Remote but must be local to Milwaukee
What you will do:
The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required.
Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations.
ESSENTIAL FUNCTIONS:
Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers.
Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric.
Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required.
Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization.
Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions.
Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary.
Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate.
Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security.
Recommends policies and procedures for controlling remote access by employees, non-employees and vendors.
Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration.
Keeps current on security issues through seminars, publications and self-education on an on-going basis.
MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
Requires bachelor's degree in computer science or related technology field. Master's degree preferred.
Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management.
Epic Security certification is a requirement.
Professional certification (e.g. CISA, CISM or CISSP) preferred.
Thorough understanding of risk analysis, disaster recovery and audit tracking.
Familiarity with current common paradigms for violating system integrity.
Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel.
Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts.
Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law.
Certifications/Licenses:
Auto-ApplySecurity Analyst- Pen Testing
Security engineer job in Brookfield, WI
The Security Analyst- Pen Testing plays a critical role in facilitating continued growth and execution within our security practice. This highly skilled and detail-oriented Consultant will have deep knowledge in Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), and Hardware Penetration Testing. The ideal candidate will be responsible for identifying vulnerabilities across software and hardware systems, advising on remediation strategies, and communicating findings clearly to both technical and non-technical stakeholders.
Primary Responsibilities:
* Conduct in-depth SAST, DAST, and SCA assessments across a variety of application types (web, mobile, desktop, APIs).
* Perform hardware penetration testing on embedded systems, IoT devices, and industrial control systems (ICS), including debug interface discovery, firmware extraction and analysis, and secure boot review.
* Develop and maintain threat models, attack trees, and risk assessments for both software and hardware systems.
* Identify and exploit vulnerabilities using both manual techniques and automated tools, simulating real-world attack scenarios.
* Provide detailed technical reports and executive summaries tailored to different audiences, including developers, engineers, and leadership.
* Collaborate with product and engineering teams to prioritize and remediate vulnerabilities, offering secure design and coding recommendations.
* Participate in security architecture reviews and code reviews to identify potential weaknesses early in the development lifecycle.
* Assist in the development and implementation of security testing methodologies, checklists, and standard operating procedures.
* Conduct security tool evaluations and help integrate them into CI/CD pipelines for continuous security testing.
* Lead or support red team/blue team exercises, tabletop simulations, and incident response drills.
* Stay abreast of the latest security trends, vulnerabilities, and threat actor tactics, techniques, and procedures (TTPs).
* Contribute to internal knowledge bases, training sessions, and technical workshops to upskill team members and clients.
* Engage with clients to understand their security needs, define testing scopes, and deliver high-quality consulting services.
* Ensure all testing activities comply with legal, ethical, and organizational guidelines, including responsible disclosure practices.
* Develop and present organized report findings to technical audiences.
Cybersecurity GRC Analyst, Training & Awareness, FCH - IT - SECURITY
Security engineer job in Menomonee Falls, WI
Discover. Achieve. Succeed. #BeHere This job is REMOTE. FTE: 1.000000 Standard Hours: 40.00 Shift: 1st shift flexible 7 am to 5pm Shift Details: Holidays: Weekends: Froedtert ThedaCare Health, Inc., a leading healthcare system located in Eastern Wisconsin, is seeking a Cybersecurity GRC Analyst, Training & Awareness professional to join the Cybersecurity Governance, Risk Management, and Compliance (GRC) team. This role is critical in promoting a robust security culture across the organization by designing, managing, and improving cybersecurity training and awareness programs. The successful candidate will focus on cybersecurity awareness, phishing program operations, cybersecurity training, and GRC concepts while fostering cultural engagement and workforce behavioral change through creative and innovative initiatives. You will partner with cross-functional teams to address cybersecurity risks in clinical and non-clinical environments, ensure regulatory compliance, and contribute to the harmonization of cybersecurity programs across the Froedtert ThedaCare ecosystem.
Position Responsibilities:
Training and Awareness Program Management:
* Develop, implement, enhance, and manage a comprehensive Cybersecurity Training and Awareness framework tailored to healthcare's unique risks and regulatory landscape (e.g., HIPAA, PCI DSS, and Joint Commission requirements).
* Design role-based training for diverse audiences, including clinicians, administrative staff, IT teams, and executives.
* Continuously refine training materials to incorporate emerging threats, organizational changes, and stakeholder feedback.
Phishing Program Operations:
* Build, enhance, and execute a dynamic, reality-based phishing simulation program, addressing sector-specific threats such as ransomware and patient data phishing schemes.
* Analyze simulation metrics and provide actionable insights to improve employee awareness and reduce risks.
* Develop and maintain educational material to support cybersecurity initiatives and training activities.
* Deliver targeted follow-up training for individuals or teams with repeated simulation failures.
Creative Engagement and Communications:
* Develop multimedia content, including videos, infographics, and gamified training, to drive engagement and retention.
* Design and execute large-scale security awareness campaigns, ensuring alignment with cultural transformation goals.
* Partner with leadership to create impactful security messaging and content tailored to high-risk roles.
Regulatory and Compliance Integration:
* Ensure training programs align with healthcare-specific regulations and standards, including HIPAA, PCI DSS, and Joint Commission requirements.
* Collaborate with Compliance and Legal teams to embed security awareness into broader compliance initiatives.
* Provide support for audits and regulatory reviews by showcasing training program effectiveness.
Metrics, Reporting, and Continuous Improvement:
* Develop and maintain KPIs and dashboards to measure the success of training programs and awareness initiatives.
* Conduct quarterly and annual program reviews to identify opportunities for innovation and enhancement.
* Prepare reports and presentations for leadership to highlight program impact and align with organizational goals.
Collaboration and Change Management:
* Partner with IT, Risk Management, and Clinical Operations teams to ensure training initiatives integrate seamlessly across the organization.
* Lead security awareness efforts during organizational transitions, such as the Froedtert-ThedaCare merger, ensuring program consistency and harmonization.
* Act as a trusted advisor to business units, translating complex cybersecurity topics into actionable guidance.
Risk and Compliance Integration:
* Assist with routine GRC activities, such as monitoring risk registers, supporting audit preparation, and reviewing policy exception requests.
* Collaborate with the Risk Management team to align training efforts with identified risk scenarios, ensuring targeted mitigation strategies.
Policy and Procedure Maintenance:
* Support the documentation and dissemination of cybersecurity policies, standards, and procedures.
* Assist in the lifecycle management of GRC documentation, ensuring alignment with training content and awareness initiatives.
EXPERIENCE DESCRIPTION:
1 - 3 years of experience in a related field.
3 or more years of experience in a related field is preferred.
At least three years of experience in Cybersecurity training, GRC, or a related role within healthcare or similarly regulated industries preferred
Proven track record managing phishing simulation programs and security training platforms (e.g., KnowBe4, LMS).
Experience creating and executing large-scale awareness campaigns using multimedia tools
EDUCATION DESCRIPTION:
BA in Computer Science or related field is required or equivalent acquired through combination of education and experience.
Bachelor's degree in Information Security, Computer Science, Communications, or a related field is preferred.
Relevant certifications (e.g., CISSP, CISM, CISA, or GIAC) are a plus.
SPECIAL SKILLS DESCRIPTION:
Technical Expertise:
* In-depth knowledge of healthcare regulations and cybersecurity frameworks, including HIPAA, HITECH, NIST CSF, and HITRUST.
* Proficiency with phishing simulation platforms (e.g., KnowBe4) and LMS tools.
* Familiarity with behavioral analytics and metrics for tracking training effectiveness.
Creative and Communication Skills
* Exceptional written and verbal communication skills, with the ability to craft messaging for technical and non-technical audiences.
* Experience creating multimedia content (e.g., video editing, graphic design) for awareness campaigns.
* Public speaking skills and confidence in presenting to diverse audiences.
Analytical and Strategic Thinking
* Strong problem-solving and critical-thinking skills for addressing complex training needs.
* Experience developing data-driven strategies to improve training program impact and employee behavior.
Collaboration and Leadership:
* Demonstrated ability to collaborate across diverse teams and levels of leadership.
* Self-starter with the ability to work independently and drive initiatives in a matrixed organization.
* Proven ability to manage multiple projects with competing priorities.
Preferred Qualifications
* Experience in large healthcare systems or regulated industries.
* Familiarity with change management and integration strategies during mergers or acquisitions.
* Experience with gamified training methods or VR/AR-based security awareness tools
Compensation, Benefits & Perks at Froedtert Health
Pay is expected to be between: (expressed as hourly) $37.95 - $64.92. Final compensation is based on experience and will be discussed with you by the recruiter during the interview process.
Froedtert Health Offers a variety of perks & benefits to staff, depending on your role you may be eligible for the following:
* Paid time off
* Growth opportunity- Career Pathways & Career Tuition Assistance, CEU opportunities
* Academic Partnership with the Medical College of Wisconsin
* Referral bonuses
* Retirement plan - 403b
* Medical, Dental, Vision, Life Insurance, Short & Long Term Disability, Free Workplace Clinics
* Employee Assistance Programs, Adoption Assistance, Healthy Contributions, Care@Work, Moving Assistance, Discounts on gym memberships, travel and other work life benefits available
The Froedtert & the Medical College of Wisconsin regional health network is a partnership between Froedtert Health and the Medical College of Wisconsin supporting a shared mission of patient care, innovation, medical research and education. Our health network operates eastern Wisconsin's only academic medical center and adult Level I Trauma center engaged in thousands of clinical trials and studies. The Froedtert & MCW health network, which includes ten hospitals, nearly 2,000 physicians and more than 45 health centers and clinics draw patients from throughout the Midwest and the nation.
We are proud to be an Equal Opportunity Employer who values and maintains an environment that attracts, recruits, engages and retains a diverse workforce. We welcome protected veterans to share their priority consideration status with us at ************. We maintain a drug-free workplace and perform pre-employment substance abuse testing. During your application and interview process, if you have a need that requires an accommodation, please contact us at ************. We will attempt to fulfill all reasonable accommodation requests.
Information Security Analyst/Administrator II
Security engineer job in Kenosha, WI
is onsite at the Corporate Headquarters located in Kenosha, WI.
Who We Are:
People know Snap-on for the quality of our products, but we know that it is the passion and character of our people that make our company a global leader. With our diverse talents and deep pride in the Snap-on family of brands, we drive innovation and create value. We work hard together. We grow together. We are one Snap-on team.
Company-paid benefits include:
Basic dental, Basic life, Basic accidental death and dismemberment coverage
Short term and long-term disability, Employee Assistance Program
Business travel accident insurance
Other health education programs including smoking cessation, annual wellness screening and seasonal flu shot
Market competitive compensation with Rewards for high performance and special skills
Bonus, incentives, or sales commissions depending on position and level
Base pay progression through lateral & promotional development on both managerial and technical career paths
Paid time off, vacation and paid holidays
Tuition Assistance Plan
Employee Stock Purchase Plan - annual optional enrollment period
Retirement programs including 401(k) Plan with matching employer contributions
Job Opportunity:
The Information Security Administrator will be responsible for providing advanced-level configuration, maintenance and support of network and security related systems. Role includes implementing and monitoring security protocols to maintain the integrity of corporate networks, assets, data and security related equipment.
Responsibilities
Configure, maintain and provide technical support for Security platforms and technologies (Firewalls, Proxy services, Data security, Intrusion detection systems, syslog's, NAC, SIEM solutions, End point protection, Web application firewalls, SOC, Vulnerability program management, Ethical hacking services and compliance requirements)
Devise and execute strategies to improve the reliability and maturity levels of internal and external Security architectures and applications
Partner with internal and external IT teams to conduct vulnerability assessments, audits, forensic investigations and execute remediations
Responsible for security reviews and hardening of enterprise architecture - which includes network, business applications, integrations, data security and cloud deployments.
Responsible for security related incident response, post-analysis and mitigation efforts
Maintain security application portfolio and establish rules of engagement with infrastructure, application teams and external sites
Create and maintain process and procedure documentation for Security Applications
Collaboration and knowledge sharing with internal and external IT external teams, establish and cultivate associations with vital customers and vendor contacts
Devise and develop a security dashboard incorporating relevant security and operational metrics
Qualifications
Several years (5+) of hands-on experience related to Information security
In-depth knowledge on Security architecture, Security and network protocols, standards and compliance requirements
Experience with deploying and managing cyber security solutions (detection, remediation, and prevention) and developing and administering an IT security program
Knowledge of different type of attacks, techniques, threat vectors, attack paths, and how to formulate risk-based decision making in assessing vulnerabilities and remediation priorities
Network security architecture concepts including topology, components, and principles
Bachelor's degree in Computer Science, Information Systems/Technology, Computer Engineering, or applicable Professional work experience
Excellent decision making, analytical, problem-solving, and organizational skills.
Excellent communication and customer service skills
Industry IT security certifications are desirable - CISSP, CISM, GIAC
Auto-ApplySecurity Systems Specialist
Security engineer job in Mount Pleasant, WI
FII USA, Inc., a Foxconn Technology Group Company, is seeking a Security Systems Specialist to design, maintain, and support security system infrastructure and ensure reliable operation of access control, surveillance, and related technologies. Once a part of the team, you will be responsible for a wide variety of tasks within the Facilities/Security Department in a production environment and have the opportunity to display critical thinking skills to expand your career in Smart Manufacturing.
The Security Systems Specialist will develop and upgrade site security systems, conduct threat assessments, troubleshoot system issues, and assist the Facilities/Security Department as needed.
Job Responsibilities:
Design new camera and access control systems for new projects using CAD software and Statements of Work.
Conduct threat assessments of buildings and network environments and implement mitigation strategies.
Upgrade existing camera and access control systems to better support the site's security mission.
Research and evaluate new technology solutions to improve departmental efficiency and system performance.
Troubleshoot, diagnose, and resolve issues with the current security system infrastructure.
Maintain and service all existing surveillance, access control, and security hardware/software systems.
Maximize system capabilities by optimizing configuration, usage, and system integrations.
Install, configure, and support CCTV, access control, and other electronic security systems.
Perform routine audits of cameras, door access points, badges, and system logs to ensure compliance.
Document system changes, maintenance work, troubleshooting efforts, and incident findings.
Assist with investigations by retrieving footage, access logs, and supporting data.
Collaborate with IT, Facilities, and Security teams on system enhancements and upgrades.
Respond to critical system alerts and after-hours issues as needed.
Other Duties as assigned.
Qualifications:
Technical degree or certificate in Electronics, IT, Security Technology, or related field preferred.
Hands-on experience with CCTV, access control, alarms, or security system support required.
Familiarity with enterprise platforms such as Lenel, Genetec, Honeywell, Bosch, or similar systems.
Ability to read wiring diagrams, CAD drawings, schematics, and technical documentation.
Strong analytical, troubleshooting, and problem-solving skills.
Ability to work independently and manage multiple priorities in a fast-paced environment.
Must be able to lift up to 50 lbs, climb ladders, and work in varied indoor/outdoor conditions.
Reasons you should work for us:
Comprehensive benefits package including medical, dental, and vision insurance coverage.
Basic life insurance and short-term disability coverage provided by employer.
Supplemental life insurance and long-term disability coverage options available.
401K with employer contribution.
Personal, Vacation, and Holiday paid time off for all full-time employees.
Onsite Aurora Health & Wellness Center available for all employees.
Employees are continuously encouraged to learn and grow their careers in smart manufacturing.
About FII USA, Inc., a Foxconn Technology Group Company:
FII USA, Inc, a Foxconn Technology Group Company, is a global leader in smart manufacturing and industrial internet services. With a strong presence in the digital economy, we offer a comprehensive range of solutions in cloud computing, industrial internet, smart home, 5G, and network communication equipment. Fueled by continuous innovation and a commitment to sustainable development, we have become a key player in the electronic manufacturing service industry and sit at the forefront of driving advanced industry development.
FII USA, Inc is an Equal Opportunity employer. All qualified applicants will receive consideration for employment, without regard to sex, race, color, religion, national origin, age, marital status, political affiliation, sexual orientation, gender identity, genetic information, disability or protected veteran status. We are committed to providing a workplace free of any discrimination or harassment.
Auto-ApplyIT Security Project Manager with GIS (Geographic information system) expertise
Security engineer job in Racine, WI
SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise.
All SA Technologies requirements are Direct Client Requirements from IT Hiring Managers. We guarantee you the best rate for your skills and performance.
Job: IT Security Project Manager with GIS (Geographic information system) expertise
Location: Racine, WI
Employment Type: Contract
Rate: TBD
Job Description :
• Act as the main liaison between GIS and the Project Team
• Using the GIS intake form ensure that all GIS activities are accounted for and propose any changes to the Project Manager incorporating them in the overall project plan
• Identify all GIS resources in the Project Plan and ensure that sufficient lead time is provided to GIS tower leads to onboard resources.
• Aid the Project Manager in identifying and scheduling GIS activities across all GIS towers
• Raise Project Change Requests where necessary to ensure that original scope is adhered to
• Ensure that all GIS activities are completed prior to entering a stage gate and steward project deliverables through GIS and Project stage gates
• Periodically report project milestones, progress, issues and risk to Project Manager and GIS
• Provide feedback and improvements to the GIS Operating Model including process and deliverables
Qualifications include:
• Experience in Information Security Risk Advisory, Risk Management, Architecture and Operations
• Familiarity with the GIS Operating Model and Deliverables
• Working knowledge of project planning, scope management and resource forecasting
• Proven ability to work on many priorities at any given time
• Ability to work in a matrixed team environment and influence and guide key decision makers
Additional Information
Shibu Thomas
************
Senior Cyber Security Engineer
Security engineer job in Milwaukee, WI
Title: Senior Cyber Security Engineer (Data Protection & Insider Risk)
Type: Hybrid (3 days onsite per week)
Duration: ASAP - 12/31/2026
Perks: Competitive Rates, Benefits, free daily lunch when onsite
Job Description:
About the Role
Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale.
Key Responsibilities
Engineer Secure-by-Default E5 Data Protection
Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams.
Develop and maintain Sensitivity Label taxonomy with automated enforcement paths.
Build Policy-as-Code Pipelines
Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments.
Integrate Security Telemetry
Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection.
Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios.
Develop Automations & Guardrails
Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners.
Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.).
Operate and Continuously Improve
Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks.
Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations.
Collaborate Across Teams
Partner with Privacy and Compliance for audit-ready controls and evidence processes.
Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows.
Provide technical leadership and mentorship for engineers and analysts implementing new E5 features.
Required Qualifications
5+ years of experience in enterprise security or platform engineering.
Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery).
Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell.
Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot.
Preferred Qualifications
Strong background in data protection for regulated data (PII/PHI) and insider-risk detection.
Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches).
Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies.
Knowledge of HIPAA/PHI audit support and exception governance workflows.
Success Metrics (First 6-12 Months)
Improved DLP policy efficacy and reduced unauthorized data movement.
Increased label coverage and accuracy for sensitive content.
End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk.
Secure-by-default adoption and Copilot controls baselined.
Audit readiness with complete evidence and exception closure rates.
Tools & Technologies
Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk
Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES)
Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
Senior Security Architect - SAP
Security engineer job in Waukegan, IL
Job Description
Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting
Scope of Services:
The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy.
This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape.
Role, Responsibilities, and Deliverables:
Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs.
Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements.
Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks.
GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations.
Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements.
Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy.
Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions.
Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs.
Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time.
Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner.
Experience & Skills:
SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations.
GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred.
Security Tools: Proficiency in SAP Security, GRC, and SOD management.
Leadership: Previous experience managing cross-functional teams and leading security projects.
Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations.
Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions.
Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms.
Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals.
Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills.
Education & Certifications:
Degree: A degree in IT, Computer Science, Business, or a complementary field is required.
Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.