Post job

Security engineer jobs in Missouri - 310 jobs

  • KS-Chief Information Security Officer

    Blue Diamond Career Consultants

    Security engineer job in Kansas City, MO

    An advocate for the total information security needs of SLHS and is responsible for the development and delivery of a comprehensive information security strategy to optimize the security posture of the Health System. Leads the development and implementation of a security, GRC, and business continuity program that leverages collaboration and organization wide resources, facilitates information security governance, advises senior leadership on security direction and resource investment, and designs appropriate policies to manage information security risk. The complexity of this position requires a leadership approach that is engaging, imaginative, and collaborative, with a sophisticated ability to work with other leaders to set the best balance between security strategies and other priorities at the organization level. Job Requirements Applicable Experience: 6-9 years CCISO - EC-Council CISM - ISACA CISSP - ISC Bachelor's Degree Job Details Full TimeDay (United States of America) The best place to get care. The best place to give care. Saint Luke's 12,000 employees strive toward that vision every day. Our employees are proud to work for the only faith-based, nonprofit, locally owned health system in Kansas City. Joining Saint Luke's means joining a team of exceptional professionals who strive for excellence in patient care. Do the best work of your career within a highly diverse and inclusive workspace where all voices matter. Join the Kansas City region's premiere provider of health services. Equal Opportunity Employer. Effective November 1st, 2021, full COVID-19 vaccination is a condition of employment for all Saint Luke's Health System employees unless a medical or religious exemption is approved. #J-18808-Ljbffr
    $100k-151k yearly est. 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Senior SAP Security Consultant

    Fintech Staffing Partners 4.2company rating

    Security engineer job in Saint Louis, MO

    Senior SAP Application Security Configurator (GRC / Security) Duration: 12-month contract Security Requirement: U.S. Citizen with Active Secret Clearance (mandatory) We are seeking a Senior SAP Application Security Configurator to lead and execute SAP User Management and Security activities within a highly regulated environment. This role is hands-on and strategic, responsible for SAP access design, role provisioning, Segregation of Duties (SoD) compliance, and SAP GRC security configuration across the full system lifecycle. The ideal candidate brings deep SAP Application Security and GRC expertise, is comfortable operating in an onsite delivery model, and can lead both technical execution and governance activities while mentoring junior team members. Key Responsibilities Lead SAP User Management (UM) activities, including role creation, access provisioning, audits, and ongoing access maintenance Design, develop, configure, and test SAP GRC security components Perform role design and provisioning aligned with SoD policies, internal controls, and security standards Conduct SoD risk analysis, remediation support, and access reviews Support User Acceptance Testing (UAT), production cutover, and post-go-live hypercare activities Lead role design reviews and ensure proper security documentation and audit readiness Collaborate with functional, technical, and compliance stakeholders to ensure secure system design Mentor junior SAP Security team members and support planning and delivery activities Required Qualifications 8+ years of hands-on SAP Application Security experience Expert-level experience with SAP GRC and SAP role design Strong knowledge of User Access Management, SoD concepts, and compliance controls Experience supporting UAT, go-live, and post-production environments CompTIA Security+ certification U.S. Citizenship with active Secret Clearance (required) Ability to work 100% onsite in St. Louis, MO Preferred Skills Experience supporting SAP security in highly regulated or government-adjacent environments Strong documentation, communication, and stakeholder management skills Experience mentoring or leading junior security resources
    $84k-110k yearly est. 4d ago
  • Senior Cloud Security Engineer - Product Security

    IBM 4.7company rating

    Security engineer job in California, MO

    A leading software solutions company is seeking a Senior Product Security Engineer to enhance their product security function. In this role, you will collaborate closely with R&D teams to ensure security is integrated into the cloud offerings, including multi-cloud environments. Responsibilities include monitoring vulnerabilities, executing security assessments, and contributing to secure software architecture. Candidates should have extensive experience in security practices, particularly in cloud environments. This position offers a hybrid work arrangement within the United States. #J-18808-Ljbffr
    $62k-79k yearly est. 2d ago
  • Information Security Specialist

    Federal Reserve Bank of Kansas City 4.7company rating

    Security engineer job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. Important Information Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen. No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered. This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility. This position is not eligible to be remote and relocation assistance is not available. We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies. This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization. Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal. Key Activities Interpret and evaluate policies in order to mature and implement the DevSecOps program. Assess maturity of development teams' DevSecOps practices against an existing framework. Proactively advocate for and drive enhancements into the program. Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC). Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process. Monitors information security policy compliance using security tooling. Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives. Provide technical expertise and support to internal teams on security-related matters. Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure. Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture. Support leadership decision making through timely analysis and written communications. Qualifications Typically requires 3-6 years of relevant experience. Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience. Strong competence in cloud technologies such as AWS, Azure, and other platforms. Expert understanding of DevSecOps practices, frameworks, and tools. Expertise with tool integration for the DevOps pipeline such as Git. Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules. Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work. Conveys complex and technical issues to diverse audiences. Demonstrated competencies with artificial intelligence are beneficial. Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others. Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java Technical expertise in security tools and knowledge of security practices and procedures. A learning mindset, proactiveness, collaboration, and strong attention to detail. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Locations: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Relocation Assistance: No Salary: $79,100 - $111,500 / Experienced Level $98,600 - $139,000 / Senior Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels. Privacy Notice
    $98.6k-139k yearly 3d ago
  • Lead Security Engineer - Cyber Security

    Relativity 4.7company rating

    Security engineer job in Kansas City, MO

    Posting Type Remote As a Lead Cyber Security Engineer, you will ensure the security of Relativity's network and infrastructure. In this role, the main responsibilities will be to investigate and analyze emerging threats against our assets, identities, and clients. You will also provide actionable remediation guidance to end users and collaborate with highly skilled cyber experts to anticipate and mitigate evolving threats using world-class toolsets and next generation capabilities. Job Description and Requirements Responsibilities: Review, validation, and triage of alerts and technical analysis of log data from a diverse inventory of sensors, correlated signature logic, and threat intelligence sources. Assess the impact of security events by leveraging host, cloud and network-based indicators and evidence to deliver actionable incident escalations. Develop and deploy detection and prevention signatures with response actions as part of a layered defensive strategy leveraging multiple technologies and data types. Build automation to search through collected telemetry to detect and isolate advanced threats that evade existing security solutions. Create Standard Operating Procedures, SOC playbooks, configuration guides, and secure standards. Automate incident handling processes. Engage in the continuous research of emerging threats and apply appropriate countermeasures within the context of a rapidly changing environment. Serve as a subject matter expert in the mechanism and analysis of observed malicious activity. Clearly document and communicate investigation findings to both technical and executive stakeholders. Identify and automate away technical burden. Build automation to deploy, operate and connect multiple cyber security tools and applications. Preferred Qualifications: 7+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team for Cloud applications and corporate networks Exposure to threat detection development and tuning Experience in software design and development DevSecOps experience Ability to perform threat hunting, threat emulation, and/or purple teaming exercises Familiarity with industry standard security devices and their configuration Experience in reverse engineering malicious code to explore infection and propagation mechanisms Experience with threat intelligence tools and processes Certifications: One or more of the following certifications are preferred (GCFA, GCIA, GCIH, GNFA, GREM, OSCP, OSEP, OSED, OSWE, OSDA, OSCE3, CompTIA Security+, CCNA CyberOps, or CEH) 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Minimum Qualifications: 5+ years of experience in a Security Operations Center, Incident Response, or Threat Detection team Strong cyber incident response skills (such as: Network forensics, memory forensics, and/or packet analysis) Ability to read, write and analyze PowerShell, C#, and Python Capability to independently manage the prioritization of complex security events Advanced understanding of common SOC/CIRT operational processes and documentation Advanced knowledge of TCP/IP, network services, cryptography, cloud, and web application attacks Ability to collaborate within a global cross-functional team to execute on high-level objectives and drive the maturation of Relativity's security posture Deep understanding of infection mechanisms, malicious behavior, exploitation techniques, and mitigating controls Good understanding of tools, tactics, and procedures utilized by attackers to access private systems and data Strong analytical and problem-solving skills Ability to leverage programming and scripting languages to build automations and develop SOAR playbooks Relativity is committed to competitive, fair, and equitable compensation practices. This position is eligible for total compensation which includes a competitive base salary, an annual performance bonus, and long-term incentives. The expected salary range for this role is between following values: $150,000 and $226,000 The final offered salary will be based on several factors, including but not limited to the candidate's depth of experience, skill set, qualifications, and internal pay equity. Hiring at the top end of the range would not be typical, to allow for future meaningful salary growth in this position. Suggested Skills: Cybersecurity, Infrastructure Security, Network Security, Penetration Testing, Security Architecture Design, Security Audit, Security Information, Security Information and Event Management (SIEM), Security Operations, Vulnerability Management
    $76k-98k yearly est. 5d ago
  • Security Engineer II Threat & Vulnerability Management

    Teksystems 4.4company rating

    Security engineer job in Saint Louis, MO

    Responsibilities: * Researches emerging threats and vulnerabilities to aid in the identification of incidents. * Monitors threat intelligence feeds to identify a range of threats, including indicators of compromise and advanced persistent threats (APTs). * Assist in identifying potential threats' tactics, techniques, and procedures (TTPs) through the MITRE ATT&CK or similar frameworks. * Research and understand vulnerabilities, including different ways to exploit them. * Assess threats and vulnerabilities and the level of risk to the firm. * Identifies deviations from acceptable configurations and enterprise or local security policy. * Interface with network and server administrators, desktop support, developers, and business stakeholders on security vulnerabilities and threats. * Track remediation efforts for identified vulnerabilities through agreed-upon completion dates and plans. Ensure remediation efforts are in compliance with associated corrective action timeframes. * Work collaboratively with all departments to ensure local practices are consistent with corporate information security policies and standards. *Skills* Information security, Security, Vulnerability, Vulnerability management, threat hunting *Additional Skills & Qualifications* Qualifications: * Advanced understanding of security control environment (access control, logging, authentication, encryption, integrity, etc.); * Experience coordinating corporate-wide initiatives for obtaining security-related assurances. * Familiarity with federal and state legal and regulatory requirements related to information security. * Understand the advanced tenants of security risk management and defense-in-depth practices. * The ability to combine pieces of information to form general rules or conclusions. * Ability to use logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions, or problem approaches. * Ability to consider the relative costs and benefits of potential actions to choose the most appropriate one. * Ability to analyze needs and product requirements to create a design. *Job Type & Location*This is a Permanent position based out of Saint Louis, MO. *Pay and Benefits*The pay range for this position is $80000.00 - $115000.00/yr. Organization offers an entrepreneurial environment, comprehensive benefits package to include health, dental and vision care, 401k (matching up to 6%), life insurance, and paid time off (16 days). *Workplace Type*This is a fully onsite position in Saint Louis,MO. *Application Deadline*This position is anticipated to close on Jan 16, 2026. h4>About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. About TEKsystems and TEKsystems Global Services We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com. The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
    $80k-115k yearly 7d ago
  • Offensive Security Consultant

    Konica Minolta Business Solutions 3.8company rating

    Security engineer job in Kansas City, MO

    Offensive Security Consultant candidates are motivated offensive security professionals, often with 2-5 years of pen testing experience not counting previous IT experience. The primary role of an Offensive Security Consultant is to perform External Network Penetration Tests as well as Application Penetration Tests against web applications, mobile applications, and web services. Security Consultants are expected to execute the appropriate testing methodology, identify risk at a level commensurate with the company bar, perform punctually, clearly document findings for multiple audiences, and demonstrate outstanding customer service skills. Responsibilities * Deliver Application Penetration Tests against web apps, mobile apps, web services, and fat-clients * Security Consultants who have proven adept at application penetration testing will perform small to medium-sized Network Penetration Tests. * Communicate with customers in a friendly manner, quickly and clearly, and with great accuracy during: o Kickoff and scoping calls o Assessment status updates and ongoing project communication o Report delivery o Wrap-up meetings o Non-Billable events such as lunches, conferences, and meetups * Work towards professional-level certs such as the OSCP if they have not already been achieved * Assist in enhancing various company methodologies and other documentation * Work with project management to enhance the company's overall efficiency * Assist peers in identifying/exploiting issues during assessments * Demonstrate excellent writing skills both during email correspondence and report creation * Prioritize findings based on perceived risk, using existing knowledge of clients' business to ascertain finding severity * Lead by example in behavior, work ethic, and punctuality * Interpret and obey any applicable customer testing restrictions based on scope and kickoff calls * Utilize non-billable time to work on company-directed internal projects * Develop and own an area of expertise e.g. web services, SQL injection killer, mobile apps, Powershell, reporting god, Java, XXE skills, etc. * Contribute to company methodology and vulnerability repositories Qualifications * 2+ years' full-time penetration testing experience * Full familiarity with OWASP top 10, SANS top 25 * Applicants with common industry certifications such as OSCP, OSCE, SANS, CREST, and etc. will be preferred. * Applicants with public disclosure track record will be preferred * Excellent communication skills in written, verbal, and in-person formats * High-level knowledge of common platforms and their vulnerabilities * BurpSuite expert o Ability to configure working login macros o Use Repeater and Intruder to manually find flaws. o Use Scanner in an appropriate manner to automatically find flaws. o Quickly eliminate false positive based on intuition and response content * Kali Linux * Github * Research o Search for flaws in fingerprinted services/components o Find exploits in vulnerable fingerprinted services/components o Use existing research to craft proof of concepts for assessments * Ability to alter existing exploits so they apply to different assessment targets About Us Konica Minolta Business Solutions' (Konica Minolta) journey started more than 150 years ago, with a vision to see and do things differently. The company partners with clients to Give Shape to Ideas by supporting their digital transformation through its expansive Intelligent Connected Workplace portfolio. Its business technology offerings include IT Services, intelligent information management, video security solutions and managed print services, as well as office technology and industrial and commercial print solutions. 2025 marks Konica Minolta's 20th anniversary in production print, for which it celebrates "20 Years of Excellence, Innovation and Impact," and continues to lead the way in digital commercial printing. This year also commemorates 20 years of Konica Minolta's bizhub brand. Over the past two decades, the bizhub series has revolutionized office technology and redefined how businesses operate. It has continuously evolved to meet the needs of modern workplaces, fueled by advances in technology and a commitment to innovation. Konica Minolta is proud to be ranked on the Forbes 2025 America's Best Large Employers list, included on CRN's MSP 500 list numerous times; recognized as the #1 Brand for Customer Loyalty in the MFP Office Copier Market by Brand Keys for eighteen consecutive years and presented with Keypoint Intelligence's BLI 2025 and 2021 A3 Line of The Year and BLI 2021-2023 Most Color Consistent A3 Brand Awards for its bizhub One i-Series. For more information, please visit Konica Minolta online and follow it on Facebook, YouTube, LinkedIn and Twitter. Konica Minolta operates on a North American Shared Services model, which aligns cross-border priorities and enhances delivery to its field organization. This combines service functions in the U.S. and Canada, ultimately providing more resources to support areas such as sales administration, logistics and supply chain, marketing, product planning, finance, IT, HR and legal. Au sujet de Konica Minolta Solutions d'affaires Konica Minolta (Konica Minolta) a entame son parcours il y a plus de 150 ans, avec la volonte de voir et de faire les choses autrement. Elle fait equipe avec ses clients pour donner forme a leurs idees en appuyant leur transformation numerique grace a un riche portefeuille de solutions pour un milieu de travail connecte et fute. Parmi ses technologies d'affaires, on retrouve des services de TI, la gestion intelligente de l'information, des solutions de securite video et des services d'impression geres ainsi que des technologies de bureau et des solutions d'impression industrielle et commerciale. L'annee 2025 marque le 20e anniversaire de l'entree de Konica Minolta dans le marche de l'impression de production; l'entreprise souligne 20 annees d'excellence, d'innovation et de resultats tout en continuant d'etre une figure de proue dans l'impression numerique commerciale. C'est aussi l'annee ou la marque bizhub de Konica Minolta celebre ses 20 ans, au cours desquels la gamme a revolutionne la technologie de bureau, redefini les processus des entreprises, et evolue continuellement pour repondre aux besoins des milieux de travail modernes, mue par les avancees technologiques et la volonte d'innover. Konica Minolta est fiere de faire partie du palmares 2025 des meilleurs grands employeurs d'Amerique de Forbes, d'avoir figure a plusieurs reprises au palmares CRN des 500 fournisseurs de services geres, d'avoir ete nommee la marque numero un en matiere de fidelite des clients sur le marche des appareils de bureau multifonctions par Brand Keys pendant 18 annees consecutives, et de s'etre vue decerner les prix BLI A3 Line of the Year 2021 et 2025 et Most Colour Consistent A3 Brand 2021-2023 de Keypoint Intelligence pour sa gamme bizhub One i-Series. Pour en savoir plus, rendez-vous sur le site de Konica Minolta et suivez l'entreprise sur Facebook, YouTube, LinkedIn et Twitter. Konica Minolta fonctionne selon un modele de services partages nord-americain qui permet d'harmoniser les priorites transfrontalieres et d'ameliorer la prestation de services aux organisations operationnelles. Le modele combine des fonctions de service americaine et canadienne afin d'offrir davantage de ressources aux services de soutien comme l'administration des ventes, la logistique et la chaine d'approvisionnement, le marketing, la planification des produits, la finance, les TI, les RH et les services juridiques. EOE Statement Konica Minolta is an equal opportunity and affirmative action employer. We consider all qualified applicants for employment without regard to race, color, religion, creed, national origin, sex, pregnancy, age, sexual orientation, transgender status, gender identity, disability, alienage or citizenship status, marital status or partnership status, genetic information, veteran status or any other characteristic protected under applicable law. Konica Minolta Business Solutions (Canada) Ltd. is an equal opportunity employer. Solutions d'affaires Konica Minolta (Canada) Ltee. est un employeur d'opportunite egale.
    $84k-110k yearly est. 7d ago
  • Mid-Level Systems Engineer

    Leidos 4.7company rating

    Security engineer job in Saint Louis, MO

    Leidos National Security Sector combines technology-enabled services and mission software capabilities in the areas of cyber, logistics, security operations, and decision analytics to support our defense and intel customers' mission to defend against evolving threats around the world. Our team's focus is to ensure our customers have the right tools, technologies, and tactics to keep pace with an ever-evolving security landscape and succeed in their pursuit to protect people and critical assets. The Intelligence Production Solutions Division (IPSD), part of the Decision Advantage Solutions Business Area, is currently seeking a Mid-Level Systems Engineer for the Chinook Program. As part of a highly skilled team, you will play a critical role in delivering geospatial intelligence (GEOINT) capabilities through innovative systems engineering practices, directly supporting the Customer's mission to provide timely, relevant, and accurate intelligence to national decision-makers and warfighters. Position may be performed in the following locations below. Please note Gaithersburg, MD is the program's primary work location. Gaithersburg, MD Alexandria, VA Chantilly, VA Aurora, CO St. Louis, MO Tucson, AZ Clearance Level Required: Top Secret with SCI eligibility and able to obtain a Polygraph. Primary Responsibilities: Support system architecture design, requirements development, integration planning, and configuration management. Provide engineering expertise for mission systems across the full system lifecycle from concept through deployment and sustainment. Collaborate with stakeholders across the Customer's and contractor teams to ensure interoperability, scalability, and mission alignment. Evaluate and recommend tools, techniques, and processes for system development and integration. Develop and maintain technical documentation, including system interface control documents (ICDs), and engineering reports. Participate in technical reviews, readiness assessments, and milestone events. Conduct analysis of system performance and provide recommendations for optimization. Basic Qualifications: US citizenship is required per contract. Bachelor's degree in Systems Engineering, Computer Science, or related field and 4-8 years of prior relevant experience or Master's with 2-6 years of prior relevant experience. Strong understanding of systems engineering principles, including requirements management, integration & test, and configuration control. Familiarity with Model-Based Systems Engineering (MBSE) tools and methodologies (e.g., Cameo, Sysml). Experience working in a DoD or Intelligence Community (IC) environment. Proficiency with Atlassian tools (JIRA, Confluence), Microsoft Office Suite, and collaboration platforms. Excellent written and verbal communication skills. Preferred Qualifications: Systems Engineering Professional (SEP), INCOSE, CISSP, Security+ certification, or similar credentials. Experience supporting the Customer's programs or working with the GEOINT lifecycle. Knowledge of cloud-based architectures (AWS, C2S) and DevSecOps environments. Familiarity with Agile and SAFe methodologies. Experience supporting GEOINT missions. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Original Posting: November 21, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: $87,100.00 - $157,450.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. About Leidos Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit *************** Pay and Benefits Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at ************************************ Securing Your Data Beware of fake employment opportunities using Leidos' name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system - never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at *****************************. If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. #J-18808-Ljbffr
    $87.1k-157.5k yearly 4d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security engineer job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
    $118k-154k yearly est. 1d ago
  • Security Engineer - Data Protection

    Lockton 4.5company rating

    Security engineer job in Kansas City, MO

    Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure. Key Responsibilities: * Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal. * Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery. * Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications. * Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration. * Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls. * Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails. * Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response. * Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership. * Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform. * Actively coach and mentor other security and technology team members on data protection best practices. * Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
    $75k-96k yearly est. 29d ago
  • Cyber Security Training

    Learnkwik.com

    Security engineer job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 11h ago
  • Security Engineer - Identity & Privileged Access Management (IAM & PAM)

    Exegy 4.1company rating

    Security engineer job in Saint Louis, MO

    Exegy is a global leader in intelligent market data, advanced trading systems, and future-proof technology. Exegy serves as a trusted partner to the complete ecosystem of the buy-side, sell-side, exchanges, and financial services technology firms around the globe. Headquartered in St. Louis with regional offices in North America, the UK/Europe and Asia Pacific, Exegy has the global footprint to deliver world-class support and managed services to its customer base of elite financial market participants. Job Summary The Security Engineer - IAM & PAM is responsible for designing, implementing, and operating identity, authentication, authorization, and privileged access controls across the enterprise. This role focuses on reducing over-provisioned access, enforcing least privilege, and ensuring access is appropriately granted, reviewed, and revoked in alignment with business risk, regulatory requirements, and security best practices. This engineer partners with IT Operations, Security Architecture, GRC, HR, and Application Owners to ensure identity and access management supports both secure operations and business agility. Responsibilities Identity & Access Engineering Design, implement, and maintain IAM and PAM platforms supporting workforce, privileged, and service identities Enforce least-privilege access models, role-based access control (RBAC), and attribute-based access control (ABAC) where appropriate Implement strong authentication controls, including MFA, conditional access, and phishing-resistant authentication Privileged Access Management (PAM) Manage privileged identities for administrative, infrastructure, cloud, and application accounts Eliminate shared, standing, and unmanaged privileged accounts through vaulting, just-in-time (JIT) access, and session recording Ensure privileged access is time-bound, approved, logged, and auditable Access Governance & De-Provisioning Lead initiatives to identify and remediate over-provisioned access, orphaned accounts, and excessive entitlements Design and operate access review and certification processes in collaboration with GRC and business owners Integrate IAM with HR systems and ITSM to automate joiner, mover, and leaver workflows Risk Reduction & Continuous Improvement Partner with Risk and GRC teams to align IAM/PAM controls to ISO 27001, NIST, CIS Controls, and regulatory requirements Perform periodic access risk assessments and provide remediation recommendations Develop metrics that demonstrate risk reduction, such as decreased standing privileged access, faster de-provisioning, and reduced audit findings Incident Support & Monitoring Support security incident investigations related to identity misuse, credential compromise, or privilege escalation Ensure IAM and PAM logs integrate with SIEM and monitoring platforms for visibility and alerting Our Ideal Candidate Has Technical Experience 5+ years of experience in information security or identity engineering, with deep focus on IAM and/or PAM programs Hands-on experience designing, implementing, and operating enterprise IAM and PAM platforms (e.g., Azure AD / Entra ID, Okta, Ping, CyberArk, BeyondTrust, Delinea, HashiCorp Vault, or comparable solutions) Proven experience building and maintaining RBAC models, automating joiner-mover-leaver workflows, and leading entitlement cleanup initiatives Strong working knowledge of modern authentication and authorization protocols (SAML, OAuth, OIDC, LDAP, Kerberos) Experience integrating identity systems across cloud platforms, SaaS applications, on-prem infrastructure, and CI/CD pipelines Governance & Risk Enablement Demonstrated experience reducing access-related audit findings and closing identity control gaps Working knowledge of common security and compliance frameworks (e.g., ISO 27001 Annex A, NIST SP 800-53, CIS Controls), with emphasis on access control and identity safeguards Ability to translate security and compliance requirements into practical, scalable identity controls that support business operations Operating & Collaboration Approach Effective partner to IT, Security, HR, and business teams to align identity controls with real-world workflows Comfortable communicating access risk, least-privilege principles, and control decisions to both technical and non-technical stakeholders Organized and process-oriented, with the judgment to balance security rigor, operational efficiency, and user experience Experience That Enhances Impact Exposure to regulated environments such as SOX, PCI-DSS, HIPAA, or similar compliance frameworks Experience working with identity governance (IGA) platforms, access reviews, or access analytics Relevant security or identity certifications (e.g., CISSP, CISM, GIAC, or IAM/PAM vendor certifications) are beneficial but not required
    $75k-98k yearly est. Auto-Apply 13d ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Security engineer job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 7d ago
  • Data Security Analyst

    The Timberline Group

    Security engineer job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Security engineer job in Springfield, MO

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client.* Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $79k-106k yearly est. Easy Apply 4d ago
  • IAM Information Security Specialist V6W6W656

    AP Recruiters & Associates

    Security engineer job in Kansas City, MO

    IAM Information Security Specialist Duration: 12 Months Overview of the Role: Our Client is currently seeking an Identity Access Management (IAM) Information Security Specialist that will have a strong emphasis on Cloud based IAM services. As a member of the team, your work will focus on IDaaS (Identity as a service) work using SaaS (Software as a Service) tools. As an IAM Information Security Specialist you will work with critical and sensitive information daily, and you will be relied upon to maintain critical security safeguards. Key Responsibilities: Develop and maintain comprehensive information security posture including rules, controls, and security safeguards. General activities such as Develop and maintain the information security posture (rules, controls, security safeguards, etc.) to protect information assets, and conducts reviews. Engineering activities such as facilitating and configuring application integrations, creation of IAM objects (users, groups, servicer accounts, API tokens, etc.), working incidents, following change management processes, and creating documentation. Required Skills & Qualifications: At least three years of related access control experience with a general understanding of provisioning within IDaaS and IAM systems preferred. Associate or Bachelors degree from an accredited college or university with specialization in an information technology field or equivalent combination of experience, education, and/or certification preferred. Intermediate understanding of computer applications such as Microsoft Office, internet navigation and email programs. Strong interpersonal, analytical and customer service skills and communication skills. Good business and organizational skills including the ability to prioritize, work within a team setting and manage work. Perks of Working with AP Recruiters & Associates: Competitive compensation (depending on experience) Comprehensive career development and professional growth opportunities Dedicated recruiter support throughout your contract journey Access to exclusive opportunities with Fortune 500 clients Flexible work arrangements and professional development resources About the Client: Our client is a leading energy company recognized as one of the largest electric utilities in the United States. They are committed to delivering clean, affordable, and reliable energy while driving innovation in sustainable power generation. The organization operates across multiple states, serving millions of customers and maintaining a strong focus on environmental stewardship, technological advancement, and community development. Their commitment to digital transformation and cybersecurity excellence makes this an exciting opportunity for security professionals.
    $68k-96k yearly est. 60d+ ago
  • Information Security Specialist

    Collabera 4.5company rating

    Security engineer job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 11h ago
  • Senior AI Security Engineer

    Mastercard 4.7company rating

    Security engineer job in OFallon, MO

    Our Purpose Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, we're helping build a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Our technology and innovation, partnerships and networks combine to deliver a unique set of products and services that help people, businesses and governments realize their greatest potential. Title and Summary Senior AI Security EngineerAs an Information Security Engineer specializing in AI Security and Data Science, you will be at the forefront of protecting our AI systems and the underlying data that powers them. Your role will combine deep technical expertise in security engineering with strong data science capabilities to analyze, interpret, and secure complex datasets used in AI models. You will design and implement advanced security measures to safeguard AI infrastructure and ensure the integrity, confidentiality, and availability of AI-driven solutions. Key Responsibilities: - Security Architecture Design: Architect and implement robust security frameworks for AI systems, including secure coding practices and design principles. -Data Analysis & Risk Modeling: Apply data science techniques to analyze AI system data, identify patterns, and assess potential security risks. Develop predictive models to anticipate vulnerabilities and threats. - Vulnerability Assessment: Implement and manage tooling for penetration testing on AI models and systems, leveraging statistical and data-driven approaches to prioritize remediation. - Secure AI Development: Collaborate with data scientists and software engineers to integrate security best practices into the AI development lifecycle, including secure model training, validation, and deployment. - Data Governance & Privacy: Ensure compliance with data protection standards (GDPR, NIST, ISO) and implement privacy-preserving techniques such as differential privacy and federated learning. - Research and Innovation: Stay abreast of advancements in AI security and data science, conduct research, and contribute to innovative security solutions. - Documentation and Reporting: Prepare detailed reports and dashboards using data visualization tools to communicate security posture and risk insights. - Advisory and Support: Provide guidance on secure data handling and AI security best practices to cross-functional teams. - Technical Training and Mentorship: Mentor team members on AI security principles and data science methodologies. - Experimentation and POCs: Design and execute experiments and proof-of-concepts to validate emerging threats and security solutions using data-driven approaches. Qualifications: Bachelor's or Master's degree in Computer Science, Information Security, Data Science, or related field. Relevant experience in information security with a strong focus on AI systems and data protection. Proficiency in data science tools and languages (Python, R, SQL) and experience with machine learning frameworks (TensorFlow, PyTorch). Strong understanding of statistical modeling, data visualization, and anomaly detection techniques. Expertise in designing and implementing security measures for AI systems, including encryption, access controls, and secure coding desired. Excellent analytical and problem-solving skills with ability to interpret complex datasets for security insights. Relevant certifications such as CISSP, CEH, OSCP, or data science certifications are highly desirable.Mastercard is a merit-based, inclusive, equal opportunity employer that considers applicants without regard to gender, gender identity, sexual orientation, race, ethnicity, disabled or veteran status, or any other characteristic protected by law. We hire the most qualified candidate for the role. In the US or Canada, if you require accommodations or assistance to complete the online application process or during the recruitment process, please contact reasonable_accommodation@mastercard.com and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. In line with Mastercard's total compensation philosophy and assuming that the job will be performed in the US, the successful candidate will be offered a competitive base salary and may be eligible for an annual bonus or commissions depending on the role. The base salary offered may vary depending on multiple factors, including but not limited to location, job-related knowledge, skills, and experience. Mastercard benefits for full time (and certain part time) employees generally include: insurance (including medical, prescription drug, dental, vision, disability, life insurance); flexible spending account and health savings account; paid leaves (including 16 weeks of new parent leave and up to 20 days of bereavement leave); 80 hours of Paid Sick and Safe Time, 25 days of vacation time and 5 personal days, pro-rated based on date of hire; 10 annual paid U.S. observed holidays; 401k with a best-in-class company match; deferred compensation for eligible roles; fitness reimbursement or on-site fitness facilities; eligibility for tuition reimbursement; and many more. Mastercard benefits for interns generally include: 56 hours of Paid Sick and Safe Time; jury duty leave; and on-site fitness facilities in some locations. Pay Ranges O'Fallon, Missouri: $115,000 - $184,000 USD
    $115k-184k yearly Auto-Apply 10d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security engineer job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems. Additional preferred knowledge and experience to include: Azure Cloud Security Intune Security Endpoint Detection and Response Security Information and Event Management (SIEM) Intrusion Protection Systems Data Loss and Prevention Vulnerability and Penetration Testing/Remediation Data Classification Encryption (Endpoint and In-Transit) Site Certificates Incident Response Program Business Resiliency Procedures Bachelor's degree (B.A.) from four-year college or university; or three to five years advanced information security experience and/or training; or ten years of combined information systems and information security experience; and three to five years supervisory experience; and/or equivalent combination of education and experience. Professional certification of CISA or CISSP desirable. Must have advanced knowledge of general information security equipment and functionality. OR Must have advanced knowledge with PC and LAN servers, security firewalls, intrusion protection systems, cloud-based security systems and other Information Security related technologies. Additional preferred knowledge and experience to include: Azure Cloud Security Intune Security Endpoint Detection and Response Security Information and Event Management (SIEM) Intrusion Protection Systems Data Loss and Prevention Vulnerability and Penetration Testing/Remediation Data Classification Encryption (Endpoint and In-Transit) Site Certificates Incident Response Program Business Resiliency Procedures
    $118k-154k yearly est. 35d ago
  • Information Security Specialist

    Collabera 4.5company rating

    Security engineer job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 60d+ ago

Learn more about security engineer jobs

Do you work as a security engineer?

What are the top employers for security engineer in MO?

Top 10 Security Engineer companies in MO

  1. Boeing

  2. Oracle

  3. Meta

  4. Duvari Group

  5. Ryder System

  6. Stifel Financial

  7. UMB Bank

  8. Exegy

  9. The Giant Bullseye

  10. Concentrix

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security engineer jobs in missouri by city

All security engineer jobs

Jobs in Missouri