Senior UEBA Security Engineer
Security Engineer job 17 miles from Grandview
You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world. As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.
Position Purpose:
We are seeking an experienced and highly skilled Senior UEBA (User and Entity Behavior Analytics) Engineer to lead the implementation, and optimization of advanced security analytics solutions. The ideal candidate will possess deep expertise in threat detection, data analysis, and behavioral analytics, driving initiatives to enhance the organization's security posture through proactive monitoring and anomaly detection. This role requires a deep understanding of security analytics, behavioral baselining, data integration, and threat detection methodologies. This role will serve as a key technical leader, mentor, and strategic advisor within the cybersecurity team to enhance threat detection and overall security posture.
Solution Design & Leadership: Architect and maintain scalable UEBA solutions, integrating with SIEMs, data lakes, and other security technologies.
Design & Implementation: Deploy and configure UEBA platforms to monitor and analyze user and entity behaviors across IT and cloud environments.
Anomaly Detection: Develop and refine behavioral analytics models to detect complex threats, including insider threats, lateral movement, and account compromises.
Data Integration: Collect and integrate data from multiple sources, including SIEMs, authentication logs, endpoint systems, and network devices, to enrich security analytics.
Incident Investigation: Provide in-depth analysis and investigation of alerts triggered by anomalous behavior.
Incident Response Support: Provide expert guidance and technical analysis for security incidents involving anomalous user and entity behavior.
Threat Hunting: Assist in proactive threat hunting efforts using behavioral insights from the UEBA platform.
Optimization: Continuously fine-tune analytics models to reduce false positives and improve detection capabilities.
Mentorship & Collaboration: Guide and mentor junior engineers, fostering knowledge sharing and technical skill development.
Stakeholder Engagement: Partner with security operations, threat intelligence, and leadership teams to define UEBA strategies and implement use cases.
Reporting & Documentation: Develop dashboards, reports, and detailed documentation for technical and non-technical stakeholders.
Performs other duties as assigned.
Complies with all policies and standards.
Education/Experience:
A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 4 - 6 years of related experience.
Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.
Technical Skills:
5+ years of experience in cybersecurity with a focus on security analytics, threat detection, or UEBA solutions.
Hands-on experience with UEBA platforms (e.g., Exabeam, Gurucul, Splunk UEBA, Microsoft Sentinel).
Strong knowledge of cybersecurity concepts and threat vectors.
Proficiency in scripting (Python, PowerShell, etc.) for data analysis and automation.
Experience with data normalization, correlation, and event analysis.
Deep understanding of SIEM technologies, data pipelines, and event management processes.
Knowledge of SIEM platforms and their integration with UEBA solutions.
Experience with machine learning models for threat detection and behavioral analytics.
Hands-on experience with cloud security analytics (AWS, Azure, GCP).
Familiarity with NIST, MITRE ATT&CK, and other security frameworks.
Soft Skills:
Intermediate - Seeks to acquire knowledge in area of specialty
Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
Intermediate - Ability to work independently
Intermediate - Demonstrated analytical skills
Intermediate - Demonstrated project management skills
Intermediate - Demonstrates a high level of accuracy, even under pressure
Intermediate - Demonstrates excellent judgment and decision making skills
License/Certification:
Security certifications such as CISSP, GIAC, GCTI, or Security+.
Pay Range: $85,300.00 - $158,100.00 per year
Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law. Total compensation may also include additional forms of incentives.
Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.
Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act
Ethical Hacker - Overland Park, KS ( Only Citizens )
Security Engineer job 9 miles from Grandview
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Ethical Hacker - Overland Park, KS ( Only Citizens )
Security Engineer job 9 miles from Grandview
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
CyberArk Security Engineer
Security Engineer job 20 miles from Grandview
NCR Atleos, headquartered in Atlanta, is a leader in expanding financial access. Our dedicated 20,000 employees optimize the branch, improve operational efficiency and maximize self-service availability for financial institutions and retailers across the globe.
Job Title: CyberArk Engineer
Location: Frisco, TX (hybrid)
*Must be in office 3 days a week*
Eligibility: Please note that this position is not eligible for Visa sponsorship now or in the future. This restriction applies to all candidates for this position.
Job Summary:
We are seeking a highly experienced CyberArk engineer to implement PAM across our users and applications. The ideal candidate will have a robust background in cybersecurity and PAM best practices. The CyberArk Engineer will collaborate with various teams to ensure the seamless integration and effective use of CyberArk.
Key Areas of Responsibility:
Administer and manage CyberArk solutions.
Configure, monitor, and troubleshoot CyberArk systems to ensure optimal performance and security.
Plan and execute upgrades, patches, and other maintenance activities for CyberArk systems.
Implement and manage CyberArk security policies and protocols to protect against threats.
Analyze security incidents, perform root cause analysis, and implement corrective measures.
Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.
Provide advanced technical support for CyberArk -related issues.
Mentor and guide junior engineers and IT support staff.
Create and maintain comprehensive documentation of CyberArk configurations, procedures, and processes.
Generate regular reports on system performance, security incidents, and maintenance activities.
Remain current with emerging threats and share knowledge with colleagues to improve security posture.
Liaise with the security engineering team to improve monitoring and response workflow.
Willingness to work nonstandard business hours to respond to and mitigate threats.
Perform other duties as assigned.
Experience:
At least 3 years of hands-on experience with CyberArk administration and management.
Technical Skills:
Strong understanding of identity and access management (IAM) principles and best practices.
Experience with supporting IAM in a Cloud environment, including Azure or AWS.
Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).
Knowledge of a scripting language (PowerShell, Python, C#) for automation.
#LI-AD1
#LI-HYBRID
Offers of employment are conditional upon passage of screening criteria applicable to the job.
Full time employee benefits include:
Medical Insurance
Dental Insurance
Life Insurance
Vision Insurance
Short/Long Term Disability
Paid Vacation
401k
EEO Statement
NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law.
Statement to Third Party Agencies
To ALL recruitment agencies: NCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.
2U Network Security Operations Analyst
Security Engineer job 17 miles from Grandview
It starts with our culture ... Common sense has never been common. If it were, the world would be a different place. Things would run smoothly and on time. People would do what they say and say what they do. Everything would be fair, without all the small talk. And banks would only sell you what you need. When a banker looked at a client, they wouldn't just see a number, they'd see a dad or a mom or a graduate or a business owner. Our Bankers understand the complexities of people's lives and offer simple solutions.
That's the basics of Relationships. Fairness. Simplicity
When you choose our Company, you have an opportunity to make an impact beyond the walls of our buildings.
We have a long-standing commitment to Equity, Diversity and Inclusion. Through lending, investing, grants, and volunteerism, NBH Bank promotes the growth, revitalization and sustainability of the communities we serve. We believe that these are important elements in building and sustaining a successful organization and a positive, results-driven culture. We strive for all of our associates to feel welcome and empowered at work.
This type of position is ideal for someone looking to build a career in finance, banking, and technology. We will provide you training and coaching throughout your onboarding experience, as well as on the job. As you demonstrate success, there will be opportunities for advancement within our organization.
The focus of a Network Security Operations Analyst centers around producing timely results that are high quality and accurate. Benefiting from an analytical, inquiring and critical mind, this job requires imagination and strong problem solving skills, but with a strong technical orientation. The job requires an ability to deal with abstract concepts, systems and ideas and all of that in an organized and self-disciplined way. Intellectual confidence is important in this job and to do it well requires close, hands-on involvement, careful follow-up and very disciplined, and limited, delegation. Central to this job is the need to weigh all decisions carefully and thoroughly, based on expertise in order to avoid unpredictable risk. You will be responsible for a variety of tasks including the continuous monitoring of cloud operations and security. Additionally, Network Security Operations Analysts are expected to continually strive for innovation, efficiencies, proactively remediate problem areas, write documentation and educate users on functionality, build a great rapport with clients and fellow associates, and treat others with respect and consideration regardless of their status or position.
As a Network Security Operations Analyst you will act in an operational role focusing on real time event and incident analysis. You will be responsible for a variety of tasks including the following:
* Monitoring and analysis of cyber security events with the use of Security Information and Event Management (SIEM)
* Monitor and triage infrastructure environment health and performance alarms
* Triage security events and incidents following Standard Operating Procedures
* Track incident remediation status from start to finish
* Escalate events and incidents to next level support where appropriate
* Provide incident documentation to management
Additionally an Network Security Operations Analyst will follow policies and procedures; complete administrative tasks correctly and on time; support the Bank's goals and values; will perform other duties as assigned; benefit the bank through outside activities, participate in coordination of disaster recovery planning and preparation, build a great rapport with clients and fellow associates, and treat others with respect and consideration regardless of their status or position.
Minimum Requirements:
* Understanding of cloud and on-prem network infrastructure and systems
* Strong analytical troubleshooting skills
* Ability to collaborate and work in a team environment
* Overall Understanding of TCP/IP 3-way handshakes, network protocols, and network routing
* Strong communication skills
* Maintain incident or event tracking via internal ticketing system in a timely manner
Desired Skills: Ideal candidates for this position should possess some or all of the following skills:
* Experience with Windows and Linux platforms
* Experience with application and network performance monitoring
* Experience with Microsoft Azure and AWS cloud infrastructure
* Ability to make sound and timely decisions, to consistently deliver on commitments, and assume responsibility for results
* Ability to think creatively and meet challenges with resourcefulness
* Experience with Azure Sentinel and/or LogRhythm SIEM
* Experience with database technologies including mysql, mssql, postgres, redis
* Experience with firewalls, IPS, and/or load balancers
* Understanding/Experience with Azure Kubernetes (AKS)
* Take initiative to research and resolve problems prior to asking for assistance from Manager and ability to make quick pivots with priorities
* Familiarity with Change Management processes, controls, and documentation.
* Must be self-motivated, proactive, service-oriented team player with good interpersonal skills
* Ability to communicate technical issues to a variety of audiences
* Ability to function as part of an administrative support team
* Hands on software administrative experience
* Well developed and proven organization skills with ability to utilize time efficiently
* Proficient in MS Office applications which include Outlook, Word, Excel, Power Point, OneNote, Visio, & Access
* Exceptional verbal, written and interpersonal communication skills with the ability to apply common sense to carry out instructions and instruct others, train personnel, write procedures and correspondence, speak clearly to clients and associates
* Absolute discretion when dealing with confidential matters
* Strong typing skills to meet production needs of the position
Work Environment:
We are a culture that believes that people are our greatest asset and are at the heart of everything we do. We take pride in bringing clarity and simplicity to our associates (employees) and clients. Our decisions are made efficiently, fairly and locally. Our success is directly tied to the communities we serve. It is equally important for us to look through the lens of our applicants and associates to identify their individual needs. As such, we want to share the following:
* We are committed to our core value of meritocracy and supporting our associates in growing within their role
* Must be able to work at a rapid pace while sitting for long periods of time (typically no longer than 12 hours)
* Must be able to work overtime to the extent necessary
Benefits:
In addition to your financial compensation, we also offer a generous benefits package that includes insurance, 401k, an associate stock purchase program, paid time off, associate banking perks. For more information about the benefits offered click here.
If this is what you believe in, then you're definitely right for us. Consider making an investment in us, so that we may invest in you and your bright future.
Security Engineer
Security Engineer job 17 miles from Grandview
Spring Venture Group is a leading digital direct-to-consumer sales and marketing company with product offerings focused on the senior market. We specialize in distributing Medicare Supplement, Medicare Advantage, and related products via our family of brands and dedicated team of licensed insurance agents. Powered by our unique technologies that combine sophisticated marketing, comparison shopping, sales execution, and customer engagement – we help thousands of seniors across the country navigate the complex world of Medicare every day.
Job Description
Are you a cybersecurity engineer who thrives on the challenge of safeguarding digital assets? Do you possess a deep passion for engineering, configuring, and masterfully managing cutting-edge SIEM and EDR tools? Spring Venture Group is searching for a proactive and highly collaborative Security Engineer to join our elite team in Kansas City. This isn't just about monitoring; it's about building, optimizing, and automating our defenses to stay ahead of sophisticated threats.
We're looking for a hands-on engineer with 3+ years of experience who understands that true security comes from meticulous configuration, intelligent rule development, and seamless integration. If you're a problem-solver who enjoys diving deep into logs, crafting custom alerts, and orchestrating automated responses, this is the role for you. You'll be a vital part of protecting our information assets, ensuring the integrity of our systems, and championing a robust security posture across the organization.
You'll need strong scripting skills, particularly in Python and/or PowerShell, to excel in this role.
Please note: You must currently reside in the Kansas City area. We are unable to provide sponsorship for this role now or in the future.
What You'll Engineer and Manage
SIEM Mastery: The Brains of Our Defense
You won't just use our SIEM; you'll be its architect and custodian. You'll be instrumental in:
Engineering and optimizing our SIEM solution to ingest, normalize, and analyze security events from diverse sources, transforming raw data into actionable intelligence.
Designing, developing, and continually refining SIEM rules, alerts, and dynamic dashboards that provide immediate visibility into emerging threats.
Spearheading investigations into security incidents identified by the SIEM, rapidly dissecting alerts to uncover their root cause and impact.
EDR Domination: Fortifying Our Endpoints
Take ownership of our EDR capabilities, ensuring our endpoints are resilient and responsive. Your responsibilities will include:
Deploying, meticulously configuring, and actively managing our Endpoint Detection and Response (EDR) solution across the enterprise.
Proactively analyzing EDR alerts, transforming them into actionable insights and leading thorough investigations into potential endpoint security incidents.
Developing, implementing, and enforcing robust EDR rules and policies that automatically detect, prevent, and respond to threats at the endpoint level.
Orchestrating rapid responses to contain and eradicate endpoint-specific threats, minimizing their impact.
Cloud Security Platform Administration: Securing Our Digital Frontier
Configure and maintain our cloud security platforms, ensuring a secure and compliant cloud environment.
Monitor and analyze cloud application usage and security events, identifying and mitigating risks.
Implement and enforce stringent cloud security policies.
Incident Response: On the Front Lines
Lead and participate in critical incident response activities, from initial investigation to containment and full remediation.
Meticulously document incident response procedures and findings to foster continuous improvement.
Actively contribute to the ongoing development and enhancement of our incident response plans.
Orchestration and Automation: Building Smart Defenses
Develop and implement ingenious security automation scripts and workflows, leveraging your Python and/or PowerShell expertise, streamlining our operations.
Integrate diverse security tools and systems to create a cohesive and highly efficient security ecosystem.
Utilize orchestration tools to automate incident response and routine security tasks, freeing up valuable time for advanced threat hunting.
Vulnerability Management: Proactive Defense
Conduct thorough vulnerability scans and assessments, identifying potential weaknesses before they can be exploited.
Analyze complex vulnerability reports, expertly prioritizing remediation efforts based on risk and impact.
Collaborate seamlessly with IT teams to ensure timely patching and remediation of identified vulnerabilities.
Continuously maintain and enhance our comprehensive vulnerability management program.
Who You Are:
You're more than just a security professional; you're a team player who thrives on collaboration, capable of working seamlessly across various IT teams. Your strong written and verbal communication skills allow you to articulate complex security concepts to both technical and non-technical audiences. You're passionate about security engineering and ready to make a significant impact.
If you're eager to take ownership of critical security tools and truly engineer robust defenses, we want to hear from you!
Qualifications
Qualifications:
3-5 years of experience in IT or security.
Must have 2-3 years work experience coding scripting languages (Python, PowerShell, etc.)
Must have 2-3 years of work experience with automation tools and tool configuration.
Experience with SOAR.
Proven experience with SIEM tools (e.g., Splunk, Sentinel).
Experience managing an EDR solution.
Experience with cloud security platforms (e.g. Netskope).
Strong understanding of incident response principles and methodologies.
Knowledge of vulnerability management processes and tools.
Strong understanding of networking and security protocols.
Excellent problem-solving and analytical skills.
Ability to work independently and as part of a team.
Strong written and verbal communication skills.
Relevant security certifications (e.g., Security+, CEH, CISSP) are a plus.
Desired Skills:
Experience with cloud security (AWS, Azure, GCP).
Knowledge of compliance frameworks (e.g., NIST, ISO 27001).
Experience conducting threat hunting, penetration testing, or purple team exercises.
Experience in a regulated industry.
Additional Information
Benefits:
The Company offers the following benefits for this position, subject to applicable eligibility requirements:
Competitive Compensation
Medical, Dental and vision benefits after a short waiting period
401(k) matching program
Life Insurance, and Short-term and Long-term Disability Insurance
Optional enrollment includes HSA/FSA, AD&D, Spousal/Dependent Life Insurance, Travel Assist and Legal Plan
Generous paid time off (PTO) program starting off at 15 days your first year
15 paid Holidays (includes holiday break between Christmas and New Years)
10 days of Paid Parental Leave and 5 days of Paid Birth Recovery Leave
Annual Volunteer Time Off (VTO) and a donation matching program
Employee Assistance Program (EAP) - health and well-being on and off the job
Rewards and Recognition
Diverse, inclusive and welcoming culture
Training program and ongoing support throughout your Venture Spring Venture Group career
Spring Venture Group is an Equal Opportunity Employer
Data Security Platform Engineer
Security Engineer job 17 miles from Grandview
WHO WE ARE Come join the company reinventing data security, empowering businesses to realize the full potential of their data. As the leading data security platform purpose-built for the cloud era, Cyera's mission is to reinvent how businesses secure data, enable agile collaboration, and boldly pursue new business opportunities. Trusted by security teams at leading global businesses, our team is proving that data security is the next big thing in cyber. Backed by the world's leading investors and working with a large and growing list of Fortune 1000 companies, we are looking for world-class talent to join us as we usher in the new era of data security.
THE OPPORTUNITY
We are searching for a highly skilled Data Security Platform Engineer to play a key role in optimizing our customers' utilization and return on investment in Cyera. This position offers an exciting chance to join a thriving organization and contribute to the forefront of data security, making a significant impact on the protection of data for numerous global enterprises. As part of this role, you can expect to travel between 5-10% annually. This role is a 100% in office role located in St. Louis, MO.
RESPONSIBILITIES:
Cyera Platform Operations
* Operate and monitor the Cyera platform for assigned customers, ensuring reliability, accuracy, and performance.
* Build and execute workflows to notify data owners of issues and drive remediation when applicable.
* Perform routine health checks, upgrades, and maintenance to ensure consistent service delivery.
* Configure and maintain platform integrations to meet evolving customer requirements.
* Tune policies and detection capabilities based on customer-specific needs.
* Create custom reports and dashboards to highlight business value and security impact.
* Maintain detailed documentation, including customer configurations, operating procedures, and runbooks.
* Identify opportunities to streamline and automate operational processes for scale and efficiency.
* Ensure SLA commitments are met by supporting data owner engagement and helping drive resolution of identified issues.
Customer Success Alignment
* Collaborate closely with Customer Success, Sales, and Product teams to deliver customer-focused outcomes.
* Standardize and optimize the onboarding process, driving scalability and enhancing customer satisfaction.
* Build trusted relationships with champions at strategic customer accounts, ensuring long-term success and advocacy.
Cross-Functional Collaboration
* Work alongside Product Management, R&D, and the Office of the CTO to align service delivery with product innovation and customer needs.
* Provide actionable feedback from the field to enhance product usability, supportability, and functionality.
* Support the pre-sales to post-sales transition, ensuring alignment and a seamless customer journey.
Service Delivery Excellence
* Act as a technical expert on the Cyera Platform, demonstrating deep knowledge and proficiency.
* Drive customer adoption through effective onboarding, training, and enablement programs.
* Understand customer requirements, challenges, and business goals, designing and delivering customized solutions and use cases through a consultative approach.
* Proactively identify and resolve obstacles to customer success, collaborating with internal teams to ensure timely resolution.
* Advocate for the voice of the customer, actively influencing Cyera's roadmap and product development to better meet user needs.
Team Collaboration & Development
* Document and share best practices both internally and externally to promote knowledge sharing and continuous improvement.
* Mentor team members, providing guidance and support for their professional growth.
* Contribute to hiring by participating in the interview process and supporting the onboarding of new team members.
* Foster a positive, collaborative, and high-performing team culture at Cyera.
Requirements
REQUIRED QUALIFICATIONS:
* Associates degree or equivalent experience required. Bachelor's degree in Computer Science or similar experience a plus
* Strong project management skills, enabling you to effectively plan, organize, and execute multiple projects simultaneously while maintaining a strong attention to detail
* A self-starter who thrives in an ambiguous, fast-paced, and deadline-oriented startup environment.
* A results-oriented mindset, with a proven track record of driving revenue growth, ensuring customer satisfaction, promoting feature adoption, and maximizing customer retention.
* Prior experience collaborating with Development teams.
* Proficiency in SQL, scripting languages (e.g., Python or equivalent), and hands-on experience with cloud environments.
* 3+ years of hands-on experience with data technologies and cloud technologies, including databases, cloud infrastructure and basic administration (e.g., cloud networking, data and compute assets, IAM and permissions, etc,)
* Experience with programming or scripting languages and familiarity with APIs and web services
* Demonstrated expertise in DLP (Data Loss Prevention), Data Privacy/Protection, DSPM/CSPM (Cloud Security Posture Management), SIEM (Security Information and Event Management), or vulnerability management with hands-on experience preferred.
* Prior experience working in a software company in a technical customer-facing role is essential.
* Demonstrated track record of owning customer relationships, including onboarding, renewal, and expansion.
* A self-motivated, proactive, and innovative team player who consistently strives to inspire customer loyalty.
* Excellent interpersonal and customer relations skills, particularly when it comes to building and nurturing strategic relationships.
* A clear and concise verbal and written communicator, capable of conveying complex information effectively.
* Proficiency in leading both executive meetings and technical workshops, demonstrating confidence and expertise.
* Ability to work autonomously, tackling even the most intricate challenges, and successfully completing tasks that may lack comprehensive documentation. They will actively participate in projects aligned with their current skill set, seeking assistance primarily for more complex initiatives or issues.
COMPENSATION INFORMATION:
In addition to a standard benefits and equity package, we offer a generous salary. Final compensation will vary based on seniority and relevance of experience, location, and position requirements.
This role may be eligible for potential merit increases based on factors such as individual or company performance, time in role, and other discretionary factors.
BENEFITS - Why Cyera?
* Competitive salary
* Unlimited PTO
* Paid holidays and sick time
* Health, vision, and dental insurance
* Life, short and long-term disability insurance
Location Requirements
Principal, Microsoft Security Engineer - Purview
Security Engineer job 17 miles from Grandview
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies.
The Global Technology Microsoft Center of Excellent (MCoE) drives strategic direction and enablement. We accelerate innovation and learning, advance sales and delivery excellence by amplifying Slalom's proven local model with high-caliber Microsoft technology expertise. Our focus is Microsoft's six go-to-market solution areas: Modern Work, Security, Azure Infrastructure, Digital & Application Innovation, Data & AI, and Business Applications.
Slalom is targeting a Principal hire for this role.
What You'll Do
* Implement and manage security solutions for Microsoft environments.
* Focus on enhancing the end user experience across secure solution architectures.
* Deploy tailored M365 Compliance configurations with Purview Information Protection, Data Loss Prevention (DLP), data lifecycle management, and records management.
* Implement and manage Azure data governance solutions.
* Collaborate with IT and security teams to ensure compliance with security policies.
* Conduct security audits and assessments.
* Provide technical support and guidance on security matters.
* Develop and maintain security policies, standards, and guidelines.
* Stay current with emerging security threats and technologies.
Who You Are
* Experience as a Microsoft Security Engineer or similar role.
* Proficiency in Microsoft security technologies and tools, including Purview Information Protection, DLP, data lifecycle management, records management, and Azure data governance.
* Strong troubleshooting and problem-solving skills.
* Excellent communication and teamwork skills.
* Ability to work independently and as part of a team.
* Strong understanding of security best practices and regulatory requirements.
* Experience with security frameworks such as NIST, ISO 27001, and CIS Controls.
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this position at the Principal level the base salary pay range is $122,000 to $225,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
We are accepting applicants until 6/13/2025..
Security Engineer
Security Engineer job 9 miles from Grandview
Job Description
Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply!
What You'll Do:
As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include:
Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services.
General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively.
Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments.
Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments.
Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives.
Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams.
Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends.
Who You Are:
Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats.
Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies.
Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to:
Google Cloud Security Command Center (SCC)
Google Security Operations
Google Threat Intelligence
Cloud Logging and Monitoring for security
Google Cloud Identity and Access Management (IAM)
Google Cloud Armor
Certifications: Possess one or more security certifications such as:
CompTIA Security+
(ISC)² SSCP or CISSP (Associate of (ISC)²)
Google Cloud Professional Cloud Security Engineer (highly preferred)
Other relevant cloud security certifications
Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences.
Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail.
Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
Security Network Architect
Security Engineer job 9 miles from Grandview
The City of Overland Park has a full-time Security Network Architect position available in the Information Technology Department. Implements, maintains, and monitors the organization's security environment and infrastructure. Includes supporting existing security applications including but not limited to endpoint protection, monitoring systems, IDPS, NAC, Enterprise NGFW. Reviews current system environment and recommends and implements enhancements. Conducts regular system tests and ensures continuous monitoring of network security. Maintains and organizes the practice of disaster recovery plans and procedures. Responds to security incidents and provides thorough post-event analysis. Assists IT leadership with cultivating a culture of security awareness including regular training, assessments and policy review and enforcement. Diagnoses and resolves complex network and system issues. Plans for and designs security infrastructure (physical and virtual)
RESPONSIBILITIES:
* Supports the organization's security environment including planning, installation, maintenance, monitoring and replacement/upgrade recommendations.
* Keeps up-to-date on cybersecurity industry trends, and technology developments. Make recommendations as appropriate.
* Supports the organization's security fabric, including planning, installation, maintenance, monitoring and replacement/upgrade recommendations. Security services include but are not limited to endpoint protection, monitoring systems, IDPS, NAC, NGFW.
* Manage and conduct Threat Intelligence and Threat hunting analysis activities.
* Keeps up-to-date on security threats and trends. Makes recommendations for compliance and threat mitigation.
* Designs security infrastructure for the purpose of providing highly dependable and secure connectivity systems.
* Develops project plans, time and cost estimates, implementation schedules, and project timelines.
* Reviews, evaluates and recommends disaster recovery strategies.
* Creates and maintains comprehensive documentation for all supported systems.
* Evaluates vendor products in hardware, software, and telecommunications equipment.
* Assist in preparation of proposals and solution presentations.
* Participates in long- and short-range technology planning. Recommends purchases consistent with the organization's short- and long-term objectives.
* Recommends networking and security policies and standards to ensure efficient use of Organizational resources and adherence to good security practices.
* Closely coordinates internally and maintains contact with outside organizations in the maintenance, service, recommendation, implementation, problem solving and/or purchase of security services, software and hardware.
* Troubleshoots security hardware and software problems and is typically consulted on the organization's most difficult and complex hardware/software problems and projects.
* Attends classes, seminars, conferences, user groups and reviews professional literature to enhance knowledge of trends and developments related to local area network systems.
* Answers Help Desk phones calls and participates in on-call rotation as required.
* Performs other duties as assigned.
* The employee must work the days and hours necessary to perform all assigned responsibilities and tasks. Must be available (especially during regular business hours or shifts) to communicate with peers, subordinates, supervisors, customers, vendors and any other persons or organization with whom interaction is required to accomplish work and employer goals.
* The employee must be punctual and timely in meeting all requirements of performance, including, but not limited to, attendance standards and work deadlines; beginning and ending assignments on time; and scheduled work breaks, where applicable.
REQUIREMENTS:
* Bachelor's degree in computer science, cyber security, computer science, engineering, information technology, mathematics or a related field, or an equivalent combination of formal education and work experience.
* Must have a valid driver's license and maintain an insurable driving record.
* Access to the Kansas Criminal Justice Information System (KCJIS) may be required, so the following KCJIS requirements apply: must be at least 18 years of age; must not have been convicted of a felony; must not have been convicted of a serious misdemeanor; and must not have an arrest history the nature and severity of which warrant disqualification.
EXPERIENCE:
* Five to ten years' experience with configuration, installation and maintenance of enterprise IT security environments.
* Working knowledge of IT security environments to include security infrastructure, Firewall, SIEMS, Sandox, XDR\MDR, server, and client hardware.
* Five to ten years of experience with configuration, installation and management of cybersecurity enterprise systems.
* CISSP certification is preferred. Fortinet NSE 4, NSE 5 preferred.
* Fortinet NSE 6 & NSE 7 desired.
* Certification in networking or server administration is preferred.
* Compliance knowledge of NIST and CIS Control Frameworks.
SKILLS:
* Five years' experience in at least five of the following: Next generation Fortinet firewall administration/support.
* Endpoint Protection support/administration.
* Information security and/or IT risk management with a focus on security, performance and reliability Security protocols, cryptography, authentication.
* Tenable SC+ & Tenable CS
* Current IT risks and experience implementing security solutions
* Threat Hunting and Threat Intelligence Analysis
* Multi-factor authentication, single sign-on, identity management or related technologies
* OSI Model, IEEE 802.x protocols, UDP, TCP/IP, SNMP.
* Routing protocols such as OSPF and MPLS.
* GIAC GCWN Security Administrator
* Ethernet based data network transport technologies.
* Administration of IP addressing, subnets.
* Test equipment and protocol analyzers to aid in diagnosis and solution of problems encountered in a complex networking environment.
* Advanced administration, implementation, and support experience in: Google applications, Microsoft Azure, MDM applications, virtualization software, and/or servers and datacenter environments.
* Advanced working knowledge in either virtualization software or active directory.
* Fortinet Firewalls and Fortinet Unified Threat Management environment.
* Ability to document and evaluate current environment and use best practice methodologies to ensure highest level investment utilization.
* Strong organizational and time-management skills.
* Advanced written, verbal, reading and communication skills.
* Ability to perform intermediate level mathematical calculations.
* Excellent interpersonal skills with ability to communicate effectively with others.
MENTAL REQUIREMENTS:
* Ability to work independently.
* Ability to prioritize work. Ability to analyze complex problems and recommend possible solutions.
* Alpha and numeric recognition.
* Abstract and logical reasoning.
* Decision making ability.
* Ability to adapt to a changing environment.
PHYSICAL REQUIREMENTS:
* Ability to make and receive phone calls.
* Ability to lift approx. 50 lbs. and transport 25 feet.
* Hand and eye coordination adequate for data entry.
* Ability to operate a city vehicle.
SUPERVISORY RESPONSIBILITY (Direct & Indirect):
* None.
The preceding job description has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job.
No City residency requirement.
Must successfully pass a background check, drug screen, physical exam and essential functions test.
Normal Work Hours: 8:00 a.m.-5:00 p.m., Mon.-Fri.
Salary Range - GRADE K: $97,289.93 - $136,205.08
Application Deadline: Open until filled
Benefits: Full-time
All applicants must be legally eligible to work in the United States and proof of eligibility must be provided if selected for hire.
EO/M/F/D/V
KS-Chief Information Security Officer
Security Engineer job 17 miles from Grandview
An advocate for the total information security needs of SLHS and is responsible for the development and delivery of a comprehensive information security strategy to optimize the security posture of the Health System. Leads the development and implementation of a security, GRC, and business continuity program that leverages collaboration and organization wide resources, facilitates information security governance, advises senior leadership on security direction and resource investment, and designs appropriate policies to manage information security risk. The complexity of this position requires a leadership approach that is engaging, imaginative, and collaborative, with a sophisticated ability to work with other leaders to set the best balance between security strategies and other priorities at the organization level.
Job Requirements
Applicable Experience:
6-9 years CCISO - EC-Council, CISM - ISACA, CISSP - ISC Bachelor's Degree Job Details Full Time Day (United States of America)
The best place to get care. The best place to give care
. Saint Luke's 12,000 employees strive toward that vision every day. Our employees are proud to work for the only faith-based, nonprofit, locally owned health system in Kansas City. Joining Saint Luke's means joining a team of exceptional professionals who strive for excellence in patient care. Do the best work of your career within a highly diverse and inclusive workspace where all voices matter.
Join the Kansas City region's premiere provider of health services. Equal Opportunity Employer.
Effective November 1st, 2021, full COVID-19 vaccination is a condition of employment for all Saint Luke's Health System employees unless a medical or religious exemption is approved.
Senior Security Engineer
Security Engineer job 17 miles from Grandview
**Best People + Right Culture. These are the driving forces behind JE Dunn's success.** **By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years.**
**Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection.**
**Role Summary**
The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn.
+ Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
+ Career Path: Security Architect
**Key Role Responsibilities - Core**
KEY ROLE RESPONSIBILITIES
_SECURITY ENGINEER FAMILY - CORE_
+ Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices.
+ Mentors team members on technical and security methodology characteristics.
+ Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness.
+ Acts as primary technical resource for design and implementation projects.
+ Drafts and recommends operating procedures and changes to information security practices and solutions.
+ Trains and engages operations and support personnel on security solutions.
+ Advise on trends, threats, and emerging security risks, relevant to the organization.
+ Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements.
+ May be a subject matter expert for a variety of security related systems or applications.
+ Communicates with operational groups for collaboration of security program management.
+ Advocates secure culture and provides education throughout the appropriate client group.
+ Improves maturity capability of processes, procedures, and operations of the security program.
+ Communicates intelligence and program effectiveness reports to supervision.
**Key Role Responsibilities - Additional Core**
_SENIOR SECURITY ENGINEER_
In addition, this position will be responsible for the following:
+ Designs and implements security solutions for various platforms
+ Conducts comprehensive security assessments and audits to determine the effectiveness of security controls
+ Assists operations as needed in incident response and contribute to post-incident analysis
+ Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements
+ Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level
+ Implements and maintains access control system for any type of new enhancement opportunities
+ Collaborates with development teams to ensure secure software development practices
+ Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working
+ Designs and implements robust security ensuring alignment with industry best practices and organization configurations
+ Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration
+ May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks
+ Builds security automation scripts and tools to streamline security operations and improve efficiency
+ Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle
+ Plays an active role in contributing ideas for security innovations
+ Assists in the design and execution of incident response as it pertains to security engineering
+ Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program
+ Implements security technologies with full understanding on accountability and ownership for full deployment
**Knowledge, Skills & Abilities**
+ Ability to perform work accurately and completely, and in a timely manner
+ Communication skills, verbal and written - Intermediate
+ Ability to lead technical projects once assigned
+ Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX
+ Ability to solve technical issues - Advanced
+ Demonstrated expert knowledge of information security practices
+ Substantial knowledge of Python and Powershell scripting languages
+ Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers
+ Proficient with multiple cloud platforms
+ Technical writing and documentation skills
+ Organizational skills
+ Ability to quickly and effectively solve complex problems
+ Ability to deliver quality through attention to detail
+ Ability to work in team and independently
+ Ability to work a flexible schedule - might be on call in the evenings and weekends
+ Ability to build relationships and collaborate within a team, internally and externally
**Education**
+ Bachelor's degree in information security or related field (Preferred)
+ In lieu of the above requirements, equivalent relevant experience will be considered
**Experience**
+ 5+ Years information security experience (Preferred)
**Working Environment**
+ Must be able to lift up to 25 pounds
+ May require periods of overnight travel
+ Normal office environment
+ Frequent activity: Sitting, Viewing Computer Screen
+ Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
**Benefits Information**
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details. (************************************************************************************
_JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace._
**_JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to_** **_accommodations@jedunn.com_**
_JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails._
**Why People Work Here**
At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them
**Building on our rich history,** our employee **owners are shaping the future** of JE Dunn. In our team-focused environment **we do life together** and are generously **rewarded for our efforts**
**About JE Dunn**
For more information on who we are, clickhere. (***********************************
**EEO NOTICES**
Know Your Rights: Workplace Discrimination is Illegal (***********************************************************************************************
California Privacy Policy
**E-Verify**
JE Dunn participates in the Electronic Employment Eligibility Verification Program.
E-Verify Participation (English and Spanish) (********************************************************************************************
Right to Work (English)
Right to Work (Spanish) (*****************************************************************************************************************************
**Nearest Major Market:** Kansas City
Information Security Officer
Security Engineer job 43 miles from Grandview
The Information Security Officer (ISO) is responsible for overall planning, development, implementation, and oversight of the University's information security program. The ISO works collaboratively with the campus community to establish information security programs to include Information security policies, practices and standards. Management of information security team and resources. Developing and managing information security incident response and management, risk assessment, security-related architecture, security awareness and training. Serves as the primary information security liaison to federal, state, local and professional organizations
Examples of Duties
25%
Information security policy, practices, and standards
Plan, develop, implement, and oversee the University's information security program in support of academic and administrative information systems and technology
Lead the development and work with University leadership to implement effective and reasonable policies and practices
Collaborate with Office of Technology leadership, Deans, and administrative leaders to maintain and update an IT security risk management program, while building relationships and goodwill
25%
Information security team and resources
Provide management, leadership, supervision, and accountability of the Information Security team
Mentor Information Security team members and implement professional development plans for all members of the team
Prepare financial forecasts for security operations and maintenance of security assets
Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position
10%
Information security awareness and training
Communicate information security-related issues to campus on a regular basis
Design and implement education programs focused on user awareness and security compliance
10%
Information security incident response and management
Develop security incident response plans
Lead the Security Incident Response Team (SIRT) in investigation and resolution of major security incidents
10%
Information risk assessment and management
Provide leadership, direction and guidance in assessing and evaluating information security risks
Work with internal/external auditors for required security assessments and audits
10%
Information security-related architecture
Develop, implement and administer technical security standards, security services and tools
10%
Primary information security liaison to federal, state, local and professional organizations
Lead efforts to internally assess and evaluate the adequacy of the security controls for the University's information and technology systems to protect against threats and verify compliance with state and federal statutory and regulatory requirements
Typical Qualifications
Education:
Bachelor's degree in Computer Information Systems, Management Information Systems, Computer Science, Cybersecurity, or related field. A master's degree is preferred.
Education may be substituted for experience or if experience may be substituted for education. Note that equivalencies are based on the following: AA = 2 years experience; BA/BS = 4 years experience; MA/MS = 6 years experience.
Experience:
Eight years of progressive management experience in a technology environment with increasing levels of responsibility in a combination of information security and systems/network administration. Experience in a higher education technology environment is preferred.
Knowledge, Skills, and Abilities for this position include:
Knowledge of risk assessment tools, technologies, and methods
Experience planning, researching, and developing information security policies, standards, and procedures.
Experience defining, planning, executing, and managing technology-based projects.
Knowledge and understanding of relevant legal and regulatory requirements, such as the Gramm-Leach-Bliley Act (GLBA), and the Family Educational Rights and Privacy Act (FERPA).
Experience with Anti-Malware, Next-Generation Firewalls (NGFW), Web Application Firewalls (WAF), Security Incident Event Management(SIEM), Data Loss Prevention(DLP), intrusion detection (IDS), intrusion prevention(IPS), Domain-based Message Authentication, Reporting, and Conformance (DMARC) penetration testing, and vulnerability assessment tools.
Advanced knowledge of information security principles, techniques and protocols.
Experience with PKI and SSL industry best practices.
Knowledge of cloud security best practices.
Knowledge of web and application security development best practices.
Licenses and CertificationsProfessional information security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager(CISM), or other similar credentials, is desired. Supervisory and Budget Responsibilities
Supervisory Responsibilities: Supervisor 1-2 employees
Budget Responsibilities: Manage Budget 30%
Supplemental Information
Physical Requirements: Lifting (weight) - 50-75 lbs
Special Instructions:
Full-time benefits-eligible position:
Benefits include competitive salary; health, dental, vision, life insurance, AD & D, long-term disability; 3 weeks paid vacation per year; 3 weeks of accrued sick leave per year; 13 paid holidays; retirement; and generous education assistance for an employee, spouse and dependent children taking classes at UCM.
Part-time benefits-eligible positions:
Benefits include generous education assistance for the employee.
Temporary, adjunct, student employment, or graduate assistant positions:
Benefits are not included.
Completed UCM online application for employment required. Incomplete applications will not be considered.
A review will begin immediately and continue until filled unless indicated otherwise.
NOTE: A background check is required for the selected candidate of all staff, faculty, adjunct, and temporary positions and any job offer is contingent on the results of this check. Student employees and graduate assistants do not require a background check to be conducted prior to employment.
The University of Central Missouri is an Equal Opportunity Employer and specifically invites applications from women, minorities, veteran status, and people with disabilities.
Security Analyst
Security Engineer job 9 miles from Grandview
Job DescriptionDescription:
Propio Language Services is a leading provider of language services dedicated to bridging communication gaps and ensuring accurate, culturally appropriate language interpretation and translation. We leverage innovative technology and a network of professional linguists to deliver top-tier language solutions across various industries. As we continue to grow, we are seeking a skilled Security Analyst with a strong focus on monitoring and identifying vulnerabilities. If you believe in the transformative power of technology-driven solutions and meaningful communication, Propio could be the ideal place for you
As a skilled and motivated Security Analyst on our Information Security team, you will be responsible for monitoring, analyzing, and responding to security threats across our technological environment. The ideal candidate will have hands-on experience with security tools and incident response processes, and a strong understanding of cybersecurity principles, compliance standards, and risk mitigation techniques.
Key Responsibilities:
Monitor and analyze logs and alerts from security tools (e.g., SIEM, IDS/IPS, EDR)
Investigate security incidents and assist in containment, eradication, and recovery efforts
Identify vulnerabilities in systems, networks, and applications, support remediation planning
Assist in managing and tuning security tools to ensure effectiveness
Work with IT and engineering teams to implement secure configurations and patch management
Support compliance efforts (e.g., SOC 2, HiTrust, HIPAA, GDPR) by gathering evidence and reviewing controls
Develop and maintain security documentation such as playbooks, policies, and procedures
Respond to client questionnaires
Participate in threat hunting, red/blue team exercises, and tabletop simulations
Assist in managing security awareness training and phishing simulation campaigns
Manage and support Identity and Access Management (IAM) processes and tools, including RBAC, onboarding, offboarding, and access reviews
Requirements:
Qualifications:
Bachelor’s degree in information security, Computer Science, or a related field—or equivalent experience
2–4 years of experience in a technology or security operations
Strong understanding of network protocols, operating systems, and security architecture
Familiarity with threat intelligence platforms and common frameworks (MITRE ATT&CK, NIST, ISO 27001)
Experience with security tools such as Splunk, CrowdStrike, Microsoft Defender, or similar
Strong analytical and problem-solving skills; ability to work in high-pressure situations
Excellent written and verbal communication skills
Preferred Qualifications:
Security certifications (e.g., CompTIA Security+, GSEC, CEH, SSCP, or CISSP Associate)
Experience working in regulated environments (e.g., healthcare, finance, government)
Experience with scripting or automation (Python, PowerShell, etc.)
Chief Information Security Officer
Security Engineer job 17 miles from Grandview
Job DescriptionDescription:
Chief Information Security Officer
Kansas City, MO
Hybrid options available.
MUST HAVE: 10 years of experience in a combination of risk management, information security, and IT jobs in a larger banking environment.
MUST HAVE: In-depth understanding of Information Security, Business Continuity Planning, Disaster Recovery Planning, IT Regulatory Requirements, Risk Assessments, Access Management, Change/Configuration Management, Governance, Problem/Incident Management, Awareness and Training Programs.
MUST HAVE: CISA, CISSP, CISM, CRISC certifications or equivalent experience and willingness to obtain and expand certifications.
MUST HAVE: 10 years of supervisory experience; including managing professional leads and groups.
Salary: Pay is dependent on knowledge, skills, abilities, experience, and location.
Sunflower Bank, N.A. is looking for a highly motivated individual to fill the position of a full-time Chief Information Security Officer at our Kansas City, MO location.
The Chief Information Security Officer (CISO) leads the Information Technology (IT) Risk and Governance functions of the company and is responsible for defining the cybersecurity strategy for the organization to manage risk, protect client data and company resources. The IT Risk and Governance team is manages the following areas: Information Security, Business Continuity Management, Change Management, Data Privacy, along with operational IT governance responsibilities such as Risk Assessments, external reviews and audits, regulatory compliance, and associated IT policies, procedures and documentation. The CISO is also the acting Bank Security Officer and responsible for physical security, reporting to the Bank’s Chief Risk Officer. The CISO will work with business and IT leaders to provide and maintain solutions which meet business and technical requirements by applying new and existing security technologies and solutions to solve business needs.
Primary Responsibilities
Establish and maintain the enterprise vision, strategy, and program to ensure information assets, technologies, and data are protected.
Define and administer the strategies and polices associated with Information Security and IT Compliance.
Ensure the adequacy of security measures to protect the company’s information systems to meet business needs and satisfy regulatory requirements and guidelines.
Provide oversight of the team performing Information Security Functions including log monitoring, threat analysis, vulnerability management, impact analysis, and recommend action or remediation plans.
Develop training and awareness to support information security and IT Risk objectives at various levels throughout the company.
Work closely with IT Management to ensure implementation of appropriate IT controls, processes, procedures, systems, and security technologies.
Work closely with Enterprise Risk Management to align IT Risk and Governance with the overall company risk program.
Participate in tactical groups, committees, teams, and other meeting as needed to facilitate the integration and recognition of IT Risk and Governance Benefits into business company objectives.
Stay current on new developments in IT risk practices, technologies, and regulatory changes and anticipate organizational modifications.
May be required to fulfill responsibilities specific to Response and Recovery in support of established Emergency Management, Emergency Response, Business Recovery, and Crisis Management functions.
Responsible for supporting IT Response, Business Continuity, and Disaster Recovery processes as they pertain to the continuity of operations for the enterprise.
Responsible for performing periodic evaluations or assessments to ensure controls specific to data protection and Gramm Leach Bliley Act (GLBA) compliance are effective and efficient.
Responsible for creating and defining policy related to the physical security controls implemented across the company.
Perform the job in accordance with applicable industry laws and regulations as well as the policies and procedures established by the company.
Responsible for upholding Fair and Responsible Banking practices and Code of Ethics and Conduct guidelines.
Understand and participate in the Bank’s Community Reinvestment Act program.
Perform other duties as assigned.
Education / Experience
Bachelor’s Degree preferred.
10 years of experience in a combination of risk management, information security, and IT jobs in a larger banking environment.
10 years of supervisory experience; including managing professional leads and groups.
CISA, CISSP, CISM, CRISC certifications or equivalent experience and willingness to obtain and expand certifications.
Must possess in-depth understanding of Information Security, Business Continuity Planning, Disaster Recovery Planning, IT Regulatory Requirements, Risk Assessments, Access Management, Change/Configuration Management, Governance, Problem/Incident Management, Awareness and Training Programs.
Must possess working knowledge of IT Frameworks such as NIST, CIS, COBIT and ITIL.
Knowledge and/or experience with physical security controls and procedures.
Must possess strong verbal/written skills and the ability to effectively interface with internal business clients, operations teams, technical engineering teams, internal audit, regulators, senior management, executive management, and the board.
Must be a self-starter with the ability to work independently and to manage multiple tasks/projects in a disciplined and organized fashion while maintaining attention to detail.
Analytical problem-solving skills and the ability to evaluate areas of non-compliance and associated risk implications to the business.
Ability to motivate and manage employees to produce quality products and services.
Must be able to work flexible hours.
Sunflower Bank Benefits
Employees enjoy outstanding benefits, including:
401(k) Plan with 6% Match
Health/Dental/Vision Insurance
Company-paid Life Insurance
Tuition Reimbursement
Fitness Reimbursement
Paid Time Off
Volunteer Leave
Paid Holidays
Plus many more employee perks & incentives!
People choose to “bank” with us, but for those we serve, we’re more than a bank. We strive to be the financial backbone of their lives and we know that starts with our team.
If you qualify, apply online at ******************************
You’ve never worked anyplace like Sunflower Bank!
EOE/AA: Minorities/Females/Disabled/Vets
Open until filled; early application encouraged. This vacancy announcement may be used to fill similar positions within 90 days.
If you are a California resident, you may be entitled to certain rights regarding your personal information, which is information that identifies, relates to, or could reasonably be linked with a particular California resident or household. Additional information about our data collection practices and location specific notices is available on our privacy policy.
Chief Information Security Officer
Kansas City, MO
Hybrid options available.
MUST HAVE: 10 years of experience in a combination of risk management, information security, and IT jobs in a larger banking environment.
MUST HAVE: In-depth understanding of Information Security, Business Continuity Planning, Disaster Recovery Planning, IT Regulatory Requirements, Risk Assessments, Access Management, Change/Configuration Management, Governance, Problem/Incident Management, Awareness and Training Programs.
MUST HAVE: CISA, CISSP, CISM, CRISC certifications or equivalent experience and willingness to obtain and expand certifications.
MUST HAVE: 10 years of supervisory experience; including managing professional leads and groups.
Salary: Pay is dependent on knowledge, skills, abilities, experience, and location.
Requirements:
Identity Information Systems Security Engineer
Security Engineer job 17 miles from Grandview
Sun Life U.S. is one of the largest providers of employee and government benefits, helping approximately 50 million Americans access the care and coverage they need. Through employers, industry partners and government programs, Sun Life U.S. offers a portfolio of benefits and services, including dental, vision, disability, absence management, life, supplemental health, medical stop-loss insurance, and healthcare navigation. We have more than 6,400 employees and associates in our partner dental practices and operate nationwide.
Visit our website to discover how Sun Life is making life brighter for our customers, partners and communities.
Job Description:
Sun Life embraces a hybrid work model that balances in-office collaboration with the flexibility of virtual work.
The Identity Information Security Engineer will report to the AVP, Information Security and will be the individual responsible for security configurations and engineering for all information security systems, for on-premise and cloud-based security systems but most critically Identity and Access Management systems for workforce and customer identity. This role is for an expert who will provide solutions and figure out ways to make technology work.
Preferred skills
* Significant expertise and knowledge of configuration of Identity systems, including creation of password policies, configuration of Multifactor Authentication policies, both for workforce and customer identity
* Security certifications preferred (CISSP, OSCP, CISM, GIAC) or with a requirement of obtaining within 12 months upon hire
* Knowledge of scripting languages Python, Regex, PowerShell, SQL, JSON, and XML and at least some experience in an object-oriented programming language is desirable but not required
* Knowledge of automation platforms such as Terraform and Cloud Formation
* Proficient at working on a fully Agile team or willing to become an Agile expert with a focus on delivery and execution.
* An engineering leader requiring little supervision and guidance to reverse engineer and figure technology solutions out and take reasonable steps to troubleshoot and document due diligence
* Effective organization, prioritization, negotiation and influencing skills
Qualifications
* BS and the equivalent of 4+ years working in Information Security or equivalent 5 years of work experience, in a highly regulated environment, preferably in Healthcare or Fintech, in which there are demonstrated progressive levels of responsibility, experience, and leadership and hands-on experience with the implementation and configuration of security controls
* Extensive experience with Identity and Access Management, knowledge of SAML, OIDC, and other identity protocols, experience converting legacy authentication platforms to modern authentication tools
* Working knowledge of Firewalls, Switches, Routers, Network Sensors, Endpoint Controls, Server Controls, Web Application Firewalls, and Data Loss Prevention is required
Responsibilities
* Lead configuration, implementation of all information security systems, most notably authentication systems, cloud based and on-premise
* Implement authentication policies for customer and workforce identity initiatives
* Manage all information security systems and ensure proper patching levels of all such systems
* Act as backup or lead Scrum Master for Security Engineering team as assigned by Security team leadership
* Configure and engineer all Endpoint Security controls
* Configure and engineer all Network Security controls
* Configure and engineer all Server Security controls
* Configure and engineer all Database Security controls
* Configure and engineer all identities and permissions and single sign-on for contractors and employees
* Develops peers and staff by providing direction, support, and mentoring in areas of expertise
Salary Range: $88,500 - $132,800
At our company, we are committed to pay transparency and equity. The salary range for this role is competitive nationwide, and we strive to ensure that compensation is fair and equitable. Your actual base salary will be determined based on your unique skills, qualifications, experience, education, and geographic location. In addition to your base salary, this position is eligible for a discretionary annual incentive award based on your individual performance as well as the overall performance of the business. We are dedicated to creating a work environment where everyone is rewarded for their contributions.
Not ready to apply yet but want to stay in touch? Join our talent community to stay connected until the time is right for you!
We are committed to fostering an inclusive environment where all employees feel they belong, are supported and empowered to thrive. We are dedicated to building teams with varied experiences, backgrounds, perspectives and ideas that benefit our colleagues, clients, and the communities where we operate. We encourage applications from qualified individuals from all backgrounds.
Life is brighter when you work at Sun Life
At Sun Life, we prioritize your well-being with comprehensive benefits, including generous vacation and sick time, market-leading paid family, parental and adoption leave, medical coverage, company paid life and AD&D insurance, disability programs and a partially paid sabbatical program. Plan for your future with our 401(k) employer match, stock purchase options and an employer-funded retirement account. Enjoy a flexible, inclusive and collaborative work environment that supports career growth. We're proud to be recognized in our communities as a top employer. Proudly Great Place to Work Certified in Canada and the U.S., we've also been recognized as a "Top 10" employer by the Boston Globe's "Top Places to Work" for two years in a row. Visit our website to learn more about our benefits and recognition within our communities.
We will make reasonable accommodations to the known physical or mental limitations of otherwise-qualified individuals with disabilities or special disabled veterans, unless the accommodation would impose an undue hardship on the operation of our business. Please email ************************* to request an accommodation.
For applicants residing in California, please read our employee California Privacy Policy and Notice.
We do not require or administer lie detector tests as a condition of employment or continued employment.
Sun Life will consider for employment all qualified applicants, including those with criminal histories, in a manner consistent with the requirements of applicable state and local laws, including applicable fair chance ordinances.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Job Category:
IT - Technology Services
Posting End Date:
01/08/2025
Information Security Officer
Security Engineer job 15 miles from Grandview
Job Posting Office of Information Technology Services (OITS) Our employees are our most valuable resource, pivotal to our success. OITS is dedicated to fostering a work environment that values work-life balance. With the state's generous paid time off, including holidays, this ensures our employees have the time they need to rejuvenate. We actively support our team's professional growth through tuition and certification reimbursement, empowering them to pursue their career aspirations. With sample opportunities for continued learning, we prioritize career and leadership development and mentorship. OITS is a great place to work, come join our team!
Verification of identity and employment eligibility to work in the United States is required by federal law. For a list of acceptable documents that establish these criteria, please refer to the federal Form I-9. OITS does not provide sponsorships for this position.
E-Verify: The Office of Information Technology Services (OITS) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Office of Information Technology Services
About the Position:
* Who can apply: Anyone
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* This position is eligible for OITS's hybrid work program. The candidate must work in the office three days a week. The supervisor and business needs will determine the hybrid schedule.
Compensation:
* Annual Salary/Hourly Rate: $85,000 - 95,000/Annually
Note: Salary can vary depending upon education, experience, or qualifications.
Position Summary:
The Information Security Officer (ISO) plays a critical role in safeguarding IT assets, systems, and data for the assigned agencies ensuring alignment with the Kansas Information Security Office's (KISO) overarching security strategy. The ISO supports the agency's business objectives and helps to ensure compliance with state, federal, and contractual security regulations. This role leads the implementation of security frameworks, policies, risk management, and third-party risk assessments, reporting directly to the Information Security Assurance Supervisor within the Executive Branch.
Embedded within one or more agencies, the ISO must balance agency-specific needs with state-wide security objectives and policies. This role requires a strong understanding of governance, risk management, and security frameworks, such as the NIST Cybersecurity Framework (CSF).
Key Responsibilities:
* Develop, implement, and maintain agency-specific information security policies and procedures to ensure alignment with the Kansas Information Security Office (KISO) strategy and applicable laws, regulations, and frameworks (e.g., NIST CSF, NIST 800-53).
* Lead risk management activities including risk assessments, mitigation planning, and third-party/vendor risk evaluations to protect agency data, systems, and infrastructure.
* Serve as the primary liaison between the agency and KISO, communicating and implementing statewide cybersecurity initiatives while balancing agency-specific operational needs.
* Conduct compliance assessments and support audits related to federal, state, and contractual security requirements, including CJIS, HIPAA, IRS Pub 1075, and others.
* Collaborate with agency leadership and technical teams to provide strategic guidance and ensure security is integrated into all business operations and IT projects.
* Respond to security incidents by coordinating with internal and external stakeholders to manage investigation, containment, and recovery, followed by root cause analysis and improvement plans.
* Provide security awareness training and consultation to agency staff to promote a strong security culture and ensure understanding of security policies and practices.
Required skills:
* Strong working knowledge of security frameworks such as NIST CSF or NIST 800-53.
* Ability to develop and implement policies and procedures, and to present security strategies to both technical and non-technical audiences.
* Effective communication skills, with the ability to convey complex security concepts in simple terms to technical and business stakeholders.
* Strong leadership and project management skills, with the ability to prioritize tasks in a fast-paced environment.
* Ability to assess regulatory requirements and determine whether existing controls meet those requirements.
* Proficient in reading and comprehending technical information related to software, hardware, and telecommunications systems.
Minimum Qualifications:
* Eleven (11) years' direct experience relative to the field of work, with at least three (3) years of direct experience in information security.
Preferred:
* One or more cybersecurity certifications (CISSP, CISM, CISA) or must obtain within one year.
* Familiarity with government and public sector environments
* Knowledge of state and federal regulations such as CJIS, HIPAA, and IRS Pub 1075.
Necessary Special Requirements: Ability to obtain and retain an OITS Security and KCJIS clearances are requirement of employment and continued employment.
Disclaimer: Due to security requirements related to system access, the following will result in disqualification for this position: Felony Convictions, Felony Deferred Adjudication, Class A Misdemeanor Deferred Adjudication, Class B Misdemeanor Convictions less than 10 years, an Open Arrest for Any Criminal Offense (Felony or Misdemeanor).
Employment Benefits:
In addition to the starting salary, the State of Kansas offers a significant benefits package that is available the first day of employment. All benefits eligible, full-time employees may elect to enroll in:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
* This benefits package represents additional annual compensation.
Visit the Employee Benefits page for more information…
Recruiter Contact Information:
* Name: Brenda Cripps
* Email: OITS_******************
* Mailing Address: 900 SW Jackson St, Room 803, Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Helpful Resources at jobs.ks.gov: "How, What, & Where do I Upload Documents."
Job Application Process
* First Sign in or register as a New User
* Complete or update your contact information on the:
* Careers> My Contact Information page
* NOTE: This information is included on all your job applications
* Upload required documents listed above for the Careers> My Job Applications page
* NOTE: This information is included on all your job applications
* Start your draft job application, upload other required documents, and submit when it is complete.
* Manage your draft and submitted applications on the Careers> My Job Applications page.
* Check your email and My Job Notifications for written communications from the Recruiter
* Email - sent to the Preferred email on the My Contact Information page
* Notifications - view the Careers> My Job Notifications page
Helpful Resources at jobs.ks.gov: "How to Apply for a Job - Instructions" and "How to Search for a Job - Instructions."
How to Claim Veterans Preference
Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
__________________________________________________________________________
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference:
Disability Hiring Preference | Kansas Department of Administration (ks.gov)
__________________________________________________________________________
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. We value diversity, equity, and inclusion as essential elements that create and foster a welcoming workplace. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability, or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the agency recruiter.
Information Security Specialist
Security Engineer job 12 miles from Grandview
Job Details MTN Westwood - Westwood, KS Full TimeDescription
The Information Security Specialist is responsible for driving information security initiatives. The individual will perform internal and external security compliance monitoring activities, manage client compliance audits, IT control audits, security gap analyses and security risk assessments/analyses. This role will assist in the management of key compliance areas such as HIPAA and the implementation of administrative, physical, and technical safeguards, PCI DSS, policy, process, and procedure governance, and the implementation of industry standards.
ESSENTIAL JOB FUNCTIONS
Maintain security and compliance initiatives to ensure that corporate policies, standards, procedures, and audit activities are in alignment with business, IT, legal, and regulatory requirements.
Develop and maintain a comprehensive set of policies, standards, processes, and procedures to ensure compliance with industry standards (,e.g., the NIST Cybersecurity Framework, the HIPAA Security Rule, and applicable laws.
Maintain a written information security program (WISP) that ensures security policies, standards and process are being adhered to by the business.
Monitor electronic systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and evolving and emerging cybersecurity attack vectors.
Respond to electronic system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interact with third-party incident responders, including law enforcement, and legal counsel.
Partner with IT leadership to administer authentication and access controls, including provisioning, changes, and deprovisioning of user and system accounts, security/access roles, and access permissions to information assets according to industry standards.
Lead the development, implementation and management of MTN's WISP, ensuring compliance and auditing for improvements on an ongoing basis.
Ensure compliance with healthcare information security best practices and HIPAA.
Ensure compliance with, and management of, the MTN cybersecurity incident response plan and provide guidance for improvements on an ongoing basis in conjunction with the HIPAA Compliance Officer.
Monitor security trends and drive information security best practices throughout the organization.
Evaluate, design, test, and recommend new or improved controls to keep MTN current with industry standards and compliance requirements.
Work with third party firms and consultants to conduct independent security audits, vulnerability scans, and penetration tests including social engineering.
Work together with the business to provide an interface for client information security audits
Collaborate with IT, legal, and other teams by providing cybersecurity input and guidance in relation to MTN's mission.
Conduct regular risk analyses, advise Senior Director, Information Technology Services and Senior management on appropriate recommendations and implement recommendations in an efficient and timely manner documenting remedial actions as directed.
Be informed about changes to the HIPAA Security Rule and other applicable laws and their impact on MTN's compliance obligations and business operations.
Work with the Manager, Corporate Education & Development and HIPAA Compliance Officer to develop and administer, or provide advice, evaluation, and oversight for, ePHI information security training and awareness programs.
Qualifications
QUALIFICATIONS AND PHYSICAL DEMANDS
Undergraduate degree in information systems or a related field or similar experience leading cybersecurity/information security initiatives.
Five or more years experience managing security in a healthcare environment where HIPAA/HITECH regulations and guidelines for securing ePHI data required
Experience advising and mentoring diverse teams without direct authority of team members
Professional certification in the information security space preferred (e.g. CISM, CISSP, CISA, GIAC) or other security certification at a similar level.
Experience in cybersecurity or information security systems, (Cisco Firepower, Firewalls, SIEM, EDR and NDR)
Experience with the Security Risk Assessment Tool developed by the Department of Health and Human Services' Office for Civil Rights.
Detail oriented, organized, excellent tracking/reporting skills, effective written and verbal communication.
Demonstrated understanding of business process analysis and how to use information technology to cost-effectively optimize business and clinical work processes.
Must maintain a valid driver's license in accordance with MTN motor vehicle policy. Must have reliable personal automobile transportation to be used with company reimbursement using IRS guidelines. Must be able to travel within the service area by ground or air.
Ability to lift 50 pounds and transfer short distances.
Possess ability to operate telephones, computers and office equipment.
Ability to speak and communicate clearly in order to accurately convey information in person or by phone.
OSHA Category III - No exposure to bloodborne pathogens while performing assigned job duties.
Home internet and wireless phone access may be required.
MTN BEHAVIORAL COMPETENCIES
Belonging: Intentionally connects with colleagues by embracing differences and finding commonalities to create a workplace where all employees feel safe and genuine at work. Models the philosophy that lived experiences make individuals unique by respecting and seeking to understand beliefs, values and opinions that are new or different from their own. Represents through actions and influence, the idea that diverse perspectives make MTN stronger as we serve our mission.
Respect: Builds a positive and supportive foundation inviting open, honest, and clear communication. Fosters a sensitive, supportive, and trustworthy environment, which promotes active listening and strengthens rapport throughout all interactions. Cultivates teamwork through acceptance and inclusion by valuing differences and empowering strengths.
Excellence: Demonstrates excellence by going above and beyond, while maintaining compassion and humility in all interactions. Demonstrates a high rate of achievement and success for the organization through proactive objectives centered on the overall mission and vision. Consistently models a positive attitude, a willingness to help others, and a dedication to improvement. Takes full responsibility for their role and challenges themselves to find workable solutions.
Accountability: Demonstrates the highest ethical standards, by honoring commitments to each other and professional partners. Executes all interactions through honesty and transparency. Demonstrates responsibility and integrity through ownership of the mission. Utilizes resources appropriately.
Leadership: Empowers, mentors and encourages all staff, while displaying a high-level of professionalism. Demonstrates ability to cultivate teams and relationships through open lines of communication, honesty and respect. Handles challenges with compassion by developing trust through respectful feedback and support. Acts as a resource by providing the tools, which enable others to reach their highest potential.
It is the policy of Midwest Transplant Network (MTN) to provide equal opportunity in employment to all employees and applicants for employment. No person will be discriminated against in employment because of race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, ethnic origin, age, genetic information, disability, protected veteran status, arrest record, or any characteristic protected by applicable federal, state or local laws. In addition, the organization complies with applicable state and local laws governing non-discrimination in employment in every location in which the organization has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, training, employee activities and general treatment during employment
MTN is committed to complying with state and federal disability laws and makes reasonable accommodations when requested by a qualified applicant or employee with a disability to enable the applicant or employee to be considered for the position they desire, to perform the essential functions of the position in question, or to enjoy equal benefits and privileges of employment as are enjoyed by other similarly situated employees without disabilities, unless the accommodation would impose an undue hardship on the operation of MTN's mission.
Security Engineer
Security Engineer job 17 miles from Grandview
Are you a cybersecurity engineer who thrives on the challenge of safeguarding digital assets? Do you possess a deep passion for engineering, configuring, and masterfully managing cutting-edge SIEM and EDR tools? Spring Venture Group is searching for a proactive and highly collaborative Security Engineer to join our elite team in Kansas City. This isn't just about monitoring; it's about building, optimizing, and automating our defenses to stay ahead of sophisticated threats.
We're looking for a hands-on engineer with 3+ years of experience who understands that true security comes from meticulous configuration, intelligent rule development, and seamless integration. If you're a problem-solver who enjoys diving deep into logs, crafting custom alerts, and orchestrating automated responses, this is the role for you. You'll be a vital part of protecting our information assets, ensuring the integrity of our systems, and championing a robust security posture across the organization.
You'll need strong scripting skills, particularly in Python and/or PowerShell, to excel in this role.
Please note: You must currently reside in the Kansas City area. We are unable to provide sponsorship for this role now or in the future.
What You'll Engineer and Manage
SIEM Mastery: The Brains of Our Defense
You won't just use our SIEM; you'll be its architect and custodian. You'll be instrumental in:
Engineering and optimizing our SIEM solution to ingest, normalize, and analyze security events from diverse sources, transforming raw data into actionable intelligence.
Designing, developing, and continually refining SIEM rules, alerts, and dynamic dashboards that provide immediate visibility into emerging threats.
Spearheading investigations into security incidents identified by the SIEM, rapidly dissecting alerts to uncover their root cause and impact.
EDR Domination: Fortifying Our Endpoints
Take ownership of our EDR capabilities, ensuring our endpoints are resilient and responsive. Your responsibilities will include:
Deploying, meticulously configuring, and actively managing our Endpoint Detection and Response (EDR) solution across the enterprise.
Proactively analyzing EDR alerts, transforming them into actionable insights and leading thorough investigations into potential endpoint security incidents.
Developing, implementing, and enforcing robust EDR rules and policies that automatically detect, prevent, and respond to threats at the endpoint level.
Orchestrating rapid responses to contain and eradicate endpoint-specific threats, minimizing their impact.
Cloud Security Platform Administration: Securing Our Digital Frontier
Configure and maintain our cloud security platforms, ensuring a secure and compliant cloud environment.
Monitor and analyze cloud application usage and security events, identifying and mitigating risks.
Implement and enforce stringent cloud security policies.
Incident Response: On the Front Lines
Lead and participate in critical incident response activities, from initial investigation to containment and full remediation.
Meticulously document incident response procedures and findings to foster continuous improvement.
Actively contribute to the ongoing development and enhancement of our incident response plans.
Orchestration and Automation: Building Smart Defenses
Develop and implement ingenious security automation scripts and workflows, leveraging your Python and/or PowerShell expertise, streamlining our operations.
Integrate diverse security tools and systems to create a cohesive and highly efficient security ecosystem.
Utilize orchestration tools to automate incident response and routine security tasks, freeing up valuable time for advanced threat hunting.
Vulnerability Management: Proactive Defense
Conduct thorough vulnerability scans and assessments, identifying potential weaknesses before they can be exploited.
Analyze complex vulnerability reports, expertly prioritizing remediation efforts based on risk and impact.
Collaborate seamlessly with IT teams to ensure timely patching and remediation of identified vulnerabilities.
Continuously maintain and enhance our comprehensive vulnerability management program.
Who You Are:
You're more than just a security professional; you're a team player who thrives on collaboration, capable of working seamlessly across various IT teams. Your strong written and verbal communication skills allow you to articulate complex security concepts to both technical and non-technical audiences. You're passionate about security engineering and ready to make a significant impact.
If you're eager to take ownership of critical security tools and truly engineer robust defenses, we want to hear from you!
Qualifications
Qualifications:
3-5 years of experience in IT or security.
Must have 2-3 years work experience coding scripting languages (Python, PowerShell, etc.)
Must have 2-3 years of work experience with automation tools and tool configuration.
Experience with SOAR.
Proven experience with SIEM tools (e.g., Splunk, Sentinel).
Experience managing an EDR solution.
Experience with cloud security platforms (e.g. Netskope).
Strong understanding of incident response principles and methodologies.
Knowledge of vulnerability management processes and tools.
Strong understanding of networking and security protocols.
Excellent problem-solving and analytical skills.
Ability to work independently and as part of a team.
Strong written and verbal communication skills.
Relevant security certifications (e.g., Security+, CEH, CISSP) are a plus.
Desired Skills:
Experience with cloud security (AWS, Azure, GCP).
Knowledge of compliance frameworks (e.g., NIST, ISO 27001).
Experience conducting threat hunting, penetration testing, or purple team exercises.
Experience in a regulated industry.
Additional Information
Benefits:
The Company offers the following benefits for this position, subject to applicable eligibility requirements:
Competitive Compensation
Medical, Dental and vision benefits after a short waiting period
401(k) matching program
Life Insurance, and Short-term and Long-term Disability Insurance
Optional enrollment includes HSA/FSA, AD&D, Spousal/Dependent Life Insurance, Travel Assist and Legal Plan
Generous paid time off (PTO) program starting off at 15 days your first year
15 paid Holidays (includes holiday break between Christmas and New Years)
10 days of Paid Parental Leave and 5 days of Paid Birth Recovery Leave
Annual Volunteer Time Off (VTO) and a donation matching program
Employee Assistance Program (EAP) - health and well-being on and off the job
Rewards and Recognition
Diverse, inclusive and welcoming culture
Training program and ongoing support throughout your Venture Spring Venture Group career
Spring Venture Group is an Equal Opportunity Employer
Security Analyst
Security Engineer job 9 miles from Grandview
Full-time Description
Propio Language Services is a leading provider of language services dedicated to bridging communication gaps and ensuring accurate, culturally appropriate language interpretation and translation. We leverage innovative technology and a network of professional linguists to deliver top-tier language solutions across various industries. As we continue to grow, we are seeking a skilled Security Analyst with a strong focus on monitoring and identifying vulnerabilities. If you believe in the transformative power of technology-driven solutions and meaningful communication, Propio could be the ideal place for you
As a skilled and motivated Security Analyst on our Information Security team, you will be responsible for monitoring, analyzing, and responding to security threats across our technological environment. The ideal candidate will have hands-on experience with security tools and incident response processes, and a strong understanding of cybersecurity principles, compliance standards, and risk mitigation techniques.
Key Responsibilities:
Monitor and analyze logs and alerts from security tools (e.g., SIEM, IDS/IPS, EDR)
Investigate security incidents and assist in containment, eradication, and recovery efforts
Identify vulnerabilities in systems, networks, and applications, support remediation planning
Assist in managing and tuning security tools to ensure effectiveness
Work with IT and engineering teams to implement secure configurations and patch management
Support compliance efforts (e.g., SOC 2, HiTrust, HIPAA, GDPR) by gathering evidence and reviewing controls
Develop and maintain security documentation such as playbooks, policies, and procedures
Respond to client questionnaires
Participate in threat hunting, red/blue team exercises, and tabletop simulations
Assist in managing security awareness training and phishing simulation campaigns
Manage and support Identity and Access Management (IAM) processes and tools, including RBAC, onboarding, offboarding, and access reviews
Requirements
Qualifications:
Bachelor's degree in information security, Computer Science, or a related field-or equivalent experience
2-4 years of experience in a technology or security operations
Strong understanding of network protocols, operating systems, and security architecture
Familiarity with threat intelligence platforms and common frameworks (MITRE ATT&CK, NIST, ISO 27001)
Experience with security tools such as Splunk, CrowdStrike, Microsoft Defender, or similar
Strong analytical and problem-solving skills; ability to work in high-pressure situations
Excellent written and verbal communication skills
Preferred Qualifications:
Security certifications (e.g., CompTIA Security+, GSEC, CEH, SSCP, or CISSP Associate)
Experience working in regulated environments (e.g., healthcare, finance, government)
Experience with scripting or automation (Python, PowerShell, etc.)