Sr. Information Security Engineer
Security engineer job in Kansas City, MO
Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment.
Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed.
Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm.
Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves.
Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards.
Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment.
Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing.
Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level.
Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management.
Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process.
Independently and, as a team member, plans, executes and documents security tests and evaluation.
Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed.
Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects.
Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems.
Provides guidance to non-senior security staff on information security and any security related projects.
Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes.
Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives.
Required Technical Skillsets
Windows 2016+ Server Operating System Support and Configuration
• Azure Cloud Security Architecture and Implementation
Azure Blob Storage and Containers
• Certificate Authority and Key Management
• Cloud Intrusion Protection Systems / WAF
Cloud based DLP Systems
• Fluent ability to operate Security Information and Event Management solution
Additional Preferred Skillsets
Knowledge of CrowdStrike EDR, CrowdStrike SIEM
• Content Filtering via Web Gateway
• Malicious Site Analysis
• Apple (Mac) Security Enforcement
• Cloud Vulnerability and Penetration Testing
• Virus Protection, Endpoint Encryption
• Data Classification
AI Security
Information Security Specialist
Security engineer job in Kansas City, MO
CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future.
This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture.
Important Information
Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency.
No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc.
This position requires working on-site with 5 days per month remote work flexibility.
Key Activities
Risk Assessment & Analysis
Modernize the current approach to cybersecurity risk management and assessments.
Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization.
Identify and implement risk quantification and scoring approaches within the organization.
Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority.
Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations.
Conduct business impact analyses to understand how security incidents affect critical business functions.
Evaluate and quantify risks associated with third-party vendors and supply chain.
Assess specific risks related to cloud environments and services.
Program Development
Develop reports and dashboards to illustrate the organization's risk posture.
Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk.
Research and identify options to establish a risk register.
Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options.
Map cybersecurity risks to relevant regulatory requirements and compliance frameworks.
Continuously improve risk management processes based on industry trends and organizational needs.
Communication & Collaboration
Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand.
Partner with incident response teams to incorporate lessons learned into risk models.
Translate complex technical risk scenarios into actionable insights for all levels of the organization.
Qualifications
Experience
Typically requires at least 6 years of relevant cybersecurity risk management experience.
Experience with risk scoring methods and risk quantification.
Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume.
Experience establishing or running an Enterprise cybersecurity risk management program.
Experience with NIST SP 800-53 security standards.
Experience presenting risk information to executive leadership.
Education & Certifications
Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience.
Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred.
Technical Knowledge
Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF).
Strong skills and experience with data analysis.
Experience with GRC (Governance, Risk, and Compliance) tools.
Knowledge of business impact analysis methodologies.
Familiarity with cloud security frameworks (CCSK, CCSP).
Skills & Abilities
Ability to understand technical details of cybersecurity risk.
Ability to communicate complicated technical risk scenarios to all levels of the organization.
Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment.
Additional Information
How We Work (HWW):
On-site: 5 days per month remote work flexibility
Location: Kansas City, Denver, Oklahoma City, Omaha
Remote Eligible: No
Salary:
$98,600 - $139,000 / Senior Level
$117,300 - $165,400 / Advanced Level
Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location.
Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks.
Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future.
About Us
Total Rewards & Benefits
Who We Are
What We Do
Follow us on
LinkedIn
, Instagram,
X (formerly Twitter)
, and
YouTube
#KCFedIT
Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America)
The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences.
Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels.
Privacy Notice
Auto-ApplySystems Administrator - High Volume Secure Scanning Environment
Security engineer job in Kansas City, MO
We are seeking a highly skilled and security-conscious System Administrator to lead the design, deployment, and maintenance of a high-volume dedicated scanning environment to support the annual processing of IRS tax returns. This role demands deep expertise in secure systems architecture, document imaging workflows, and strict adherence to NIST cybersecurity standards. This position will be located in Kansas City, Missouri and will be a US-Based onsite position with core hours of operation from Monday to Friday 8 am to 5 pm CT.
Responsibilities
Establishes and maintains smooth operation of computer systems (to include operating systems, software and hardware) in networked or stand-alone configurations, maintains system integrity, and upgrades systems and/or servers as required. May create and document new methods supporting network/system operations and implement changes to procedures. Consults with support teams, help desks, customers and other technical staff in the resolution of problems, coordinates and performs operation and/or maintenance activities for networks/servers, identifies recurring problems and recommends steps to reduce the severity or frequency of problems. May plan for the transition of development and/or production environments to new technologies, utilize system software to monitor the performance of system files, manage system data to maintain performance efficiencies and/or study system requirements to determine proper server installation methods and procedures.
Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations.
Plan, coordinate, and implement network/system security measures in order to protect data, software, and hardware.
Provides regular monitoring and analysis regarding short and long-range planning for in-house systems.
Prepares or ensures that appropriate documentation exists, including operational instructions.
Writes or modifies basic scripts to resolve performance problems and automate administration tasks.
Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
Qualifications
Bachelor's with 8+ years (or commensurate experience)
Required Skills and Experience
Bachelor's degree with 8+years (or commensurate experience)
Hands-on experience with IBML or similar scanners and enterprise imaging workflows
Strong knowledge of Fortinet or similar networking equipment (switches, routers) and secure configuration practices
Proficiency with SentinelOne or similar endpoint protection platforms
Expertise in system backup and recovery planning, including disaster recovery testing
Strong knowledge of NIST cybersecurity frameworks (especially SP 800-53, 800-171, and 800-37)
Proficiency with Windows Server, Linux, Active Directory, and virtualization platforms (VMware, Hyper-V)
Familiarity with secure file transfer protocols, encryption standards (TLS, AES), and SIEM tools
Excellent troubleshooting skills and ability to work under pressure in mission-critical environments
Preferred Skills and Experience
Prior experience supporting IRS or other federal tax-related systems
Certifications such as CISSP, Security+, Fortinet NSE, or Microsoft Certified: Azure Administrator Associate
Experience with automation tools (PowerShell, Ansible) and secure scripting practices
Proven experience designing and managing secure, high-throughput scanning environments
Knowledge of FedRAMP and FISMA compliance frameworks
Clearance Required: Must be able to obtain IRS public trust/suitability clearance. U.S. citizenship required due to federal contract compliance
Company Overview
GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens.
But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer?
What You Can Expect
Interview & Hiring Process
If you are selected to move forward through the process, here's what you can expect:
During the Interview Process
Virtual video interview conducted via video with the hiring manager and/or team
Camera must be on
A valid photo ID must be presented during each interview
During the Hiring Process
Enhanced Biometrics ID verification screening
Background check, to include:
Criminal history (past 7 years)
Verification of your highest level of education
Verification of your employment history (past 7 years), based on information provided in your application
Employee Perks
At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including:
Employee Assistance Program (EAP)
Corporate Discounts
Learning & Development platform, to include certification preparation content
Training, Education and Certification Assistance*
Referral Bonus Program
Internal Mobility Program
Pet Insurance
Flexible Work Environment
*Available to full-time employees
Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience.
We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets.
Posted Pay Range
The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors.
Posted Salary Range USD $115,000.00 - USD $128,000.00 /Yr.
Auto-ApplySenior IT Security Analyst
Security engineer job in Kansas City, MO
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyEngineer, Information Security
Security engineer job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplyEthical Hacker - Overland Park, KS ( Only Citizens )
Security engineer job in Overland Park, KS
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Security Engineer
Security engineer job in Overland Park, KS
Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will:
Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives.
Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards.
Provides security support during vendor risk assessments.
Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements.
Owns, maintains and matures information security review processes and documentation.
Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation.
Partners with technology and business partners to ensure compliance with policies and standards.
Determines security requirements for internal and external projects via interpretation of policies and standards.
Evaluates new technologies, processes, standards, and frameworks on an ongoing basis.
Ensures capability readiness for security controls (people, process, and technology).
Evaluates gaps in existing technologies and processes.
Assists with the implementation, configuration, and operations of various security tools as required.
Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.).
What we are looking for:
Bachelor's Degree in Information Systems, Computer Science or related field preferred.
Experience working in a security role for a SaaS organization is a must.
Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development.
3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence.
Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices.
Experience working with application security vulnerabilities and technologies is required.
Three or more years' participating in vendor and internal security assessments is required.
Two or more years' experience working in a security operations role is desired.
Certifications: CISSP, CISM, CEH or equivalent preferred.
Has strong focus on business outcomes.
Comfortable with collaboration, open communication and reaching across functional borders.
Self-motivated and able to work in a fast-paced, deadline-oriented environment .
Excellent troubleshooting, listening, and problem-solving skills.
Proven ability to solve complex issues.
Customer focused.
Works well in a team environment.
We are not currently engaging with outside agencies on this role.
What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com
About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time.
Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming.
Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment.
Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire.
Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence *********************
NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Auto-ApplyOffensive Security Consultant
Security engineer job in Kansas City, MO
Offensive Security Consultant candidates are motivated offensive security professionals, often with 2-5 years of pen testing experience not counting previous IT experience. The primary role of an Offensive Security Consultant is to perform External Network Penetration Tests as well as Application Penetration Tests against web applications, mobile applications, and web services. Security Consultants are expected to execute the appropriate testing methodology, identify risk at a level commensurate with the company bar, perform punctually, clearly document findings for multiple audiences, and demonstrate outstanding customer service skills.
Responsibilities
* Deliver Application Penetration Tests against web apps, mobile apps, web services, and fat-clients
* Security Consultants who have proven adept at application penetration testing will perform small to medium-sized Network Penetration Tests.
* Communicate with customers in a friendly manner, quickly and clearly, and with great accuracy during:
o Kickoff and scoping calls
o Assessment status updates and ongoing project communication
o Report delivery
o Wrap-up meetings
o Non-Billable events such as lunches, conferences, and meetups
* Work towards professional-level certs such as the OSCP if they have not already been achieved
* Assist in enhancing various company methodologies and other documentation
* Work with project management to enhance the company's overall efficiency
* Assist peers in identifying/exploiting issues during assessments
* Demonstrate excellent writing skills both during email correspondence and report creation
* Prioritize findings based on perceived risk, using existing knowledge of clients' business to ascertain finding severity
* Lead by example in behavior, work ethic, and punctuality
* Interpret and obey any applicable customer testing restrictions based on scope and kickoff calls
* Utilize non-billable time to work on company-directed internal projects
* Develop and own an area of expertise e.g. web services, SQL injection killer, mobile apps, Powershell, reporting god, Java, XXE skills, etc.
* Contribute to company methodology and vulnerability repositories
Qualifications
* 2+ years' full-time penetration testing experience
* Full familiarity with OWASP top 10, SANS top 25
* Applicants with common industry certifications such as OSCP, OSCE, SANS, CREST, and etc. will be preferred.
* Applicants with public disclosure track record will be preferred
* Excellent communication skills in written, verbal, and in-person formats
* High-level knowledge of common platforms and their vulnerabilities
* BurpSuite expert
o Ability to configure working login macros
o Use Repeater and Intruder to manually find flaws.
o Use Scanner in an appropriate manner to automatically find flaws.
o Quickly eliminate false positive based on intuition and response content
* Kali Linux
* Github
* Research
o Search for flaws in fingerprinted services/components
o Find exploits in vulnerable fingerprinted services/components
o Use existing research to craft proof of concepts for assessments
* Ability to alter existing exploits so they apply to different assessment targets
About Us
Konica Minolta Business Solutions' (Konica Minolta) journey started more than 150 years ago, with a vision to see and do things differently. The company partners with clients to Give Shape to Ideas by supporting their digital transformation through its expansive Intelligent Connected Workplace portfolio. Its business technology offerings include IT Services, intelligent information management, video security solutions and managed print services, as well as office technology and industrial and commercial print solutions. 2025 marks Konica Minolta's 20th anniversary in production print, for which it celebrates "20 Years of Excellence, Innovation and Impact," and continues to lead the way in digital commercial printing. This year also commemorates 20 years of Konica Minolta's bizhub brand. Over the past two decades, the bizhub series has revolutionized office technology and redefined how businesses operate. It has continuously evolved to meet the needs of modern workplaces, fueled by advances in technology and a commitment to innovation. Konica Minolta is proud to be ranked on the Forbes 2025 America's Best Large Employers list, included on CRN's MSP 500 list numerous times; recognized as the #1 Brand for Customer Loyalty in the MFP Office Copier Market by Brand Keys for eighteen consecutive years and presented with Keypoint Intelligence's BLI 2025 and 2021 A3 Line of The Year and BLI 2021-2023 Most Color Consistent A3 Brand Awards for its bizhub One i-Series. For more information, please visit Konica Minolta online and follow it on Facebook, YouTube, LinkedIn and Twitter.
Konica Minolta operates on a North American Shared Services model, which aligns cross-border priorities and enhances delivery to its field organization. This combines service functions in the U.S. and Canada, ultimately providing more resources to support areas such as sales administration, logistics and supply chain, marketing, product planning, finance, IT, HR and legal.
Au sujet de Konica Minolta
Solutions d'affaires Konica Minolta (Konica Minolta) a entamé son parcours il y a plus de 150 ans, avec la volonté de voir et de faire les choses autrement. Elle fait équipe avec ses clients pour donner forme à leurs idées en appuyant leur transformation numérique grâce à un riche portefeuille de solutions pour un milieu de travail connecté et futé. Parmi ses technologies d'affaires, on retrouve des services de TI, la gestion intelligente de l'information, des solutions de sécurité vidéo et des services d'impression gérés ainsi que des technologies de bureau et des solutions d'impression industrielle et commerciale. L'année 2025 marque le 20e anniversaire de l'entrée de Konica Minolta dans le marché de l'impression de production; l'entreprise souligne " 20 années d'excellence, d'innovation et de résultats " tout en continuant d'être une figure de proue dans l'impression numérique commerciale. C'est aussi l'année où la marque bizhub de Konica Minolta célèbre ses 20 ans, au cours desquels la gamme a révolutionné la technologie de bureau, redéfini les processus des entreprises, et évolué continuellement pour répondre aux besoins des milieux de travail modernes, mue par les avancées technologiques et la volonté d'innover. Konica Minolta est fière de faire partie du palmarès 2025 des meilleurs grands employeurs d'Amérique de Forbes, d'avoir figuré à plusieurs reprises au palmarès CRN des 500 fournisseurs de services gérés, d'avoir été nommée la marque numéro un en matière de fidélité des clients sur le marché des appareils de bureau multifonctions par Brand Keys pendant 18 années consécutives, et de s'être vue décerner les prix BLI " A3 Line of the Year " 2021 et 2025 et " Most Colour Consistent A3 Brand " 2021-2023 de Keypoint Intelligence pour sa gamme bizhub One i-Series. Pour en savoir plus, rendez-vous sur le site de Konica Minolta et suivez l'entreprise sur Facebook, YouTube, LinkedIn et Twitter.
Konica Minolta fonctionne selon un modèle de services partagés nord-américain qui permet d'harmoniser les priorités transfrontalières et d'améliorer la prestation de services aux organisations opérationnelles. Le modèle combine des fonctions de service américaine et canadienne afin d'offrir davantage de ressources aux services de soutien comme l'administration des ventes, la logistique et la chaîne d'approvisionnement, le marketing, la planification des produits, la finance, les TI, les RH et les services juridiques.
EOE Statement
Konica Minolta is an equal opportunity and affirmative action employer. We consider all qualified applicants for employment without regard to race, color, religion, creed, national origin, sex, pregnancy, age, sexual orientation, transgender status, gender identity, disability, alienage or citizenship status, marital status or partnership status, genetic information, veteran status or any other characteristic protected under applicable law.
Konica Minolta Business Solutions (Canada) Ltd. is an equal opportunity employer.
Solutions d'affaires Konica Minolta (Canada) Ltée. est un employeur d'opportunité égale.
Auto-ApplySecurity Engineer
Security engineer job in Overland Park, KS
Job Description
Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply!
What You'll Do:
As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include:
Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services.
General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively.
Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments.
Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments.
Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives.
Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams.
Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends.
Who You Are:
Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats.
Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies.
Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to:
Google Cloud Security Command Center (SCC)
Google Security Operations
Google Threat Intelligence
Cloud Logging and Monitoring for security
Google Cloud Identity and Access Management (IAM)
Google Cloud Armor
Certifications: Possess one or more security certifications such as:
CompTIA Security+
(ISC)² SSCP or CISSP (Associate of (ISC)²)
Google Cloud Professional Cloud Security Engineer (highly preferred)
Other relevant cloud security certifications
Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences.
Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail.
Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment.
Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
IT Security Engineer
Security engineer job in Shawnee, KS
Job Posting Important Recruitment Information for this vacancy Kansas Bureau of Investigation The Kansas Bureau of Investigation is the premier criminal investigative agency in the state of Kansas. The KBI is committed to its critical mission of preventing crime and enhancing public safety in Kansas. We employ individuals who exemplify the highest standards of integrity, service, and dedication. Come feel like you're part of something bigger at the KBI.
E-Verify: The Kansas Bureau of Investigation (KBI) participates in E-Verify and will provide the federal government with your I-9 information to confirm that you are authorized to work in the U.S. For additional information regarding E-Verify, please click here. For additional information regarding Immigrant and Employee Rights (IER) please click here.
Kansas Bureau of Investigation
About the Position:
* Who can apply: Anyone (External)
* Classified/Unclassified Service: Unclassified
* Full/Part-time: Full-Time
* Regular/Temporary: Regular
* Work Schedule: M-F 8am-5pm
* Eligible to Receive Benefits: Yes
* Veterans' Preference Eligible: Yes
* Search Keywords: KBI, Topeka, IT Security
Compensation:
* Hourly Pay Range: $43.87-$54.84
Note: Salary can vary depending upon education, experience, or qualifications.
Employment Benefits:
* Comprehensive medical, mental, dental, vision, and additional coverage
* Sick & Vacation leave
* Work-Life Balance programs: parental leave, military leave, jury leave, funeral leave
* Paid State Holidays
* Fitness Centers in select locations
* Employee discounts with the STAR Program
* Retirement and deferred compensation programs
Visit the Employee Benefits page for more information…
Position Summary & Responsibilities:
Position Summary:
The KBI is accepting applications to fill an IT Security Engineer position. This position supports both the KBI and the Kansas Criminal Justice Information System (KCJIS). The IT Security Engineer plays a pivotal role in developing, implementing, and maintaining the organization's information security and networking systems. Collaborating closely with the IT Security Architect and other cross-functional teams, the ITSE ensures the confidentiality, integrity, and availability of KBI and KCJIS assets through the deployment and maintenance of security and network technologies. The regular work schedule for this position is Monday thru Friday - 8:00 AM to 5:00 PM. However, this position may be required to work hours outside of the regular working schedule and be on a rotational on-call schedule as necessary.
Job Responsibilities may include but are not limited to the following:
* Implement and maintain information security and networking solutions for the KBI and KCJIS.
* Assist in the implementation and maintenance of information security and networking standards, procedures, and guidelines.
* Collaborate with other departments and units to integrate security and network controls into systems and processes.
* Ensure compliance with applicable policies and governance requirements (ex. SoK ITEC, KCJIS).
* Monitor security controls, systems, and networks for potential security incidents and take appropriate action to respond to and mitigate threats. Analyze log files to identify possible threats to organizational information systems.
* Support the implementation and management of security and network technologies, including firewalls, intrusion detection/prevention systems, endpoint protection, encryption, logging, identity and access management solutions, switches, routers, and wireless networks.
* Stay current with emerging threats, vulnerabilities, security, and networking technologies through continuous learning.
* Contribute to the development and maintenance of security documentation and procedures.
* Provide technical support and guidance to internal and external stakeholders on security-related matters.
* Perform other duties as assigned.
Qualifications:
Minimum Qualifications
* Associate's or Bachelor's degree from an accredited college or university, (preferably in computer science, information security, or related field).
* A minimum 5 years of information security work experience and at least one industry advanced cybersecurity certification in good standing (e.g., CISSP or CISM).
* Relevant experience should include all of the following:
* At least 3 years of Check Point and/or Palo Alto firewall administration.
* Security log/event analysis and incident response (preferably Splunk).
* Systems security and administration of Windows and/or Linux server operating systems.
* Configuring, tuning, and managing security systems and controls, such as: VPNs, IDS/IPS, endpoint security, content filters, email security, vulnerability management systems, and mobile device management systems.
* Configuring, tuning, and managing network systems and controls, such as: routers, switches, and wireless LANs.
* Extensive computer, network, and security troubleshooting experience.
* Mastery of core security concepts.
* Strong communication, teamwork, leadership, and problem-solving skills.
* Ability to research, interpret, and understand advanced technical information.
* Basic understanding of project management concepts and principles.
Preferred Qualifications
* Additional industry standard certifications such as: Network+, Security+, SSCP, CCNA, CCNP, CCSA/CCSE/CCSM, or similar.
* Experience with cloud security (e.g., Azure or AWS).
* Experience with implementing or administering Microsoft 365.
* Experience with VMware virtual infrastructure (ESXi, vSphere/vCenter).
* Experience with federated authentication technologies, such as SAML and OAuth/OIDC.
* Experience with penetration testing.
Post-Offer, Pre-employment Requirements
* As a condition of employment, you will be subject to a pre-employment process to include a polygraph examination, fingerprint based records check, and comprehensive background investigation, including reference check of past and present employers. The pre-employment process will be waived for current KBI personnel who have previously completed the screening requirements
Recruiter Contact Information:
* Name: Luci Zieman
* Email: *************************
* Phone: ************
* Mailing Address: 1620 SW Tyler; Topeka, KS 66612
Required documents for this application to be complete:
* On the My Job Applications page, verify these documents are present and valid. Upload or delete and upload new if needed.
* Tax Clearance Certificate, valid
* Transcripts
* DD214 (if you are claiming Veteran's Preference)
* Inside your Job Application upload these documents:
* Resume (or choose existing if you have one)
* Cover Letter
Kansas Tax Clearance Certificate Required: Each applicant (even non-residents) applying for a State of Kansas job vacancy must obtain a valid Kansas Certificate of Tax Clearance by accessing the Kansas Department of Revenue's website. A Tax Clearance is a comprehensive tax account review to determine and ensure that an individual's account is compliant with all primary Kansas Tax Laws. A Tax Clearance expires every 90 days. All applicants, including current state employees, are responsible for submitting a valid certificate with all other application materials to the hiring agency. This is in accordance with Executive Order 2004-03. If you need assistance with the tax clearance, please contact ************.
Visit the Tax Clearance site for more information and where to obtain this Kansas Department of Revenue document.
Job Application Process
* Sign in to your existing account or Register for a new one to apply.
* Complete or review your contact information on the My Contact Information page.
* Upload documents listed in the Required Documents section of the job posting to the appropriate location.
* Check your email and My Job Notifications for written communications from the Recruiter.
* Email - sent to the preferred email listed on the My Contact Information page
* Notifications - view the Careers - My Job Notifications page
To assist in completing your application, please see helpful links below:
* Instructions:
* Job Search
* Registration & User Account
* Application
* Frequently Asked Questions
How to Claim Veterans Preference
* Veterans' Preference Eligible (VPE): Former military personnel or their spouse that have been verified as a "veteran"; under K.S.A. 73-201 will receive an interview if they meet the minimum competency factors of the position. The veterans' preference laws do not guarantee the veteran a job. Positions are filled with the best qualified candidate as determine by the hiring manager.
Learn more about claiming Veteran's Preference
How to Claim Disability Hiring Preference
Applicants that have physical, cognitive and/or mental disabilities may claim an employment preference when applying for positions. If they are qualified to meet the performance standards of the position, with or without a reasonable accommodation, they will receive an interview for the position. The preference does not guarantee an applicant the job, as positions are filled with the best qualified candidate as determined by the hiring manager.
Learn more about claiming Disability Hiring Preference
PLEASE NOTE: The documentation verifying a person's eligibility for use of this preference should not be sent along with other application materials to the hiring agency but should be sent directly to OPS. These documents should be sent either by fax to *************, or scanned and emailed to *************************, or can be mailed/delivered in person to:
ATTN: Disability Hiring Preference Coordinator
Office of Personnel Services
Landon State Office Building
900 SW Jackson, Rm 401
Topeka, KS 66612
Equal Employment Opportunity
The State of Kansas is an Equal Opportunity Employer. All qualified persons will be considered for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, political affiliation, disability or any other factor unrelated to the essential functions of the job.
If you wish to identify yourself as a qualified person with a disability under the Americans with Disabilities Act and would like to request an accommodation, please address the request to the recruiter.
Jr. Security Analyst
Security engineer job in Kansas City, MO
Forrest T. Jones & Company, Inc., and its affiliates (“FTJ”), provide insurance and insurance related services to clients, corporations, employers and individuals. These services include providing benefits through innovative life and health insurance plans, financial services, and customized insurance products for niche markets.
Position Summary
The Security Analyst develops and manages security for more than one IT functional area.
Assists in the development and implementation of security policies and procedures.
Prepares status reports on security matters to develop security risk analysis scenarios and response procedures.
Responsible for the tracking and monitoring of software viruses.
Enforces security policies and procedures by administering and monitoring security profiles.
Reviews security violation reports and investigates possible security exceptions.
Updates, maintains and documents security controls.
Responsibilities
Utilizes information security tools to monitor risk levels and security posture.
Supports IT security goals and reduce organizational risk.
Collects and maintain data needed to meet information security reporting.
Conducts monitoring and analysis of information security data sources.
Supports company wide information security training and awareness program.
Prepares, distributes, and maintains plans, instructions, guidance, and standard operating procedures.
Supports compliance activities.
Qualifications
Associates degree and at least 2 years in similar position.
Knowledge of the following topics:
Computer networking concepts, protocols, and network security methodologies.
Incident response and handling
Applicable business processes and operations for customer organizations.
Business continuity and disaster recovery planning
Host/Network access control mechanisms.
Intrusion detection methods and techniques.
New and emerging IT and cybersecurity technologies
Server and client operating systems
We offer comprehensive benefits to full-time employees including company-paid medical, STD, LTD and life insurance; voluntary dental, vision, Life/AD&D insurance, 401(k) with company matching, generous paid time off and much more.
We encourage applicants of all ages and experience, as we do not discriminate on the basis of an applicant's age.
ALL OFFERS OF EMPLOYMENT ARE CONTINGENT UPON PASSAGE OF A DRUG SCREEN AND BACKGROUND CHECK.
Auto-ApplyNetwork Security Architect
Security engineer job in Overland Park, KS
+ High level of independent thinking and the ability to solve problems in a fast-paced environment + Ability to engage in deep system level problem determination and resolution + Must be able to work well within a technical team, as well as interface well with the outside business units Excellent organization skills, the ability to multi-task and prioritize various types of work and be able to meet/set deadlines for all assigned work
+ Excellent interpersonal and communication skills (both written and verbal), able to relate with users, service providers, and management
+ Ensures all solutions adhere to applicable change control requirements
+ Must be able to respond to, and work on, after hours issues related to all technologies/protocols/solutions
+ Self-motivated, proactive approach, able to work well independently in support of customer service level agreements
+ Occasional travel will be required. Must be able to travel without restriction, when required
+ Carries out duties in compliance with established business policies
+ Responsible for exhibiting professional behavior with both internal/external business associates that reflects positively on the company and is consistent with the company's policies and practices
+ Understands and is aware of the quality consequences which may result from the improper performance of their specific job. Has awareness of device defects that may occur in their area of responsibility, including product design, verification and validation, manufacturing and testing activities
Skills
Paloalto, Firewall, Network security, Security architecture, ISE, Firepower, IPSec
Top Skills Details
Paloalto, Firewall, Network security, Security architecture, ISE, Firepower, IPSec
Additional Skills & Qualifications
+ Network routing protocols (BGP/OSPF)
+ Cisco Data Center Networking
+ F5 Load Balancing
Experience Level
Expert Level
Job Type & Location
This is a Contract position based out of Overland Park, KS.
Pay and Benefits
The pay range for this position is $70.00 - $80.00/hr.
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following:
- Medical, dental & vision - Critical Illness, Accident, and Hospital - 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available - Life Insurance (Voluntary Life & AD&D for the employee and dependents) - Short and long-term disability - Health Spending Account (HSA) - Transportation benefits - Employee Assistance Program - Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a fully onsite position in Overland Park,KS.
Application Deadline
This position is anticipated to close on Dec 8, 2025.
h4>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Security Engineer - Data Protection
Security engineer job in Kansas City, MO
Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure.
Key Responsibilities:
* Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal.
* Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery.
* Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications.
* Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration.
* Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls.
* Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails.
* Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response.
* Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership.
* Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform.
* Actively coach and mentor other security and technology team members on data protection best practices.
* Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
Cyber Resilience Specialist
Security engineer job in Kansas City, MO
Who You'll Work With As a modern technology company, our Slalom Technologists are disrupting the market and bringing to life the art of the possible for our clients. We have passion for building strategies, solutions, and creative products to help our clients solve their most complex and interesting business problems. We surround our technologists with interesting challenges, innovative minds, and emerging technologies. We are currently looking for a Senior Consultant or Principal level Security strategist with deep technical and functional expertise in Business Continuity and Disaster Recovery.
What You'll Do
* Lead and facilitate Business Impact Assessments (BIAs) across business units
* Develop and update Business Continuity Plans (BCPs) and Disaster Recovery Plans (DRPs) aligned to critical business functions and systems
* Assess organizational risk and capability gaps related to crisis management, workforce continuity, and infrastructure resilience
* Design tiered recovery strategies based on RTOs, RPOs, and MVC (Minimum Viable Company) principles
* Coordinate and conduct tabletop exercises, test execution, and post-mortem reviews
* Align BC/DR practices with enterprise risk management frameworks, compliance requirements (e.g., HIPAA, ISO 22301), and audit expectations
* Support program governance, metrics, training, and awareness efforts
What You'll Bring
* 6+ years of experience in Business Continuity, Disaster Recovery, or operational resilience consulting
* Strong working knowledge of BIAs, BCP/DRP development, and crisis management planning
* Understanding of IT infrastructure concepts and DR technologies (e.g., backup systems, cloud platforms)
* Experience supporting risk assessments and regulatory audits
* Excellent facilitation and stakeholder management skills
* Strong writing skills to produce clear, client-ready plans and reports
About Us
Slalom is a fiercely human business and technology consulting company that leads with outcomes to bring more value, in all ways, always. From strategy through delivery, our agile teams across 52 offices in 12 countries collaborate with clients to bring powerful customer experiences, innovative ways of working, and new products and services to life. We are trusted by leaders across the Global 1000, many successful enterprise and mid-market companies, and 500+ public sector organizations to improve operations, drive growth, and create value. At Slalom, we believe that together, we can move faster, dream bigger, and build better tomorrows for all.
Compensation and Benefits
Slalom prides itself on helping team members thrive in their work and life. As a result, Slalom is proud to invest in benefits that include meaningful time off and paid holidays, parental leave, 401(k) with a match, a range of choices for highly subsidized health, dental, & vision coverage, adoption and fertility assistance, and short/long-term disability. We also offer yearly $350 reimbursement account for any well-being-related expenses, as well as discounted home, auto, and pet insurance.
Slalom is committed to fair and equitable compensation practices. For this role, we are hiring at the following levels and targeted base pay salary ranges: The targeted base salary pay range for Senior Consultant in New Jersey, New York City, and Washington DC is $153,000 to $186,000. The targeted base salary range for Senior Consultant in Atlanta, Chicago, Detroit, Kansas City, Minneapolis, Nashville, Philadelphia, Phoenix, St. Louis is $140,000 to $171,000. In addition, individuals may be eligible for an annual discretionary bonus. Actual compensation will depend upon an individual's skills, experience, qualifications, location, and other relevant factors. The salary pay range is subject to change and may be modified at any time.
We are committed to pay transparency and compliance with applicable laws. If you have questions or concerns about the pay range or other compensation information in this posting, please contact us at: ********************.
EEO and Accommodations
Slalom is an equal opportunity employer and is committed to inclusion, diversity, and equity in the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veterans' status, or any other characteristic protected by federal, state, or local laws. Slalom will also consider qualified applications with criminal histories, consistent with legal requirements. Slalom welcomes and encourages applications from individuals with disabilities. Reasonable accommodations are available for candidates during all aspects of the selection process. Please advise the talent acquisition team if you require accommodations during the interview process.
#LI-MS12
Easy ApplyCyber Security Training
Security engineer job in Kansas City, MO
Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session.
Job Description
Our Training Features:
· You will receive top quality instruction that Kanshe Infotech is famous for Online IT training.
· Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue.
· Training sessions are conducted by real-time instructor with real-time examples.
· Every training session is recorded and posted to the batch after each weekend class.
· We are offering online training on Cyber Security.
.
Provide OPT Stem Ext.:
Guidance and support for applying for the 24-month OPT STEM extension
Help with OPT Employment letter:
Help with drafting and obtaining OPT employment letters that meet USCIS requirements.
· We provide training in technology of your choice.
· Good online training virtual class room environment.
· Highly qualified and experienced trainers.
· Professional environment.
· Special interview training
· Training for skill enhancement.
· Study material and Lab material provided.
· E-Verified company.
If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates.
Thanks
Additional Information
All your information will be kept confidential according to EEO guidelines.
IT Security Manager
Security engineer job in Overland Park, KS
This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit. Key Responsibilities: ·Communicates Information Security goals and new programs effectively within the organization
·Ensures consistent and effective security practices
·Establishes appropriate Information Security procedures and governance
·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures
·Manages investigations into identified problematic activity and provides on-going communication with IT senior management
·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division
·Provides centralized guidance and governance of Information Security solutions
·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals
·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk
·Assist with Information Security awareness programs
·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management.
·Participates in annual and long-range planning activities to ensure Information Security needs are addressed
Qualifications
Must be open to travel approximately 35% of the time.
A college degree in MIS, CIS, Business Management, or related field
5+ years of overall Information Security experience
1+ years working on an Information Security implementation team
An Information Security industry certification is preferred
Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred
Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks:
CIS Critical Security Controls
ISO 27000-series standards
NIST SP800-53 and related standards
Must have a working knowledge of the following Information Security practices, standards, and systems:
Data Loss Prevention (DLP) systems
Encryption technologies and standards
Endpoint security software
Governance, Risk, and Compliance (GRC) systems
Identity and Access Management (IAM)
Incident response practices
Network security (e.g. firewalls, IDS/IPS, VPN, etc.…)
Risk assessment practices
Security Information Event Management (SIEM) systems
Vulnerability management practices and scanning tools
Additional Information
Solid company with excellent track record of stability,.Great opportunities for growth and learning.
Senior Security Engineer
Security engineer job in Kansas City, MO
Best People + Right Culture. These are the driving forces behind JE Dunn's success. By hiring inspired people, giving them interesting and challenging work, enabling them with innovative tools, and letting them share in the company's rewards, we've found a sustainable way to grow in our industry for the last 100+ years.
Our diverse teams around the country strive to enrich lives through inspired people and places everyday, and we need inspired people like you to join us in our pursuit of building perfection.
Role Summary
The Senior Security Engineer will design, install, manage, document, and maintain enterprise security systems and standards across commonly used platforms (e.g. cloud, on-premises), ensuring end-user experience is supported through collaboration across other Information Technology functions. This role will provide specifications, analyze and recommend solutions, and suggest new products and services, delivering results through varied high-impact projects. All activities will be performed in support of the strategy, vision and values of JE Dunn.
* Autonomy & Decision-Making: Makes decisions on routine matters, provides recommendations to supervisor and refers all exceptions to supervisor.
* Career Path: Security Architect
Key Role Responsibilities - Core
KEY ROLE RESPONSIBILITIES
SECURITY ENGINEER FAMILY - CORE
* Acts as escalation contact and subject matter expert for security operations and information technology team in relation to security solutions and practices.
* Mentors team members on technical and security methodology characteristics.
* Continuously improving the security program with automation and orchestration scripting for security operations efficiency and effectiveness.
* Acts as primary technical resource for design and implementation projects.
* Drafts and recommends operating procedures and changes to information security practices and solutions.
* Trains and engages operations and support personnel on security solutions.
* Advise on trends, threats, and emerging security risks, relevant to the organization.
* Engineer effective solutions that securely enable and protect in alignment with our organization compliance requirements.
* May be a subject matter expert for a variety of security related systems or applications.
* Communicates with operational groups for collaboration of security program management.
* Advocates secure culture and provides education throughout the appropriate client group.
* Improves maturity capability of processes, procedures, and operations of the security program.
* Communicates intelligence and program effectiveness reports to supervision.
Key Role Responsibilities - Additional Core
SENIOR SECURITY ENGINEER
In addition, this position will be responsible for the following:
* Designs and implements security solutions for various platforms
* Conducts comprehensive security assessments and audits to determine the effectiveness of security controls
* Assists operations as needed in incident response and contribute to post-incident analysis
* Develops and implements security policies, procedures, and configuration standards to meet regulatory and client security requirements
* Reviews the Governance, Risk, and Compliance platform to determine any opportunities to lower security risk level
* Implements and maintains access control system for any type of new enhancement opportunities
* Collaborates with development teams to ensure secure software development practices
* Monitors and analyzes security events and logs to make sure backend and correlation are implemented and working
* Designs and implements robust security ensuring alignment with industry best practices and organization configurations
* Deploys and helps maintain a secure cloud infrastructure and security controls. This includes network security, security monitoring, data protection, and compliance configuration
* May assist the Security Architect in conducting threat modeling and risk assessments for new projects and cloud initiatives, identifying and mitigating potential security risks
* Builds security automation scripts and tools to streamline security operations and improve efficiency
* Works closely with cross-functional teams to provide security guidance and best practices, ensuring security is embedded in the project lifecycle
* Plays an active role in contributing ideas for security innovations
* Assists in the design and execution of incident response as it pertains to security engineering
* Ensures compliance with security frameworks and regulations by engineering and implementing new security controls to address gaps in the security program
* Implements security technologies with full understanding on accountability and ownership for full deployment
Knowledge, Skills & Abilities
*
* Ability to perform work accurately and completely, and in a timely manner
* Communication skills, verbal and written - Intermediate
* Ability to lead technical projects once assigned
* Working knowledge of NIST cyber security framework, defense federal acquisition regulation supplement, and ISO 270XX
* Ability to solve technical issues - Advanced
* Demonstrated expert knowledge of information security practices
* Substantial knowledge of Python and Powershell scripting languages
* Proficient with multiple IT platforms including Microsoft Windows, Linux, iOS, Cisco Networking, Cisco firewalls, intrusion detection and load balancers
* Proficient with multiple cloud platforms
* Technical writing and documentation skills
* Organizational skills
* Ability to quickly and effectively solve complex problems
* Ability to deliver quality through attention to detail
* Ability to work in team and independently
* Ability to work a flexible schedule - might be on call in the evenings and weekends
* Ability to build relationships and collaborate within a team, internally and externally
Education
*
* Bachelor's degree in information security or related field (Preferred)
* In lieu of the above requirements, equivalent relevant experience will be considered
Experience
* 5+ Years information security experience (Preferred)
Working Environment
* Must be able to lift up to 25 pounds
* May require periods of overnight travel
* Normal office environment
* Frequent activity: Sitting, Viewing Computer Screen
* Occasional activity: Standing, Walking, Bending, Climbing, Reaching above Shoulder, Pushing, Pulling
Benefits Information
The benefits package aligned to this position is Professional Non-Union. Please click the link below for more details.
Click here for benefits details.
This role is expected to accept applications for at least three business days and may continue to be posted until a qualified applicant is selected or the position has been cancelled.
JE Dunn Construction is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer and it is our policy to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. JE Dunn Construction is a background screening, drug-free workplace.
JE Dunn provides reasonable accommodations to qualified individuals with disabilities. If you would like to request a reasonable accommodation in order to apply for a job, please submit your request to accommodations@jedunn.com
JE Dunn Construction Company does not accept unsolicited resumes from search firms or agencies. Any resume submitted to any employee of JE Dunn Construction without a prior written search agreement will be considered unsolicited and the property of JE Dunn Construction Company. Please, no phone calls or emails.
Why People Work Here
At JE Dunn we offer our employees an inspired place to enrich their life and the lives of those around them
Building on our rich history, our employee owners are shaping the future of JE Dunn. In our team-focused environment we do life together and are generously rewarded for our efforts
About JE Dunn
For more information on who we are, click here.
EEO NOTICES
Know Your Rights: Workplace Discrimination is Illegal
California Privacy Policy
E-Verify
JE Dunn participates in the Electronic Employment Eligibility Verification Program.
E-Verify Participation (English and Spanish)
Right to Work (English)
Right to Work (Spanish)
Engineer, Information Security
Security engineer job in Overland Park, KS
We're seeking a proactive, detail-oriented Information Security Engineer to join our Technology and Information Security team. This role plays a critical part in protecting the integrity, confidentiality, and availability of our systems and data. You'll work hands-on with advanced security tools and collaborate across teams to ensure the firm's technology environment remains resilient and compliant.
If you thrive on solving complex security challenges, driving continuous improvement, and safeguarding data in a fast-paced, highly regulated industry-this opportunity is for you.
What You'll Do
Implement, operate, and maintain enterprise-level information security tools and controls across the organization.
Conduct security assessments and control testing to evaluate system performance and operational effectiveness.
Support and mature core security processes, including:
Malware response and remediation
Vulnerability management and patch governance
Security log analysis and monitoring
Incident tracking, reporting, and documentation
Analyze the security posture of new and existing applications, software, and infrastructure; provide actionable insights and recommendations.
Collaborate with IT and business partners to identify risks, implement mitigations, and ensure security is embedded into technology and operational initiatives.
Contribute to continuous improvement of the firm's Information Security Program through data analysis, reporting, and cross-functional input
What You Bring
Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or related field-or equivalent experience.
3-5 years of professional experience in information security, IT operations, or a related technical field; experience in financial services a plus.
Familiarity with security tools and frameworks (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001).
Proven ability to operate with independence and accountability in a dynamic environment.
Excellent communication and collaboration skills, with the ability to work effectively across teams and influence without authority.
Analytical mindset with strong attention to detail, organization, and documentation discipline.
Why Join Us
We believe in giving associates progressive opportunities, actively nurturing professional growth, and giving back to the community. You'll find an environment that values curiosity, collaboration, and innovation-where your expertise contributes directly to protecting the firm and its clients.
We're dedicated to building a diverse and inclusive culture where everyone has the support to reach their full potential. Our team enjoys a flexible, hybrid work environment that encourages both professional excellence and work-life balance.
EOE/M/F/D/V
Auto-ApplyIT Security Manager
Security engineer job in Kansas City, MO
DUTIES AND RESPONSIBILITIES: * The IT Security Manager will be responsible for leading the IT Security team; * Protecting the company's employees, customers, data, network, and all other assets from internal and external threats; * Managing IT Security vendor and partner relationships, including MSSPs;
* Installing and Managing Palo Alto Firewalls and remote access solutions;
* Designing and administering a vulnerability management program;
* Developing and maintaining a Vendor Management program;
* Managing on-premises and cloud Identity & Access Management platforms;
* Designing and implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) for all possible systems.
* Assisting with required compliance audits;
* Performing regular access and system log reviews;
* Researching and creating plans to implement advanced information security techniques;
* Creating and maintaining Information security policy documentation;
* Working with stakeholders during design and implementation of new technologies to ensure they are set up with security in mind upfront;
* Handling IT Service Management trouble tickets as advanced-level support for internal users in security related matters;
* Administering current backup and restore procedures with Dell Avamar;
* And designing and leading internal security awareness training programs.
ABOUT THE COMPANY:
Bluebird Fiber is a premier fiber telecommunications provider of internet, data transport, and other services to carriers, businesses, schools, hospitals, and other enterprises in the Midwest. To learn more, please visit bluebirdfiber.com.
Join an amazing team of telecommunication professionals! Bluebird is a dynamic growing company in need of a Data Architect to be a part of a collaborative team. This is a full-time, benefit eligible position in the Kansas City, Missouri area. All of us at Bluebird work hard to meet objectives for the organization and live the mission and values of this growing company to meet a common goal. Check out this video that highlights our amazing company culture.
POSITION SUMMARY:
We are seeking a highly skilled IT Security Manager to help secure the infrastructure, communications, and data within the organization. This important role will be responsible for designing the organization's cybersecurity defense-in-depth platform; leading the team responsible for implementing and monitoring those defenses; and ensuring that our systems are secure, reliable, safe, and accessible for business-critical functions. The ideal candidate is an experienced security practitioner and leader who can work with stakeholders to understand existing systems, networks, and technologies to secure them as the business grows.
EDUCATION AND EXPERIENCE:
* Bachelor's degree in Computer Science, Information Technology, or a related technical field.
* 7+ years of hands-on experience in Cybersecurity, IT Service Management, Network Engineering, or related field, with a proven track record of building secure, friction-less experiences.
* Proven experience (5+ years) designing and implementing enterprise-level cloud environments, preferably through Terraform.
* Experience (3+ years) managing Palo Alto firewalls and related technology.
* Experience (3+ years) managing Tenable.io or other Nessus vulnerability scanners.
* Scripting experience (5+ years) with Python and Powershell to automate various Microsoft 365 or internal processes.
* Experience (3+ years) with AWS technologies, including EC2, EKS, Fargate, and Cloudwatch.
* Knowledge of how to design and implement network device access utilizing HPE Aruba Clearpass Policy Manager.
* Experience (3+ years) developing Security Policy documentation;
* Excellent written and verbal communication skills, with the ability to influence and build consensus with other business units.
* Professional certifications in cybersecurity, networking, AWS, or Microsoft systems management preferred.
* Telecommunications industry experience preferred.
SKILLS AND ABILITIES:
* Highly motivated, self-starter with a strong sense of duty
* Continual learner, eager to engage with industry trends and new technologies
* Critical thinking, analytical, and problem-solving skills with the ability to troubleshoot and devise a course of corrective action
* Holds people accountable and can keep teams focused
* Highly organized and efficient with the ability to multitask, prioritizes tasks appropriately
* Goes above and beyond to solve complex problems
* Productive without sacrificing quality, maintainability, accessibility, or performance; perform duties at a high degree of accuracy
* Welcomes giving and receiving feedback, while handling such in a positive and respectful manner
Sr. Information Security Engineer
Security engineer job in Kansas City, MO
Provides advanced technical level computer security support to ensure the firm's overall information assets are adequately protected. This position is responsible for the deep, technical engineering aspect of all security hardware and software, with the skills to interpret data from both security and non-security class equipment with an emphasis on configuration and tuning of equipment. This position requires advanced capabilities in equipment configuration, installation, system interoperability and deployment.
Communicates courteously and professionally by phone, email and in person, using good communication skills, keeping supervisor abreast of current issues and potential problems as they develop; while seeking advice as needed.
Responsible for equipment hardware, appliances and software. Conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and related devices throughout the firm.
Configures multiple products, both hardware and software, to interact with each other; devises solutions to a changing threat landscape as it evolves.
Responsible for assessing, recommending, developing, implementing and maintaining the firm's computer security infrastructure and security standards.
Provides technical engineering expertise in the selection, testing, implementation and deployment of information security systems. This includes the evaluation of new security products, and their interoperability with existing firm equipment.
Provides technical support and direction in information security monitoring, assessment, configuration, maintenance, auditing and testing.
Performs security event and intrusion analysis on a daily basis and mitigates any incidents that are medium to critical in nature. This may include troubleshooting non-security related equipment at the network layer level.
Performs penetration testing, including wired and wireless, social-engineering, and application security vulnerability assessments as required by management.
Provides guidance and input to technical reviews of proposed security projects and the certification and accreditation process.
Independently and, as a team member, plans, executes and documents security tests and evaluation.
Performs engineering and analysis of in-place technical and non-technical security controls protecting information and information systems. Uses advanced technical skills in network security design and implementation, including non-security related equipment interfacing as needed.
Has advanced understanding of the OSI model and how to apply the OSI model to daily troubleshooting and network security projects.
Manages information security aspects of IT projects, ensuring security protocols are in place and in compliance with other applicable information security policies. Reviews project plans for other IT teams to determine security requirements, and follows up to ensure security of new systems.
Provides guidance to non-senior security staff on information security and any security related projects.
Lead for security risk assessments and penetration studies of networks for both security and non-security equipment. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate.
Installs, tests, configures, monitors, maintains and upgrades malicious code detection applications/tools to ensure Malware is blocked or eradicated when detected. Configuration and tuning of security equipment as needed to adjust to changing threat landscapes.
Analyzes problematic security log entries from security infrastructure systems, provides technical solutions to issues and security breaches.
Is on call to respond to security incidents from Shook users, representatives or clients as needed, or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information System Security posture, goals and objectives.
Required Technical Skillsets
* Windows 2016+ Server Operating System Support and Configuration
* Azure Cloud Security Architecture and Implementation
* Azure Blob Storage and Containers
* Certificate Authority and Key Management
* Cloud Intrusion Protection Systems / WAF
* Cloud based DLP Systems
* Fluent ability to operate Security Information and Event Management solution
Additional Preferred Skillsets
* Knowledge of CrowdStrike EDR, CrowdStrike SIEM
* Content Filtering via Web Gateway
* Malicious Site Analysis
* Apple (Mac) Security Enforcement
* Cloud Vulnerability and Penetration Testing
* Virus Protection, Endpoint Encryption
* Data Classification
* AI Security
Bachelor's degree (B.A.) from four-year college or university; or four years information security and two years advanced information security experience and/or training with an emphasis on engineering functions; or eight years of combined information systems and information security experience; and/or equivalent combination of education and experience. Professional certifications such as Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and/or Certified Cloud Security Professional (CCSP) are strongly preferred. Must have advanced knowledge with PC and LAN servers, IT systems, and other Information Security related technologies. Has advanced technical skills in network servers, workstations, and applications.