Senior Security Architect
Security Engineer Job 11 miles from Overland Park
You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world. As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.
Position Purpose:
Advises policy, direction, and vision for critical enterprise IT & Business domains. Drives and designs new and critical security initiatives for emerging technologies. Assesses, envisions, plans, designs, and oversees the implementation of security and compliance capabilities across company platforms, systems, and applications. Defines security requirements, secure architecture blueprints, and conducts reviews of systems, platforms, and applications to identify security risks. Recommends architectural enhancements to minimize security risk to the company.
Provides guidance and assists in setting the vision for information security across organization as well as coordinates all security architecture activities globally, and develops security architecture plans, roadmaps, etc.
Develops reference architecture and implementation patterns related to security solutions
Provides guidance and architecture review of cross-program and cross-project Security Architecture strategies, opportunities, and problem resolution
Ensures conformance and compliance of projects and programs with architectural security guidelines
Oversees newly implemented technologies and coordinates internal/external audits. Serve as the subject matter expert for international security regulated programs
Drives and assists in aligning new security initiatives with senior management
Guides, identifies, develops, implements, and maintains security processes to reduce risks, respond to incidents, and limit attack surface to the company
Supports the mitigation of significant security risks, design strategies and programs to prevent and minimize loss of organizational assets, all while optimizing costs
Advises senior management of changes in the technical, legal, and regulatory areas impacting Information Security
Carries out risk assessments and ensures that resulting action items are addressed in a timely manner
Defines Information Security metrics and reports them to the steering committee
Performs other duties as assigned
Complies with all policies and standards
Education/Experience:
A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 4 - 6 years of related experience.
Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.
Technical Skills:
One or more of the following skills are desired:
Experience with Telephony and AWS Connect is required
Contact Center Application background on implementing security access levels required
Experience with Technical Security Assessments or Audits on infrastructure, applications and platforms (NIST, SOX/SOC, etc.)
Experience with Other: Security tools like Vulnerability Scanners
Experience with Other: Security Information & Event Management (SIEM)
Experience with Other: IT as it is related to Managed Healthcare
Soft Skills:
Intermediate - Seeks to acquire knowledge in area of specialty
Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
Intermediate - Ability to work independently
Intermediate - Demonstrated analytical skills
Intermediate - Demonstrated project management skills
Intermediate - Demonstrates a high level of accuracy, even under pressure
Intermediate - Demonstrates excellent judgment and decision making skills
License/Certification:
CISSP Certified Information Systems Security Professional or Relevant Security Certification preferred
CompTIA Security+ Certification preferred
AWS/Azure Security Specialty preferred
Pay Range: $98,900.00 - $183,100.00 per year
Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law. Total compensation may also include additional forms of incentives.
Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.
Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act
Security Analyst
Security Engineer Job 19 miles from Overland Park
Advantage Tech is looking for an Security Analyst in the Kansas City area.
This is a hands-on information security professional to join the team. The individual will perform web app vulnerability assessments, perform manual and automated tests, and document their results including a risk assessment. In addition, the Information Security Analyst will perform reviews as it relates to a wide variety of areas including, network security, review of SIEM, FIM, IDS/IPS, and other security logs for anomalous behavior, and incident response. The Information Security Analyst may participate in security control review, design, and threat modeling activities.
Job Details:
General responsibilities:
Web app vulnerability assessment
Network vulnerability assessment
Administering and reviewing security systems such as SIEM, FIM, IDS/IPS, Anti-malware
Security incident response
Network and application security control review and design
Auditing device configurations (e.g. servers, firewalls, VPN)
Qualifications / Requirements:
A minimum of 3 years of experience in security administration
Prior experience managing a web application firewall (WAF)
Experience with static code analysis
Bachelor's degree in Information Systems, or related field
Prior experience working in a SaaS environment, preferred
Scripting knowledge such as Python and/or PowerShell, preferred
CISSP, CEH, CISA or other security certifications, nice to have
Security Engineer
Security Engineer Job 10 miles from Overland Park
We are offering a contract to hire employment opportunity for a Security Engineer in Kansas City, Kansas. This role primarily involves working closely with various teams to implement and maintain robust cybersecurity measures that safeguard our manufacturing operations from cybersecurity threats and vulnerabilities.
Responsibilities:
- Assist in designing, monitoring, and enforcing cybersecurity standards, procedures, and controls for manufacturing plant environments, including physical security measures, network segmentation, firewalls, and intrusion detection systems.
- Collaborate with manufacturing sites, engineering, and IT teams to analyze existing OT architecture and ensure seamless integration of cybersecurity measures across the organization's plant facilities and operations.
- Create and maintain OT-specific cybersecurity documentation such as risk registers, dashboards, and detailed reports to clearly communicate the OT risk posture to relevant stakeholders.
- Evaluate current security architectures to identify vulnerabilities and develop enhanced protections.
- Develop and implement an ongoing vulnerability detection and remediation program for OT systems and oversee vulnerability testing.
- Conduct cybersecurity risk assessments on OT systems and networks using frameworks like NIST CSF, ISO 27001, and ISA/IEC 62443 to identify vulnerabilities and implement effective mitigation strategies.
- Continuously monitor OT networks and systems for unusual activities and potential security breaches using advanced monitoring tools and techniques.
- Develop and maintain an incident response plan for OT-related cybersecurity incidents, including detection, response, and recovery procedures.
- Engage in continuous improvement of cybersecurity risk management policies, procedures, and tools, focusing on enhancing the OT security framework.
- Conduct training sessions and awareness programs for employees to promote cybersecurity best practices and ensure compliance with security policies.
- Ensure compliance with relevant industry standards, regulations, and best practices related to OT cybersecurity.
Requirements - Exceptional proficiency in software engineering principles and best practices
- Demonstrable experience with cloud technologies
- Proven ability to design, execute and monitor software performance tests
- Proficiency in network and networking protocols
- Strong research skills in identifying, evaluating and implementing new technologies
- Excellent communication skills to liaise with stakeholders and vendors
- Proficiency in Active Directory operations and management
- Ability to adhere to company policies and procedures
- Demonstrable experience in planning and implementing process improvements
- Experience in HR administration and understanding of HR policies
- Ability to create and maintain comprehensive software documentation
- Familiarity with security regulations and best practices in software development
- Proven experience in a manufacturing environment would be advantageous
- Familiarity with the design and execution of manufacturing protocols
- Strong understanding of facility operations and management
- Exceptional problem-solving skills and ability to execute tasks with precision
- Ability to work well in a team and foster a collaborative environment. Technology Doesn't Change the World, People Do.
Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.
Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.
All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.
© 2024 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
Sr. SQL Engineer Secure Release II
Security Engineer Job 10 miles from Overland Park
Employment Type: Full Time, Senior-level Department: Information Technology CGS is seeking a Sr. SQL Engineer Secure Release to join our team supporting a wide-ranging technical support initiative for a large Federal agency. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
* Web Development on the Microsoft.NET technology with experience in at least one JavaScript UI framework.
* Very Strong Relational Database technologies such as Microsoft SQL server.
* Data Warehousing using SQL Server Integration Services (SSIS), including significant experience with Extract, Transform, and Load (ETL) operations.
Qualifications:
* Microsoft SQL Server Integration Services (SSIS), MySQL, Oracle, Nuix, Relativity.
* At least 7 years of professional software development experience.
* At least 7 years of web development experience, preferably on a Microsoft development stack.
* At least 7 years of experience with development against enterprise-grade RDBMS platforms such as MS SQL Server, Oracle, MySQL, etc. and the ability to write complex database queries.
* Must be eligible to obtain US government security clearance.
* A bachelor's degree.
Ideally, you will also have:
* Experience with eDiscovery tools such as Relativity, IPRO, NUIX, LAW, etc.
* Domain experience with eDiscovery, FOIA Processing, Litigation Support, or Federal Government.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
* Health, Dental, and Vision
* Life Insurance
* 401k
* Flexible Spending Account (Health, Dependent Care, and Commuter)
* Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: *******************
$149,760 - $216,320 a year
Cloud Security Engineer
Security Engineer Job 3 miles from Overland Park
**Career Opportunity** Cloud Security Engineer **Job Location:** **Remote / Hybrid** **Job Title:** **Cloud Security Engineer** **Job Type:** **Full-Time** **Job Description:** The Cloud Solution Engineer will support the Innovation Technology Team with managing client relationships and developing policies, tools, and strategies for achieving business goals. The Cloud Strategy will be an implicit part of the building blocks that make up our infrastructure and applications and will leverage both private and public cloud service providers (CSP) to enable security through various mechanisms; notably through automation, security-by-design that allows us to provide the least privilege between the various components of an application.”
**In this role, you will:**
* Supports the tenets of the overarching Cloud Strategy
* Developer focused; automated solutions integrated into the CI/CD deployment pipeline
* Widespread logging, monitoring, and near real-time alerting
* Role and attribute-based access and separation of duties
* Identify and recommend opportunities for driving escalated resolution of technology roadblocks including code, build, and deployment while also managing the overall software development cycle and security standards
* Prioritization of cloud-native services and tooling
* Maintain current client relationships and identify areas for potential clients
* Contacting potential clients to establish a business relationship and meet with them
* Research the latest in the business industry and create new opportunities to expand the business
* Strong understanding of company products or services as well as business position and competition to keep business competitive
* Assist the Technical Director with creating policies and procedures to communicate with clients effectively.
**Team overview:**
**Vision:** Secure cloud computing to propel the financial success of the customers and clients we serve.
**Mission:** Drive seamless cloud security, empowering AmaraTech to achieve a balanced risk posture through innovative, resilient, automated solutions.
**Minimum qualifications and skills required:**
* Qualification in Cloud architecture, or related field
* 1-2 years of work experience in Networking, Cloud Solutions, Cybersecurity, or related field
* Proven experience with creating business plans, tracking industry trends, analyzing data, and identifying opportunities for business improvement and growth.
* Possesses excellent analytical, interpersonal, and customer service skills · Project management skill is a plus · Proficiency in SharePoint is a plus
**Job Level:**
**L3**
* 2+ years of leadership or management experience, in an IT environment
* 2+ years of application development experience in developing applications using Java, and microservices.
* Should have a strong application development background (including Testing), and have a good understanding and implementation expertise of Agile practices
* Experience with object-oriented design and development, including strong working knowledge and experience with various architectural, design patterns, and Solid Principles
* Experience with CI/CD tools like Github, TFS, and Jenkins is a plus. Manage global teams and have experience in working with product managers to refine business requirements.
* Act as a technical and change advocate - promoting the use of technology and assessing the landscape for continuous improvement
* Take ownership of delivery and manage multi-release projects in AGILE Ability to decide and act without having the big picture and comfortable handling risk and uncertainty
* Strong verbal, written, and interpersonal skills with the ability to communicate effectively across organizational lines and with virtual team members
* Ability to approach problems holistically and come up with innovative solutions to address the root cause of the issue, rather than the outcomes of the same
* Engineering mindset, and self-driven to take up additional responsibilities and accountability.
* Experience working across one or more geographic territories or regions
We Value Diversity At AmaraTech we believe in diversity, equity, and inclusion in the workplace; accordingly, we welcome applications for employment from all qualified candidates, regardless of race, color, gender, national origin, religion, age, sexual orientation, gender identity, gender expression, genetic information, individuals with disabilities, pregnancy, marital status, status as a protected veteran or any other status protected by applicable law. Employees support our focus on building strong customer relationships balanced with a strong risk-mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company.
Ethical Hacker - Overland Park, KS ( Only Citizens )
Security Engineer Job In Overland Park, KS
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Ethical Hacker - Overland Park, KS ( Only Citizens )
Security Engineer Job In Overland Park, KS
Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks
o BruteForce attacks
o Account Takeover
o Data Breaches
3. Identify and Remediate currently exploited vulnerabilities:
o Determine abuse tactics used by fraudsters
o Put in quick remediation efforts by webserver blocks or code update
o Re-test and validate long term fix
4. Request and evaluate application vulnerability scans:
o Work directly with corp sec to initiate scans
o Analyze the results and perform or provide recommended fix to impacted party
o Provide data and reports to IT compliance/auditors
5. Support .com web application firewalls
o Monitor/Manage/Configure security on .com webservers
o Work with network team to configure and evaluate F5 security modules
Perform coding changes in .com applications as needed
Please respond with your word resume and requested details:
Full Name :
Work Authorization:
Contact Number :
Email ID :
Skype ID:
Current location:
Willing to relocate :
Rate/hr :
Additional Information
All your information will be kept confidential according to EEO guidelines.
Info Systems Security Engineer (ISSE)
Security Engineer Job 11 miles from Overland Park
Responsibilities
Cyber Engineer
Cybersecurity Engineer
We are seeking a Cybersecurity Engineer to:
Support US Marine Corps (USMC) enterprise-level hybrid cloud data center design, development, engineering and operations.
Enable USMC world-wide customers to execute critical missions
What you will do:
As a Cybersecurity Engineer, you will support an Information System Security Manager (ISSM) and Information System Security Officer (ISSO) and collaborate with a team responsible for all aspects of cybersecurity support to the hybrid-cloud enterprise hosting environment. You will conduct vulnerability analysis and self-assessment technical analysis, monitor compliance status, manage and maintain the accreditation packages and support plan of action and milestone (POA&M) for known security vulnerabilities. In addition, you will support ATO package development for the datacenter. Finally, you will participate in the continuous monitoring program supporting datacenter operations.
Responsibilities include:
Providing technical and authorization and accreditation support
Conducting vulnerability management assessments using ACAS (Tenable Nessus) and other tools including mitigation development and POA&M and documentation support
Coordinating and collaborating with engineering and installations teams and the operations cybersecurity team to identify solutions for vulnerability mitigation and preparing cybersecurity documentation to obtain support and approval to operate
Preparing systems for review and independent verification and validation (self-assessments)
Developing POA&M for identified vulnerabilities and developing remediation, mitigation and criticality downgrade strategies
Supporting accreditation activities for in-deployment infrastructure as well as requirements in development and engineering change proposal/pipeline processes such as developing supporting documentation and completing cybersecurity compliance requirements; collaborate with operations team for installed and operating systems vulnerability management and accreditation
Coordinating with independent verification and validation team and operations cybersecurity support to enable overall cybersecurity program activities
Developing, maintaining, editing, authoring, and supporting accreditation package requirements including use of USMC's accreditation tool - MCCAST
Supporting continuous monitoring activities
Qualifications
Required Experience/Education:
BS 8-10, MS 6-8, PhD 3-5, Will also consider HS diploma and 12+ years of experience.
DoD Secret Clearance
IAT III Certification required (within 6 months)
Experience creating and maintaining RMF-based accreditation packages
Experience using a certification and accreditation tool/GRC -- MCCAST (built on RSA Archer preferred), eMASS alternative
Demonstrated understanding of DOD cybersecurity infrastructure tools including PKI, Data encryption, McAfee HBSS/ePO, DOD IA Toolkit
Strong technical foundation with system administration skills and experience to support independent assessments of cybersecurity risk and mitigation measures of enterprise data center systems including Virtualization, networking (CISCO, Palo Alto), Storage (SAN, NAS), Windows, Linux, Oracle and SQL database, SharePoint solutions
Experiencing operating within an Enterprise ITSM solution and queue operations (BMC Remedy preferred)
Experience with the configuration of datacenter monitoring and management solutions
Experience using Log Management and SIEM solutions to support cybersecurity program (LogInsight is tool in use)
Preferred
ACAS and RMF certification desired
Demonstrated strong understanding and application of RMF And DISA STIG/Security framework implementation, experience with cloud implementation desired
Expert experience conducting Tenable ACAS vulnerability management and reporting using Security Center, Nessus, PVS), experience with IAVM/IAVA management and reporting desired
Fundamental understanding of ITSM/ITIL processes (ITIL training or certification desired)
Benefits: At Peraton, our benefits are designed to help keep you at your best, beyond the work you do with us daily. We are fully committed to the growth of our employees. From fully comprehensive medical plans, to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range $86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
Info Systems Security Engineer (ISSE)
Security Engineer Job 11 miles from Overland Park
Responsibilities Cyber Engineer Cybersecurity Engineer We are seeking a Cybersecurity Engineer to: * Support US Marine Corps (USMC) enterprise-level hybrid cloud data center design, development, engineering and operations.
* Enable USMC world-wide customers to execute critical missions
What you will do:
As a Cybersecurity Engineer, you will support an Information System Security Manager (ISSM) and Information System Security Officer (ISSO) and collaborate with a team responsible for all aspects of cybersecurity support to the hybrid-cloud enterprise hosting environment. You will conduct vulnerability analysis and self-assessment technical analysis, monitor compliance status, manage and maintain the accreditation packages and support plan of action and milestone (POA&M) for known security vulnerabilities. In addition, you will support ATO package development for the datacenter. Finally, you will participate in the continuous monitoring program supporting datacenter operations.
Responsibilities include:
* Providing technical and authorization and accreditation support
* Conducting vulnerability management assessments using ACAS (Tenable Nessus) and other tools including mitigation development and POA&M and documentation support
* Coordinating and collaborating with engineering and installations teams and the operations cybersecurity team to identify solutions for vulnerability mitigation and preparing cybersecurity documentation to obtain support and approval to operate
* Preparing systems for review and independent verification and validation (self-assessments)
* Developing POA&M for identified vulnerabilities and developing remediation, mitigation and criticality downgrade strategies
* Supporting accreditation activities for in-deployment infrastructure as well as requirements in development and engineering change proposal/pipeline processes such as developing supporting documentation and completing cybersecurity compliance requirements; collaborate with operations team for installed and operating systems vulnerability management and accreditation
* Coordinating with independent verification and validation team and operations cybersecurity support to enable overall cybersecurity program activities
* Developing, maintaining, editing, authoring, and supporting accreditation package requirements including use of USMC's accreditation tool - MCCAST
* Supporting continuous monitoring activities
Qualifications
Required Experience/Education:
* BS 8-10, MS 6-8, PhD 3-5, Will also consider HS diploma and 12+ years of experience.
* DoD Secret Clearance
* IAT III Certification required (within 6 months)
* Experience creating and maintaining RMF-based accreditation packages
* Experience using a certification and accreditation tool/GRC -- MCCAST (built on RSA Archer preferred), eMASS alternative
* Demonstrated understanding of DOD cybersecurity infrastructure tools including PKI, Data encryption, McAfee HBSS/ePO, DOD IA Toolkit
* Strong technical foundation with system administration skills and experience to support independent assessments of cybersecurity risk and mitigation measures of enterprise data center systems including Virtualization, networking (CISCO, Palo Alto), Storage (SAN, NAS), Windows, Linux, Oracle and SQL database, SharePoint solutions
* Experiencing operating within an Enterprise ITSM solution and queue operations (BMC Remedy preferred)
* Experience with the configuration of datacenter monitoring and management solutions
* Experience using Log Management and SIEM solutions to support cybersecurity program (LogInsight is tool in use)
Preferred
* ACAS and RMF certification desired
* Demonstrated strong understanding and application of RMF And DISA STIG/Security framework implementation, experience with cloud implementation desired
* Expert experience conducting Tenable ACAS vulnerability management and reporting using Security Center, Nessus, PVS), experience with IAVM/IAVA management and reporting desired
* Fundamental understanding of ITSM/ITIL processes (ITIL training or certification desired)
Benefits: At Peraton, our benefits are designed to help keep you at your best, beyond the work you do with us daily. We are fully committed to the growth of our employees. From fully comprehensive medical plans, to tuition reimbursement, tuition assistance, and fertility treatment, we are there to support you all the way.
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$86,000 - $138,000. This represents the typical salary range for this position based on experience and other factors.
Senior Information Security Engineer
Security Engineer Job 4 miles from Overland Park
General information JobID 14395 Level Individual Contributor Team Information Technology Working Time Full-Time Type Regular Travel Requirements 5% Workplace Type Hybrid Preferred Location Springfield, MO Additional Locations Allen, TX, Lenexa, KS, Monett, MO
Equal Employment Opportunity
Applicants for U.S. based positions with Jack Henry & Associates must be legally authorized to work in the United States. Verification of employment eligibility will be required at the time of hire. Visa sponsorship is not available for this position.
Jack Henry & Associates, Inc. is an Equal Employment Opportunity/Affirmative Action Employer and maintains a Drug-Free Workplace.
EOE-M/F/Vet/Disability
Link Copied! The link to this job was copied to your clipboard.
**Job Posting:** 12922905
**Posted On:** May 04, 2024
**Updated On:** May 20, 2024
Growth Hacker
Security Engineer Job 3 miles from Overland Park
Seventic is a fast-growing operational marketing and prospecting agency specializing in B2B lead generation for new technology and consulting players. We are looking to immediately recruit an operational Growth Hacker to generate the maximum number of qualified opportunities on behalf of our clients.
**Assignment :**
In direct contact with our clients, you will carry out and manage effective lead generation actions for them.
Four fundamental roles for our bizdev Growth Hacker:
• Sales: Identify, prospect, qualify by phone high-level decision-makers in major accounts
• Growth hacking: Scraping data on social networks and consolidating information on SalesForce Seventic.
• Marketing: Defining messages and creating conversational email campaigns for our clients
• Steering: Managing target KPIs with each client, and each month, analyzing performance and adjusting actions accordingly.
**Profile sought:**
Graduated from a business school or IAE, data and business oriented, you are passionate about the web and the startup ecosystem.
Entrepreneur at heart, you are looking for a very stimulating environment: you are not afraid of responsibilities!
So don't hesitate any longer, send us your application and we will examine it as soon as possible.
**Digital project manager**
You have real interpersonal skills with an excellent sense of organization. Team spirit, proactive and committed, you are comfortable working in constantly changing environments. You will be responsible for the implementation and…
Workday Certified HCM Security Consultant
Security Engineer Job In Overland Park, KS
Who We Are We are Accenture, a global professional services company, searching for a Workday Security Consultant/Team Lead. This individual will be part of a team of advisory professionals focused on cloud-based data-reporting operations that integrate and optimize the essential corporate functions of finance, analytics, planning and HR.
For many of our clients, successfully getting their data operations into cloud environments is a major focus. The enterprise data-reporting software of Workday is a critical component of many of the cloud solutions we design, which is why Accenture has assembled a team of more than 2,000 Workday-certified professionals.
What's in it for You
Help HR and Finance leaders define and execute their strategy and give them the adaptability they need in a fast-changing world.
To help you take your skillset beyond Workday technology, our Transformation Powered by Workday Training will help you take your consulting to a whole new level.
Take your Workday skills and career to the next level, mastering complex projects while expanding your leadership and advisory skills with a market-leading team.
As a Workday Security Consultant, your primary responsibilities may include:
* Lead or support the Security workstream on a Workday implementation project.
* Support the creation of work plans for large complex global engagements, owning risk, budget, resources, client relationships, etc.
* Researching and resolving day-to-day Workday Security issues
* Work with client to support the new requirements for Sec in Workday
* Creating and Updating Workday configurations based on requirement changes
* Provide support for regular and special Security processes in Workday
* Provide support for Security activities like posting, bank transfer and pay checks in Workday
* Provide support for Legal and regulatory reports in Workday
* Provide support for year-end reporting and other year-end activities in Workday
* Manage small on and off-shore functional teams
* Identify strategies, risks, and options, recommend approaches and mitigations to meet client/functional requirements
* Architect Workday Security solutions to ensure that all work streams are cohesive and cross functional impacts are considered and mitigated
* Advise clients on industry standards and leading practices.
* Demonstrate design options through the use of prototyping.
* Understand and apply Workday and Accenture methodologies.
* Provide the Project Manager with status updates and keep them apprised of overall project status.
* Demonstrate strong client and stakeholder management to achieve project objectives
* Support innovation through the creation of new industry leading methods and assets
Why should I join the Accenture Workday team?
Innovate every day. Be at the forefront of designing and delivering Workday solutions that push boundaries and create new opportunities for our clients.
Lead with the industry's best. Join an industry-recognized global cloud leader with more than 2000 Workday certified professionals collaborating to drive enterprise-wide transformational projects on a global scale. Accenture has worked with more than 600 clients to deliver Workday deployments to unlock the potential of their organizations.
Learn and grow continuously. Harness unmatched training and professional development to help you build and advance your Workday, consultative and delivery skills. With learning resources, interactive classroom courses, real-life client simulations and ongoing mentoring available when you need it, you'll expand your thinking beyond the core Workday implementation.
Who will be successful at Accenture?
It's not just what you know or where you've been that propels success at Accenture: It's who you are, fundamentally, as a person. We prize diversity in backgrounds and perspectives. Whatever your unique qualities, a few key traits should apply: You're passionate about technology and motivated to apply the latest technology trends. You're proactive and collaborative; a leader with effective communication skills. You're driven by new challenges and are motivated to improve. You're a creative problem solver with the flexibility to navigate uncertainty. You're focused on the future with a desire to develop inclusive, responsible and sustainable solutions to complex challenges.
Travel may be required for this role. The amount of travel will vary from 0 to 100% depending on business need and client requirements.
Qualification
Job Qualifications
Here's what you need:
* Workday Partner Certification
* Minimum of 2 years of consulting experience, most recently in a Lead or similar level role
* Minimum of 2 years of Security Implementations
* Bachelor's degree or equivalent (minimum 12 years work experience). If Associate's Degree must have equivalent minimum 6 year of work experience.
Bonus points if you have:
* 4 years of HCM Implementations
* Expert knowledge of the HR function & processes
* Experience in Education & Government implementations
Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired in California, Colorado, District of Columbia, Maryland, New York or Washington as set forth below.
We accept applications on an on-going basis and there is no fixed deadline to apply.
Information on benefits is here.
Role Location Annual Salary Range
California $63,200 to $169,800
Colorado $63,200 to $146,700
District of Columbia $67,300 to $156,200
New York $58,500 to $169,800
Maryland $58,500 to $135,800
Washington $67,300 to $156,200
Total Rewards
With Accenture's Total Rewards, you are empowered to be your best-for the business, for your family, and for yourself.
Locations
Information Security Analyst
Security Engineer Job 3 miles from Overland Park
As a Vision, Mission, and Driven company, VMD has been delivering information technology solutions to the Federal government in Agile Engineering, Cybersecurity, and Critical Infrastructure Protection since 2002. Our mission has now expanded, and we have merged with Xcelerate Solutions to revolutionize end-to-end enterprise security. Together we are committed to protecting our nation's citizens, critical infrastructure, and resources. At VMD, now a part of Xcelerate Solutions, you have the opportunity to thrive in your career and become a Game Changer. The quality and talent of our people is what drives our success. We embrace an employee-first culture and make it a priority to provide professional development opportunities that foster career growth. We help protect American Citizens and the nation's most critical infrastructure by working alongside our customers and delivering game changing solutions to strengthen their missions. We believe our passion and commitment to achieve our customers' goals and solve their most critical challenges defines who we are. We don't just dream big, we act on it - through teamwork, dedication, and resilience.
Learn more about VMD culture here: **About the Mission You Will Join:** Support the Department of the Air Force (DAF) in managing the lifecycle cybersecurity requirements of all DAF Systems. **Your Impact to the Mission:** The Information Security Analyst will support the Department of the Air Force (DAF) in managing the lifecycle cybersecurity requirements of all DAF Systems. This role involves implementing the Risk Management Framework (RMF), developing communications and risk mitigation plans, and maintaining awareness of cybersecurity policies and frameworks. Key Responsibilities:
Risk Management Framework (RMF) Implementation:
* Manage the lifecycle cybersecurity requirements of all DAF Systems consistent with applicable policy and guidance.
* Coordinate with DoD and DAF appointed authorizing officials (AO) and their staffs, and other internal and external stakeholders.
Communications and Risk Management:
* Develop a communications plan and risk mitigation plan addressing how to collect core architectural metadata across the DAF.
* Proactively manage outreach efforts with various stakeholders in the USAF, USSF, joint staff, sister services, MAJCOMS, FLDCOMs, and other entities.
* Address specific EA governance requirements through the development of these plans.
Policy Awareness and Compliance:
* Maintain a strong in-depth awareness of all policies involving the Risk Management Framework and DAF policy/guidance.
Cybersecurity Framework:
* Support the development of voluntary, industry-led cybersecurity standards and best practices as directed by the Cybersecurity Enhancement Act of 2014.
* Ensure the framework is relevant for every size, sector, and type of organization.
Support Services:
* Provide experienced and skilled support services including strategic communications, issue/point papers, white papers, guidebooks, reports, publications, and policy/guidance documents.
* Assess and implement higher-level cybersecurity requirements including federal laws, regulations, Presidential, OMB, and DoD directives.
**Experience Needed to Be Successful:**
* Minimum of 5 years of experience in information security or a related role.
* Strong analytical and problem-solving skills.
* Excellent written and verbal communication skills.
* Proficiency in cybersecurity tools and frameworks.
**Desired Qualifications and Experience:**
* Master's degree in Information Security, Cybersecurity, Information Technology, or a related field.
* Experience with the Risk Management Framework (RMF) and NIST Cybersecurity Framework.
* Familiarity with military or government operations.
**Basic Qualifiers:**
* Education Requirement**: Bachelor's degree in Information Security, Cybersecurity, Information Technology, or a related field.**
* **No**
* Required Certification(s): **DoD Approved 8570 IAM Level III certifications (Certified Information System Security Professional (CISSP), and/or Certified Authorization Professional (CAP)) preferred.**
* Minimum Years of Overall Experience: **5**
* Minimum Years of Specific Experience in Field: **5**
* Minimum Clearance to Start: **Secret Clearance**
* Work Status Allowable: **US Citizen**
**The Type of Person That Will Excel:**
* Strong attention to detail and accuracy.
* Ability to manage multiple priorities and meet deadlines.
* Strong interpersonal skills and the ability to work effectively with diverse teams.
* Ability to handle confidential information with discretion.
**Travel and Telecommuting:**
* Travel: **None**
* Telecommute Options: **Hybrid Remote. In office daily for first 90 days then possibility of 2 days per week in office dependent on client requirements and leadership determination**
*VMD provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a covered veteran in accordance with applicable Federal, state and local laws. VMD maintains a drug-free workplace.*
Data Security Analyst
Security Engineer Job 3 miles from Overland Park
TO SUCCEED IN THIS ROLE: * Bachelor's degree or equivalent. Degree / Background - Math / Statistics Major is a big plus.. * What is more important is having the attitude, skills and experience to do the job. * Positive Professional. You have an upbeat, persistent style and the ability to produce creative solutions without fear of rejection. You can manage your time well, prioritize deliverables, and multi-task with the best of them. In addition, you can present your ideas in a clear, professional manner on paper, in-person, and over the phone. With your leadership skills, you are comfortable influencing, guiding and lending expertise to other teams & associates. You already possess a high degree of integrity, are trustworthy, and can work independently.
* Subject Matter Expert. Solid data analysis experience will be key to being successful in this role… it will help you interface with the various product teams from an Analyzing perspective. Your experience with analytical tools for log & configuration analysis will help us deliver solutions to meet today's needs, and tomorrow's vision! Experience across the Microsoft Purview suite will be valuable in this role.
* Proven Experienced Winner. With your two to ten-plus years of experience in technology & cybersecurity roles, including: planning, implementing, and running security solutions. You have a track record of integrating both technological & people processes to ensure adoption success. You work well with key collaborators (security partners, technology teams, business units) to help improve or solution designs that adapt to ADP data platforms.
* Technical Background You possess strong analytical skills and cross-functional knowledge of multiple technology and cybersecurity domains. You are superb at defining and documenting business processes and controls. Your background will lend strength based on your experience with Digital Rights Management (DRM), meta-data definitions, and encryption technologies & solutions. In addition, your knowledge and working experience with data loss prevention (DLP), and structured and unstructured data protection (UDP) technologies and approaches will help prevent unsafe and incorrect data disclosure, transmission or exfiltration. You may possess a vast background (additional certificates help support your deep security knowledge (CISSP, GSEC, CISA, CISM, CRISC, MCSD), comprising of functional experience working in a global hybrid cloud environment, including AWS, Azure, O365, and GCP. Experience with Data Governance or Data Compliance Standards is valuable.
* Fabulous Soft Skills. You recognize that with the pace that digital transformations drive, one must include the ability to communicate with various audiences that include executive leadership, business leaders, Analysts, architects, clients, and associates. You know that it is important to possess great verbal communication skills to convey information to all levels. This includes exceptional written communication skills, documentation, and reporting. The sense-of-urgency, activator attitude you possess makes you a stellar candidate and highly sought after on project teams!
WHAT YOU'LL DO:
Here is what you can expect on a typical day in the life of a Security Data Analyst at ADP.
* Planning:Post assessing the current state of ADP's DLP technologies, this role is responsible for planning risk-reduction improvements and/or enhancements towards ADP's web security services across ADP's global organization. Exemplified effective time and priority management with ability to analyze and resolve complex issues while providing reasoned alternatives to solution existing issues.
* Develop:Using existing tools, leverage available data to prioritize what should be addressed to reduce risk in the environment.
* Measure: Develop metrics to track and show the risk reduction opportunities within the program space.
* Collaborate: In partnership with your colleagues, support the collaboration and influence multi-disciplinary teams in testing, identifying, and remediating network and system vulnerabilities along with supporting the implantation of new security policies. This role possesses positive relationship management with experience engaging cross functional teams including strategic product managers, enterprise technology, privacy, and information security teams. Influence others with your expertise and supported analysis.
* Design & Process Improvement: Gather and define requirements to develop prevention and detection capabilities that support ADP's data security network policies. Interpret security and technical policies from business processes and communicate security risks to relevant stakeholders ranging from business leaders to Analysts. Continually improve program outcomes, address gaps, and reduce risk to ADP's infrastructure, processes, and sensitive data. Define, measure, and report metrics to support ongoing monitoring of compliance with Global Security Network standards. Organize and coordinate supporting security services for testing, deployment of new technical design specifications, and implementation and configuration of suites. You will also provide readouts on current state network security policies and processes and find ways to reduce risk to ADP.
* Operate: Support the current state governing routines on auditing compliance while helping improve prevention and detection capabilities that support ADP's data security policies on the DLP platforms. Assess and evaluate control effectiveness, enable comprehensive orchestration and automation to provide improved metrics and operational support, and identify and implement new network security technologies and best practices into the company's critical applications.
* Security Incident Response: Enable the comprehensive analysis and governance of security processes to provide rapid incident and gain efficiencies throughout the technical security services lifecycle.
* Security & Compliance: Drive the discovery and prioritization of remediation of data controls to meet audit, compliance and ADP's network data protection requirements, policies, and standards. Ensure global data security network initiatives adhere to continually changing privacy and legal compliance requirements. Assess and evaluate end point and data security control effectiveness, and drive towards improved control effectiveness, consistency, and maturity across the organization.
YOU'LL LOVE WORKING HERE BECAUSE YOU CAN:
* What we're doing here will surprise you. Whether we're leveraging one of the world's most comprehensive datasets that predicts the economic health of a nation, using the latest tech stacks to create adaptive, industry-changing platforms, or developing one of the Top 10 mobile applications for business, we're making a positive impact on the lives of millions of people around the world. Every day.
* Deliver at epic scale. We deliver real user outcomes using strong judgment and good instincts. We are obsessed with the art of achieving simplicity with a focus on client happiness and productivity.
* Join a company committed to equality and equity. Our goal is to affect lasting change through our actions.
* Team collaboration. Courage comes from how associates are willing to have difficult conversations, speak up, be an owner, and challenge one another's ideas to net out the best solution.
* Be surrounded by curious learners. We align ourselves with other smart people in an environment where we grow and elevate one another to the next level. We encourage our associates to listen, stay agile, and learn from mistakes.
* Act like an owner & doer. Mission-driven and committed to navigating change, you will be encouraged to take on any challenge and solve complex problems. No tasks are beneath or too great for us. We are hands-on and willing to master our craft.
Cloud Security Analyst
Security Engineer Job In Overland Park, KS
Description Company Overview Shamrock Trading Corporation is the parent company for a family of brands in transportation services, finance and technology. Headquartered in Overland Park, KS, Shamrock is frequently recognized among the “Best Places to Work” in Kansas City and Chicago and was most recently recognized as one of America's top 100 “Most Loved Workplaces” by Newsweek. We also have offices in Atlanta, Chicago, Dallas, Ft. Lauderdale, Houston, Laredo, Nashville, Philadelphia and Phoenix. With an average annual revenue growth of 25% over several decades, Shamrock's success is attributed to three key factors: hiring the best people, cultivating long-term relationships with our customers and continually evolving in the marketplace. Responsibilities Shamrock Trading Corporation is looking for a Cloud Security Analyst to join our Information Security team. This individual will be a key contributor on the security team, playing a critical role in delivering secure solutions for cloud computing to make sure all systems and company devices are free from any potential threats. The Cloud Security Analyst will provide security guidance and expertise and perform a variety of responsibilities, including monitoring, discovering and remediating any vulnerabilities while upholding and complying with corporate policies, standards and procedures. Responsibilities include but are not limited to:
Define and execute public cloud-centric security controls
Design secure patterns for computing, storage, networking, operational and security domains
Serve as a practical, solutions-focused thought leader and consensus builder, interacting with technical and non-technical audiences both within and outside the company
Deploy, consult and manage security controls leveraging solutions included but not limited to AWS multi-accounts structure, Organizational Units, Service Control Policies (SCP), IAM policies, Virtual Private Cloud (VPC), AWS Control Tower Guardrails and best practices
Partner with application teams to support the design and implementation of infrastructure-as-code stacks that meet the needs of a secure infrastructure
Advise on all aspects of secure cloud infrastructure offerings and solution design
Provide hands-on technical coaching and mentoring to accelerate cloud security learnings across the organization
Provide accurate and current information on AWS services and serve as a consultant to the Information Security organization
Collaborate with senior IT or business employees to ensure security compliance
Support the planning, coordination and implementation of the organization's information security requirements
Evaluate security requirements and conduct feasibility studies to examine software requirements, administration costs, information flow and other metrics
Qualifications
Bachelor's Degree in Information Systems, Computer Science or related field OR equivalent work experience
3+ years of experience designing and implementing secure solutions and securing public cloud workloads
Experience identifying and handling security incidents
Ability to monitor and interpret logs, note suspicious or unusual activity and make recommendations for resolution
Demonstrated knowledge and experience with the following tools and process:
Auditing and SIEMs
Infrastructure-as-code (IaC) and deployment
Automation methodologies, processes improvement and development of CI/CD pipelines
At least 2 scripting languages, such as Python, PowerShell, AWS/Azure CLI, Ansible or Bash
Deployment and operation of computer instances (EC2), AWS Storage Services (EBS/S3/Glacier), AWS multi-accounts environment, IAM Policies, AWS Tower, AWS Config and Service Control policies (SCP)
Configuration management and pipeline automation with AWS DevOps, Jenkins, Git or similar offering
Container technologies, such as Docker, Kubernetes, AWS EKS and ECS
Common enterprise-grade security solutions
Other cloud security tools
Demonstrated knowledge of common security issues and best practices with the ability to train employees or customers and assist in the resolution of computer security problems
Ability to establish and maintain collaborative relationships with team members, other technical staff, service providers, partners and business units
Strong communication skills with the ability to communicate findings to business units and follow up on resolution
A desire to continually learn, enhance skills and execute superior projects that improve security, reduce down time and maintain integrity
Experience creating and maintaining accurate technical documents and records
Possess the following certifications:
Certified Cloud Security Professional (CSSP)
Certificate of Cloud Security Knowledge (CCSK)
GIAC Cloud Security Automation (GCSA)
AWS Solutions Architect Associate
AWS Certified Security - Specialty
CompTIA Cloud+
Benefits Package At Shamrock we hire bright, ambitious people and give them the tools they need to be successful. By investing in training and development, we hope to become a long-term career for employees, where there are always opportunities for advancement. Shamrock also offers a premier set of benefits for employees and their families:
Medical: Fully paid healthcare, dental and vision premiums for employees and eligible dependents
Work-Life Balance: Competitive PTO, paid leave policies and eligibility for work from home opportunities after an introductory period
Financial: Generous company 401(k) contributions and employee stock ownership after one year
Wellness: Onsite gym, jogging trail, and discounted membership to nearby fitness center
#LI-NB1 #LI-Onsite
IT Security Manager
Security Engineer Job In Overland Park, KS
Solid stable, long standing company that is very employee oriented with great benefits.
They are one of the fastest growing companies in their space
Job Description
This is the perfect role to really put your mark on something. This is a newly created position, tasked with building a team to support the security vision of an entire business unit.
Key Responsibilities:
·Communicates Information Security goals and new programs effectively within the organization
·Ensures consistent and effective security practices
·Establishes appropriate Information Security procedures and governance
·Oversees the deployment, integration, and initial configuration of all new Information Security solutions and Information Security policies, standards, and operational procedures
·Manages investigations into identified problematic activity and provides on-going communication with IT senior management
·Owns and manages relationships with vendors performing managed security services for the Overseas & Trading division
·Provides centralized guidance and governance of Information Security solutions
·Engages in ongoing communications with peers in the Infrastructure and Application Support groups as well as the business groups to ensure understanding of security goals
·Collaborates with affiliate companies to assist with identifying and managing Cybersecurity risk
·Assist with Information Security awareness programs
·Creates and maintains a set of metrics to document and measure the performance and effectiveness of the Information Security program; responsible for communicating metrics to the Overseas & Trading senior management.
·Participates in annual and long-range planning activities to ensure Information Security needs are addressed
Qualifications
Must be open to travel approximately 35% of the time.
A college degree in MIS, CIS, Business Management, or related field
5+ years of overall Information Security experience
1+ years working on an Information Security implementation team
An Information Security industry certification is preferred
Progressive experience in a combination of Information Technology, Risk Management, Information Security, and Compliance roles is preferred
Must have a working knowledge of at least one of the following regulatory compliance requirements and IT management frameworks:
CIS Critical Security Controls
ISO 27000-series standards
NIST SP800-53 and related standards
Must have a working knowledge of the following Information Security practices, standards, and systems:
Data Loss Prevention (DLP) systems
Encryption technologies and standards
Endpoint security software
Governance, Risk, and Compliance (GRC) systems
Identity and Access Management (IAM)
Incident response practices
Network security (e.g. firewalls, IDS/IPS, VPN, etc.…)
Risk assessment practices
Security Information Event Management (SIEM) systems
Vulnerability management practices and scanning tools
Additional Information
Solid company with excellent track record of stability,.Great opportunities for growth and learning.
Sr. SQL Engineer Secure Release II
Security Engineer Job 11 miles from Overland Park
Employment Type: Full Time, Senior-level Department: Information Technology CGS is seeking a Sr. SQL Engineer Secure Release to join our team supporting a wide-ranging technical support initiative for a large Federal agency. CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
- Web Development on the Microsoft.NET technology with experience in at least one JavaScript UI framework.
- Very Strong Relational Database technologies such as Microsoft SQL server.
- Data Warehousing using SQL Server Integration Services (SSIS), including significant experience with Extract, Transform, and Load (ETL) operations.
Qualifications:
- Microsoft SQL Server Integration Services (SSIS), MySQL, Oracle, Nuix, Relativity.
- At least 7 years of professional software development experience.
- At least 7 years of web development experience, preferably on a Microsoft development stack.
- At least 7 years of experience with development against enterprise-grade RDBMS platforms such as MS SQL Server, Oracle, MySQL, etc. and the ability to write complex database queries.
- Must be eligible to obtain US government security clearance.
- A bachelor's degree.
Ideally, you will also have:
- Experience with eDiscovery tools such as Relativity, IPRO, NUIX, LAW, etc.
- Domain experience with eDiscovery, FOIA Processing, Litigation Support, or Federal Government.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
- Health, Dental, and Vision
- Life Insurance
- 401k
- Flexible Spending Account (Health, Dependent Care, and Commuter)
- Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: *******************
$149,760 - $216,320 a year
Information Security Risk and Assurance Specialist
Security Engineer Job 11 miles from Overland Park
Job Title Information Security Risk and Assurance Specialist Job Location Kansas City Description **The Role** The mission of the firm's Information Security and Risk team is to establish a risk managed environment that enables the firm to adequately and reasonably protect the confidentiality, integrity and availability of information used by the business and on behalf of clients. The successful candidate will be part of the team that focuses on the management of risk and assurance for Information Security and IT, and will work with stakeholders across the global business to develop and maintain the risk management and control frameworks, identify and measure the levels of associated Information Security and IT risks, help to identify and oversee the implementation of appropriate remediation strategies where necessary including the implementation of appropriate controls, work alongside the technical teams and other areas of the business to help bring the levels of risk into appetite; periodically monitor the risk levels and the maturity of related controls, conduct reviews and control assurance exercises, develop
and maintain the associated policies, processes, standards to ensure that the people,
processes and technology within the enterprise are appropriately risk-managed, adding value to the business consistent with assigned information security scope and risk appetite.
**Key Responsibilities**
* Ensure an in-depth knowledge and understanding of the Information Security and IT risk management requirements and practices.
* Lead the development and maintenance of the risk management framework for
Information Security and IT, in accordance with company policy and in line with the enterprise risk management framework. Periodically review and maintain the
Information Security and IT risk management policies as appropriate.
* Work closely and build relationships with stakeholders in Information Security, IT, the global Risk department and across the wider business, to encourage and develop the processes required for the determination of appropriate risk appetite, identification and assessment of risk, the implementation of appropriate mitigation strategies and ongoing management, in accordance with the risk management policy.
* Develop and manage the Information Security and IT risk register, ensuring that all identified risks are clearly recorded together with assigned owners, measured
inherent and residual risk levels, and details of compensating controls and/or
mitigation strategies with their respective owners. Ensure that the recording and
management of risk remains consistent and in accordance with the policy and
underlying agreed standards/processes.
* Ensure that all risks are periodically reviewed and re-assessed to determine whether the inherent/residual levels are still appropriate. For risks still not in appetite, determine the most likely scenarios that could lead to crystallization of the risk, and whether current mitigation strategies and/or controls would be optimal/effective.
* Perform risk assessment activities as are appropriate for larger projects or for where there may be significant transformation or change within the business affecting Information Security or IT. Identify and assess on an ongoing basis, risks that could materially impact the ability for IT to deliver its commitments to the business, together with periodic reporting to the Senior Leadership Team, and the tracking of any mitigation actions required.
* Provide education where required to develop the skills within Information Security, IT and other business areas to identify, assess, measure and record risks.
* Stay abreast of developments in the risk management area and cyber and information security trends as they relate to the legal industry, information management, technological standards, emerging and current threats employing appropriate horizon scanning.
* Build and maintain relationship with the global Risk department to share best practice and to ensure that the risk management and control frameworks for Information Security and IT fully aligns with the enterprise risk management framework.
* Develop and implement a risk reporting framework that informs effective risk-based decision making within IT and tracks progress of risk mitigation while recognizing the different audiences within Clyde & Co e.g. risk or service owners, to management within Information Security and IT, the Audit and Risk Committee and where appropriate to other levels of management in the company. Maintain a reporting environment capable of historical reporting, trends, key triggers, performance and risk indicators, management information etc.
**Essential Skills and Experience**
* Proven experience of working in an Information Security and IT Risk Management role within a fast-paced environment. Experience within the legal industry is ideal, but not essential.
* Operational knowledge of risk management and international information security
standards, practices, risk management and control frameworks e.g. ISO31000,
IRAM2, NIST 800-53 and cybersecurity framework. ISO27001/2, COBIT, ISF SOGP, CPS-234 etc.
* Strong organisational skills and the ability to handle multiple conflicting priorities.
* Able to work to very tight deadlines under pressure and to assimilate information
quickly.
* Strong interpersonal skills including confidence, positivity, diplomacy and the ability to gain credibility quickly.
* Excellent verbal and written communication skills, with the ability to explain risk concepts and technical terms in a way that non-technical people would understand.
* Demonstrates attention to detail with a high level of accuracy.
* Positive and tenacious with the ability to pro-actively drive initiatives forward and
motivate resources within and outside their team to perform. within and outside their team to perform.
**Business Services Competencies**
Clyde & Co is committed to providing extensive, personal and professional development opportunities for our people enabling them to be highly effective in their current role as well as assisting them to fulfil their career aspirations.
The competencies are used to inform all aspects of Business Services career development.
They vary across levels and different business areas and fall under the following areas:
• Technical Excellence
• People and Team
• Client/Stakeholder Relationships
• Service Delivery and Commercial Awareness
• Personal Effectiveness
This is the job description as constituted at present; however the Firm reserves the right to reasonably amend it in accordance with the changing needs of the business.
#LI-AC3 #LI-HYBRID #LI-DNP
**Our Privacy Statement & Cookie Policy**
**Privacy Preference Center**
** Manage Consent Preferences**
Always Active
Security Analyst-C
Security Engineer Job 3 miles from Overland Park
Check out our for current openings that match your skills and interests. Job Title Security Analyst-C Job Description The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.
Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!
This is a contingent position upon contract being awarded.
Telos is looking for an IT Security Analyst to provide Functional Mission Analysis-Cyber assistance to identify the United States Air Force weapon system's critical information technology architecture and supporting infrastructure that aids the warfighting mission. The Telos team supporting Functional Mission Analysis work activities shall possess a fundamental understanding of DoD Mission Assurance concepts and principles and how they relate to the United States Air Force (USAF) Mission. Team members shall be familiar with the purpose and use of the Mission Assurance Decision Support System (MADSS) and other similar data base repositories, such as the Strategic Mission Assurance Database System (SMADS). Together you and your teammates shall possess an in-depth knowledge of various technical resources pertinent to emerging cyber tools and capabilities required to perform functional mission analysis and supporting assessments, including open-source technologies.
**Job Responsibilities**
* Investigate a diverse collection of network activities in cyberspace to determine essential MRT-C support designed for command, control, processes, and systems.
* Develop a strategy to identify, evaluate, and minimize risks in the local cyberspace environment that are considered crucial for mission success.
* Create and implement strategies and techniques to merge and display relevant MRT-C, based on essential systems and network services.
* Identify and analyze trends to define MRT-C requirements and provide guidance and alignment services.
* Assist with FMA-C, identifying, mapping, and developing a defense plan to safeguard MRT-C.
* Maintain databases to monitor systems, modify user boundaries, and create indexing to make searches easier.
* Utilize classified and unclassified networks and information portals to create support and information distribution plans for mission activities.
* Review and provide recommendations for establishing new or revised policies, procedures, objectives, and organization design for the staff, as necessary.
* Coordinate with local SMEs to resolve events and/or incidents.
* Brief supporting recommendations and Courses of Actions.
* Define and perform vulnerability assessments leveraging threat analysis to scope and prioritize efforts.
* Coordinate with enterprise-wide cyber defense staff to validate network alerts.
* Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
* Perform cyber defense trend analysis and reporting.
* Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
* Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Job Requirements
* Bachelor's degree in Computer Science, Information System Engineering, Business, or related technical discipline in cybersecurity or information technology.
* Possess 5 years of combined experience in the following:
+ Functional Mission Analysis in Cyberspace processes and associated mapping and defense of Mission-Relevant Terrain in Cyberspace.
+ Information Technology (IT) cybersecurity principles, concepts, and methods to investigate, analyze, and respond to cyber incidents within a computer network environment or enclave
+ IT security principles, policies, products and services to assess risk factors and advise on vulnerability to attack from a variety of sources (e.g., destructive programs/applications/ viruses, unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications.
+ Commonly applied telecommunications principles, concepts, and methodologies, operating characteristics and capabilities of systems, media, equipment, and related software systems, processes, and procedures to assess the efficiency of operations and make recommendations involving equipment and system integrity.
* IAT Level II Certification (ex: CompTIA Security+) in accordance with (IAW) DOD 8140 and AFMAN 17-1303.
* Possess and maintain a Top-Secret clearance with SCI eligibility for access to classified processing systems.
* Ability to communicate effectively, both orally and in writing.
The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship.
Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment
Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration (“SSA”) and/or the Department of Homeland Security (“DHS”) of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future.
Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service:
Telos Corporation is an EEO/AA employer.
EEOC Job Category
Location Yokota AB, 35 13 JP (Primary) JP (Primary)
Telos offers an excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos and its subsidiaries are an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
Information Security Specialist
Security Engineer Job 5 miles from Overland Park
Job Details Westwood - Westwood, KS Full TimeDescription
The Information Security Specialist is responsible for driving information security initiatives. The individual will perform internal and external security compliance monitoring activities, manage client compliance audits, IT control audits, security gap analyses and security risk assessments/analyses. This role will assist in the management of key compliance areas such as HIPAA and the implementation of administrative, physical, and technical safeguards, PCI DSS, policy, process, and procedure governance, and the implementation of industry standards.
ESSENTIAL JOB FUNCTIONS
Maintain security and compliance initiatives to ensure that corporate policies, standards, procedures, and audit activities are in alignment with business, IT, legal, and regulatory requirements.
Develop and maintain a comprehensive set of policies, standards, processes, and procedures to ensure compliance with industry standards (,e.g., the NIST Cybersecurity Framework, the HIPAA Security Rule, and applicable laws.
Maintain a written information security program (WISP) that ensures security policies, standards and process are being adhered to by the business.
Monitor electronic systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and evolving and emerging cybersecurity attack vectors.
Respond to electronic system security incidents, including investigation of, countermeasures to, and recovery from computer-based attacks, unauthorized access, and policy breaches; interact with third-party incident responders, including law enforcement, and legal counsel.
Partner with IT leadership to administer authentication and access controls, including provisioning, changes, and deprovisioning of user and system accounts, security/access roles, and access permissions to information assets according to industry standards.
Lead the development, implementation and management of MTN's WISP, ensuring compliance and auditing for improvements on an ongoing basis.
Ensure compliance with healthcare information security best practices and HIPAA.
Ensure compliance with, and management of, the MTN cybersecurity incident response plan and provide guidance for improvements on an ongoing basis in conjunction with the HIPAA Compliance Officer.
Monitor security trends and drive information security best practices throughout the organization.
Evaluate, design, test, and recommend new or improved controls to keep MTN current with industry standards and compliance requirements.
Work with third party firms and consultants to conduct independent security audits, vulnerability scans, and penetration tests including social engineering.
Work together with the business to provide an interface for client information security audits
Collaborate with IT, legal, and other teams by providing cybersecurity input and guidance in relation to MTN's mission.
Conduct regular risk analyses, advise Senior Director, Information Technology Services and Senior management on appropriate recommendations and implement recommendations in an efficient and timely manner documenting remedial actions as directed.
Be informed about changes to the HIPAA Security Rule and other applicable laws and their impact on MTN's compliance obligations and business operations.
Work with the Manager, Corporate Education & Development and HIPAA Compliance Officer to develop and administer, or provide advice, evaluation, and oversight for, ePHI information security training and awareness programs.
Qualifications
QUALIFICATIONS AND PHYSICAL DEMANDS
Undergraduate degree in information systems or a related field or similar experience leading cybersecurity/information security initiatives.
Five or more years experience managing security in a healthcare environment where HIPAA/HITECH regulations and guidelines for securing ePHI data required
Experience advising and mentoring diverse teams without direct authority of team members
Professional certification in the information security space preferred (e.g. CISM, CISSP, CISA, GIAC) or other security certification at a similar level.
Experience in cybersecurity or information security systems, (Cisco Firepower, Firewalls, SIEM, EDR and NDR)
Experience with the Security Risk Assessment Tool developed by the Department of Health and Human Services' Office for Civil Rights.
Detail oriented, organized, excellent tracking/reporting skills, effective written and verbal communication.
Demonstrated understanding of business process analysis and how to use information technology to cost-effectively optimize business and clinical work processes.
Must maintain a valid driver's license in accordance with MTN motor vehicle policy. Must have reliable personal automobile transportation to be used with company reimbursement using IRS guidelines. Must be able to travel within the service area by ground or air.
Ability to lift 50 pounds and transfer short distances.
Possess ability to operate telephones, computers and office equipment.
Ability to speak and communicate clearly in order to accurately convey information in person or by phone.
OSHA Category III - No exposure to bloodborne pathogens while performing assigned job duties.
Home internet and wireless phone access may be required.
MTN BEHAVIORAL COMPETENCIES
Belonging: Intentionally connects with colleagues by embracing differences and finding commonalities to create a workplace where all employees feel safe and genuine at work. Models the philosophy that lived experiences make individuals unique by respecting and seeking to understand beliefs, values and opinions that are new or different from their own. Represents through actions and influence, the idea that diverse perspectives make MTN stronger as we serve our mission.
Respect: Builds a positive and supportive foundation inviting open, honest, and clear communication. Fosters a sensitive, supportive, and trustworthy environment, which promotes active listening and strengthens rapport throughout all interactions. Cultivates teamwork through acceptance and inclusion by valuing differences and empowering strengths.
Excellence: Demonstrates excellence by going above and beyond, while maintaining compassion and humility in all interactions. Demonstrates a high rate of achievement and success for the organization through proactive objectives centered on the overall mission and vision. Consistently models a positive attitude, a willingness to help others, and a dedication to improvement. Takes full responsibility for their role and challenges themselves to find workable solutions.
Accountability: Demonstrates the highest ethical standards, by honoring commitments to each other and professional partners. Executes all interactions through honesty and transparency. Demonstrates responsibility and integrity through ownership of the mission. Utilizes resources appropriately.
Leadership: Empowers, mentors and encourages all staff, while displaying a high-level of professionalism. Demonstrates ability to cultivate teams and relationships through open lines of communication, honesty and respect. Handles challenges with compassion by developing trust through respectful feedback and support. Acts as a resource by providing the tools, which enable others to reach their highest potential.
It is the policy of Midwest Transplant Network (MTN) to provide equal opportunity in employment to all employees and applicants for employment. No person will be discriminated against in employment because of race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, ethnic origin, age, genetic information, disability, protected veteran status, arrest record, or any characteristic protected by applicable federal, state or local laws. In addition, the organization complies with applicable state and local laws governing non-discrimination in employment in every location in which the organization has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, training, employee activities and general treatment during employment
MTN is committed to complying with state and federal disability laws and makes reasonable accommodations when requested by a qualified applicant or employee with a disability to enable the applicant or employee to be considered for the position they desire, to perform the essential functions of the position in question, or to enjoy equal benefits and privileges of employment as are enjoyed by other similarly situated employees without disabilities, unless the accommodation would impose an undue hardship on the operation of MTN's mission.