Post job

Security engineer jobs in Oklahoma

- 105 jobs
  • SAP Security Administrator

    Inceed 4.1company rating

    Security engineer job in Oklahoma City, OK

    SAP Security Administrator Compensation: $130,000 - $160,000 annually, depending on experience Inceed has partnered with a great company to help find a skilled SAP Security Administrator to join their team! Join an innovative environment where you will play a critical role in managing and supporting SAP Roles and Security within a dynamic SAP landscape. This is an exciting opportunity to contribute to the design, development, and implementation of SAP Role Administration functions. If you are passionate about SAP security and thrive in a collaborative setting, this role is for you! Key Responsibilities & Duties: Design and maintain security solutions for identity and access management Analyze processes to deliver quality solutions meeting business requirements Drive security strategy for S4Hana ecosystem Identify and mitigate security risks and violations Ensure SAP security aligns with standards and methodologies Provide technical support and resolve security issues Collaborate with IT management for user/system access controls Generate SOX and adhoc reports regularly Maintain Segregation of Duties for SAP environment Conduct vulnerability assessments and penetration tests Required Qualifications & Experience: Bachelor's Degree in Business Management, Information Systems, or related field 4+ years experience in SAP GRC, Role Administration & Security Experience with SAP S/4 HANA security and authorizations In-depth understanding of SAP Security Role design & GRC Architecture Expertise in SAP Security automation and scripts creation Nice to Have Skills & Experience: Experience with cloud applications and Azure SAP GRC Certification Oil and Gas industry experience Experience with SAP GRC Access Control configuration Strong knowledge in provisioning to SAP LDAP and SAP Enterprise Portal Perks & Benefits: Comprehensive and competitive benefits package-details shared during later stages If you are interested in learning more about the SAP Security Administrator opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.
    $130k-160k yearly 1d ago
  • Cyber Security Operations Engineer

    Oaktree Staffing

    Security engineer job in Tulsa, OK

    The CSOC Operations Engineer III position is a technical leader responsible for the tactical execution of incident response, threat detection and continuous improvement of solutions which defend and protect our computer systems, information, and networks from intentional or unintentional access, modification, or destruction. This position is responsible for technical leadership in the design, planning, documenting and support of projects and cyber security solutions for the company. This position needs to intently focus on prioritization and always seek the improvement of processes and tools, providing recommendations to engineering and architecture teams. A successful CSOC Operations Engineer III will have a multidisciplinary background beyond cyber security, with advanced knowledge in fields such as client and server systems, networking, and application development. This position will also be responsible for ensuring systems and processes follow regulatory requirements, such as PCI-DSS, HIPAA and SOX. This position is responsible for the mentorship of other IT staff and performs third level support for incidents and issues. Major functions for this position Cyber Security Incident Response - 15% of total job Lead Cyber Security Incident Response as an incident owner, direct incident response activities, provide real-time decision making and communicate with the incident commander. Function as a threat hunter, working proactively to seek out weaknesses and stealthy attackers, conducting penetration tests and reviewing vulnerability assessments. Continuously develop and improve security technologies, focusing on the development of automation and orchestration capabilities as it relates to incident response. Coordinate documentation of activities during an incident and provide status updates to the incident commander during the life cycle of the incident. Participate in post-mortem collections and after-action reviews to identify and remediate gaps in processes and technologies. Participate in regular table-top sessions with the CSIRT and E-CSIRT teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Cyber Security Infrastructure Operations - 60% of total job Serve as an escalation point for all cyber security infrastructure operational issues during business hours and on-call for junior members of the team. Provide third tier support and subject matter expertise for all cyber security technologies and solutions. Work with the CSOC Principal and Manager to provide the team with tactical direction of operational technology capabilities focused on continuous improvement. Guide Security Engineering with necessary support as needed during IT projects with Cyber Security needs. Ensure project transitions meet CSOC operational standards for needed functionality, prevention, monitoring, detection, and response. Cyber Security Threat Operations - 15% of total job Perform third tier analysis of exploits such as malware, network intrusions, and unauthorized use to help determine attack-surface, patient zero, and possible pivot-points for escalation. Provide technical leadership to the team and guidance in investigating escalated notable/suspicious events and the latest investigation techniques, containment and mitigation methods, evidence handling standards, threat intelligence, playbook development and case documentation best practices. Participate in the Cyber Security Risk Scoring process to include scoring risks, providing remediation or compensating control guidance and risk remediation/mitigation validation. Stay current on monitoring, detection, prevention, analysis, and investigation techniques/tools and adversary techniques, to implement recommendations for improving cyber security event processes, procedures and tooling. Participate in regular technical table-top sessions with the cyber security teams to evaluate readiness, address changes in company, external cyber security threats and impact. Participate in after action reviews to identify and remediate gaps in process or technologies. Technical Leadership - 10% of total job Provide leadership and mentoring to IT staff in the following manner. Coordinate or lead necessary training to develop staff. Ensure that appropriate technology is implemented in the appropriate manner. Provide timely and effective communication of changes to processes and technologies. Maintain technical competence and relevance on existing and emerging cyber security, infrastructure, and automation technologies. Conceive, define, develop, and deploy tools/processes which help automate our cyber security technologies to produce higher business value. Help develop cyber security awareness content and provide education on security policies and practices both internal and external to the group. Routinely evaluate documentation provided by Security Engineering staff to ensure complete coverage of required diagrams, support articles, and other necessary documentation. Position Specifications: The required specifications (education, experience, and skills) are those that the employee must have to hold the position. Applicants applying for this position must possess the required specifications in order to be considered for the job. The desired specifications are those that are not required for the employee to hold the position, but the employee should try to obtain the desired education, experience, and/or skills to be effective and successful in the position. Required education: Bachelors in relevant field or the equivalent combination of education and experience. Desired education: Bachelor's degree in Cyber Security or a degree in a technology related field. Multiple industry certifications in Security, Systems Administration, and/or Networking, such as CISSP, GDSA, CCNP Security, or PCNSE. Required experience: Minimum of 8 years of progressive experience with cyber security technology design, administration or incident response in large, complex environments, particularly in multi-region retail. Advanced expertise in cryptography, network defense, endpoint protection, forensics, data protection, and incident response. Advanced understanding of data center technologies and concepts including services, security, infrastructure design, disaster recovery practices. Advanced level troubleshooting of IT systems. In depth knowledge of compliance standards such as HIPAA, PCI, and SOX. Experience mentoring, training, and developing other IT staff. Desired experience: Advanced experience in all aspects of cyber security technologies and knowledge in supporting and building large, complex cyber security environments. Experience planning and implementing a technical backlog to drive continuous improvement of technology and practices. Required skills: Advanced knowledge of multiple cyber security technologies, including next generation firewalls, IDS/IPS, network access control, email and web security, digital forensics, endpoint detection and response, vulnerability scanning and analysis, data protection, credential vaulting, certificate management, Multi-Factor, access brokering, SIEM, public cloud compliance and Cybersecurity automation and orchestration technologies. Advanced experience in planning and tracking the execution of large and complex projects or other efforts. Experience in scripting or software development. The ability to communicate effectively to both business and IT staff in a professional manner. Desired skills: Working experience with Active Directory and Microsoft and/or Linux OS, networking, identity and access management, wireless networking and security, penetration testing, incident response, and application security methodologies. Understanding of encryption systems and methodology. Advanced experience in software development or secure coding techniques. This position will require shift work that could include weekends and nights as dictated by support needs. On call 24/7. Must have knowledge of many areas and be able to switch between them rapidly. Must be able to work under pressure and provide guidance to Information Technology and business users during a crisis. This position will require ability to maintain absolute confidentiality of information or events due to the sensitivity of their natures.
    $73k-99k yearly est. 4d ago
  • Cyber Security Analyst

    Wildfire Talent Solutions

    Security engineer job in Tulsa, OK

    The Mid-Level Cyber Analyst plays a key role in securing enterprise systems through proactive monitoring, advanced threat analysis, and incident response. The role involves collaboration with IT, engineering, and compliance teams to improve the organization's overall security posture. Key Responsibilities Lead analysis of complex security incidents and drive incident response efforts. Develop detection rules, tuning SIEM use cases, and creating actionable alerts. Conduct vulnerability assessments and partner with infrastructure teams for remediation. Support endpoint detection and response (EDR) and network intrusion detection (NIDS/NIPS) tuning. Perform threat hunting and forensic analysis to identify indicators of compromise (IoCs). Assist in designing and implementing security controls for new technologies or projects. Mentor junior analysts and support continuous process improvement in SOC operations. Qualifications Bachelor's degree in Cybersecurity, Computer Science, or related discipline. Must be a US Citizen or Permanent resident 3-5 years of experience in security operations, incident response, or network defense. Expertise with SIEM tools (e.g., Splunk, Sentinel, QRadar), EDR, and vulnerability management platforms. Knowledge of MITRE ATT&CK framework and common attack vectors. Certifications such as CompTIA CySA+, CEH, GCIH, or CISSP (in progress) preferred. Strong analytical, scripting (Python, PowerShell), and communication skills.
    $65k-88k yearly est. 2d ago
  • Cyber Security Operations Analyst

    Explorer Pipeline Corporation 4.1company rating

    Security engineer job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS * Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities * Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. * Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. * Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. * Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. * Knowledge of TSA security requirements and regulations. * Knowledge of identity management processes and procedures. * Skill in project management. * Ability to manage, track and analyze information. * Ability to effectively work and cooperate with supervisors, co-workers, and vendors. * Ability to follow corporate policies and the directions of supervisors. * Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 17d ago
  • Security Engineer Investigator, Insider Trust

    Meta 4.8company rating

    Security engineer job in Oklahoma City, OK

    As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats. **Required Skills:** Security Engineer Investigator, Insider Trust Responsibilities: 1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats 2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes 3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations 4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation 5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities 6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities 7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success **Minimum Qualifications:** Minimum Qualifications: 8. Bachelor's degree in Computer Science, Engineering, or equivalent experience 9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role 10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis 11. Experience with attacker tactics, techniques, and procedures 12. Proficiency in coding or scripting in one or more general-purpose programming languages **Public Compensation:** $147,000/year to $208,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $147k-208k yearly 60d+ ago
  • Offensive Security Engineer, Assessments (Web3)

    Coinbase 4.2company rating

    Security engineer job in Oklahoma City, OK

    Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system. To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems. Our ******************************** is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be. While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an experienced Offensive Security Engineer specializing in Web3 penetration testing and Web3 bug bounty program management and optimization. In this role, you will collaborate with the Bug Bounty Program Lead to drive Web3 bug bounty triage, validation, and strategic initiatives aimed at increasing program efficiency, maturity, and hacker engagement. You will work closely with whitehat hackers, security engineers, and cross-functional teams to enhance Coinbase's security posture through an effective bug bounty program. Additionally, you will perform penetration tests on Web3 technologies and applications, ensuring the security of Coinbase's blockchain-based products and services. *What you'll be doing (ie. job duties):* * Conduct security assessments of Web3 products and services, including smart contracts, DeFi protocols, and blockchain infrastructure. * Collaborate with partner teams to enhance detection and response capabilities for Web3 vulnerabilities. * Stay informed on emerging security trends, advisories, and academic research in the Web3 space. * Lead Web3 bug bounty triage and validation, ensuring timely and accurate assessments of reported vulnerabilities. * Develop and implement strategies to incentivize high-quality bug bounty submissions and engage with the hacker community. * Manage the Web3 bug bounty program, including scope updates, researcher communication, and payout disbursements. * Analyze bug bounty data to identify trends, common vulnerabilities, and areas for improvement. * Collaborate with engineering teams to prioritize and remediate vulnerabilities identified through the bug bounty program. * Mentor and train junior security engineers in Web3 bug bounty triage and analysis. * Provide on-call support for critical Web3 bug bounty-related incidents. * Document and report on Web3 bug bounty metrics and program effectiveness. *What we look for in you (ie. job requirements):* * Bachelor's or Master's degree in Computer Science, Cybersecurity, Software Engineering, or a related field. * 3+ years of experience in Web3 application security and penetration testing. * Proven track record of identifying critical vulnerabilities across the blockchain protocol stack, Web2, and Web3 components. * Extensive knowledge of the blockchain ecosystem, including L1/L2 networks, DeFi protocols, and staking mechanisms. * Deep understanding of Web2 security concepts and common vulnerabilities (e.g., OWASP Top 10, SANS Top 25). * Strong analytical skills to identify trends and patterns in vulnerabilities. * Excellent communication skills for engaging with internal teams. * Passion for security and a drive to improve Web3 security posture. * Ability to work independently and take ownership of penetration testing initiatives. * Energy and self-drive for continuous learning in the rapidly evolving crypto space. * Excellence in clear, direct, and kind communication with technical and non-technical stakeholders. * Experience building relationships with product, engineering, and security teams. *Nice to haves:* * Participation in CTFs, bug bounty programs, or open-source security research. * Expertise in Application Security, Network Security, or Cloud Security. * Relevant security certifications (e.g., OSCP, GPEN). * Experience developing and implementing security tooling to support bug bounty triage and analysis. * Experience with bug bounty programs and platforms, including triage, validation, and researcher communication. * Strong analytical skills to identify trends and patterns in bug bounty submissions. * Excellent communication skills to effectively engage with bug bounty researchers. Position ID: P69494 \#LI-remote *Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include bonus eligibility + equity eligibility**+ benefits (including medical, dental, vision and 401(k)). Pay Range: $152,405-$179,300 USD Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying. Commitment to Equal Opportunity Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the *********************************************** in certain locations, as required by law. Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations*********************************** *Global Data Privacy Notice for Job Candidates and Applicants* Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available ********************************************************** By submitting your application, you are agreeing to our use and processing of your data as required. *AI Disclosure* For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description. For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate. *The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact accommodations[at]coinbase.com
    $152.4k-179.3k yearly 60d+ ago
  • Cyber Threat Analyst

    Fortiphi

    Security engineer job in Oklahoma City, OK

    **Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)** Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
    $65k-88k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Oklahoma City, OK

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 28d ago
  • Senior Security Architect - Oklahoma

    Cyberone Security

    Security engineer job in Oklahoma City, OK

    CyberOne is hiring! We hire smart, talented and high-performing professionals to push our organization forward and provide superior service to our customers. We each take accountability for our work, strive to make each other better, and genuinely love what we do. If you value learning new things, being innovative, and working in a supportive, collaborative environment, CyberOne may be the place for you. If you are ready to raise the bar for your career and be part of our exciting journey, we would like to hear from you! The Presales Senior Security Architect partners closely with Account Managers, Professional Services, and partner resources to design and deliver tailored cybersecurity solutions that address customer needs. Acting as a trusted advisor, this role combines deep technical expertise with strong communication skills to build confidence and drive successful outcomes. The Senior Security Architect will primarily support customers in the Oklahoma region, while providing additional support to other regions as needed. This position requires the candidate to reside in Oklahoma in order to effectively serve the assigned region.Essential Functions Build strong customer relationships and serve as a trusted technical advisor, helping them achieve their business and security goals. Work in close partnership with Account Managers, Professional Services, and vendor partners. Continuously expand and update knowledge of cybersecurity use cases, leading partner technologies, and CyberOne's Professional Services offerings to align with customer needs. Maintain a strong understanding of the broader cybersecurity ecosystem with deep knowledge of key verticals (e.g., network, cloud, OT, application security). Provide training and knowledge sharing to sales teams on vendor products, cybersecurity trends, and market insights. Perform assessments and consulting services to help customers identify risks within their environments. Lead strategic conversations with enterprise customers on industry trends and emerging technologies. Act as the customer's advocate for technical issues, ensuring timely follow-up and resolution. Travel as needed to participate in customer meetings, workshops, and strategic discussions. Education/Experience 7+ years of experience designing and implementing security solutions in large environments. Experience leading and recommending technology selection processes within or for enterprise organizations. Proven experience as a senior or lead technical resource/architect (cybersecurity, network, cloud, etc.) within a large organization, reseller, or systems integrator. Effectively lead and support customer demonstrations with Systems Engineers to highlight CyberOne's value proposition. Certification/License Requirements Industry-recognized certifications (e.g., CISSP, CCSP, SANS, Open CA) preferred. Vendor/technology certifications (e.g., AWS, Palo Alto Networks, Tenable) preferred. Core Skills/Abilities Excellent relationship-building skills with the ability to engage clients confidently in person and virtually. Strong organizational skills with the ability to manage multiple priorities in a fast-paced environment. Strong presentation, written, and oral communication skills across all organizational levels, from senior leadership to peers and team members. Proficiency with standard office equipment such as laptops and smartphones. Work Environment Ability to travel up to 50% within the Oklahoma territory and occasionally to the Plano, TX headquarters. Ability to navigate client environments, including walking, stairs, and carrying light materials (up to 25 lbs). Prolonged periods of sitting or standing while working remotely or attending meetings. Operates a laptop and standard office equipment for prolonged periods. Participates in virtual meetings and occasional in-person training or company events. Strong verbal, visual, and auditory capabilities to effectively present, communicate, and engage with clients and internal teams. If you are passionate, driven and ready to take your career to the next level, we invite you to apply today! CyberOne is a proud Equal Opportunity and Affirmative Action Employer. All qualified applicants, regardless of race, color, genetic information, national origin, religion or belief, sex, affectional or sexual orientation, gender identity or expression, immigration status, ancestry, age, marital status, disability, or protected veteran status, are encouraged to apply and will receive equal consideration based on merit, qualifications, and business need. Recruitment Agencies Please Note: "In accordance with our recruitment policy, CyberOne strictly prohibits any form of solicitation of our employees by external agencies or third parties. Any candidate information that may be received from such agencies or third parties shall be deemed as a voluntary gift and shall become the exclusive property of CyberOne. Exceptions to this policy apply only when an Agency/Third Party is an Authorized Vendor of CyberOne, holding a valid and current contract that has been duly signed by our People Services Manager or CFO of CyberOne. Under no circumstances will any payment be made to any Agency/Third Party unless they are an Authorized Vendor or possess written approval from the CyberOne People Services Manager or CFO, granting them explicit permission to engage in recruitment efforts on behalf of CyberOne."
    $98k-132k yearly est. Auto-Apply 60d+ ago
  • Security Engineer II

    Trustmark 4.6company rating

    Security engineer job in Oklahoma City, OK

    Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities. We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information. You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs. **Responsibilities:** + Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data. + Conduct vulnerability assessments and penetration testing to identify and mitigate risks. + Develop and implement security policies, standards, and procedures. + Monitor security systems and respond to incidents promptly and effectively. + Stay up-to-date with the latest cybersecurity threats and trends. + Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business. + Provide technical guidance and support to internal stakeholders. **Qualifications:** + Bachelor's degree in Computer Science, Information Technology, or a related field or + 3-5 Years of network engineering or cyber engineering experience + Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001). + Proficiency in network security, systems security, application security, and data security. + Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM). + Excellent problem-solving and analytical skills. + Strong communication and interpersonal skills. + Ability to work independently and as part of a team. **Preferred Qualifications:** + Certifications such as CISSP, CISA, or CEH. + Experience with cloud security (e.g., AWS, Azure, GCP). + Knowledge of scripting and programming languages (e.g., Python, PowerShell). Brand: Trustmark Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums. **For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability. Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match. When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives. At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
    $73k-94k yearly est. 60d+ ago
  • Information Security Risk & Compliance Analyst

    Midfirst Bank 4.8company rating

    Security engineer job in Oklahoma City, OK

    The Security Risk and Compliance Analyst is a member of the information security team and works closely with the other members of the team, the business, and other IT staff to develop and manage security for one or more IT functional area (e.g., data, systems, network, and physical) across the enterprise. The candidate will be able to effectively understand standard risk methodologies and the implementation of security controls in an enterprise environment. Key Result Areas: Work as part of a team to maintain security and integrity of corporate data and IT systems through activities including: Develop and maintain enterprise security policies and procedures Assist in the coordination and completion of information security risk assessments and documentation Work with information security management to develop strategies and plans to enforce security requirements and address identified risks Report to management concerning residual risk, vulnerabilities, and other security exposures including misuse of information assets and noncompliance Work with IT department and members of the information security team to identify, select and implement technical controls Provide direct support to the business and IT staff for security related Maintain an awareness of security and control issues in emerging technologies Perform other duties as assigned Knowledge, skills, and experience required: Bachelor's degree in Computer Science, Information Systems, or other equivalent degree or experience Preferred Certifications (CISSP, CISA, CRISC, CRM, GSEC, etc.) Strong analytical and problem-solving skills to enable effective security incident and problem resolution Proven ability to work under stress with the flexibility to handle multiple high-pressure tasks simultaneously Ability to work well under minimal supervision Strong team-oriented skills with the ability to interface effectively with a broad range of people and roles, including vendors and enterprise personnel Strong written and verbal communication skills and attention to detail for board level committee and regulatory reporting Strong customer/client focus with the ability to manage expectations appropriately General understanding of risk management Knowledge of security methodology frameworks and regulatory requirements such as NIST, CIS, HIPAA, PCI, and FFIEC Microsoft Excel, Word, and Visio skillset for the creation, tracking and reporting of security metrics (e. graphs, formatting, basic formulas) Preferred Qualifications: Understanding of enterprise risk management systems and automation platforms Experience with Data Loss Prevention (DLP) and Vulnerability Management solutions *This position is on-site located in Oklahoma City, must reside within the area to be considered. *Position requires a minimum of 3 years of relevant US based experience. #LI-Onsite #LI-DNI
    $77k-104k yearly est. 23d ago
  • Chief Information Security Officer (CISO)

    Buffkin/Baker

    Security engineer job in Stillwater, OK

    Oklahoma State University Chief Information Security Officer Oklahoma State University invites nominations and applications for the position of Chief Information Security Officer. This position reports directly to the Chief Information Officer. Oklahoma State University (OSU) is a modern land-grant university, fostering student success through a blend of tradition and innovation. OSU's goal is to become the preeminent land-grant institution in the country through its university strategy. Through leadership and service, we are preparing students for a bright future and building a brighter world for all. As a Very High Research Activity institution, OSU improves the lives of people in Oklahoma, the nation, and the world through integrated, high-quality teaching, research, and outreach. OSU has more than 35,000 students across its five-campus system and more than 26,000 on its combined Stillwater and Tulsa campuses, with students from all 50 states and more than 100 nations. Established in 1890, OSU has graduated more than 290,000 students. The Chief Information Security Officer (CISO) provides strategic leadership for the university's comprehensive information security and cybersecurity programs. This position is responsible for protecting the institution's digital assets, research data, student information, and technology infrastructure while enabling academic excellence and research innovation. The CISO reports directly to the Chief Information Officer and serves as a key collaborator to the senior leadership team. Minimum Qualifications: Bachelor's degree and seven years of information security work experience from one or a combination of security architecture and design, security engineering, auditing and compliance, incident response and forensics, security awareness training, and the management of an IT security department. Demonstrated experience managing enterprise-wide security programs in complex distributed environments. Familiarity with Zero Trust architecture principles and enterprise identity governance. Experience in conducting security tabletop exercises or cyber incident simulations; use of cybersecurity maturity models such as NIST CSF Tiers or CMMC. Professional security certifications required (CISSP, CISM, CISA, or equivalent). Excellent written and verbal communication skills with ability to present complex technical concepts to non-technical audiences. Strong leadership and team management capabilities. Knowledge of emerging technologies in higher education (cloud computing, IoT, AI/ML security implications). Preferred Qualifications: Bachelor's degree in computer science, management information systems, computer engineering, or related area. Higher education experience. Deep knowledge of information security frameworks (NIST Cybersecurity Framework, ISO 27001/27002, CIS Controls). Experience with security technologies including SIEM, endpoint protection, network security tools, and cloud security platforms. Knowledge of research security requirements and federal compliance mandates. Experience with security program maturity ssessments and continuous improvement initiatives. While applications and nominations will be accepted until a successful candidate has been appointed, interested parties are encouraged to submit their materials by September 5, 2025 to receive optimal consideration. Applications (letter of interest addressing the qualifications and responsibilities listed above, current resume, and the names, email addresses and telephone numbers of five references) must be submitted to jobs.okstate.edu, req # 492963. For questions, please contact Martin Baker and Chelsie Whitelock at Buffkin/Baker as indicated below: Martin M. Baker, Managing Partner Buffkin/Baker Chelsie Whitelock, Associate Partner ************************ Oklahoma State University (OSU) strives to provide a safe study, work, and living environment for its faculty, staff, volunteers and students. To support this environment and comply with applicable laws and regulations, OSU conducts pre-employment background checks on final candidates. Offers of employment are contingent upon the successful completion of a background check. The type of background check conducted varies by position and can include, but is not limited to, criminal (felony and misdemeanor) history, sex offender registry, motor vehicle history, financial history, and/or education verification. Background checks will be conducted when required by law or contract and when, in the discretion of the university, it is reasonable and prudent to do so. Oklahoma State University, as an equal opportunity employer, complies with all applicable federal and state laws regarding non-discrimination. Oklahoma State University is committed to a policy of equal opportunity for all individuals and does not discriminate based on race, religion, age, sex, color, national origin, marital status, disability, or veteran status with regard to employment, educational programs and activities, and/or admissions. For more information, visit eeo.okstate.edu. To Request Full Profile, Click here.
    $99k-149k yearly est. Easy Apply 60d+ ago
  • C2ISR Information System Security Officer

    Plexsys 4.1company rating

    Security engineer job in Oklahoma City, OK

    At PLEXSYS, our teams design, build and deliver Live, Virtual, and Constructive (LVC) innovation and training solutions to customers around the world. With over 200 employees in seventeen states and four foreign countries, we contribute our success to enabling better training…everyday…across the globe. As an employee of PLEXSYS, you'll find a culture that empowers you to achieve your professional objectives, give your personal best, and work with other highly passionate individuals. Our core values of integrity, excellence, teamwork and agility drive our daily decisions, identify our focus areas, and inspire our organizational culture. GENERAL DESCRIPTION The Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) Information System Security Officer (ISSO) will provide cybersecurity support to Joint Theater Air-to-Ground Simulation Systems (JTAGGS), Airborne Warning and Control Systems (AWACS), Airborne Surveillance Command and Control (ASC2), and/or Theater Air Control System (TACS) training and ground systems and networks. The ISSO is responsible for ensuring the appropriate operational security posture for information systems and must have detailed knowledge and expertise required to manage the security aspects of an information system. Responsibilities include implementation of the requirements of the Joint Special Access Program (SAP) Implementation Guide (JSIG), Risk Management Framework (RMF), and other security requirements as assigned. Duties also include physical and environmental protection, personnel security, and incident handling. Coordinate and synchronize security policy guidance with PLEXSYS Facility Security Officer and C2ISR Information System Security Manager (ISSM) and work in close coordination with Partner/Government ISSO/ISSM. Duties & Responsibilities Execute on-site information system security program to include implementation and validation of automated informational security, ensuring security requirements are satisfied for C2ISR training systems Establish and implement security procedures and practices in support of Corporate goals and current DoD Regulations Develop, implement and maintain security emergency action plans Provide security education and training to local employees Maintain administrative security records and documents for local employees Conduct self-inspections to ensure current security measures and policies are effective Conduct random security inspections to ensure regulations and procedures are being adhered to by local employees May assist in the development and updating of required Authority to Operate (ATO) artifacts Conduct system audits in accordance with System Security Plan requirements May be required to conduct maintenance on the networks, systems, and hardware May be required to perform software upgrades on networks, systems, and hardware Understand and follow NISPOM/ODAA/RMF/ICD/NIST/JSIG classified system accreditation and certification requirements Other duties as assigned REQUIREMENTS Bachelor's degree in related field or 2 years' experience in related field Extensive Training or experience with Windows based Information Systems standards with a working knowledge of Linux operating systems Specialized computer training in networking and active directory Experience with security audits for information systems Strong communication and problem-solving skill Ability to work in both a Team environment as well as independently Must be organized and detail orientated Current DoD 8570 IAT Level II and IAM Level I or higher certification (i.e. Security + or equivalent certification) DESIRABLE Experience with DoD Security Regulations and Policies Experience with Type 1 and/or Type 2 virtualization platforms Experience managing system security in an enterprise environment Strong system documentation skills Experience with Trellix ePO (HBSS), Splunk, and Tenable Security Center/Nessus (ACAS) AUTHORITY Must have or be able to obtain and maintain a Top-Secret clearance with approval for SAP and SCI access PERKS As a PLEXSYS employee, you can expect certain advantages; such as advancement based on performance, competitive wages, valuable benefits and a great working environment. Our team is committed to ensuring an environment that empowers individuals to realize their full potential by providing opportunities and necessary support to achieve personal and professional goals. Medical/Vision/Prescription/Dental Benefits Life, AD&D and Long Term Disability Coverage Paid Holidays, Military Leave, and Paid Time Off 401k Plan with eligibility from first day of employment Education reimbursement for job-related courses for full-time employees PriceClub/COSTCO/Sam's Club annual membership PLEXSYS Interface Products, Inc. is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
    $76k-99k yearly est. 60d+ ago
  • Manager Information Security

    Weokie Federal Credit Union

    Security engineer job in Oklahoma City, OK

    We are seeking an experienced and mission-driven Manager of Information Security to help protect our credit union's systems, safeguard member data, and support our commitment to being the best place our employees have ever worked and the best place our members have ever banked. The ideal candidate holds a current CISSP certification, demonstrating deep expertise across all cybersecurity domains, and maintains ongoing training to stay ahead of evolving threats and regulatory requirements in the financial services sector. The Manager Information Security responsible for overseeing the Information Security program, Vendor Management program, and the administration of the Business Continuity Plan at WEOKIE Federal Credit Union. Responsibilities include but are not limited to developing and maintaining the information security framework, monitoring and managing vendor risk, and maintaining, enhancing, and testing the Business Continuity Plan. Major Activities: * Develops, maintains, and reviews appropriate information security policies and procedures needed to maintain the integrity of the information security program. * Conducts threat focused business impact analysis to maintain an inventory of business impacting cyber threats. * Organizes and conducts cybersecurity simulation exercises. * Acts as the IT Security, Business Continuity, and Vendor Management central point of contact for the annual NCUA exam and IT Controls Audit. * Ensures proper policies, procedures, risk mitigation activities, and operation controls are followed. Reports gaps in policies, procedures, and operating controls to leadership to ensure member impact and risk is mitigated. * Responsible for performing information security risk assessments on a scheduled basis that focus on ensuring policies and procedures are consistently applied. * Attends/makes presentations to the WEOKIE Board of Directors and various Board Committees as assigned. * Assist with development of company wide information security training materials for computer-based training modules and build company wide information security awareness materials. * Support technology/systems that enable all vendor management activities by administering the Tandem platform. * Responsible for vendor risk assessment and execution of other vendor management activities as needed. This includes administration, processing risk acceptance documentation, and maintaining the schedule of vendor management activities. * Maintain, develop, update, and test WEOKIE's Business Continuity Plan. * Write reports to summarize testing activities, including results and recommendations. * Act as Business Continuity Coordinator in the event of an incident, to ensure that WEOKIE's Business Continuity Plan is implemented. Critical Results: * WEOKIE's information security program is a core part of its culture and is integrated into all of its lines of business, support functions and third-party management programs. * Information Security risks and threats are clearly identified, measured and remediated timely. * The Board of Directors and Senior Management receive timely and credible reporting and recommendations that lead to effective decision-making in both strategic and tactical contexts. * Members and credit union information security assets are protected from unauthorized access and when necessary, reacts timely and effectively to manage incidents or vulnerabilities. * WEOKIE receives favorable results from key reviews, audits, and exams from audit and exam sources. * WEOKIE's information security program is seen as independent from the IT line of business and also seen as supportive and collaborative to all stakeholders. * Risk assessments are completed annually and deficiency are quickly addressed and/or remediated. * Security incidents are properly documented, tracked, and escalated in a timely fashion when deficiencies are presented. * New quality control activities are developed and presented to leadership that correspond to the information security program. * Vendor Management risk assessments, reporting results, and conclusions are thoroughly documented, completed timely and accurately. * Vendor Management is collaboratively managed with fellow team members. * Vendor Management risks are controlled and mitigated by adhering to all applicable policies and procedures. * WEOKIE's Business Continuity Plan is up-to-date, regularly tested, thoroughly communicated, and ready for immediate implementation in the event of an incident. Qualifications: * Specialized or Technical Knowledge and Skills: The Manager Information Security is a data security professional skilled at managing IT security activities in a complex, multi-system/multi-vendor computing environment. A strong, practical working knowledge of information security concepts and technical architecture are necessary along with an ability to take technical concepts and translate them into business impact. * A bachelor's degree is required, preferably in Information Technology or Computer Science. * A minimum of three years of experience in the information security field. * A Certified Information System Security Professional (CISSP) certification is required; additional certifications such as a Certified Information Systems Auditor (CISA) or Certified Information Security Manager (CISM) are preferred. * Demonstrated experience in managing and working with third party vendors. * Demonstrated ability to research and implement innovative solutions that have improved security, operational efficiency, quality, and service levels. * In-depth understanding of the financial services or highly regulated business, and the applications systems and technical infrastructures needed to support them. B. Behavioral Competencies: Behavioral competencies are the skills and personal characteristics that an individual should possess in order to be successful in this position. * Core Competencies: Core competencies are consistent for all positions across the organization and are aligned with WEOKIE's core values. * Member Focus (internal and external): Builds member confidence, is committed to increasing member satisfaction, sets achievable member expectations, assumes responsibility for solving member problems, ensures commitments to members are met, solicits opinions and ideas from members, responds to internal members. * Dependability: Meets commitments, works independently, accepts accountability, handles change, sets personal standards, stays focused under pressure, and meets attendance/punctuality requirements. * Integrity/Ethics: Deals with others in a straightforward and honest manner, is accountable for actions, maintains confidentiality, supports company values, conveys good news and bad. * Job Specific Competencies: The position requires a well‐rounded and level‐headed individual who is able to maintain composure in a variety of situations. The following stand out among a long list of behavioral competencies for this position: * Managing Vision and Purpose: Communicates a compelling and inspired vison of core purpose; talks beyond today; talks about possibilities, is optimistic, creates mileposts and symbol to rally support behind the vision; make the vision sharable by everyone; can inspire and motivate entire units or organizations. * Strategic Agility: Sees ahead clearly, can anticipate future consequences and trends accurately; has broad knowledge and perspective; is future oriented; can articulately pain credible pictures and visions of possibilities and likelihoods; can create competitive and breakthrough strategies and plans. * Oriented Towards Serving Others: Is predisposed to servant leadership and excited towards improving conditions for others. * Command Skills: Relishes leading; takes unpopular stands if necessary; encourages direct and tough debate but isn't afraid to end it and move on; is looked to for direction in a crisis; faces adversity head on; energized by tough challenges. * Intellectual Horsepower: Is bright and intelligent; deals with concepts and complexity comfortably; described as intellectually sharp, capable, and agile. * Innovation Management: Is good at brining the creative ideas of others to market; has good judgement about which creative ideas and suggestions will work; has a sense about managing the creative process of others; can facilitate effective brainstorming; can project how potential ideas may play out in the marketplace. * Composure: Is cool under pressure; does not become defensive or irritated when times are tough; is considered mature; can be counted on to hold things together during tough times; can handle stress; is not knocked off balance by the unexpected; doesn't show frustration when resisted or blocked; is a settling influence in a crisis. * Political Savvy: Can maneuver through complex political situations effectively and quietly; is sensitive to how people and organizations function; anticipates where the land mines are and plans his/her approach accordingly; views corporate politics as a necessary part of organizational life and work to adjust to that reality. C. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms; climb or balance; stoop, kneel, crouch, or crawl and talk or hear. The employee must occasionally lift and/or move up to 50 pounds. Specific vision abilities required by this job include color vision, peripheral vision, depth perception and ability to adjust focus. D. Work Environment: The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The worker is not substantially exposed to adverse environmental conditions. The noise level in the work environment is usually moderate. WEOKIE does not and shall not discriminate on the basis of Protected Status, marital status, and political belief or any other status or condition protected by applicable federal and/or state law. Bona fide occupational qualifications will be applied impartially. These activities include, but are not limited to, hiring of staff, selection of volunteers and vendors, and provision of services. We are committed to providing an inclusive and welcoming environment for all our members, our staff, clients, volunteers, subcontractors, vendors, and clients.
    $91k-132k yearly est. 23d ago
  • Information Security Specialist

    Feed The Children 4.1company rating

    Security engineer job in Oklahoma City, OK

    At Feed the Children, we recognize the value of outstanding people, and we are looking for compassionate changemakers to join our team. We pride ourselves on cultivating a collaborative workplace where employees experience productive and rewarding employment and feel engaged in our mission to end childhood hunger. Our passionate team shares a deep sense of purpose, and we dream big to solve complex problems and create positive impact in communities around the world. Feed the Children is recognized by Candid with its Platinum Seal of Transparency and is accredited by the BBB Wise Giving Alliance. The organization has received a 4-star rating from Charity Navigator and is consistently recognized on the Forbes Top 100 Charities list. We are currently in search of an Information Security Specialist to join our Information Technology team! The Information Security Specialist will investigate, analyze, and learn from cybersecurity researchers, attackers, and incidents to develop durable detective controls across the IT infrastructure. This role will provide support and resolution for scanning, reporting, and vulnerability remediation. This position will collaborate with the Senior Director of Information Security to assist in prioritizing vulnerabilities, planning mitigations, and security control configuration. NOTE: This is an entry level position working from our corporate office in Oklahoma City, OK. Salary range: Up to $21.64/hr. based on education and experience. Job Requirements: Education Bachelor's degree in Computer Science, CIS, Engineering, Cybersecurity, or related field preferred. High school diploma or GED required. Experience 2+ years' experience working with technical and business teams related to information security Ability to analyze general cyber security-related technical problems and provide basic engineering and technical support in solving these problems. Familiarity with Azure and Office 365 security suite of tools, to include Microsoft Defender. Industry-standard knowledge of activities relating to identity and access management, MDR, SIEM, and least privilege access management. Basic understanding of NIST-specific security assessments. Aware of the legal, regulatory, and ethical considerations of working with sensitive information Proactive, self-motivated, well organized, reliable, and detail-oriented team member Ability to communicate across all levels of the organization with strong organizational skills Ability to multitask, self-prioritize daily tasks, and experience with task management tools. Analytical and critical thinking skills, required Any combination of education, training and experience which provides the required knowledge, skills and abilities to perform the essential functions of this job may be considered. Essential Functions: Execute day-to-day threat hunting for targeted attacks against multiple environments. Work closely with Information Technology's Director of Data Governance and the Sr. Director of Information Security to make sure identified vulnerabilities are patched and remediated. Maintain an understanding of security-related IT policies to assess the effectiveness of controls. Facilitate incident remediation including monitoring Data Loss Prevention (DLP) tools and responding to alerts. Investigate network threats such as computer viruses, exploits, and malicious attacks to determine true threats, false positives, and network system misconfigurations. Monitor potential compromise, intrusion, deficiency, significant event or threat to the security posture and provide solutions to issues. Work within the IT department verifying and validating security compliance against corporate standards, regulatory standards, and other industry defined practices. Assist with security awareness training of employees, as needed. Champion the NIST 800-53 program, documenting policies and procedures as well as performing audits, risk assessments and implementation reviews. Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; monitoring information security news for emerging threats; and participating in professional organizations. Document specific activities, problems solved, and issues resolved. Protect our organization by keeping information confidential. Collaborate cross-functionally throughout the organization to safeguard sensitive information from potential insider risks and threat actors. Develop, update, and maintain policies and other technical documentation Establish an environment of high performance and continuous improvement that values learning, a commitment to quality, welcomes and encourages collaboration, and fosters both intra and inter-departmental dialogue and respect. Model the type and level of behavior, professionalism and leadership that is in accordance with the values of the organization. Perform other related duties as required About Feed the Children: As a leading anti-hunger organization, Feed the Children is committed to ending childhood hunger. We provide children and families in the U.S. and around the world with the food and essentials kids need to grow and thrive. Through our programs and partnerships, we feed children today while helping their families and communities build resilient futures. In addition to food, we distribute household and personal care items across the United States to help parents and caregivers maintain stable, food-secure households. Internationally, we expand access to nutritious meals, safe water, improved hygiene, and training in sustainable living. Responsible stewards of our resources, we are driven to pursue innovative, holistic, and child-focused solutions to the complex challenges of hunger, food insecurity, and poverty. For children everywhere, we believe that having enough to eat is a fundamental right. Our Values: We are driven by a shared sense of PURPOSE At Feed the Children, our commitment to the mission is at the heart of what we do and fuels our collective impact in the communities where we serve. We cannot achieve our bold vision without our talented PEOPLE We are passionate about fostering a best-in-class workforce that is engaged, respected, and empowered to deliver results. We believe in CURIOSITY and continued learning Success requires a culture of discovery, curiosity and continued learning to expand our knowledge, seek new perspectives and challenge the status quo. We know COLLABORATION is the only way to end childhood hunger We cannot succeed alone. It will take all of us - our employees, donors, partners, volunteers - working together to accomplish our ambitious goals. We DREAM big When we work together, we collectively reimagine what is possible. We dream big to solve complex problems and create deep impact in communities around the world. We VALUE every donor We respect our donors' intentions and promote responsible stewardship of the resources they entrust to us. Join Feed the Children and help create a world where no child goes to bed hungry. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire. Feed the Children is an equal opportunity employer. All qualified candidates will receive consideration for positions without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, political affiliation, pregnancy, military and/or veterans' status, genetic characteristics, marital status or any other considerations made unlawful by applicable state, federal, or local law. Feed the Children welcomes and encourages applications from persons with physical and mental disabilities and will make every effort to reasonably accommodate the needs of those persons. Additionally, Feed the Children strives to provide an environment free from sexual exploitation and abuse and harassment in all places where relief and development programs are implemented. Feed the Children expects its employees to maintain high ethical standards, protect organizational integrity and reputation, and ensure that Feed the Children work is carried out in honest and fair methods, in alignment with the Feed the Children safeguarding and associated policies.
    $21.6 hourly 7d ago
  • System Administrator Advisor - SAP Security

    Diamondback Energy 4.3company rating

    Security engineer job in Oklahoma City, OK

    CURRENT EMPLOYEES - Please apply using "Jobs Hub" in Workday. This career site is for external applicants only. The SAP Security/GRC Admin is responsible for the management and support of SAP Roles and Security with the Diamondback SAP environment. This position will provide technical and thought leadership in the design, development, implementation, and support of the SAP Role Administration functions across the entire landscape. This role will also provide key contributions in a cross functional approach in the overall and ongoing management, testing and support of the SAP landscape for patches, upgrades and day to day operational issues. Job Duties and Responsibilities: Design, deploy and maintain security solutions that enables the business community to achieve their goals while providing proper identity and access management controls Analyze processes and system user needs to deliver quality solutions that meet both business and functional end-to-end requirements Drive overall security strategy including role design and provisioning for S4Hana ecosystem including SAP S/4 HANA, FIORI, GTS, Solution manager, HANA & other Databases, BTP, etc. Identify security risks, determines the root causes of security violations, suggest the risk mitigation and control measures and build required procedures and controls Ensures SAP security development and deployment execution align with standards, methodologies, and processes Identify the root cause of the issues and providing a permanent solution. Work with the Functional team in proposing solutions for the overall stability of the applications Daily monitoring of jobs that are necessary for the GRC application(s) to run effectively and efficiently, for example nightly management risk analysis reporting Responsible for day-to-day technical support and resolution of security issues, troubleshooting sap security problems including approval procedures and all the necessary compliance Develop and maintain processes with applicable documentation related to security by coordinating with IT management and governance teams Work with IT management as well as governance groups to facilitate appropriate controls around user/system access Proactively Interact with senior management to discuss and explain issues affecting users or systems Generate SOX/ad hoc reports on monthly/quarterly/semi-annual basis Provide production support and enhancement testing for existing security roles and positions/functions Work closely with SAP functional teams to create roles, profiles and authorizations that meet audit requirements as well as functional requirements for end users Maintain Segregation of Duties for the SAP environment (e.g. HR/Payroll, BASIS, Security Administration, and BI) Work collaboratively with a team to design, build and deploy security frameworks, devices and applications Vulnerability Assessment and Penetration Testing: Conduct regular security assessments, vulnerability scans, and penetration tests to identify and address potential security weaknesses in SAP S/4 environments. Be able to provision and de-provision users and roles with appropriate SAP security levels Able to effectively prioritize tasks in a high-speed environment Candidate must have strong problem-solving skills, be self-directed and capable of working with minimal supervision Must have a strong, demonstrated commitment to customer service and be committed to pro-active review of processes and procedures to continually enhance service quality, service delivery and support Cross Training Support for other SAP S/4 HANA Cross-functional team Occasional work in off-hours to minimize disruption to business Required Qualifications: Bachelor's Degree in Business Management, Information Systems or related field or equivalent in years of experience Four (4+) years in-depth experience in SAP GRC, Role Administration & Security implementation, and production support in ECC 6.0/S4-HANA Experience with SAP S/4 HANA security and authorizations Experience in SAP S/4 HANA version 1909 or later Experience in creating and assigning FF ID's and extracting Fire Fighter logs In-Depth understanding of SAP Security Role design & GRC Architecture Very good understanding of role remediation, setting up of SAP Security processes Expertise in SAP Security automation and scripts creation for mass maintenance Expertise in Running and publishing various SOX reports like, UAR, Critical Actions, SOD, Critical Permissions, Firefighter Log Review Experience in maintaining and troubleshooting Structural Authorizations Preferred Qualifications: Experience in SAP security engagements with cloud applications, Azure, etc Experience in supporting end-to-end SAP Security projects, Security and GRC workshops, testing support, Cutover prep, and Hyper care activities Experience in Role design in S/4 with Catalog and Group for Fiori Apps and good analytical skills in issue resolution SAP GRC Certification In-Depth understanding on FIORI requirement specifications, design, development, and testing In-Depth understanding of core BASIS functions and activities Minimum of three (3+) years of SAP experience within a large organization including implementing and supporting Experience in creating/maintaining GRC solutions Experience creating user and security roles for Fiori applications Experience with SOD development and ongoing controls Role administration across multiple landscape Oil and Gas experience preferred Experience with system monitoring, background job administration, spool administration Experience working with SAP GRC 10.0/10.1, SAP HCM and SAP Solution Manager Experience with SAP GRC Access Control configuration that includes MSMP and BRFPlus Experience in designing, configuring, and implementing SAP GRC Access Request Analysis (ARA), Access Request Management (ARM), Emergency Access Management (EAM), and Business Role Management (BRM) Strong knowledge in provisioning to SAP LDAP and SAP Enterprise Portal platforms for ABAP Roles, UME Roles, and Portal Roles/Groups. Work Authorization: Diamondback Energy is not currently sponsoring employment visas for this position. Diamondback is an Equal Employment Opportunity Employer. Diamondback provides equal employment opportunities to all qualified applicants without regard to race, sex, sexual orientation, gender identity, national origin, color, age, religion, veteran or disability status, genetic information, pregnancy, or any other status protected by law. Diamondback participates in E-Verify. Learn more about E-Verify.
    $65k-78k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Operations Analyst

    Explorer Pipeline 4.1company rating

    Security engineer job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS · Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities · Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. · Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. · Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. · Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. · Knowledge of TSA security requirements and regulations. · Knowledge of identity management processes and procedures. · Skill in project management. · Ability to manage, track and analyze information. · Ability to effectively work and cooperate with supervisors, co-workers, and vendors. · Ability to follow corporate policies and the directions of supervisors. · Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 16d ago
  • Security Engineer

    Meta 4.8company rating

    Security engineer job in Oklahoma City, OK

    Meta Platforms, Inc. (Meta), formerly known as Facebook Inc., builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps and services like Messenger, Instagram, and WhatsApp further empowered billions around the world. Now, Meta is moving beyond 2D screens toward immersive experiences like augmented and virtual reality to help build the next evolution in social technology. To apply, click "Apply to Job" online on this web page. **Required Skills:** Security Engineer Responsibilities: 1. Build tools that enable connectivity to our infrastructure only from Meta owned and managed devices. 2. Build machine attestation and secure certificate storage solutions to enable strong client trust. 3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices. 4. Develop, validate, and enforce our client security policies. 5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services. 6. Advise and collaborate with other teams. 7. Telecommuting from anywhere in the U.S. allowed. **Minimum Qualifications:** Minimum Qualifications: 8. Requires Bachelor's Degree (or foreign equivalent) in Computer Science, Engineering or a related field and 1 year of experience in the job offered or a computer-related occupation 9. Requires 12 months of experience involving the following: 10. PHP, Golang, Python, C/C++, Rush, or Ruby 11. Designing and deploying security infrastructure such as PKI, key management, and certificate management 12. Endpoint Security & Management 13. Certificate Lifecycle 14. Devices & OS hardening and security policies 15. Identity & Access Management (Authentication & Authorization, SSO) 16. Network Security and 17. Programming and Code Review **Public Compensation:** $178,041/year to $200,200/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $178k-200.2k yearly 34d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Oklahoma City, OK

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 28d ago
  • Information Security Specialist

    Feed The Children 4.1company rating

    Security engineer job in Oklahoma City, OK

    At Feed the Children, we recognize the value of outstanding people, and we are looking for compassionate changemakers to join our team. We pride ourselves on cultivating a collaborative workplace where employees experience productive and rewarding employment and feel engaged in our mission to end childhood hunger. Our passionate team shares a deep sense of purpose, and we dream big to solve complex problems and create positive impact in communities around the world. Feed the Children is recognized by Candid with its Platinum Seal of Transparency and is accredited by the BBB Wise Giving Alliance. The organization has received a 4-star rating from Charity Navigator and is consistently recognized on the Forbes Top 100 Charities list. We are currently in search of an Information Security Specialist to join our Information Technology team! The Information Security Specialist will investigate, analyze, and learn from cybersecurity researchers, attackers, and incidents to develop durable detective controls across the IT infrastructure. This role will provide support and resolution for scanning, reporting, and vulnerability remediation. This position will collaborate with the Senior Director of Information Security to assist in prioritizing vulnerabilities, planning mitigations, and security control configuration. NOTE: This is an entry level position working from our corporate office in Oklahoma City, OK. Salary range: Up to $21.64/hr. based on education and experience. Job Requirements: Education Bachelor's degree in Computer Science, CIS, Engineering, Cybersecurity, or related field preferred. High school diploma or GED required. Experience 2+ years' experience working with technical and business teams related to information security Ability to analyze general cyber security-related technical problems and provide basic engineering and technical support in solving these problems. Familiarity with Azure and Office 365 security suite of tools, to include Microsoft Defender. Industry-standard knowledge of activities relating to identity and access management, MDR, SIEM, and least privilege access management. Basic understanding of NIST-specific security assessments. Aware of the legal, regulatory, and ethical considerations of working with sensitive information Proactive, self-motivated, well organized, reliable, and detail-oriented team member Ability to communicate across all levels of the organization with strong organizational skills Ability to multitask, self-prioritize daily tasks, and experience with task management tools. Analytical and critical thinking skills, required Any combination of education, training and experience which provides the required knowledge, skills and abilities to perform the essential functions of this job may be considered. Essential Functions: Execute day-to-day threat hunting for targeted attacks against multiple environments. Work closely with Information Technology's Director of Data Governance and the Sr. Director of Information Security to make sure identified vulnerabilities are patched and remediated. Maintain an understanding of security-related IT policies to assess the effectiveness of controls. Facilitate incident remediation including monitoring Data Loss Prevention (DLP) tools and responding to alerts. Investigate network threats such as computer viruses, exploits, and malicious attacks to determine true threats, false positives, and network system misconfigurations. Monitor potential compromise, intrusion, deficiency, significant event or threat to the security posture and provide solutions to issues. Work within the IT department verifying and validating security compliance against corporate standards, regulatory standards, and other industry defined practices. Assist with security awareness training of employees, as needed. Champion the NIST 800-53 program, documenting policies and procedures as well as performing audits, risk assessments and implementation reviews. Update job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; monitoring information security news for emerging threats; and participating in professional organizations. Document specific activities, problems solved, and issues resolved. Protect our organization by keeping information confidential. Collaborate cross-functionally throughout the organization to safeguard sensitive information from potential insider risks and threat actors. Develop, update, and maintain policies and other technical documentation Establish an environment of high performance and continuous improvement that values learning, a commitment to quality, welcomes and encourages collaboration, and fosters both intra and inter-departmental dialogue and respect. Model the type and level of behavior, professionalism and leadership that is in accordance with the values of the organization. Perform other related duties as required About Feed the Children: As a leading anti-hunger organization, Feed the Children is committed to ending childhood hunger. We provide children and families in the U.S. and around the world with the food and essentials kids need to grow and thrive. Through our programs and partnerships, we feed children today while helping their families and communities build resilient futures. In addition to food, we distribute household and personal care items across the United States to help parents and caregivers maintain stable, food-secure households. Internationally, we expand access to nutritious meals, safe water, improved hygiene, and training in sustainable living. Responsible stewards of our resources, we are driven to pursue innovative, holistic, and child-focused solutions to the complex challenges of hunger, food insecurity, and poverty. For children everywhere, we believe that having enough to eat is a fundamental right. Our Values: We are driven by a shared sense of PURPOSE At Feed the Children, our commitment to the mission is at the heart of what we do and fuels our collective impact in the communities where we serve. We cannot achieve our bold vision without our talented PEOPLE We are passionate about fostering a best-in-class workforce that is engaged, respected, and empowered to deliver results. We believe in CURIOSITY and continued learning Success requires a culture of discovery, curiosity and continued learning to expand our knowledge, seek new perspectives and challenge the status quo. We know COLLABORATION is the only way to end childhood hunger We cannot succeed alone. It will take all of us - our employees, donors, partners, volunteers - working together to accomplish our ambitious goals. We DREAM big When we work together, we collectively reimagine what is possible. We dream big to solve complex problems and create deep impact in communities around the world. We VALUE every donor We respect our donors' intentions and promote responsible stewardship of the resources they entrust to us. Join Feed the Children and help create a world where no child goes to bed hungry. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire. Feed the Children is an equal opportunity employer. All qualified candidates will receive consideration for positions without regard to race, color, religion, sex, sexual orientation, age, national origin, disability, political affiliation, pregnancy, military and/or veterans' status, genetic characteristics, marital status or any other considerations made unlawful by applicable state, federal, or local law. Feed the Children welcomes and encourages applications from persons with physical and mental disabilities and will make every effort to reasonably accommodate the needs of those persons. Additionally, Feed the Children strives to provide an environment free from sexual exploitation and abuse and harassment in all places where relief and development programs are implemented. Feed the Children expects its employees to maintain high ethical standards, protect organizational integrity and reputation, and ensure that Feed the Children work is carried out in honest and fair methods, in alignment with the Feed the Children safeguarding and associated policies.
    $21.6 hourly 6d ago

Learn more about security engineer jobs

Do you work as a security engineer?

What are the top employers for security engineer in OK?

Top 6 Security Engineer companies in OK

  1. Oracle

  2. Meta

  3. Trustmark

  4. Trellix

  5. Coinbase

  6. Ensono

Job type you want
Full Time
Part Time
Internship
Temporary

Browse security engineer jobs in oklahoma by city

All security engineer jobs

Jobs in Oklahoma