Post job

Security engineer jobs in Rogers, AR - 624 jobs

All
Security Engineer
Information Security Analyst
Cyber Security Analyst
Systems Engineer
Hacker
Information Security Manager
Network Security Architect
Senior Security Analyst
Senior Security & Network Engineer
Senior Information Systems Engineer
SAP Security Consultant
Senior Information Security Analyst
Data Security Analyst
  • Senior SAP Security Consultant

    Fintech Staffing Partners 4.2company rating

    Security engineer job in Saint Louis, MO

    Senior SAP Application Security Configurator (GRC / Security) Duration: 12-month contract Security Requirement: U.S. Citizen with Active Secret Clearance (mandatory) We are seeking a Senior SAP Application Security Configurator to lead and execute SAP User Management and Security activities within a highly regulated environment. This role is hands-on and strategic, responsible for SAP access design, role provisioning, Segregation of Duties (SoD) compliance, and SAP GRC security configuration across the full system lifecycle. The ideal candidate brings deep SAP Application Security and GRC expertise, is comfortable operating in an onsite delivery model, and can lead both technical execution and governance activities while mentoring junior team members. Key Responsibilities Lead SAP User Management (UM) activities, including role creation, access provisioning, audits, and ongoing access maintenance Design, develop, configure, and test SAP GRC security components Perform role design and provisioning aligned with SoD policies, internal controls, and security standards Conduct SoD risk analysis, remediation support, and access reviews Support User Acceptance Testing (UAT), production cutover, and post-go-live hypercare activities Lead role design reviews and ensure proper security documentation and audit readiness Collaborate with functional, technical, and compliance stakeholders to ensure secure system design Mentor junior SAP Security team members and support planning and delivery activities Required Qualifications 8+ years of hands-on SAP Application Security experience Expert-level experience with SAP GRC and SAP role design Strong knowledge of User Access Management, SoD concepts, and compliance controls Experience supporting UAT, go-live, and post-production environments CompTIA Security+ certification U.S. Citizenship with active Secret Clearance (required) Ability to work 100% onsite in St. Louis, MO Preferred Skills Experience supporting SAP security in highly regulated or government-adjacent environments Strong documentation, communication, and stakeholder management skills Experience mentoring or leading junior security resources
    $84k-110k yearly est. 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Information Security Specialist

    Federal Reserve Bank of Kansas City 4.7company rating

    Security engineer job in Kansas City, MO

    CompanyFederal Reserve Bank of Kansas CityWhen you join the Federal Reserve-the nation's central bank-you'll play a key role, collaborating with leading tech professionals to strengthen and protect our economic, financial and payments systems. We invest in contemporary and emerging technology each year to support the Federal Reserve and our economy, and we're building a dynamic and diverse team for our future. Important Information Open to US citizens, Green Card holders or Permanent Residents with at least 3 years of residency, with the intent to become a US citizen. No sponsorship is available. Candidates must have valid work authorization, without an end date, to be considered. This position requires working on-site, in Kansas City, Denver, Oklahoma City, or Omaha, with 5 days per month remote work flexibility. This position is not eligible to be remote and relocation assistance is not available. We are seeking cybersecurity professionals to join our Information Security team as a security specialist focused on operating our DevSecOps program according to standards and policies. This will be done through close partnership with peers in FRB Kansas City and other Reserve Banks across the System. It will also require healthy relationship building and tight integration with development teams. Additionally, you'll partner with business areas, vendors, and our diverse network of professionals to identify, implement, and support security across the organization. Candidates with strong understanding and experience in cloud environment deployments, information security, data management, low-code and no-code solutions, DevSecOps, and artificial intelligence will be ideal. Key Activities Interpret and evaluate policies in order to mature and implement the DevSecOps program. Assess maturity of development teams' DevSecOps practices against an existing framework. Proactively advocate for and drive enhancements into the program. Identify gaps/opportunities for enhancements to workflows and processes for enhancing the software development lifecycle (SDLC). Implement and consults on secure continuous integration and continuous delivery (CI/CD) pipelines, evaluating code and/or applications, or creating code to facilitate the process. Monitors information security policy compliance using security tooling. Evaluate and implement security products and/or processes to enhance productivity and effectiveness for various platforms and initiatives. Provide technical expertise and support to internal teams on security-related matters. Collaborate with cross-functional teams to integrate security measures into existing software applications and infrastructure. Stay current with emerging technologies, industry trends, and best practices in cybersecurity to enhance our security posture. Support leadership decision making through timely analysis and written communications. Qualifications Typically requires 3-6 years of relevant experience. Bachelor's Degree in Technology, Engineering, Computer Science, Information Systems, Cybersecurity or other related field or equivalent work experience. Strong competence in cloud technologies such as AWS, Azure, and other platforms. Expert understanding of DevSecOps practices, frameworks, and tools. Expertise with tool integration for the DevOps pipeline such as Git. Combines and organizes information into meaningful patterns; identifies underlying relationships, causes and effects; and combines pieces of information to form conclusions or general rules. Rapidly acquires new knowledge and learns new skills, and practices agile methodologies to planning and accomplishing work. Conveys complex and technical issues to diverse audiences. Demonstrated competencies with artificial intelligence are beneficial. Working knowledge of Terraform, Ansible, Cloud Formations, AWS Config, AWS Inspector, Guard Duty and others. Strong knowledge of software development languages, tools and techniques such as Python, JSON, YAML, and Java Technical expertise in security tools and knowledge of security practices and procedures. A learning mindset, proactiveness, collaboration, and strong attention to detail. Additional Information How We Work (HWW): On-site: 5 days per month remote work flexibility Locations: Kansas City, Denver, Oklahoma City, Omaha Remote Eligible: No Relocation Assistance: No Salary: $79,100 - $111,500 / Experienced Level $98,600 - $139,000 / Senior Level Final offers are determined by factors including the candidate's qualifications, internal alignment considerations, district assignment, and geographic location. Screening: US citizens, permanent residents with the intent to become a US citizen with at least three or more years of United States residency from the date of legal entry to the United States is required for this position.This position has additional screening requirements due to the information accessed while performing the job. These additional screenings would be initiated at the time of offer acceptance and can take up to a couple of months to be completed. You can begin work before the screening is completed; however, continued employment is contingent on acceptable screening results. The areas screened may include education/employment verification, criminal history, credit history, and reference checks. Sponsorship: The Federal Reserve Bank of Kansas City will not sponsor a new applicant for employment authorization for this position. Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future. About Us Total Rewards & Benefits Who We Are What We Do Follow us on LinkedIn , Instagram, X (formerly Twitter) , and YouTube #KCFedIT Full Time / Part TimeFull time Regular / TemporaryRegularJob Exempt (Yes / No) YesJob CategoryInformation Technology Family GroupWork ShiftFirst (United States of America) The Federal Reserve Banks are committed to equal employment opportunity for employees and job applicants in compliance with applicable law and to an environment where employees are valued for their differences. Always verify and apply to jobs on Federal Reserve System Careers (FRS) or through verified Federal Reserve Bank social media channels. Privacy Notice
    $98.6k-139k yearly 2d ago
  • Senior Information Security Analyst

    Hctec 4.3company rating

    Security engineer job in Tulsa, OK

    Title: Sr Information Security Analyst Salary: $100K Job Summary: As a member of the Information Security team, responsibilities include manages and mitigates information security risk by identifying, evaluating, assessing, designing, monitoring, administering, reporting and implementing systems, policies and processes. Provides information security risk insight and guides management on information security risk issues and serves as advisor to peers, team members and management. Minimum Education: Bachelor's degree in Computer Science, MIS, Computer Engineering, Cyber Security or related discipline. Licensure, Registration and/or Certification: One or more of the following certifications are preferred: Certified Information Systems Security Professional (CISSP) Certified in Risk and Information Systems Control (CRISC) Certified Information Systems Auditor (CISA). Work Experience: 3 - 4 years related experience inclusive of two years working directly in an Information Services department and previous experience with HIPAA/PHI compliance programs, policies, procedures, risk assessments and audits. Knowledge, Skills and Abilities: In-depth knowledge of cyber security methodology and security practices. Knowledge of HIPAA, PCI, SOX, ISO and NIST cybersecurity frameworks. Knowledge of intrusion detection and intrusion prevention systems, penetration and vulnerability testing. Knowledge of data loss prevention, anti-virus and anti-malware software tools. Knowledge of computer networking, TCP/IP, routing and switching, network protocols and packet analysis tools. Knowledge of Windows, UNIX and Linux operating systems. Excellent problem solving and analytical skills. Excellent written and oral communication skills. Excellent organizational and interpersonal skills. Ability to work independently as well as in a team setting. Essential Functions and Responsibilities: Define, implement, and enforce information security policies, strategies, and procedures that align with healthcare laws and regulations, such as HIPAA. Conduct and/or support targeted risk assessment. Determine significant risk points and exercise process for risk assessment and risk acceptance. Review assessment results for vulnerabilities, gaps, control deficiencies, and work with key stakeholders to establish plans for sustainable resolution. Maintain an effective information security awareness program and educate internal teams on best practices. Ensures that business and clinical software applications include adequate information and security controls. Establish and maintain metrics based on the information security framework..
    $100k yearly 1d ago
  • Air Dominance Systems Engineer (Product Manager) (Senior or Consultant)

    Boeing 4.6company rating

    Security engineer job in Saint Louis, MO

    At Boeing, we innovate and collaborate to make the world a better place. We're committed to fostering an environment for every teammate that's welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us. We are Boeing Global Services (BGS) Engineering team creating and implementing innovative technologies that make the impossible possible and enabling the future of aerospace. We provide engineering design and support, including aftermarket modifications, and are innovating to make product and services safety even stronger. Join us and put your passion, determination, and skill to work building the future! #TheFutureIsBuiltHere #ChangeTheWorld BGS is currently seeking to hire an Air Dominance Systems Engineer (Product Manager): F-15 USAF Government Training Engineering (GTE) Product Manager located in Berkeley, Missouri or Hazelwood, Missouri. The selected candidate will join the GTE F-15 USAF Office of the Chief Engineer (OCE) and will be responsible for the design, development, manufacture, integration, testing, delivery and maintenance of pilot and maintenance training devices for a program in the F-15 USAF portfolio. The Air Dominance Systems Engineer (Product Manager) is responsible for managing the entire product life cycle across all engineering teams required to produce the final product. Your role includes project management, technical leadership and a strong desire to get the job done. You will be collaborating with the engineering teams and program management to maintain a common vision and deliver winning products. Our teams are currently hiring for a broad range of experience levels including; Senior or ConsultantAir Dominance Systems Engineer (Product Manager). Special Program Access or other Government Access Requirements may be required for this position. Position Responsibilities: Primary point of contact for all engineering aspects of the product Collaborate with the technical leadership team consisting of Chief engineers, system architects and other product managers Manage product release schedules and release activities Define plans for risk mitigation and opportunity Play an integral role in the development of the Statement of Work (SOW) and estimates to meet the requirements of our customers Coordinate with program management and engineering teams to develop and maintain execution plans Track execution progress and provide guidance for adjustments where necessary Work with the supplier management team to monitor and track supplier performance Identify risks, issues, and opportunities, and develop mitigation or execution plans Ensure the product is complete prior to delivering to the customer Basic Qualifications (Required Skills/Experience): Bachelor of Science degree from an accredited course of study in engineering, engineering technology (includes manufacturing engineering technology), chemistry, physics, mathematics, data science, or computer science 9+ years of industry experience to include: 3+ years of experience leading teams in a formal and/or informal role and 5+ years of experience in engineering project management Experience developing and tracking program plans/schedules and budgets for technical projects Preferred Qualifications (Desired Skills/Experience): 14 or more years' related work experience or an equivalent combination of education and experience 5+ years of experience leading teams in a formal and/or informal role 7+ years of experience in engineering project management Cost account management and/or earned value management experience Risk management experience Proficient with Excel, Work, PowerPoint Experience with Microsoft Project Experience with Training Systems and/or Boeing military aircraft platforms Experience working within a SAFe Agile team Drug Free Workplace: Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies. Pay & Benefits: At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities. The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work. The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements. Pay is based upon candidate experience and qualifications, as well as market and business considerations. Summary pay range Senior (Level 4): $119,850 - $162,150 Summary pay range Consultant (Level 5): $147,050 - $198,950 Experience, qualification, and soft skills, have you got everything required to succeed in this opportunity Find out below. Applications for this position will be accepted until Jan. 27, 2026 Export Control Requirements: This position must meet U.S. export control compliance requirements. To meet U.S. export control compliance requirements, a "U.S. Person" as defined by 22 C.F.R. §120.62 is required. "U.S. Person" includes U.S. Citizen, U.S. National, lawful permanent resident, refugee, or asylee. Export Control Details: US based job, US Person required Education Bachelor's Degree or Equivalent Required Relocation This position offers relocation based on candidate eligibility. Security Clearance This position requires the ability to obtain a U.S. Security Clearance for which the U.S. Government requires U.S. Citizenship. An interim and/or final U.S. Secret Clearance Post-Start is required. This position requires ability to obtain program access, for which the U.S. Government requires U.S. Citizenship only. Visa Sponsorship Employer will not sponsor applicants for employment visa status. xevrcyc Shift This position is for 1st shift Equal Opportunity Employer: Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
    $61k-80k yearly est. 1d ago
  • Mid-Level Systems Engineer

    Leidos 4.7company rating

    Security engineer job in Saint Louis, MO

    Leidos National Security Sector combines technology-enabled services and mission software capabilities in the areas of cyber, logistics, security operations, and decision analytics to support our defense and intel customers' mission to defend against evolving threats around the world. Our team's focus is to ensure our customers have the right tools, technologies, and tactics to keep pace with an ever-evolving security landscape and succeed in their pursuit to protect people and critical assets. The Intelligence Production Solutions Division (IPSD), part of the Decision Advantage Solutions Business Area, is currently seeking a Mid-Level Systems Engineer for the Chinook Program. As part of a highly skilled team, you will play a critical role in delivering geospatial intelligence (GEOINT) capabilities through innovative systems engineering practices, directly supporting the Customer's mission to provide timely, relevant, and accurate intelligence to national decision-makers and warfighters. Position may be performed in the following locations below. Please note Gaithersburg, MD is the program's primary work location. Gaithersburg, MD Alexandria, VA Chantilly, VA Aurora, CO St. Louis, MO Tucson, AZ Clearance Level Required: Top Secret with SCI eligibility and able to obtain a Polygraph. Primary Responsibilities: Support system architecture design, requirements development, integration planning, and configuration management. Provide engineering expertise for mission systems across the full system lifecycle from concept through deployment and sustainment. Collaborate with stakeholders across the Customer's and contractor teams to ensure interoperability, scalability, and mission alignment. Evaluate and recommend tools, techniques, and processes for system development and integration. Develop and maintain technical documentation, including system interface control documents (ICDs), and engineering reports. Participate in technical reviews, readiness assessments, and milestone events. Conduct analysis of system performance and provide recommendations for optimization. Basic Qualifications: US citizenship is required per contract. Bachelor's degree in Systems Engineering, Computer Science, or related field and 4-8 years of prior relevant experience or Master's with 2-6 years of prior relevant experience. Strong understanding of systems engineering principles, including requirements management, integration & test, and configuration control. Familiarity with Model-Based Systems Engineering (MBSE) tools and methodologies (e.g., Cameo, Sysml). Experience working in a DoD or Intelligence Community (IC) environment. Proficiency with Atlassian tools (JIRA, Confluence), Microsoft Office Suite, and collaboration platforms. Excellent written and verbal communication skills. Preferred Qualifications: Systems Engineering Professional (SEP), INCOSE, CISSP, Security+ certification, or similar credentials. Experience supporting the Customer's programs or working with the GEOINT lifecycle. Knowledge of cloud-based architectures (AWS, C2S) and DevSecOps environments. Familiarity with Agile and SAFe methodologies. Experience supporting GEOINT missions. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Original Posting: November 21, 2025 For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above. Pay Range: $87,100.00 - $157,450.00 The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. About Leidos Leidos is an industry and technology leader serving government and commercial customers with smarter, more efficient digital and mission innovations. Headquartered in Reston, Virginia, with 47,000 global employees, Leidos reported annual revenues of approximately $16.7 billion for the fiscal year ended January 3, 2025. For more information, visit *************** Pay and Benefits Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available at ************************************ Securing Your Data Beware of fake employment opportunities using Leidos' name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system - never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at *****************************. If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws. #J-18808-Ljbffr
    $87.1k-157.5k yearly 3d ago
  • (USA) Principal, Application Security Engineer

    Walmart 4.6company rating

    Security engineer job in Bentonville, AR

    The Principal, Application Security Engineer leads the design and implementation of advanced security practices to safeguard applications across multiple platforms. This role involves identifying vulnerabilities, guiding secure coding standards, and integrating security controls within development lifecycles. The position requires collaboration with cross-functional teams to align security solutions with business objectives while mentoring associates and promoting continuous improvement. The ideal candidate demonstrates expertise in risk assessment, threat modeling, and secure architecture, driving innovation to enhance organizational resilience against evolving cyber threats. This leadership role supports the delivery of secure, scalable, and compliant software solutions. About the team: The AI Security Team within Information Security integrates cybersecurity, data science, and governance to enhance organizational protection and secure AI systems. The team designs and implements advanced security architectures, ensuring robust infrastructure and application security aligned with industry standards. Collaborating across domains, they develop scalable, resilient solutions addressing evolving security challenges. Combining expertise in systems engineering, security technology, and infrastructure management, the team drives innovation and maintains the integrity of critical systems that support Walmart's business objectives.What you'll do... Develop and promote repeatable secure development practices aligned with security frameworks and standards. Identify vulnerability trends and systemic issues to enhance application security controls. Provide guidance and mentorship to team members on secure coding and security testing techniques. Analyze requirements and prioritize product features to align with business objectives and risk assessments. Collaborate with cross-functional teams to integrate advanced secure software capabilities into existing systems. Design and validate architecture blueprints ensuring scalability, performance, and security compliance. Lead cyber risk assessment activities and recommend mitigation strategies for emerging threats. Monitor applications in production and oversee development of security patches and updates. What you'll bring: Extensive knowledge of application security principles, including confidentiality, integrity, identity management, and availability. Proficiency in secure coding frameworks, security testing techniques, and vulnerability assessments. Experience with risk frameworks, threat modeling, and implementation of security controls. Strong understanding of data security, cloud services, and Generative AI systems security. Ability to analyze requirements, perform risk analysis, and align security solutions with business objectives. Proven skills in mentoring teams and integrating advanced secure software capabilities. Familiarity with architectural principles and designing scalable, secure system architectures. Expertise in coding languages (Python) and security testing methodologies to ensure robust application security. At Walmart, we offer competitive pay as well as performance-based bonus awards and other great benefits for a happier mind, body, and wallet. Health benefits include medical, vision and dental coverage. Financial benefits include 401(k), stock purchase and company-paid life insurance. Paid time off benefits include PTO (including sick leave), parental leave, family care leave, bereavement, jury duty, and voting. Other benefits include short-term and long-term disability, company discounts, Military Leave Pay, adoption and surrogacy expense reimbursement, and more. You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable. For information about PTO, see ******************************** Live Better U is a Walmart-paid education benefit program for full-time and part-time associates in Walmart and Sam's Club facilities. Programs range from high school completion to bachelor's degrees, including English Language Learning and short-form certificates. Tuition, books, and fees are completely paid for by Walmart. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms. For information about benefits and eligibility, see One.Walmart. The annual salary range for this position is $110,000.00 - $220,000.00 Additional compensation includes annual or quarterly performance bonuses. Additional compensation for certain positions may also include : - Stock ㅤ ㅤ ㅤ ㅤ Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications. Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 5 years' experience in application security, or related area at a technology, retail, or data-driven company. Option 2: 7 years' experience in application security, or related area at a technology, retail, or data-driven company.Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications. Certification in Security+, GISF, CISSP, CSSP, CASE, or GWEB, Master's degree in Computer Science, Information Technology, Engineering, Information Systems, Cybersecurity, or related area and 3 years' Exposure of leading/ working on Information Security / Cyber Security Projects, We value candidates with a background in creating inclusive digital experiences, demonstrating knowledge in implementing Web Content Accessibility Guidelines (WCAG) 2.2 AA standards, assistive technologies, and integrating digital accessibility seamlessly. The ideal candidate would have knowledge of accessibility best practices and join us as we continue to create accessible products and services following Walmart's accessibility standards and guidelines for supporting an inclusive culture.Primary Location...805 Se Moberly Ln, Bentonville, AR 72712, United States of AmericaWalmart and its subsidiaries are committed to maintaining a drug-free workplace and has a no tolerance policy regarding the use of illegal drugs and alcohol on the job. This policy applies to all employees and aims to create a safe and productive work environment.
    $110k-220k yearly Auto-Apply 1d ago
  • Manager of Information Security

    Shook, Hardy & Bacon 4.9company rating

    Security engineer job in Kansas City, MO

    Oversees and coordinates all information security staff and activities to ensure the firm's overall information assets are adequately protected. Oversees the planning, coordinating and implementing of information security programs in order to maintain information integrity and protect against all cybersecurity threats. Interacts with other individuals in the firm in a problem-solving and team-building manner. Oversees, develops and maintains the Firm's ISO 27001 Program, and operation objectives. Manages the development and cost effective solutions to maintain the integrity of system information while allowing business operations to continue in the event of any type of business interruption. Assists in audits of the Information Security program as needed at the request of management. Uses leadership skills to train, motivate and direct assigned staff. Provides technical expertise in the selection, testing, implementation and deployment of information security systems. Provides technical guidance and direction in information security monitoring, assessment, auditing and testing. Defines, develops and implements the firm's Information Protection Program security policy. Works with the Director of Information Security and Risk Management to develop methods of improving department workflow, customer satisfaction and employee efficiency. Assists in determining department work procedures, plans, assigns and directs work as necessary. Monitors employee workflow and makes adjustments as necessary to ensure customers' needs are addressed in a timely and efficient manner. Monitors and audits analyst(s) work product, reviews and communicate results with employee and provides advice. Coordinates training of staff to ensure work meets/exceeds performance expectations within a reasonable time frame. Oversees department projects, ensuring that procedures are followed and objectives are accomplished according to schedule. Responsible for conducting, coordinating, testing, implementing, deploying, and operational maintenance of all information security systems, applications, appliances and devices throughout the firm. Responsible for assessing, recommending, developing, implementing and maintaining the firm's information security infrastructure and security standards. Lead for security risk assessments and penetration studies of networks. Recommends solutions for security vulnerabilities and takes corrective measures and/or applies security patches when appropriate. Installs, monitors, maintains and upgrades virus detection applications/tools to ensure computer codes, viruses, and worms are blocked or eradicated when detected. Analyzes problematic security log entries from security servers and routers, provides technical solutions to issues and security breaches. Is on call to respond to security incidents or disaster recovery and business continuity operations. Maintains advanced knowledge of the firm's Information Security posture, goals and objectives. Supervises the Information Security Engineers. Is responsible for the overall direction, coordination, and evaluation of designated employees in this category. Carries out supervisory responsibilities in accordance with the organization's policies and applicable laws. Responsibilities include interviewing, hiring, and training employees; planning, assigning, and directing work; appraising performance; rewarding, coaching, and disciplining employees; addressing complaints and resolving problems.
    $118k-154k yearly est. 6h ago
  • Cyber Security Operations Analyst

    Explorer Pipeline Corporation 4.1company rating

    Security engineer job in Tulsa, OK

    The Cyber Security Operations Analyst is primarily responsible for monitoring the front lines of the company's cyber defense program, helping to protect critical systems and data from potential threats, responding to reported security violations, analyzing internet access, connectivity and threats (virus protection, spam, etc.) DUTIES AND RESPONSIBILITIES The following represents the majority of the duties performed by the position but is not meant to be all-inclusive nor prevent other duties from being assigned when necessary. 1. Complies with DOT and OSHA health, safety and environmental requirements and follows safety philosophy and procedures developed by the Company including: applicable environmental, health and safety rules, procedures, and accepted safe work practices, the use of appropriate personal protective equipment and safety systems, and the reporting of workplace hazards and injury or illness arising from workplace activities; observes the workplace to identify conditions or behaviors that should be corrected and takes appropriate action. 2. Monitors Security Information and Event Management (SIEM) alerts, firewall logs, intrusion detection systems, and network activity for suspicious behavior including public and private threat intelligence sources for emerging risks; analyzes internet access, connectivity logs, and alerts related to virus protection, spam, and suspicious behavior including user account activity providing reports on potential anomalies. 3. Conducts daily security log reviews and assists in identifying potential threats; summarizes and shares relevant alerts with the cybersecurity team. 4. Monitors incoming security tickets and alerts; documents and triages security incidents, escalating to senior analysts as needed; assists with evidence collection and incident tracking. 5. Performs scheduled vulnerability scans, analyzes findings, and maintains remediation tracking logs; assists with patch management processes including deployment, tracking, and reporting. 6. Assists with internal and external audits by collecting necessary documentation and evidence. 7. Maintains regulatory compliance documentation as required by TSA, DOT, O SHA, etc.; creates and updates procedural documents, runbooks, security playbooks, and knowledge base articles. 8. Documents all incidents, assessments, and routine checks to support audit readiness and knowledge transfer; manages project tracking logs. 9. Assists with the configuration and maintenance of endpoint protection, firewall settings, and other cybersecurity tools under guidance. 10. Reviews vendor solutions and compiles initial summaries for team consideration; maintains security-related inventories, software licenses, and access lists. 11. Assists with development and dissemination of basic cybersecurity awareness content for end users; tracks completion of required security training and assists with scheduling refresher sessions. 12. Participates in a scheduled on-call rotation for after-hours and weekend security support. REQUIREMENTS * Associate's degree or the equivalent in experience in Cyber Security, Information Technology or related field and a minimum of two (2) years of prior experience in cybersecurity, IT support, or SOC environment. Internship or hands-on training in networking, firewalls, or security systems preferred. Certification such as CompTIA Security+, CASP+, or CEH (preferred or in progress). Knowledge, Skills and Abilities * Ability to actively engage in safe behavior and understand and follow the principles and methods related to pipeline and workplace safety as established by the Company. * Knowledge of emergency and safety procedures, policies procedures, equipment operating parameters, and all applicable DOT, EPA, FERC, DHS, and OSHA requirements. * Knowledge of Active Directory, Exchange, SharePoint, CISCO routing and switching configuration. * Knowledge of firewall and network security and IDS (intrusion detection systems), and network management tools. * Knowledge of TSA security requirements and regulations. * Knowledge of identity management processes and procedures. * Skill in project management. * Ability to manage, track and analyze information. * Ability to effectively work and cooperate with supervisors, co-workers, and vendors. * Ability to follow corporate policies and the directions of supervisors. * Ability to refrain from causing or contributing to the disruption of the workplace.
    $87k-113k yearly est. 6d ago
  • PCI Security Analyst, Senior

    Jack Henry & Associates Inc. 4.6company rating

    Security engineer job in Monett, MO

    At Jack Henry, we're more than a technology company, we're a force for good in financial services. We're redefining how community banks and credit unions connect with the people they serve. Our mission is rooted in people inspired innovation, empowering financial institutions to deliver seamless, secure, and human centered experiences. We deliver cutting-edge solutions that are paving the way for the next generation of digital banking and payments, but our true impact begins with our associates. If you're ready to help transform an industry and grow with a company that values purpose, collaboration, and excellence then we'd love to meet you. We are seeking a highly skilled PCI Security Analyst to join our team. The analyst is responsible for ensuring organizational compliance with the Payment Card Industry Data Security Standard (PCI DSS) and related cybersecurity requirements. This role involves conducting compliance assessments, managing audits, implementing security controls, and mitigating risks associated with payment card data. This position offers remote flexibility within a 70-mile radius of our office locations in Allen, TX; Lenexa, KS; Springfield, MO; or Monett, MO. The salary range for this position is $110,000- $125,000 and will be determined based on location and experience level. All positions, regardless of location, may require an onsite interview or in-person onboarding requirement to verify your identity. What you'll be responsible for: * Conducts PCI DSS compliance assessments to identify gaps and risks supporting ongoing security and compliance. * Develops, implements, and maintains PCI-related security policies, standards, and procedures to ensure consistent protection of cardholder data. * Monitors and validates compliance with PCI DSS requirements across systems and processes to maintain regulatory adherence. * Executes comprehensive validation of PCI DSS scope across enterprise environments, ensuring accurate identification and classification of in-scope systems, applications, and data flows. * Collaborates with cross-functional teams to assess segmentation controls, cardholder data locations, and business processes to confirm scope boundaries align with PCI DSS requirements. * Documents scope rationale and provide evidence-based recommendations to reduce scope where feasible, while maintaining compliance integrity. * Validates vulnerability assessments and penetration testing to ensure secure configurations. * Validates encryption, key management, and secure transmission of cardholder data to protect sensitive information. * Supports incident response and forensic investigations involving payment card data to enable rapid resolution. * May perform other job duties as assigned. What you'll need to have: * Minimum of 6 years of experience in a PCI DSS compliance role. * At least one relevant certification (e.g., PCIP, QSA, CISSP, ISA) is required. What would be nice for you to have: * A senior level professional with in-depth body of knowledge, experience and expertise with the ability to resolve complex issues. * Excellent understanding of PCI DSS requirements and security frameworks (e.g., PCI 4.x, NIST, ISO 27001). * Strong knowledge of network security, encryption, and secure system configurations. * Strong technical expertise in network security, encryption, vulnerability management, and secure system design. * Strong risk management capabilities including the ability to identify, assess, and mitigate compliance and security risks within payment card environments * Demonstrated proficiency using compliance management platforms (e.g., Archer, Qualys, Trustwave), SIEM, and vulnerability scanning tools to support PCI DSS compliance and cybersecurity initiatives. If you got this far, we hope you're feeling excited about this opportunity. Even if you don't feel you meet every single requirement on this posting, we still encourage you to apply. We're looking for passionate, driven individuals who align with our mission and can bring unique perspectives to our team. Why Jack Henry? At Jack Henry, we live by the motto: "Do the right thing, do whatever it takes, and have fun." It's more than a tagline, it's the foundation of our culture. We recognize that our associates are the key to our success, and we're deeply committed to their wellbeing. That's why we offer comprehensive benefits designed to support your physical, mental, and financial health so you can thrive both personally and professionally. We're also leading the way in technology modernization, helping financial institutions evolve with speed, security, and flexibility. Our strategy focuses on delivering secure data access, mitigating fraud, and enabling seamless integration. Empowering our teams to build innovative solutions that meet the evolving needs of accountholders. Culture of Commitment Ask our associates why they love Jack Henry, and many will tell you it is because our culture is exceptional. We do great things together. Our culture empowers us to rise to challenges, seek new opportunities, and support one another through change. It's this shared commitment that drives our success. We're proud to foster an environment where inclusion, sustainability, and community impact are more than values, they're how we operate. Visit our Corporate Sustainability site to learn more about our culture and commitment to our people, customers, community, environment, and shareholders. Equal Employment Opportunity At Jack Henry, we know we are better together. We value, respect, and protect the uniqueness each of us brings. Innovation flourishes by including all voices and makes our business - and our society - stronger. Jack Henry is an equal opportunity employer and we are committed to providing equal opportunity in all of our employment practices, including selection, hiring, performance management, promotion, transfer, compensation, benefits, education, training, social, and recreational activities to all persons regardless of race, religious creed, color, national origin, ancestry, physical disability, mental disability, genetic information, pregnancy, marital status, sex, gender, gender identity, gender expression, age, sexual orientation, and military and veteran status, or any other protected status protected by local, state or federal law. No one will be subject to, and Jack Henry prohibits, any form of discipline, reprisal, intimidation, or retaliation for good faith reports or complaints of discrimination of any kind, pursuing any discrimination claim, or cooperating in related investigations. Requests for full corporate job descriptions may be requested through the interview process at any time.
    $110k-125k yearly 16d ago
  • Ethical Hacker - Overland Park, KS ( Only Citizens )

    Info-Ways

    Security engineer job in Overland Park, KS

    Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks o BruteForce attacks o Account Takeover o Data Breaches 3. Identify and Remediate currently exploited vulnerabilities: o Determine abuse tactics used by fraudsters o Put in quick remediation efforts by webserver blocks or code update o Re-test and validate long term fix 4. Request and evaluate application vulnerability scans: o Work directly with corp sec to initiate scans o Analyze the results and perform or provide recommended fix to impacted party o Provide data and reports to IT compliance/auditors 5. Support .com web application firewalls o Monitor/Manage/Configure security on .com webservers o Work with network team to configure and evaluate F5 security modules Perform coding changes in .com applications as needed Please respond with your word resume and requested details: Full Name : Work Authorization: Contact Number : Email ID : Skype ID: Current location: Willing to relocate : Rate/hr : Additional Information All your information will be kept confidential according to EEO guidelines.
    $62k-97k yearly est. 60d+ ago
  • Ethical Hacker - Overland Park, KS ( Only Citizens )

    Info. Services Inc. 4.2company rating

    Security engineer job in Overland Park, KS

    Role: Ethical Hacker Duration: 6+ Months BGV will be done for the selected candidates. 1. Actively hack the sprint.com website with a fraudster mindset: 2. Perform url manipulation o Break process flow to bypass security/business checks o BruteForce attacks o Account Takeover o Data Breaches 3. Identify and Remediate currently exploited vulnerabilities: o Determine abuse tactics used by fraudsters o Put in quick remediation efforts by webserver blocks or code update o Re-test and validate long term fix 4. Request and evaluate application vulnerability scans: o Work directly with corp sec to initiate scans o Analyze the results and perform or provide recommended fix to impacted party o Provide data and reports to IT compliance/auditors 5. Support .com web application firewalls o Monitor/Manage/Configure security on .com webservers o Work with network team to configure and evaluate F5 security modules Perform coding changes in .com applications as needed Please respond with your word resume and requested details: Full Name : Work Authorization: Contact Number : Email ID : Skype ID: Current location: Willing to relocate : Rate/hr : Additional Information All your information will be kept confidential according to EEO guidelines.
    $64k-91k yearly est. 2d ago
  • Network and Security Services Solutions Architect*

    Accenture 4.7company rating

    Security engineer job in Bentonville, AR

    We Are: Navisite, part of Accenture, has evolved to become a trusted digital transformation partner for growing and established global brands. We provide global capabilities, customer-centric solutions, and flexible approaches that are specifically rightsized for the needs of mid-market and small enterprise customers. This team specializes in digital transformation and managed services with deep expertise in cloud, infrastructure and application services dedicated to assisting clients in building a strong digital core. With experience across multiple cloud providers, enterprise applications and digital technologies, Navisite serves clients in the health and industrial, life sciences, technology, consumer goods and retail industries. Given their customer-centric solutions and flexible approaches, this team is adept at scaling our services for clients seeking to modernize and build more agile, resilient, and scalable businesses. The Navisite team of more than 1,400 members globally joined Accenture in January 2024. As part of Accenture, you will be working with an ambitious, collaborative team more empowered than ever to help customers modernize their IT for the AI era. You Are: An Enterprise Solution Architect with deep expertise in network architecture and cybersecurity who can translate complex requirements into clear, value‑led solutions. You engage confidently with C‑level executives and technical stakeholders, simplify risk and resilience decisions, and shape architectures that are secure, scalable, and compliant. As a Presales Solution Architect specializing in Security and Network, you will serve as the technical expert and trusted advisor during the sales process, designing secure, scalable, and compliant network and cybersecurity solutions tailored to customer needs and business objectives. You will collaborate closely with sales, engineering, product management, and customers (including C‑suite) to qualify opportunities, develop solution architectures, lead technical presentations/demonstrations, and ensure successful transition to delivery. The Work: You operate as a Solution Architect across opportunities from targeted upgrades to large multi‑tower managed services deals spanning enterprise networking (LAN/WAN/WLAN, SD‑WAN, cloud networking) and security stacks (NGFW, VPN/ZTNA/SASE, IDS/IPS, SIEM/XDR/SOAR, identity‑centric and Zero‑Trust models). You will co‑create solutions with clients; define operating models, SLAs, and KPIs; and align proposals to compliance frameworks and enterprise governance. Lead Pre‑Sales Architecture & Solutioning: * Design and articulate high‑level network and cybersecurity architectures that align with customer requirements, compliance standards, and enterprise IT strategies. * Define reference designs for SD‑WAN/SASE/Zero‑Trust, cloud networking (Azure/AWS/GCP), segmentation, firewalls, and secure remote access. * Build delivery models (operate, enhance, transform) with clear SLAs, KPIs, RACI, and transition plans. Qualify & Propose: * Collaborate with sales stakeholders to qualify opportunities and craft compelling technical proposals addressing risk, security posture, and network resilience. * Shape solution scope, assumptions, dependencies, and pricing inputs; contribute to SOWs and commercial terms with Legal/Commercial. Client Engagements & Demonstrations: * Lead client engagements, including technical demonstrations, proofs of concept, pilots, and security assessments to evidence value and feasibility. * Present architecture rationale, trade‑offs, and value realization to IT leadership, CISOs, and business executives. Trusted Advisory & Best Practices: * Advise customers on security best practices, emerging threats, network modernization, and resilience improvements. * Recommend controls and operating models aligned to ITIL, Zero‑Trust, and defense‑in‑depth principles. Technology Mastery: * Develop and maintain deep understanding of technologies such as firewalls, VPN/ZTNA, IDS/IPS, SIEM, XDR, SOAR, cloud security platforms, network observability, and automation. Compliance, Governance & Risk: * Ensure proposals meet enterprise security governance and regulatory compliance, including risk‑management frameworks and certifications relevant to customer environments (NIST, ISO 27001, PCI, SOC 2, FedRAMP, GDPR, etc.). * Lead internal Technology Delivery sign‑off aligning scope, risks, commercials, and feasibility. Cross‑Functional Handover & Delivery Readiness: * Partner with engineering, delivery, and product teams to ensure smooth handover, readiness, and successful implementation. * Where appropriate, support early deal stabilization to de‑risk transition. Thought Leadership: * Stay updated on industry trends, threat landscapes, and vendor roadmaps to continuously innovate offerings. * Support technical training, marketing presentations, and participation in industry events. Travel may range from 0% to 100% depending on deal stage, client discussions, and business need Qualification Here's what you need: * Minimum 8 years in a technology environment, specifically in a Network and Cybersecurity capacity * Minimum 5 years in solution planning, deal shaping, presales engineering, or enterprise solution architecture. * Minimum of 2 years of hands‑on experience and knowledge of network architectures (LAN/WAN, SD‑WAN/SDN, cloud networking) and security technologies: firewalls (Palo Alto, Cisco, Fortinet, Check Point), endpoint protection, IDS/IPS, SIEM/XDR/SOAR, ZTNA/SASE, VPN, and cloud security controls. * Understanding and familiarity with security frameworks and compliance standards (e.g., NIST, ISO 27001, FedRAMP, GDPR) and experience navigating customer accreditation processes. * Bachelor's degree or equivalent (12 years of work experience). If Associate's Degree: 6 years minimum relevant experience required Bonus Points if: * You have relevant certifications (one or more preferred): CISSP, CCNP Security/CCIE Security, PCNSE, NSE, AZ‑500/AZ‑700, AWS Security/Specialty, GSEC/GCIH/GCIA. * You have experience designing Zero‑Trust, SASE, micro‑segmentation, and cloud‑native security architectures; familiarity with automation/orchestration (Terraform, Ansible, Python). * You have strong understanding of ITIL service operations and managed‑service delivery models. Compensation at Accenture varies depending on a wide array of factors, which may include but are not limited to the specific office location, role, skill set, and level of experience. As required by local law, Accenture provides a reasonable range of compensation for roles that may be hired as set forth below. We accept applications on an on-going basis and there is no fixed deadline to apply. Information on benefits is here. Role Location Annual Salary Range California $73,800 to $218,800 Cleveland $68,300 to $175,000 Colorado $73,800 to $189,000 District of Columbia $78,500 to $201,300 Illinois $68,300 to $189,000 Maryland $73,800 to $189,000 Massachusetts $73,800 to $201,300 Minnesota $73,800 to $189,000 New York/New Jersey $68,300 to $218,800 Washington $78,500 to $201,300 Locations
    $78.5k-201.3k yearly 8d ago
  • Cyber Threat Analyst

    Fortiphi

    Security engineer job in Oklahoma City, OK

    **Job Opportunity is actually with a company called Western Farmers Electric Cooperative (WFEC)** Under the general supervision of the Supervisor, IT Infrastructure, the Cyber Threat Analyst performs monitoring and analysis of cyber threats to assist in the defense of WFEC cyber systems and operations. The incumbent will curate and triage intelligence from multiple cyber intelligence sources and will inform the security operations with timely and relevant TTPs, IOCs, and context. The incumbent will generate reports for upper management based on data, information, and intelligence. The incumbent must understand the MITRE ATT&CK framework and be able to integrate the framework in the reporting. The Cyber Threat Analyst will develop and document threat hunt activities based on intelligence, scenarios, and observations. The incumbent develops, maintains, and supports systems that provide collection capabilities and telemetry information to the organization. In addition, the incumbent performs troubleshooting, installation, and maintenance on equipment and software systems related to NERC CIP. The incumbent performs change management and configuration activities, security controls testing, system baseline activities, vulnerability testing and analysis, and network traffic analysis to ensure system reliability and security. The incumbent participates in in-house, regulatory, and industry teams, including working groups, committees, incident response teams, and business continuity teams as required. Also, the incumbent participates in exercises that test policies, procedures, and skills which are required by business and critical operations. The incumbent responds to anomalous events that will require analysis and will have to synthesize and correlate complex events to ensure operational security.
    $65k-88k yearly est. 60d+ ago
  • Cyber Security Training

    Learnkwik.com

    Security engineer job in Kansas City, MO

    Kanshe Infotech is Consulting Firm Which Provides World online training. Online Training (Remote Training + Real-time exp) available. Our training is more than just hours of lecture, we believe in student engagement, motivation and knowledge sharing as tools for success and we do it with great dedication and precision. We offer online training that clearly stands out of the group, sign up for a demo session. Job Description Our Training Features: · You will receive top quality instruction that Kanshe Infotech is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $65k-87k yearly est. 2d ago
  • CI Cyber Threat Analyst IV

    Techguard Security 3.6company rating

    Security engineer job in Saint Louis, MO

    Assignment Overview: The senior Contractor CI Cyber Threat Analyst will ensure all required reports are complete with minimal errors and that all processes, activities, and reports are conducted within established time frames. will also ensure analysts are trained in and follow current standard operating procedures. They will contribute to the following annual production requirements: Duties: Produce weekly actionable Technical CI (Cyber) status reports in collaboration with teammates, NGA partners and intelligence community peers, as necessary. Provide relevant input for the CI Cyber Branch to create 36 weekly cyber status reports, each report due NLT 0800 each Monday morning. Status reports will include (as applicable): Threat data collected and reported by NGA Technical CI team and network security personnel. Intelligence reported by the Intelligence Community. Fusion of all source threat analysis derived from multiple intelligence sources (INTs). Imagery when available. Information that can be used to inform security decisions. Produce monthly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide a monthly threat report for the months not falling on the quarterly report month or the annual report month. Provide relevant input for the CI Cyber Branch to create 8 monthly reports, each report due NLT 5th day of each applicable month. Threat reports should include: Compilation of data collected and reported in weekly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decision makers. Produce quarterly Technical CI threat reports in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. Provide relevant input for the CI Cyber Branch to create three quarterly reports, each report due NLT 5th day of January, April, and July. Threat reports should include: Compilation of data collected and reported in weekly and monthly products. Intelligence reported by the Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Depiction of Technical CI threat(s) to NGA to inform security decisions. Produce relevant input to the CI Cyber Branch annual Cyber Threat Assessment in collaboration with teammates, NGA partners and Intelligence Community peers as necessary. The annual Cyber Threat Assessment is due NLT 1 1 December. Threat studies should include: Compilation of data collected and reported in Intelligence Information Reports (IIRs) and quarterly products. Raw and finished Intelligence reported by Intelligence Community. Fused All Source threat analysis derived from multiple INTs. Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cyber security personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross referencing local information reporting with Intelligence Community reporting. Clear and concise writing to briefly convey threat. Responsiveness to Intelligence Community priority collections requirements. Timeliness. Perform inquiries of anomalous activity using automated investigative tools (For example: M3, Palantir, TAC, ARCSIGHT, RSA Security Analytics, CCD, QLIX, TIDE, or Criss Cross). Provide Technical CI advise and expertise in support of CI inquiries, operations and issues. Develop leads by detecting anomalous activity, conducting open source and classified research, and liaison with internal and external partners. Conduct research, evaluate collection, and perform analysis on Technical CI intelligence topics of interest to leadership, analysts and customers. Demonstrate an ability to draw high-quality, appropriate and objective conclusions from information in a timely manner. Research, analyze, and synthesize All-Source data to identify patterns, commonalities, and linkages. Demonstrate current subject matter expertise on Technical CI issues, threats and trends. (For example: Cyber threats and Technical Surveillance threats). Demonstrate and master the ability to self-edit and produce clearly written, properly sourced and grammatically correct intelligence products that adhere to established style guide and template standards. Demonstrate proficiency in use of bottom-line-up-front (BLUF) writing. Display an ability to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, Cyber Security Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. Skills and Experience Required: Shall possess a minimum of 11 years Threat Analysis experience, of which at least 5 of those years include Technical Threat Analysis experience or cyber investigations. Possess or obtain certification to comply with DoD 8570.01-M Information Assurance (IA) requirements within one calendar year of assignment at the sole expense of the vendor. Shall possess or obtain and maintain IA II certification. See DoD 8570.01-M for acceptable certifications for each IA level. Desired: Be a credentialed graduate of an accredited federal or DoD CI training academy. Possess a Bachelor's degree in Science, Technology, Engineering, or Mathematics disciplines. Possess post-graduate degree in Science, Technology, Engineering, or Mathematics disciplines. Possess knowledge and understanding of foreign adversaries' security and intelligence services, terrorist organizations, and threats posed to US Gov. Experience translating Government vision into understandable and achievable measures. Experience in using supervisory skills to coach teammates to achieve objectives. Monitor and track progress toward achievable measures.
    $69k-91k yearly est. 11d ago
  • Cyber Security Analyst Tier 3

    Freedom Technology Solutions Group

    Security engineer job in Saint Louis, MO

    Freedom Technology Solutions Groups is looking to add a Tier 3 Cyber Security Analyst to the team. The candidate will provide CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in support of CSOC Tier 3 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the Contractor shall conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certification that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents; Collaborates with appropriate authorities in the production of security incident reports; Categorizes incidents and events; Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated; Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events; Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event; Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions. Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed. Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed; Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; Provides adversary attribution; Performs malware analysis and signature development; Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: Bachelors Degree and or 6 years' experience in Cyber Security (CSOS) Active security clearance. DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report; Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander; Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems; Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis. When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events; Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down; Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification Preferred Qualifications: Masters degree IAT III Qualifications that are nice to have: Juniper certification What's in It for You? Flexible work environment A team mentality - work with friendly, like-minded professionals Work with innovative, cutting edge technologies Enjoy extremely competitive compensation and benefits A work-life balance you can count on Opportunities to grow and advance your career on our dime The Benefits You Get with Freedom Amazing benefits including matching 401k, fully paid medical, and more Generous paid time off - including paid site closure days Competitive salary offerings Paid training and tuition reimbursement Referral bonuses Fully paid life and disability Annual logo wear allowance Company sponsored events (game nights, holiday party, summer party, happy hours) Interested in learning more about Freedom and our culture? Contact us today! We're constantly hosting hiring events in our office and elsewhere, to help you get a sense of what life is like at Freedom before joining the team. As an Equal Opportunity Employer, we do not discriminate on the basis of race, color, religion, sex, age, marital status, disability or veteran status Applicant Federal & E-Verify Postings VEVRAA Federal Contractor Accessibility: If you need an accommodation as part of the employment process, please contact Human Resources at Phone: ************ Email: ********************* Equal Opportunity Employer, including disabled and veterans. If you want to view the EEO Law poster, please choose your language: English - Spanish - Arabic - Chinese If you want to view the EEO Law Supplement poster, please choose your language: English - Spanish - Chinese If you want to view the Pay Transparency Policy Statement, please click the link: English
    $66k-89k yearly est. Auto-Apply 2d ago
  • Data Security Analyst

    The Timberline Group

    Security engineer job in Saint Louis, MO

    Join our dynamic and thriving company as a Data Security Analyst in St. Louis, MO where you'll have the opportunity to make an impact and shape the future of our renowned brands. If you have a passion for fashion, eager to learn and have an eye for detail, this is the perfect role for you! As a member of our team, you'll be part of a company that values results, caring and learning. What You'll Be Doing Monitor security service performance and availability: Provide recommendations on security equipment, software, and services On-going investigation: Inspect information security alarms and events to determine vulnerability and impact Implement processes: Put forth structured risk assessment processes, conducting ongoing threat and vulnerability assessments, and evaluating controls and countermeasures to mitigate risk Participate in architecture reviews: Ensure adherence to information security architecture Develop processes: Create plans for preventing, detecting, identifying, analyzing and responding to information security incidents Design and deliver programs: Create education and training programs on information security and privacy matters The Timberline Group Phone: ************ PO Box 565, Sullivan, Mo 63080 ********************* ************************* "Delivering quality solutions through quality people"
    $64k-89k yearly est. Easy Apply 60d+ ago
  • Information Security Specialist

    Collabera 4.5company rating

    Security engineer job in Saint Louis, MO

    Collabera is ranked amongst the top 10 Information Technology (IT) staffing firms in the U.S., with more than $550 million in sales revenue and a global presence that represents approximately 12,000+ professionals across North America (U.S., Canada), Asia Pacific (India, Philippines, Singapore, Malaysia) and the United Kingdom. We support our clients with a strong recruitment model and a sincere commitment to their success, which is why more than 75% of our clients rank us amongst their top three staffing suppliers. Not only are we committed to meeting and exceeding our customer's needs, but also are committed to our employees' satisfaction as well. We believe our employees are the cornerstone of our success and we make every effort to ensure their satisfaction throughout their tenure with Collabera. As a result of these efforts, we have been recognized by Staffing Industry Analysts (SIA) as the “Best Staffing Firm to Work For” for five consecutive years since 2012. Collabera has over 40 offices across the globe with a presence in seven countries and provides staff augmentation, managed services and direct placement services to global 2000 corporations. For consultants and employees, Collabera offers an enriching experience that promotes career growth and lifelong learning. Visit ***************** to learn more about our latest job openings. Awards and Recognitions --Staffing Industry Analysts: Best Staffing Firm to Work For (2016, 2015, 2014, 2013, 2012) --Staffing Industry Analysts: Largest U.S. Staffing Firms (2016, 2015, 2014, 2013) --Staffing Industry Analysts: Largest Minority Owned IT Staffing Firm in the US. Job Description Responsibilities: Performs focused risks assessments of existing or new services and technologies (both internal and external) by utilizing questionnaires, surveys, interviews and observations and reviewing documentation to identify and evaluate risk scenarios. Communicates risk assessment findings to information security “customers,” or business partners.Provides consultative advice to information security customers that enables them to make informed risk management decisions.Identifies appropriate controls to effectively manage information risks as needed.Identifies opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk.Maintains strong working relationships with individuals and groups involved in managing information risks across the organization Qualifications Required Skills/Experience • 3+ years of work experience in information security, especially in an Information Risk Analysis, Enterprise Risk Management (ERM), and/or IT Audit role • Knowledge of quantitative and qualitative risk evaluation methods • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one • An ability to effectively influence others to modify their opinions, plans, or behaviors • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization • Open and able to apply original and innovative thinking to produce new ideas and create innovative products in an environment that embraces continuous improvement Additional Information To set up an inerview for this position, feel free to contact: Imran Malek ************ *******************************
    $71k-97k yearly est. Easy Apply 2d ago
  • Information Security Analyst

    Tenex.Ai

    Security engineer job in Overland Park, KS

    TENEX is an AI-native, automation-first, built-for-scale Managed Detection and Response (MDR) provider. We are a force multiplier for defenders, helping organizations enhance their cybersecurity posture through advanced threat detection, rapid response, and continuous protection. Our team is composed of industry experts with deep experience in cybersecurity, automation, and AI-driven solutions. Backed by leading investors, we are rapidly growing and seeking top talent to join our mission of revolutionizing the MDR landscape. We're a fast growing startup backed by industry experts and top tier investor Andreessen Horowitz. As an early employee, you'll play a meaningful role in defining and building our culture. Get in on the ground floor. We're a small but well-funded team that just raised a substantial round - joining now comes with limited risk and unlimited upside. Culture is one of the most important things at TENEX.AI-explore our culture deck at culture.tenex.ai to witness how we embody it, prioritizing the irreplaceable collaboration and community of in-person work. We are looking for a detail-oriented Information Security Analyst to spearhead our internal compliance efforts and manage our Third-Party Risk Management (TPRM) program. In this role, you won't just be checking boxes; you will be the architect of the controls that protect our customers' data involving AI and other cutting edge technologies. You will bridge the gap between technical security operations and formal audit requirements, ensuring we remain a gold standard in the industry. Location: This role will require onsite in our Overland Park, KS or Sarasota, FL location. Key Responsibilities 1. Internal SOC 1 & SOC 2 Compliance Audit Readiness: Lead the preparation for annual SOC 1 Type II and SOC 2 Type II audits. Control Monitoring: Perform continuous testing of technical and administrative controls (e.g., access reviews, change management, encryption standards). Evidence Collection: Coordinate with Engineering, HR, and DevOps teams to gather and organize audit evidence throughout the year. Remediation: Identify gaps in current processes and work with department heads to implement corrective actions. 2. Third-Party Risk Management (TPRM) Vendor Assessments: Conduct security assessments of new and existing vendors, reviewing their SOC reports, ISO certifications, and SIG questionnaires. Risk Scoring: Evaluate the risk profile of third-party tools and services, providing recommendations to leadership on whether to approve or mitigate risks. Contract Review: Partner with Legal to ensure security addendums (DSAs/BAsAs) meet our internal compliance requirements. 3. Policy & Governance Maintain and update the Information Security Management System (ISMS) documentation. Develop and deliver security awareness training tailored to compliance requirements. Act as the primary point of contact for client inquiries regarding our security posture. Required Qualifications & Skills: Experience: At least 2 years in Information Security, IT Audit, or Compliance (GRC). Frameworks: Deep understanding of AICPA Trust Services Criteria (SOC 2) and SSAE 18 (SOC 1) along with ISO 27001, NIST-800. Technical Knowledge: Familiarity with cloud environments (GCP/AWS/Azure), IAM, and vulnerability management. TPRM Tools: Experience with risk assessment platforms (e.g., OneTrust, Vanta, or Drata). Certifications: CISA, CRISC, or Security+ preferred (CPA-tracked experience is a plus). Ideal Candidate Profile: The "Translator": You can explain complex frameworks like ISO27001, NIST 800, and map them to internal controls in policy documentation to support compliance requirements. Meticulous: You audit the environment and policies for consistency and enforcement. Proactive: You don't wait for the audit window to open; you are constantly looking for ways to automate evidence collection. Education & Certifications: Bachelor's degree in Computer Science, Cybersecurity, Engineering, or a related field (or equivalent experience). Why Join Us? Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions. Collaborate with a talented and innovative team focused on continuously improving security operations. Competitive salary and benefits package. A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
    $68k-95k yearly est. Auto-Apply 14d ago
  • Information Security Analyst

    Capitol Federal Savings Bank 4.4company rating

    Security engineer job in Lawrence, KS

    Make a direct impact on protecting the Bank's people, systems, and customers! As an Information Security Analyst, you'll play a hands-on role in strengthening the Bank's security posture while working closely with Compliance, Risk Management, and IT Security. This position offers visibility across the organization, meaningful responsibility, and the opportunity to influence how security awareness and risk management are practiced every day. You'll be trusted to monitor critical system access, investigate and respond to real-world phishing threats, and lead the Bank's security awareness and social engineering programs. From training employees to advising leadership on security risks, your work will directly reduce risk and improve the organization's security culture. What You'll Do * Protect critical systems by monitoring access changes and advising on best practices * Investigate suspicious emails and manage phishing response and testing programs * Lead engaging security awareness training and new-hire education * Plan and report on phishing and social engineering exercises * Support key information security risk assessments and control reviews * Partner with IT and business leaders to identify and mitigate security risks What You Bring * 5+ years of experience in IT security, risk management, audit, or compliance CapFed is an equal opportunity employer.
    $82k-111k yearly est. Auto-Apply 12d ago

Learn more about security engineer jobs

How much does a security engineer earn in Rogers, AR?

The average security engineer in Rogers, AR earns between $61,000 and $110,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Rogers, AR

$82,000

What are the biggest employers of Security Engineers in Rogers, AR?

The biggest employers of Security Engineers in Rogers, AR are:
  1. Walmart
Job type you want
Full Time
Part Time
Internship
Temporary