Post job

Security engineer jobs in Olathe, KS

- 118 jobs
All
Security Engineer
Information Security Engineer
Network Engineer
Information Security Analyst
Information Security Manager
Hacker
Cyber Security Analyst
Security Systems Administrator
  • Infrastructure Security Engineer

    Inceed 4.1company rating

    Security engineer job in Lenexa, KS

    Infrastructure Security Engineer Compensation: $40-50 /hour, depending on experience Inceed has partnered with a great company to help find a skilled Infrastructure Security Engineer to join their team! Join a dynamic team in a company that values culture and work-life balance. As an Infrastructure Engineer, you will play a crucial role in designing and maintaining a secure hybrid infrastructure. This is an exciting opportunity for someone who thrives in a technical environment and is passionate about security compliance. Enjoy working in a supportive and collaborative setting where your skills and expertise will make a significant impact. Key Responsibilities & Duties: Design and manage Azure environments and Azure Virtual Desktop. Ensure compliance with security frameworks like CMMC and NIST. Administer Windows Server and Active Directory. Implement and monitor network security. Translate compliance requirements into technical controls. Collaborate with high-level executives and cross-functional teams. Required Qualifications & Experience: Bachelor's degree in IT or 10 years of IT experience. Proven experience with cloud and on-premises environments. Strong understanding of CMMC or NIST frameworks. Excellent written and verbal communication skills. Strong analytical and troubleshooting skills. Nice to Have Skills & Experience: Experience with Hyper-V and VMware. Knowledge of PowerShell scripting and automation. Familiarity with vulnerability management and incident response. Perks & Benefits: 3 different medical health insurance plans, dental, and vision insurance Voluntary and Long-term disability insurance Paid time off, 401k, and holiday pay Weekly direct deposit or pay card deposit If you are interested in learning more about the Infrastructure Security Engineer opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law. #IND
    $40-50 hourly 4d ago
  • Endpoint Security Engineer #10904

    ECCO Select 4.8company rating

    Security engineer job in Kansas City, MO

    ECCO Select is a talent acquisition and consulting company specializing in people, process and technology solutions. We provide the talent behind the technology enabling our clients to achieve their goals. For more information about ECCO Select, visit us at ******************* Position Title: Endpoint Security Engineer Location Information Kansas City Metro (Onsite) Position Responsibilities: The Endpoint Security Engineer will play a critical role within the IT security and operations team, responsible for the administration, implementation, and continual improvement of endpoint security solutions-primarily utilizing Microsoft Intune. The ideal candidate must possess advanced expertise in Intune for Mobile Device Management (MDM) and Mobile Application Management (MAM), and be prepared to respond to security incidents beyond regular business hours. Experience with Jamf in Apple environments is an advantage. Design, deploy, and manage the organization's Microsoft Intune environment for both corporate-owned and BYOD (Bring Your Own Device) devices, ensuring a secure yet seamless user experience. Develop and maintain solutions for device enrollment, authentication, and complete lifecycle management utilizing Intune, while leveraging Jamf for Apple device environments when required. Configure, optimize, and monitor Microsoft Intune settings for MDM and MAM across Windows, Android, and iOS devices to ensure security and compliance. Establish and enforce device compliance policies, security baselines, encryption protocols, and remote wipe capabilities for rapid incident response. Manage application deployment, app protection policies, and conditional access requirements via Intune and related tools. Continuously monitor the performance of security solutions via analytics, logs, and user feedback; proactively identify areas for improvement to enhance protection and efficiency. Lead or contribute to large-scale device migrations, OS upgrades, and mobility transformation projects, ensuring minimal business impact and service continuity. Regularly monitor, investigate, and respond to endpoint threats, vulnerabilities, and anomalies; promptly remediate endpoint security incidents and collaborate with SOC and IT support teams for escalated security issues and rapid resolution. Ensure that endpoint security implementations meet regulatory standards and internal governance requirements; stay up to date with relevant compliance frameworks (HIPAA, GDPR, SOC 2, etc.). Generate detailed reports on device compliance, application usage, and security incidents, supplying metrics and documentation for audits and stakeholders as required. Develop, refine, and deliver training sessions and materials for end-users and IT helpdesk staff on device enrollment, usage, and security best practices. Provide Tier 2/3 support for complex endpoint security, mobility, and compliance issues; serve as a subject matter expert for cross-functional teams implementing security initiatives. Promote a culture of continuous improvement by researching and recommending new endpoint security technologies, trends, and best practices; implement process and tool enhancements as appropriate. Essential Skills, Experience 3-5 years of hands-on experience in administering and supporting Microsoft Intune, Office 365, and enterprise device security solutions. Strong proficiency in configuring, managing, and troubleshooting Intune, Microsoft Endpoint Manager, and Azure Active Directory settings. Proven expertise in designing, deploying, and supporting MDM/MAM solutions for large enterprise environments. Comprehensive understanding of endpoint security principles, including antivirus, EDR, encryption, secure authentication, and access controls. Practical experience with endpoint compliance and governance requirements; strong working knowledge of frameworks such as HIPAA, GDPR, or SOC 2 and involvement in audit processes. Familiarity with automation and scripting tools (e.g., PowerShell, Bash) for task automation, device management, and mobile application deployment. Demonstrated ability to manage multiple complex projects simultaneously, with excellent organizational, analytical, and documentation skills. Knowledge of Active Directory, Group Policy Objects (GPO), and remote support tools for user and device management. Exceptional interpersonal and communication skills, with a proven track record of successful cross-functional collaboration and the ability to operate independently or as part of a team. Preferred: Hands-on experience with Jamf administration for mac OS and iOS device management, including policy configuration and endpoint protection. Preparedness to provide support and incident response outside normal business hours as needed. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field (advanced degrees or relevant certifications are a plus). Preferred certifications: Microsoft Certified (Intune, Azure, or Endpoint Manager), Jamf Certification. ECCO Select is committed to hiring and retaining a diverse workforce. Our policy is to provide equal opportunity to all people without regard to race, color, religion, national origin, ancestry, marital status, veteran status, age, disability, pregnancy, genetic information, citizenship status, sex, sexual orientation, gender identity or any other legally protected category. Veterans of our United States Uniformed Services are specifically encouraged to apply for ECCO Select opportunities. Equal Employment Opportunity is The Law This Organization Participates in E-Verify
    $71k-91k yearly est. 1d ago
  • Information Security Engineer

    Akkodis

    Security engineer job in Overland Park, KS

    Akkodis is seeking an Information Security Engineer for a Contract with a client located in Overland Park, KS (Remote). Pay Range: $60/hr - $70/hr, The rate may be negotiable based on experience, education, geographic location, and other factors Must come from the Financial industry, has experience implementing SIEM, SASE/SSE, EDR/MDR, etc, has AWS or Azure as a cloud, CIS, NIST, ISO 27001, Okta or IAM, and SentinelOne experience is preferred. Job Description: We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture, you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Cloud Platform Focus: The client operates in a hybrid environment, primarily in Azure, with some AWS and on-prem infrastructure. Core Security Tooling: SentinelOne experience is preferred, but candidates with experience using other tools are strongly considered as long as they have solid, overarching experience across SIEM, EDR, and vulnerability management platforms. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security is built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. If you are interested in this role, then please click APPLY NOW . For other opportunities available at Akkodis , or any questions, please contact Anirudh Srivastava at ************ or ***********************************. Equal Opportunity Employer/Veterans/Disabled Benefit offerings include medical, dental, vision, term life insurance, short-term disability insurance, additional voluntary benefits, commuter benefits, and a 401K plan. Our program provides employees the flexibility to choose the type of coverage that meets their individual needs. Available paid leave may include Paid Sick Leave, where required by law; any other paid leave required by Federal, State, or local law; and Holiday pay upon meeting eligibility criteria. Disclaimer: These benefit offerings do not apply to client-recruited jobs and jobs that are direct hires to a client. To read our Candidate Privacy Information Statement, which explains how we will use your information, please visit ******************************************
    $60 hourly 2d ago
  • Network Engineer (Cisco IOS and NX-OS Expert) - 3 Months (Short Term Contract)

    Centraprise

    Security engineer job in Kansas City, MO

    Certifications (Highly Desired): CCNA (Cisco Certified Network Associate): Often a minimum requirement. CCNP (Cisco Certified Network Professional): Preferred for mid-to-senior roles. Technical Expertise: Deep knowledge of the TCP/IP suite and fundamental networking concepts. Expertise in Cisco IOS and NX-OS. Experience with WAN technologies (MPLS, VPNs) and wireless networking. Familiarity with cloud networking concepts (AWS, Azure, or Cisco Meraki Cloud). Soft Skills: Strong Analytical and Problem-Solving Skills (critical for complex troubleshooting). Excellent written and verbal communication. Ability to manage multiple projects and priorities effective.
    $65k-85k yearly est. 1d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security engineer job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems. Additional preferred knowledge and experience to include: Azure Cloud Security Intune Security Endpoint Detection and Response Security Information and Event Management (SIEM) Intrusion Protection Systems Data Loss and Prevention Vulnerability and Penetration Testing/Remediation Data Classification Encryption (Endpoint and In-Transit) Site Certificates Incident Response Program Business Resiliency Procedures Bachelor's degree (B.A.) from four-year college or university; or three to five years advanced information security experience and/or training; or ten years of combined information systems and information security experience; and three to five years supervisory experience; and/or equivalent combination of education and experience. Professional certification of CISA or CISSP desirable. Must have advanced knowledge of general information security equipment and functionality. OR Must have advanced knowledge with PC and LAN servers, security firewalls, intrusion protection systems, cloud-based security systems and other Information Security related technologies. Additional preferred knowledge and experience to include: Azure Cloud Security Intune Security Endpoint Detection and Response Security Information and Event Management (SIEM) Intrusion Protection Systems Data Loss and Prevention Vulnerability and Penetration Testing/Remediation Data Classification Encryption (Endpoint and In-Transit) Site Certificates Incident Response Program Business Resiliency Procedures
    $118k-154k yearly est. 6d ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Security engineer job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture. Important Information Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency. No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc. This position requires working on-site with 5 days per month remote work flexibility. Key Activities Risk Assessment & Analysis Modernize the current approach to cybersecurity risk management and assessments. Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization. Identify and implement risk quantification and scoring approaches within the organization. Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority. Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations. Conduct business impact analyses to understand how security incidents affect critical business functions. Evaluate and quantify risks associated with third-party vendors and supply chain. Assess specific risks related to cloud environments and services. Program Development Develop reports and dashboards to illustrate the organization's risk posture. Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk. Research and identify options to establish a risk register. Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options. Map cybersecurity risks to relevant regulatory requirements and compliance frameworks. Continuously improve risk management processes based on industry trends and organizational needs. Communication & Collaboration Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand. Partner with incident response teams to incorporate lessons learned into risk models. Translate complex technical risk scenarios into actionable insights for all levels of the organization. Qualifications Experience Typically requires at least 6 years of relevant cybersecurity risk management experience. Experience with risk scoring methods and risk quantification. Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume. Experience establishing or running an Enterprise cybersecurity risk management program. Experience with NIST SP 800-53 security standards. Experience presenting risk information to executive leadership. Education & Certifications Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience. Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred. Technical Knowledge Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF). Strong skills and experience with data analysis. Experience with GRC (Governance, Risk, and Compliance) tools. Knowledge of business impact analysis methodologies. Familiarity with cloud security frameworks (CCSK, CCSP). Skills & Abilities Ability to understand technical details of cybersecurity risk. Ability to communicate complicated technical risk scenarios to all levels of the organization. Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Location: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Salary: $98,600 - $139,000 / Senior Level $117,300 - $165,400 / Advanced Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $117.3k-165.4k yearly Auto-Apply 32d ago
  • Product Security Engineer, Instagram

    Meta 4.8company rating

    Security engineer job in Topeka, KS

    The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform. **Required Skills:** Product Security Engineer, Instagram Responsibilities: 1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products 2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code 3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities 4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage 5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers 6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world **Minimum Qualifications:** Minimum Qualifications: 7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience 8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP) 9. Extensive, proven experience in threat modeling and secure systems design 10. Experience with exploiting common security vulnerabilities **Preferred Qualifications:** Preferred Qualifications: 11. Product software engineering or product management experience 12. Experience in security consulting or other leadership-facing security advisory roles 13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response 14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.) **Public Compensation:** $177,000/year to $251,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $177k-251k yearly 60d+ ago
  • Systems Administrator - High Volume Secure Scanning Environment

    Govcio

    Security engineer job in Kansas City, MO

    We are seeking a highly skilled and security-conscious System Administrator to lead the design, deployment, and maintenance of a high-volume dedicated scanning environment to support the annual processing of IRS tax returns. This role demands deep expertise in secure systems architecture, document imaging workflows, and strict adherence to NIST cybersecurity standards. This position will be located in Kansas City, Missouri and will be a US-Based onsite position with core hours of operation from Monday to Friday 8 am to 5 pm CT. Responsibilities Establishes and maintains smooth operation of computer systems (to include operating systems, software and hardware) in networked or stand-alone configurations, maintains system integrity, and upgrades systems and/or servers as required. May create and document new methods supporting network/system operations and implement changes to procedures. Consults with support teams, help desks, customers and other technical staff in the resolution of problems, coordinates and performs operation and/or maintenance activities for networks/servers, identifies recurring problems and recommends steps to reduce the severity or frequency of problems. May plan for the transition of development and/or production environments to new technologies, utilize system software to monitor the performance of system files, manage system data to maintain performance efficiencies and/or study system requirements to determine proper server installation methods and procedures. Maintain and administer computer networks and related computing environments, including computer hardware, systems software, applications software, and all configurations. Plan, coordinate, and implement network/system security measures in order to protect data, software, and hardware. Provides regular monitoring and analysis regarding short and long-range planning for in-house systems. Prepares or ensures that appropriate documentation exists, including operational instructions. Writes or modifies basic scripts to resolve performance problems and automate administration tasks. Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes. Qualifications Bachelor's with 8+ years (or commensurate experience) Required Skills and Experience Bachelor's degree with 8+years (or commensurate experience) Hands-on experience with IBML or similar scanners and enterprise imaging workflows Strong knowledge of Fortinet or similar networking equipment (switches, routers) and secure configuration practices Proficiency with SentinelOne or similar endpoint protection platforms Expertise in system backup and recovery planning, including disaster recovery testing Strong knowledge of NIST cybersecurity frameworks (especially SP 800-53, 800-171, and 800-37) Proficiency with Windows Server, Linux, Active Directory, and virtualization platforms (VMware, Hyper-V) Familiarity with secure file transfer protocols, encryption standards (TLS, AES), and SIEM tools Excellent troubleshooting skills and ability to work under pressure in mission-critical environments Preferred Skills and Experience Prior experience supporting IRS or other federal tax-related systems Certifications such as CISSP, Security+, Fortinet NSE, or Microsoft Certified: Azure Administrator Associate Experience with automation tools (PowerShell, Ansible) and secure scripting practices Proven experience designing and managing secure, high-throughput scanning environments Knowledge of FedRAMP and FISMA compliance frameworks Clearance Required: Must be able to obtain IRS public trust/suitability clearance. U.S. citizenship required due to federal contract compliance Company Overview GovCIO is a team of transformers--people who are passionate about transforming government IT. Every day, we make a positive impact by delivering innovative IT services and solutions that improve how government agencies operate and serve our citizens. But we can't do it alone. We need great people to help us do great things - for our customers, our culture, and our ability to attract other great people. We are changing the face of government IT and building a workforce that fuels this mission. Are you ready to be a transformer? What You Can Expect Interview & Hiring Process If you are selected to move forward through the process, here's what you can expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented during each interview During the Hiring Process Enhanced Biometrics ID verification screening Background check, to include: Criminal history (past 7 years) Verification of your highest level of education Verification of your employment history (past 7 years), based on information provided in your application Employee Perks At GovCIO, we consistently hear that meaningful work and a collaborative team environment are two of the top reasons our employees enjoy working here. In addition, our employees have access to a range of perks and benefits to support their personal and professional well-being, beyond the standard company offered health benefits, including: Employee Assistance Program (EAP) Corporate Discounts Learning & Development platform, to include certification preparation content Training, Education and Certification Assistance* Referral Bonus Program Internal Mobility Program Pet Insurance Flexible Work Environment *Available to full-time employees Our employees' unique talents and contributions are the driving force behind our success in supporting our customers, which ultimately fuels the success of our company. Join us and be a part of a culture that invests in its people and prioritizes continuous enhancement of the employee experience. We are an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, disability, or status as a protected veteran. EOE, including disability/vets. Posted Pay Range The posted pay range, if referenced, reflects the range expected for this position at the commencement of employment, however, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, education, experience, and internal equity. The total compensation package for this position may also include other compensation elements, to be discussed during the hiring process. If hired, employee will be in an “at-will position” and the GovCIO reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, GovCIO or individual department/team performance, and market factors. Posted Salary Range USD $115,000.00 - USD $128,000.00 /Yr.
    $115k-128k yearly Auto-Apply 60d+ ago
  • Ethical Hacker - Overland Park, KS ( Only Citizens )

    Info. Services Inc. 4.2company rating

    Security engineer job in Overland Park, KS

    Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks o BruteForce attacks o Account Takeover o Data Breaches 3. Identify and Remediate currently exploited vulnerabilities: o Determine abuse tactics used by fraudsters o Put in quick remediation efforts by webserver blocks or code update o Re-test and validate long term fix 4. Request and evaluate application vulnerability scans: o Work directly with corp sec to initiate scans o Analyze the results and perform or provide recommended fix to impacted party o Provide data and reports to IT compliance/auditors 5. Support .com web application firewalls o Monitor/Manage/Configure security on .com webservers o Work with network team to configure and evaluate F5 security modules Perform coding changes in .com applications as needed Please respond with your word resume and requested details: Full Name : Work Authorization: Contact Number : Email ID : Skype ID: Current location: Willing to relocate : Rate/hr : Additional Information All your information will be kept confidential according to EEO guidelines.
    $64k-91k yearly est. 14h ago
  • Cyber Security Training

    Learnkwik.com

    Security engineer job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 14h ago
  • Security Engineer

    Quest Analytics

    Security engineer job in Overland Park, KS

    Quest Analytics is one of the fastest growing companies in the Healthcare software space in the US. Healthcare providers and insurance companies rely on our software. We do the important work of providing access to healthcare for all Americans! We are searching for a Security Engineer to join our team in our Overland Park, KS office! In this role, you will contribute to the achievement of security objectives for Quest Analytics. You will provide technical security leadership across multiple security domains to ensure IT best practices and compliance requirements are met for both industry and regulatory standards (HITRUST, FISMA, NIST) when applicable. You will provide deep information security expertise for projects within any of the Information Technology or DevOps disciplines and can provide security guidance to multiple technical teams. You will possess a thorough understanding of emerging technologies and our current business strategy and will offer and recommend solutions. In this role you will: Collaborates with Systems Administrators, DevOps Engineers, the Director of Security, Development personnel, and Legal, and HR associates to align security requirements to meet business objectives. Participates in monthly security reviews and provides oversight to application implementations through ongoing security design reviews and risk assessments in order to build security into solutions and to ensure compliance with industry and regulatory standards. Provides security support during vendor risk assessments. Viewed as a security expert across the organization, working with various technology team members to convey security best practices and communicate Quest Analytics security requirements. Owns, maintains and matures information security review processes and documentation. Plans the delivery and implementation of core information security projects and capabilities in relation to network connectivity, firewalls, threat analysis, encryption, and segmentation. Partners with technology and business partners to ensure compliance with policies and standards. Determines security requirements for internal and external projects via interpretation of policies and standards. Evaluates new technologies, processes, standards, and frameworks on an ongoing basis. Ensures capability readiness for security controls (people, process, and technology). Evaluates gaps in existing technologies and processes. Assists with the implementation, configuration, and operations of various security tools as required. Works with the organization to achieve and maintain industry security standards (HITRUST, FISMA, ISO etc.). What we are looking for: Bachelor's Degree in Information Systems, Computer Science or related field preferred. Experience working in a security role for a SaaS organization is a must. Applicants should possess 5+ years of industry related experience in Information Security, Information Technology or Application Development. 3+ years demonstrated success in developing, operating, leading and implementing security solutions and functions. Relevant Examples include- Vulnerability Management, Application Pen Testing, Cloud Security, Data Security or Threat Management/Intelligence. Strong experience independently developing processes to solve complex issues and implementing new security programs based on current industry best practices. Experience working with application security vulnerabilities and technologies is required. Three or more years' participating in vendor and internal security assessments is required. Two or more years' experience working in a security operations role is desired. Certifications: CISSP, CISM, CEH or equivalent preferred. Has strong focus on business outcomes. Comfortable with collaboration, open communication and reaching across functional borders. Self-motivated and able to work in a fast-paced, deadline-oriented environment . Excellent troubleshooting, listening, and problem-solving skills. Proven ability to solve complex issues. Customer focused. Works well in a team environment. We are not currently engaging with outside agencies on this role. What you'll appreciate:•Workplace flexibility - you choose between remote, hybrid or in-office•Company paid employee medical, dental and vision•Competitive salary and success sharing bonus•Flexible vacation with no cap, plus sick time and holidays•An entrepreneurial culture that won't limit you to a job description•Being listened to, valued, appreciated -- and having your contributions rewarded•Enjoying your work each day with a great group of people Apply TODAY!careers.questanalytics.com About Quest AnalyticsFor more than 20 years, we've been improving provider network management one groundbreaking innovation at a time. 90% of America's health plans use our tools, including the eight largest in the nation. Achieve your personal quest to build a great career here. Visa sponsorship is not available at this time. Preferred work locations are within one of the following states: Alabama, Arizona, Arkansas, Colorado, Connecticut, Delaware, Florida, Georgia, Idaho, Illinois (outside of Chicago proper), Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland, Massachusetts, Michigan, Minnesota, Mississippi, Missouri, Montana, Nebraska, Nevada, New Hampshire, New Mexico, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin, or Wyoming. Quest Analytics provides equal employment opportunities to all people without regard to race, color, religion, sex, national origin, ancestry, marital status, veteran status, age, disability, sexual orientation or gender identity or expression or any other legally protected category. We are committed to creating and maintaining a workforce environment that is free from any form of discriminations or harassment. Applicants must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. Persons with disabilities who anticipate needing accommodations for any part of the application process may contact, in confidence ********************* NOTE: Staffing agencies, headhunters, recruiters, and/or placement agencies, please do not contact our hiring managers directly. We are not currently working with additional outside agencies at this time. Any job posting displayed on websites other than questanalytics.com or jobs.lever.co/questanalytics/ may be out of date, inaccurate and unavailable We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $75k-101k yearly est. Auto-Apply 60d+ ago
  • Security Engineer

    Foresite 4.3company rating

    Security engineer job in Overland Park, KS

    Job Description Foresite is seeking a highly motivated and passionate Security Engineer with a specialized focus on Google Security Operations (SecOps) to join our growing team. In this client-facing role, you will be instrumental in helping our clients leverage the full potential of Google's security offerings to enhance their security posture. If you have a strong foundation in security operations, a drive to continuously learn, and a desire to provide expert guidance, we encourage you to apply! What You'll Do: As a Security Engineer specializing in Google SecOps, you will be a trusted advisor to our clients, guiding them through the implementation, optimization, and ongoing management of their Google security solutions. Your responsibilities will include: Infrastructure Provisioning: Design, configure, and deploy Google security tools and platforms for clients, ensuring seamless integration with their existing environments. This may include configuring Google Cloud Security Command Center, Chronicle Security Operations, BeyondCorp Enterprise, and other relevant Google security services. General Support & Troubleshooting: Provide expert-level support for client inquiries and issues related to Google SecOps tools and configurations. Diagnose and resolve technical challenges efficiently and effectively. Security Guidance & Best Practices: Offer proactive security guidance and recommendations to clients based on Google's security best practices and industry standards. Help clients understand and mitigate potential risks within their Google Cloud environments. Product Strategy & Optimization: Collaborate with clients to understand their security objectives and develop tailored Google SecOps strategies. Advise on product selection, feature utilization, and roadmap planning to maximize their security investments. Client Relationship Management: Build and maintain strong, positive relationships with clients, acting as a primary technical point of contact for Google SecOps initiatives. Documentation & Knowledge Sharing: Create and maintain comprehensive documentation for client environments, configurations, and best practices. Share knowledge and expertise with internal teams. Stay Current: Continuously research and stay up-to-date with the latest Google security product updates, features, and threat landscape trends. Who You Are: Passion for Security: You possess a genuine enthusiasm for cybersecurity and a strong desire to protect organizations from evolving threats. Experience: 3-5 years of experience in security operations, with a solid understanding of common security frameworks, incident response processes, and threat detection methodologies. Google SecOps Focus: Demonstrated experience with and understanding of Google Cloud security services, including but not limited to: Google Cloud Security Command Center (SCC) Google Security Operations Google Threat Intelligence Cloud Logging and Monitoring for security Google Cloud Identity and Access Management (IAM) Google Cloud Armor Certifications: Possess one or more security certifications such as: CompTIA Security+ (ISC)² SSCP or CISSP (Associate of (ISC)²) Google Cloud Professional Cloud Security Engineer (highly preferred) Other relevant cloud security certifications Client-Facing Skills: Excellent communication, presentation, and interpersonal skills with the ability to articulate complex technical concepts clearly to both technical and non-technical audiences. Problem-Solver: Strong analytical and problem-solving skills with a meticulous attention to detail. Self-Starter: Ability to work independently and as part of a team in a fast-paced, dynamic environment. Proactive Learner: A continuous learner who stays ahead of industry trends and new technologies.
    $81k-110k yearly est. 20d ago
  • Security Engineer - Data Protection

    Lockton 4.5company rating

    Security engineer job in Kansas City, MO

    Lockton is seeking a dedicated Security Engineer specializing in Data Protection. This role is focused on leveraging the Microsoft Purview suite to safeguard our organization's most critical data assets across our hybrid environment. The ideal candidate will be a subject matter expert in designing, implementing, and managing data-centric security controls within Microsoft Purview and Azure. Key Responsibilities: * Design, implement, and manage a comprehensive data protection strategy utilizing the Microsoft Purview governance and compliance portal. * Deploy and configure Microsoft Purview solutions, including Data Loss Prevention (DLP), Microsoft Information Protection (MIP) for data classification and sensitivity labeling, Insider Risk Management, and eDiscovery. * Develop and enforce data governance policies to discover, classify, and protect sensitive data across Microsoft 365, Azure, on-premises infrastructure, and other SaaS applications. * Create, tune, and monitor robust Data Loss Prevention (DLP) policies for endpoints, email, Microsoft Teams, and cloud applications to prevent data exfiltration. * Collaborate with business, legal, and compliance teams to translate data protection requirements into technical policies and controls. * Manage the configuration and lifecycle of sensitivity labels to ensure proper encryption, access control, and visual markings are applied to documents and emails. * Serve as the subject matter expert for data-related security incidents, using Purview tools for investigation, forensics, and response. * Monitor the effectiveness of data protection controls and provide regular reporting on compliance, risk posture, and policy enforcement to leadership. * Stay current with the latest advancements and threats in the data protection landscape and the evolution of the Microsoft Purview platform. * Actively coach and mentor other security and technology team members on data protection best practices. * Participate in the security team's on-call rotation and be available to respond to critical data security incidents outside of regular business hours.
    $75k-96k yearly est. 45d ago
  • Engineer, Information Security

    Mariner Wealth Advisors 4.4company rating

    Security engineer job in Overland Park, KS

    We're looking for a proactive and technically curious Information Security Engineer to join our Technology & Information Security team. In this role, you'll work within an engineering-minded security organization that values modern architectures, hands-on problem solving, and high-impact technical contributions. You'll help safeguard a complex, highly regulated environment while collaborating with teams who move quickly, think strategically, and execute with precision. If you thrive in dynamic environments, enjoy building and refining security capabilities, and want to make a meaningful impact on an organization's security posture-you'll feel right at home here. What You'll Do: Engineer and operate modern security platforms. Implement, run, and optimize enterprise-level security tooling across detection, identity, cloud, endpoint, and governance technologies. Conduct deep-dive security assessments. Evaluate systems, configurations, and architecture through hands-on testing and analysis-delivering actionable insights that directly influence engineering and business decisions. Strengthen core security operations. Support and mature processes such as: Malware response and remediation Vulnerability management and patch governance SIEM log analysis, correlation, and monitoring Incident documentation, reporting, and lifecycle management Improve systems by design-not by accident. Embed security into applications, infrastructure, and business initiatives from the outset, partnering with IT and engineering teams to identify risks and drive effective mitigations. Contribute through data, insights, and experimentation. Analyze trends, surface patterns, and help refine the firm's Information Security Program through continuous improvement and cross-functional engagement. What Makes This Role Unique: Technical leadership that “gets it.” You'll work under leaders with real engineering backgrounds who understand workflows, decision points, constraints, and trade-offs because they've been hands-on themselves. Security built on innovation, not stagnation. Our program prioritizes modern architectures, continuous improvement, and thoughtful evaluation of emerging standards, frameworks, and controls. Access to state-of-the-art platforms. Gain experience with advanced detection systems, automated response tooling, identity and access platforms, cloud-native security solutions, and governance technologies used across the industry. High-rigor environment with real impact. Build and refine capabilities in a financial-services context where precision, repeatability, and operational discipline matter-and influence enterprise-level direction. Collaboration with top industry partners. Participate in vendor assessments, tooling evaluations, and integrations that shape an enterprise-grade security program. Opportunities for broad domain depth. Contribute to initiatives spanning detection engineering, identity architecture, cloud security, automation, governance, and more. What You Bring: Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or equivalent experience. 3-5 years of hands-on experience in information security, IT operations, or adjacent engineering roles; experience in financial services is a plus. Familiarity with modern security tools, frameworks, and standards (SIEM, EDR, vulnerability scanners, CIS, NIST, ISO 27001). Familiarity with identity and access management (IAM) solutions, such as Okta, including integration with applications and security systems. Experience with automation, including scripting languages (e.g., Python, PowerShell, Bash) to streamline security processes, workflows, and response actions. Ability to operate with autonomy, accountability, and comfort in fast-moving environments. Exceptional communication and collaboration skills with the ability to influence across teams. Analytical mindset with a high bar for detail, documentation, and operational excellence. Why Join Us We foster a culture that values curiosity, innovation, and ownership. You'll have opportunities to grow, to experiment, and to contribute directly to the firm's security maturity. Our team operates in a flexible, hybrid environment designed to support both high performance and work-life balance. We're dedicated to building a diverse, inclusive culture where people can do the best work of their careers-and see the real impact of what they're building. Our compensation reflects the cost of talent across multiple US geographic markets. The base pay for this position across all US geographic markets ranges from $99,000.00/year to $125,000.00/year. Pay is based on a number of factors including geographic location and may vary depending on job-related knowledge, skills, and experience. Eligibility to participate in an incentive program is subject to the rules governing the program, whereby an award, if any, depends on various factors including, without limitation, individual and organizational performance. Roles may also be eligible for additional compensation and/or benefits. #LI-JS1 #LI-REMOTE EOE/M-F/D/V
    $99k-125k yearly Auto-Apply 42d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Network Engineer

    Inceed 4.1company rating

    Security engineer job in North Kansas City, MO

    Network Engineer Compensation: $40 - $50 /hour, depending on experience Inceed has partnered with a great company to help find a skilled Network Engineer to join their team! Join a dynamic environment where you'll be the go-to expert for maintaining and optimizing the network infrastructure. This is a fantastic opportunity to leverage your networking skills in a hands-on role. The role is open due to the need for dedicated support in managing day-to-day network operations. Key Responsibilities & Duties: Configure and troubleshoot VLANs, trunking, and STP Manage routing protocols like OSPF/EIGRP Handle IP addressing, subnetting, and NAT Troubleshoot circuit issues Respond to tickets and outages Make configuration changes during maintenance windows Be physically present for outages or critical changes Required Qualifications & Experience: 3-5 years of core networking expertise Strong experience with Cisco equipment Proficient in routing and switching Experience with NAT and WAN Hands-on experience with network troubleshooting tools Nice to Have Skills & Experience: Experience with BGP Familiarity with SNMP monitoring and packet captures Knowledge of MPLS and VPNs Perks & Benefits: 3 different medical health insurance plans, dental, and vision insurance Voluntary and Long-term disability insurance Paid time off, 401k, and holiday pay Weekly direct deposit or pay card deposit If you are interested in learning more about the Network Engineer opportunity, please submit your resume for consideration. Our client is unable to provide sponsorship at this time. We are Inceed, a staffing direct placement firm who believes in the possibility of something better. Our mission is simple: We're here to help every person, whether client, candidate, or employee, find and secure what's better for them. Inceed is an equal opportunity employer. Inceed prohibits discrimination and harassment of any type and affords equal employment opportunities to employees and applicants without regard to race, color, religion, sex, sexual orientation, gender identity, or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law. #IND
    $40-50 hourly 1d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security engineer job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
    $118k-154k yearly est. 9h ago
  • Information Security Specialist

    Federal Reserve Bank of San Francisco 4.7company rating

    Security engineer job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. This role is responsible for modernizing the methods and procedures for performing cybersecurity risk management and assessing cybersecurity risk. This involves assessing the current approach, data, and tools to identify gaps and enhancements. It requires strong partnerships with key stakeholders and business leaders, conveying cyber risk to them in a way that allows them to make risk informed decisions and improve the Organization's security posture. Important Information Open to US Citizens, Green Card holders or Permanent Residents with at least 3 years of residency. No sponsorship is available. Candidates must have valid work authorization, without an end date to be considered. No H1-B, OPT, STEM OPT, CPT, TN, J-1, etc. This position requires working on-site with 5 days per month remote work flexibility. Key Activities Risk Assessment & Analysis Modernize the current approach to cybersecurity risk management and assessments. Research and evaluate methodologies and frameworks and subsequently apply them for use in the organization. Identify and implement risk quantification and scoring approaches within the organization. Perform in-depth data analysis to identify patterns, trends, and areas of focus and priority. Incorporate threat intelligence into risk assessments to provide context-aware risk evaluations. Conduct business impact analyses to understand how security incidents affect critical business functions. Evaluate and quantify risks associated with third-party vendors and supply chain. Assess specific risks related to cloud environments and services. Program Development Develop reports and dashboards to illustrate the organization's risk posture. Ensure that cybersecurity risk is integrated with IT risk, and informs overall Enterprise risk. Research and identify options to establish a risk register. Develop and track risk treatment plans including mitigation strategies, acceptance justifications, or transfer options. Map cybersecurity risks to relevant regulatory requirements and compliance frameworks. Continuously improve risk management processes based on industry trends and organizational needs. Communication & Collaboration Meet with technical experts and business leaders to convey cybersecurity risk in a way they can understand. Partner with incident response teams to incorporate lessons learned into risk models. Translate complex technical risk scenarios into actionable insights for all levels of the organization. Qualifications Experience Typically requires at least 6 years of relevant cybersecurity risk management experience. Experience with risk scoring methods and risk quantification. Experience with generating reports and dashboards to convey cybersecurity risk in a way that is easy to consume. Experience establishing or running an Enterprise cybersecurity risk management program. Experience with NIST SP 800-53 security standards. Experience presenting risk information to executive leadership. Education & Certifications Bachelor's degree specializing in an information technology field from an accredited college or university, or equivalent combination of directly related education and/or experience. Information Security industry certification (SSCP, CISSP, GIAC, CISM, CISA, etc.) preferred. Technical Knowledge Strong knowledge of and experience applying cybersecurity risk frameworks and assessment methodologies; examples may include Factor Analysis of Information Risk (FAIR), NIST Cybersecurity Framework (CSF). Strong skills and experience with data analysis. Experience with GRC (Governance, Risk, and Compliance) tools. Knowledge of business impact analysis methodologies. Familiarity with cloud security frameworks (CCSK, CCSP). Skills & Abilities Ability to understand technical details of cybersecurity risk. Ability to communicate complicated technical risk scenarios to all levels of the organization. Demonstrated self-motivation and ability to perform work independently, and also collaborate in a team environment. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Location: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Salary: $98,600 - $139,000 / Senior Level $117,300 - $165,400 / Advanced Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US Citizens or Green Card holders and Permanent Residents with at least 3 years of residency. This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and could take up to a couple of months to complete. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (************************************* or through verified Federal Reserve Bank social media channels. Privacy Notice
    $117.3k-165.4k yearly Auto-Apply 32d ago
  • Security Engineer Investigator, Insider Trust

    Meta 4.8company rating

    Security engineer job in Topeka, KS

    As part of Meta Security, our Insider Trust team is dedicated to identifying and responding to insider threats that target our data. Our mission is to detect, investigate, and mitigate damage caused by insider threats. We handle a wide range of abuse cases, including misuse of user data, intellectual property theft, and leaks of sensitive information.We are seeking an experienced Security Engineer to join the team. This role involves investigating, hunting, and automating internal signals to detect malicious activities related to insider threats. **Required Skills:** Security Engineer Investigator, Insider Trust Responsibilities: 1. Perform analysis, and threat hunting from a variety of log sources (e.g., individual host logs, network traffic logs) to identify potential insider threats 2. Create workflows and automations to streamline signal detection, threat hunts, and investigative processes 3. Collaborate with software and production engineering teams to build scalable and adaptable solutions for insider threat investigations 4. Identify gaps in our infrastructure and work with cross-functional partners to improve visibility through logging and automation 5. Build operational workflows and actions to auto-resolve false positives and provide context, scaling investigation capabilities 6. Prioritize efforts to maximize impact by enhancing visibility, automating processes, and scaling investigative capabilities 7. Coach, mentor, and support team members to foster long-term career growth, job satisfaction, and success **Minimum Qualifications:** Minimum Qualifications: 8. Bachelor's degree in Computer Science, Engineering, or equivalent experience 9. 5+ years of experience in Detection & Response Engineering, Insider Threat, or a similar Security Engineering role 10. Technical and procedural expertise in conducting security investigations, including response, forensics, and large-scale log analysis 11. Experience with attacker tactics, techniques, and procedures 12. Proficiency in coding or scripting in one or more general-purpose programming languages **Public Compensation:** $147,000/year to $208,000/year + bonus + equity + benefits **Industry:** Internet **Equal Opportunity:** Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment. Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
    $147k-208k yearly 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Security engineer job in Topeka, KS

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills. **Responsibilities:** + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Experience with scripting languages (e.g., PowerShell, Python) for automation and integration. + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Understanding of DevOps practices. + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. + Adaptability to stay ahead of evolving IAM technologies and security threats. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago

Learn more about security engineer jobs

How much does a security engineer earn in Olathe, KS?

The average security engineer in Olathe, KS earns between $65,000 and $116,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Olathe, KS

$87,000

What are the biggest employers of Security Engineers in Olathe, KS?

The biggest employers of Security Engineers in Olathe, KS are:
  1. Inceed
  2. Foresite
  3. Quest Analytics
Job type you want
Full Time
Part Time
Internship
Temporary