Network Engineer - FinTech
Security Engineer Job 12 miles from Sherwood
An elite financial trading and technology firm is expanding its infrastructure presence in Little Rock and looking for a Network Engineer to support and evolve its low-latency, high-availability network infrastructure. This is a second-shift role, ideal for candidates who thrive during evening and overnight hours and are excited to contribute to critical operations during off-peak trading windows.
You'll be joining a small, focused network engineering team with visibility and impact across a global estate. The position offers significant responsibility in network optimisation, monitoring, and hands-on problem solving in a high-performance environment. This is a fast-moving environment where attention to detail, speed, and precision are key.
Key Responsibilities:
- Engineering, monitoring, and supporting complex layer 2 and layer 3 network infrastructure
- Troubleshooting and tuning protocols such as BGP, OSPF, IGMP, and PIM
- Collaborating with internal teams and global offices to ensure uptime and stability
- Working closely with telecom providers to provision, test, and maintain circuits
- Implementing and tuning multicast configurations for optimal traffic performance
- Participating in data center operations, physical connectivity, and cabling plans
- Supporting Layer1 switching platforms, particularly low-latency hardware like Arista 7130
- Contributing to automation and scripting efforts to streamline workflows
Ideal Candidate Profile:
- Strong grasp of core networking concepts at layer 2 and 3, including IP routing and switching
- Deep understanding of TCP/IP internals and comfort troubleshooting across network layers
- Proficient with scripting tools and approaches for automating tasks
- Previous experience working in a data center environment
- Familiar with multicast networking, QoS, and Layer1 switch operations
- Skilled in coordinating with telecoms for circuit deployments and issue resolution
- Understanding of time-sensitive networking, GPS clocking, and precision timing protocols
Salary
$100,000- $150,000
Annual discretionary bonus
Company benefits
Core hours: 6pm to 4am Central Time, Monday through Friday
Participation in a 24/7 on-call rotation
Onsite presence in Little Rock, Arkansas as part of a growing operations and infrastructure team
Principal Offensive Security Engineer
Security Engineer Job 12 miles from Sherwood
The Oracle Cloud Infrastructure (OCI) Offensive Security team provides OCI with the capabilities to ensure our systems and services meet the security objectives we communicate to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, red-teaming, and security tool development. We ensure the security of the software and hardware that runs our cloud infrastructure and strive for continuous improvement. The OCI Offensive Security group works as a team. We don't fit people into predefined roles. We bring together the right people who enhance team capability and build roles around each team member's skills and interests.
Values are OCI's foundation and how we deliver excellence. We strive for equity, inclusion, and respect for all. We are committed to the greater good in our products and our actions. We are continually learning and taking opportunities to grow our careers and ourselves. We challenge each other to stretch beyond our past to build our future. You can learn more about us by visiting ********************************************* .
Are you interested in building large-scale distributed security systems and tools for the cloud? Do you love the idea of working in an environment with the excitement of a start-up, but the financial backing of a Fortune 100 company? This role offers huge upside potential, high visibility, and fast career growth without the risks of a typical start-up. We are growing fast, maturing, and working on results-oriented initiatives. A security-focused leader can have significant technical and business impact. This is a unique opportunity to work with smart people to solve complex problems in distributed systems, security, and multi-tenant Infrastructure-as-a-Service (IaaS) operating at massive scale. The biggest challenges for the team is the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution. We hope you like working at scale as much as we do because Oracle has no shortage of it! Craft the future of one of the largest clouds on earth with us!
Our ideal candidate is a hardworking and hands-on engineer who cares about security and improves their knowledge every day. We're looking for handson cloud hackers with expertise and passion in identifying and exploiting complex security problems in distributed, multi-tenant services and infrastructure. We operate distributed systems at a high scale, worldwide. These are the foundations of our cloud environment. Our customers run their businesses on our cloud, and our mission is to provide them with a best-in-class and ever-expanding set of cloud-based services.
A security-focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. To get you excited, here is a list of some of the projects over the last year this team has worked on:
Big iron - ExaLogic, ExaData, UltraSPARC, InfiniBand
Firmware reverse engineering of various hardware components
Developing custom fuzzing platforms for code-coverage analysis
Several different hypervisors
Linux and Windows kernel mode non-sense The list goes on and on!
This role is for a hands-on cloud hacker on the Offensive Security Team.
Career Level - IC4
**Responsibilities**
+ You enjoy diving into complex source code audits to reveal subtle security vulnerabilities
+ Writing new tools such as fuzzers in languages such as C/C++, Python, Ruby, Go or Java,
+ Tearing apart an undocumented file format or network protocol
+ Coming up with novel techniques to solve unique and interesting security problems
+ Review new services, including their integration points with existing services
+ Guide security projects beyond the scope of performing assessment work
+ Identify and disclose vulnerabilities to 3rd party vendors
+ Design complex systems and services that improve quantity or quality of offensive security output
+ You'll reviews new features of moderate complexity in existing systems, identifying areas of new risk created; work with service teams to explore and recommend mitigations; and collaborate across service teams and security stakeholders.
+ Review new services, including their integration points with existing services
+ Guide security projects beyond the scope of performing assessment work: identifying and disclosing vulnerabilities to 3rd party vendor or design of complex systems and services that improve quantity or quality of offensive security output
+ You'll drive organization wide improvement in the form of engineering practices, security architecture, operation practices or development practices.
+ You'll reviews new services and their integration points with other services; guides security assessments of our most complex or important products, and is independently capable of balancing business and security risk; and apply your expertise in business-critical security area to advance the business relative to the industry.
Qualifications
+ Six years experience in vulnerability discovery / security engineering / application security
+ Threat modeling experience of microservice architectures
+ Experience working in a large cloud or software company
+ Extensive research or experience with multiple classes of security bugs
+ Evidence of contribution to the security community in the form of conducting training / thought leadership / conference talks / publications Improve security throughout the organization, identifying areas of risk or opportunities for improvement and piloting them
+ Be a subject matter expert in at least one business-critical area (e.g. cryptography, hardware security, operating systems, authentication protocols, fuzzing, DoS mitigation, networks, distributed systems)
+ Collaborative track record working between internal teams and external organizations
+ Excellent organizational, verbal and written communication skills
+ Intermediate knowledge of Linux OS Internals
+ Advanced knowledge of one programming language and ability to read two high level programming language such as Java
Preferred Qualifications
+ Undergraduate or Graduate degree in Electrical Engineering, Computer Science, or another related field or equivalent work experience.
+ Hands-on experience developing services on a public cloud platform (e.g., AWS, Azure, Oracle)
+ Building continuous integration/deployment pipelines with robust testing and deployment schedules
+ Experience working with internal customers and translating requests into prioritized work or features
+ Expertise in applying risk identification techniques to develop security solutions
+ Experience and understanding of Cryptographic algorithms, standards, implementation and application
+ Experience and understanding of threat modeling, penetration testing, reverse engineering and attacks on software Experience working with large enterprise customers
+ Active TS/SCI Clearance
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Engineer, Incident Response
Security Engineer Job 12 miles from Sherwood
Meta Security is looking for an Incident Response Engineer with experience coordinating, investigating and responding to internal and external threats. You will help the team establish, lead and execute multi-year roadmaps to mature investigative and response services, drawing upon automation and cross functional partnerships to create scalable and resilient operational capabilities.
**Required Skills:**
Security Engineer, Incident Response Responsibilities:
1. Conduct security investigations and lead security incident response in a cross-functional environment and drive incident resolution.
2. Develop Incident Response initiatives that improve our capabilities to effectively respond and remediate security incidents.
3. Refine operational metrics, key performance indicators, and service level objectives to measure Security Operations and Incident Response services.
4. Influence and align the team's vision and strategy. Collaboratively prioritize and deliver specific multi-year roadmaps and projects.
5. Build, cultivate, and maintain positive relationships with internal customers to identify and facilitate solutions to increase the impact of the team's work.
6. Partner with cross-functional teams to solve challenges related to a broad spectrum of detection and response initiatives.
7. Collaborate with software and production engineering teams to develop scalable and flexible Incident Response and Investigative solutions.
8. Focus on ruthlessly prioritizing, automating and scaling every aspect of our detection and response capabilities.
9. Coach, mentor, support and care for the team in a way that enables long-term career development, happiness and success at scale.
**Minimum Qualifications:**
Minimum Qualifications:
10. B.S. or M.S. in Computer Science or related field, or equivalent experience
11. 10+ years of work experience in Security Incident Response and Detection & Response Engineering in a large, regulated organization.
12. Be a technical and process subject matter expert regarding Security Operations and Incident Response services.
13. Experience developing and delivering information on incident and program status for leadership.
14. Experience leading and managing complex cross-functional programs.
15. Experience responding to both external and insider threats.
16. Experience analyzing network and host-based security events.
17. Knowledge of networking technologies, specifically TCP/IP and the related protocols.
18. Knowledge of operating systems, file systems, and memory structures on Windows, MacOS and Linux.
19. Coding/scripting experience in one or more general purpose languages.
20. Experience with attacker tactics, techniques, and procedures.
**Preferred Qualifications:**
Preferred Qualifications:
21. Background in malware analysis, digital forensics, intrusion detection, and/or threat intelligence.
22. Experience in threat hunting including leveraging intelligence data to proactively identify and iteratively investigate suspicious behavior across networks and systems.
23. Broad knowledge across the Security domain, as well as demonstrated experience in one (or more) areas such as Logs and events processing, Incident Management, Digital Forensics, Detection and/or response tool development.
24. Experience recruiting, building, and leading technical teams, including performance management.
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Mainframe Security Engineer
Security Engineer Job 12 miles from Sherwood
Mainframe Security EngineerRemote - United StatesJR011549 **About the role and what you'll be doing:** **This is a Mainframe Security Administration position, working on IBM z/OS operating systems. Experience using TSO, JCL, ISPF, JES2, and IBM Utilities will be required.**
**A passing of a Federal Background Check is required for this position.**
+ Hands-on security administration experience with RACF, ACF2 and Top-Secret logon ID's, datasets, and resource rules.
+ Top Secret security administration experience required for this position, ACF2 and RACF experience desired.
+ Provision user access in response to tickets opened in Service Now within defined SLAs.
+ Monitor system security policy and violations/incidents.
+ Perform and review daily, weekly, and monthly audit reports.
+ Liaison with business areas and other technical support areas.
+ Provide customer support by preparing ad hoc reports and giving presentations.
+ Monitors the environment for adherence to security standards.
+ Must be available 24 x 7. On-call support will be required.
+ Experience using Vanguard and/or IBM zSecure security products.
+ iSeries security knowledge a plus.
**Technical Skills:**
+ Excellent TSO, JCL, IBM UTILITIES, JES2, and ISPF a must.
+ Experience with REXX or any programming language is desired.
+ Experience with CICS security administration preferred.
+ Experience using Vanguard and/or IBM zSecure security products is desired.
+ Experience with IAM, MFA and PAM is desired.
**General Knowledge:**
+ z/OS experience is highly desired
+ PC Skills (Microsoft Outlook, Word, Excel, PowerPoint)
**Personal Skills:**
+ Strong written and verbal communication skills.
+ Strong organisational skills with the ability to manage multiple concurrent project deliverables and the ability to work as a global team.
+ Ability to work on own initiatives.
+ Strong analytical skills and problem-solving skills
+ Must be an excellent team player with the ability to work independently in a fast-paced environment
+ Self-starter, detail-oriented and ability to multitask
+ Excellent Communication skills required
+ Good written skills are required
**Education:**
+ CISSP, CISA, CISM or ITIL Certification a plus
+ Bachelor's or master's degree preferred
+ Other mainframe security products a plus
**Why Ensono?**
Ensono is a place to make better happen - for our clients and for your career. You can do great things through innovation or collaboration, by learning or volunteering, or to promote diversity and inclusion. You can do great things for your own health or for a healthier planet. Whatever it means to you to do great things we want Ensono to be the place you can do it.
We are a client-facing business, but we do encourage clients to allow us to work remotely most of the time so if you are not required to be on a client site, you can choose to work from home or in our Ensono offices.
Some of our benefits include:
+ Unlimited Paid Days Off
+ Three health plan options through Blue Cross Blue Shield
+ 401k with company match
+ Eligibility for dental, vision, short and long-term disability, life and AD&D coverage, and flexible spending accounts
+ Paid Maternity Leave, Paternity Leave, and Sabbatical Leave
+ Education Reimbursement, Student Loan Assistance or 529 College Funding
+ Enhanced fertility coverage
+ Wellness program
+ Depending on location, ability to take Flexible work schedule
+ Advantage of fitness centers
As of the date of this posting, a good faith estimate of the current pay scale for this role is $75,000 to $123,000 annually based on a full-time schedule. Please note that placement in the range may vary based on numerous factors including but not limited to skills, experience, internal equity, and business needs. In addition to base salary, other compensation programs, depending on eligibility, include an annual bonus plan based on company and individual performance and an equity grant under our Associate Equity Appreciation Program.
Ensono is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment to our Associates and building a diverse and inclusive workforce. All qualified applicants will be considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability, or other legally protected basis, in accordance with applicable law.
Pay transparency nondiscrimination statement/posting OFCCP's pay transparency policy can be found on OFCCP's website (*********************************************************************************************** .
If you need accommodation at any point during the application or interview process, please let your recruiter know or email ****************************** .
JR011549
Cyber Security Engineer
Security Engineer Job 45 miles from Sherwood
Responsibilities We are hiring a Cyber Security Engineer for our program in Stuttgart, Germany. What you'll do: This role requires a broad range of cybersecurity skills and knowledge, covering both technical and strategic aspects of information security. The person in this position would play a crucial role in protecting an organization's digital assets and ensuring the overall security of its IT infrastructure. This position is specifically tailored to support the U.S. European Command (EUCOM) Headquarters' cybersecurity needs.
* The role will support U.S. government networks and Mission Partner
* The cybersecurity professional will be responsible for system security posture assessment, authorization process execution, continuous monitoring
* Assessing information security controls on new and existing systems
* Working with system owners to resolve and mitigate security findings
* Helping maintains the security posture of systems and networks
* The role involves collaboration with EUCOM personnel.
* Creating and maintaining Authorization packages to keep Authority to Operate (ATO) for multiple networks of varying classification levels.
* Ensuring System Administrators maintain required DoD 8140 certifications, Reviewing and providing recommendations to the Information System Security Manager (ISSM) regarding Hardware, Software, and Ports, Protocols, and Services (PPS) requests.
* Reviewing Plans of Action and Milestones (POA&Ms) for closure or extensions based on mission requirements.
* Reviewing Authorizing Official (AO) Risk Acceptance requests for validity and working with requestors on mitigations.
* Coordinating with the Defense Information Systems Agency (DISA) Security Control Assessor (SCA) for Authorization & Assessment reviews.
Qualifications
Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD, in lieu of degree 12 years of related work experience
What you'll need:
* Active IAM III Certification (including CISSP, CISM, GSLC)
* TESA eligibility & active U.S. passport
* Active DoD Secret Clearance
* Extensive knowledge of the RMF (Risk Management Framework) process
Desired qualifications:
* Knowledge of Commercial Solution for Classified (CSfC) Assessment and Authorization process
* Working knowledge of: ACAS, ESS, Carbon Black, eMASSKnowledge of DISA CAL (Defense Information Systems Agency Cyber Asset Library)
* Experience with DISA reviews, specifically:A&A (Assessment and Authorization) CCRI (Command Cyber Readiness Inspection) CORA (Cyber Operational Readiness Assessment)
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.
Target Salary Range
$104,000 - $166,000. This represents the typical salary range for this position based on experience and other factors.
EEO
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Information Security Engineer (Cybersecurity)
Security Engineer Job 12 miles from Sherwood
span class="jobdescription" itemprop="description"pspan style="font-size:12.0px"bspan style="font-family:Arial, Helvetica, sans-serif"Job Title: /span/bspan style="font-family:Arial, Helvetica, sans-serif"Information Security Engineer (Cybersecurity)/span/span/p
pspan style="font-size:12.0px"bspan style="font-family:Arial, Helvetica, sans-serif"Work Place Flexibility:/span/bspan style="font-family:Arial, Helvetica, sans-serif" Hybrid /span/span/p
pspan style="font-size:12.0px"bspan style="font-family:Arial, Helvetica, sans-serif"Legal Entity:/span/bspan style="font-family:Arial, Helvetica, sans-serif" Entergy Services, LLC/span /span/p
p align="center" style="text-align:center"span style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:#3c3c3c"***This position may be filled in The Woodlands, TX or Little Rock, AR. Other locations within Entergy's service territory may be considered - Texas, Arkansas, or Louisiana***/span/b/span/span/span/p
p align="center" style="text-align:center"span style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:#3c3c3c"***This position will be filled as an Info Sec Engineer III-SR depending on the candidate's qualifications and experience***/span/b/span/span/span/p
p align="center" style="text-align:center" /p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"JOB SUMMARY/PURPOSE:/span/b/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"The Identity Management Systems Engineer assists in delivering Enterprise Identity Security access provisioning and authentication services for employees and vendors, Information Technology and Operational Technology, and with the capability to support cloud and on-premise platforms. The Engineer executes on policies to ensure critical applications, systems and data are protected from unauthorized access while managing the identities and access rights of people both inside and outside the organization./span/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"span /span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"JOB DUTIES/RESPONSIBILITIES:/span/b/span/span/span/p
ul
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Assist in executing on the strategy, roadmap and delivery plans for Identity and Access Management (IAM) Systems/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Day-to-day operations of IAM systems to create a successful identify program/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Assist with compliance activities to meet requirements of North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) and Nuclear Regulatory Commission (NRC) Nuclear Cyber (10 CFR 73.54)/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Assist with establishing user identity, provisioning and de-provisioning access, access level changes, federation, etc./span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Assist with maintenance of IAM technology infrastructure, managing application and user-store integrations, directory capabilities, patching, upgrades, etc./span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Support the Enterprise Active Directory (AD) environment, Lightweight Directory Access Protocol (LDAP) services, virtual directory services (VDS) multi-factor authentication (MFA), federation services, privileged account management (PAM) and password management/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#333333"Support all system use of Role-Based Access Control (RBAC) for verifying and granting access to their resources/span/span/span/span/li
/ul
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"span /span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"MINIMUM REQUIREMENTS/span/b/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"Minimum education required of the position/span/b/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Associate degree in computer science, cyber security or a related discipline or equivalent work experience. /span/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"span /span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"Minimum experience required of the position/span/b/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:#32363a"Info Sec Engineer III/span/bspan style="color:#32363a": 4 plus years of identity management experience or relevant experience/span/span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:#32363a"Info Sec Engineer, SR: /span/bspan style="color:#32363a"6 plusb /byears of identity management experience or relevant experience/span/span/span/span/p
p /p
ul
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Experience related to IAM skills/field: (i.e. provisioning and workflow, authentication and entitlements, role-based access controls (RBAC), data privacy, and IAM solutions) is a plus/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Exposure to IAM federated roles and responsibilities within corporate environments is a plus/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Exposure to federated identity and web services security concepts such as SAML, OAuth 2.0, OpenID Connect, OWIN and ID-WSF, WS-Federation, and WS-Security is a plus/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Experience with IAM technologies like Active Directory, LDAP, multi-factor authentication across different infrastructure topologies including external vendors is a plus/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Experience in supporting different topology models of IAM stack across cloud, on-prem, Multi-Data Centre with 100% availability of the service is a plus/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Experience working with outsourced teams is a plus/span/span/span/span/li
/ul
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"span /span/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanbspan style="color:black"Minimum knowledge, skills and abilities required of the position/span/b /span/span/span/p
ul
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Awareness of modern Identity Management protocols and standards, frameworks, federation technologies and solutions/span/span/span/span/li
/ul
ul
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Knowledgeable in Identity and Access Mgmt products with proven technical capabilities with those solutions/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Experience with enterprise directory solutions/span/span/span/span/li
/ul
ul
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Some technical engineering and process management skills/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Understanding of security operations, access management, intrusion detection, and physical security/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Awareness of security ramifications of energy related regulations (SOX, HIPAA, NERC CIP, FERC, and NRC Nuclear Cyber (10 CFR 73.54)/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Knowledge of security, risk, and control frameworks and standards such as ISO 27001 and 27002, SANS-CAG, NIST, FISMA, COBIT, COSO and ITIL/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#3c3c3c"Good communication skills/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Good organizational and time management skills/span/span/span/span/li
lispan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"spanspan style="color:#32363a"Able to work in partnership with colleagues (e.g. corporate security) throughout the IT organization, and in collaborative teams to achieve common goals/span/span/span/span/li
/ul
p /p
pspan style="color:#ffffff"span style="font-size:8.0px"span style="font-family:Arial, Helvetica, sans-serif"#LI-SB1/span/span/span/p
pspan style="color:#ffffff"span style="font-size:8.0px"span style="font-family:Arial, Helvetica, sans-serif"#LI-HYBRID/span/span/span/p
p /p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"bPrimary Location:/b Arkansas-Little Rock Arkansas : Little Rock/span br/
span style="font-family:Arial, Helvetica, sans-serif"bJob Function/b: Professionalbr/
bFLSA Status/b: Professional/span br/
span style="font-family:Arial, Helvetica, sans-serif"bRelocation Option:/b br/
bUnion description/code/b: NON BARGAINING UNIT/span br/
span style="font-family:Arial, Helvetica, sans-serif"bNumber of Openings/b: 1br/
bReq ID:/b 116357br/
bTravel Percentage/b:Up to 25%/span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"An Equal Opportunity Employer, Minority/Female/Disability/Vets. Please click a href="********************************************************** /ato view the EEI page, or see statements below./span/span/p
pspan style="font-size:12.0px"bEEO Statement: /bThe Entergy System of Companies provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status, amnesty, or status as a protected veteran in accordance with applicable federal, state and local laws. The Entergy System of Companies complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment including, but not limited to, recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. br/
br/
The Entergy System of Companies expressly prohibits any form of unlawful employee harassment based on race, color, religion, sex, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of the Entergy System of Company employees to perform their expected job duties is absolutely not tolerated./span/p
pspan style="font-size:12.0px"bAccessibility: /bEntergy provides reasonable accommodations for online applicants. Requests for a reasonable accommodation may be made orally or in writing by an applicant, employee, or third party on his or her behalf. If you are an individual with a disability and you are in need of an accommodation for the recruiting process please click bua href="mailto:humanr@entergy.com?subject=Accessibility" target="_blank" title="here"here/a/u/b and provide your name, contact number, the accommodation requested and the requisition number that you are requesting the accommodation for. Employee Services will contact you regarding your request./span/p
pspan style="font-size:12.0px"bAdditional Responsibilities:/b As a provider of essential services, Entergy expects its employees to be available to work additional hours, to work in alternate locations, and/or to perform additional duties in connection with storms, outages, emergencies, or other situations as deemed necessary by the company. Exempt employees may not be paid overtime associated with such duties./span/p
pspan style="font-size:12.0px"bEntergy Pay Transparency Policy Statement:/b The Entergy System of Companies (the Company) will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information. 41 CFR 60-1.35(c). uba href="************************************************************************************************************************** target="_blank" title="Equal Opportunity"Equal Opportunity/a/b/u and uba href="********************************************************************************************* target="_blank" title="Pay Transparency"Pay Transparency/a/b/u./span/p
p class="xxx"span style="font-size:12.0px"ubspan style="font-family:Arial, Helvetica, sans-serif"Pay Transparency Notice:/span/b/u/span/p
p class="xxx"span style="font-size:12.0px"span style="font-family:Calibri, sans-serif"a href="********************************************************************************************* style="color:#0563c1;text-decoration:underline" target="_blank"Pay Transparency Nondiscrimination Provision (dol.gov)/a/span/span/p
pspan style="font-size:12.0px"The non-confidential portions of the affirmative action program for individuals with disabilities and protected veterans shall be available for inspection upon request by any employee or applicant for employment. Please contact ************************ to schedule a time to review the affirmative action plan during regular office hours./span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"bWORKING CONDITIONS: /bbr/
As a provider of essential services, Entergy expects its employees to be available to work additional hours, to work in alternate locations, and/or to perform additional duties in connection with storms, outages, emergencies, or other situations as deemed necessary by the company. Exempt employees may not be paid overtime associated with such duties./span/span/p
pspan style="font-size:12.0px"span style="font-family:Arial, Helvetica, sans-serif"bPlease note: /bAuthorization to work in the United States is a precondition to employment in this position. Entergy will not sponsor candidates for work visas for this position./span/span/p
/span
Cyber Engineer Advisor (BurpSuite)
Security Engineer Job 12 miles from Sherwood
**Anywhere** **Type:** Contract **Category:** Engineer **Industry:** Technology **Workplace Type:** Remote **Reference ID:** JN -052025-102289 **Shortcut:** ********************************** + Description + Recommended Jobs **Description:**
Own your career as a Cyber Engineer Advisor with us. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security with us will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow.
As a Cyber Engineer Advisor you will help ensure today is safe and tomorrow is smarter. Our work depends on Cyber Engineer Advisor joining our team to enhance our technical Security controls through optimizing our vulnerability management program. In this position, you will have the opportunity to directly impact the lives of millions of Americans by working on a program which increases access to care, improve health outcomes and control costs. The ideal candidate for this position possesses strong technical skills native to the realm of vulnerability management. Specifically, keen knowledge pertaining to the BurpSuite Enterprise tool. Lastly and most importantly, this candidate should strive to make a positive difference to the system and fellow team members.
**Location:** Remote
**Rate:** $70 - $75 / hr. W2
**Responsibilities:**
Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance andcybersecurity standards and practices through formal verification methods, with a specific emphasis on network operations and cyber warfare tactics.
● Work with fellow Information Security Team members in order to ensure a positive Security posture is maintained throughout the SDLC of the information system
● Configure, optimize, and document an instance of BurpSuite Enterprise to ensure it is actively and accurately scanning all in scope applications for known vulnerabilities and is streamlined for maintainability.
● Collaborate closely with technical teams to deliver appropriate deliverables
● Ensure deliverables are completed on time and of high-quality
**Experience Requirements:**
Required Experience: 8+ years of related experience
Required Technical Skills: BurpSuite Enterprise proficiency. Specifically, configuring and optimizing tool to scan all in scope assets in an accurate and reoccurring manner.
Candidate shall have lived in the United States at least three (3) out of the last five (5) years and will be required to go through a background investigation.
Certifications: CompTIA Pentest+ or equivalent preferred.
Required Skills and Abilities:
· Strong organizational skills
· Excellent written and verbal communication skills
· Detail oriented
· Timeline driven
· Experience supporting Federal, civilian and health agencies is a plus.
· Location: Remote
· Candidate must have 3 of the last 5 years of work history in the US and will be required to go through a public trust background investigation.
**Education Requirements:**
● Education: Bachelor of Arts/Bachelor of Science
_Skills, experience, and other compensable factors will be considered when determining pay rate. The pay range provided in this posting reflects a W2 hourly rate; other employment options may be available that may result in pay outside of the provided range._
_W2 employees of Eliassen Group who are regularly scheduled to work 30 or more hours per week are eligible for the following benefits: medical (choice of 3 plans), dental, vision, pre-tax accounts, other voluntary benefits including life and disability insurance, 401(k) with match, and sick time if required by law in the worked-in state/locality._
_Please be advised- If anyone reaches out to you about an open position connected with Eliassen Group, please confirm that they have an Eliassen.com email address and never provide personal or financial information to anyone who is not clearly associated with Eliassen Group. If you have any indication of fraudulent activity, please contact ********************._
_About Eliassen Group:_
_Eliassen Group is a leading strategic consulting company for human-powered solutions. For over 30 years, Eliassen has helped thousands of companies reach further and achieve more with their technology solutions, financial, risk & compliance, and advisory solutions, and clinical solutions. With offices from coast to coast and throughout Europe, Eliassen provides a local community presence, balanced with international reach. Eliassen Group strives to positively impact the lives of their employees, clients, consultants, and the communities in which they operate._
_Eliassen Group is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status._
_Don't miss out on our referral program! If we hire a candidate that you refer us to then you can be eligible for a $1,000 referral check!_
Cyber Defense Incident Responder
Security Engineer Job 12 miles from Sherwood
The Cyber Defense Incident Responder position will be responsible for investigating, analyzing, and responding to network cyber security incidents.. This role will also be responsible for supporting the development and improvement of processes, playbooks, and runbooks associated with detecting and responding to cyber security incidents.
**Responsibilities:**
+ Track cyber defense incidents from initial detection through final resolution
+ Collect intrusion artifacts
+ Determine the scope, urgency, and impact of cyber defense incidents
+ Recommend mitigation and remediation strategies for enterprise systems
+ Create thorough reports and documentation of all incidents and procedures; present findings to the teams and IR leadership on a routine basis
+ Support the development of Incident Response initiatives that improve our capabilities to effectively respond and remediate security incidents
+ Partner with cyber threat intelligence, the vulnerability management team, and technology remediation groups to deliver shared outcomes that measurably improve our ability to detect, respond to, and deter threats
+ Support broader security operation initiatives both within the cyber defense team and within engineering and operation departments across the organization
+ Create and Improve Security Playbooks for a variety of incident and compromise types for all levels of engineers and stakeholders
**Salary:**
The pay range for this position is $41.97/hour ($87,297/year) for those with entry-level qualifications up to $72.62 ($151,049) for those highly experienced. The specific rate will depend upon the successful candidate's specific qualifications and prior experience.
**Basic Qualifications:**
+ BS degree in computer science, computer engineering, software engineering, cybersecurity or related technical degree; or 4 years equivalent technology experience
+ 2+ years' experience in information security in an enterprise environment
+ Experience and understanding of incident response processes, forensic techniques, executing and administration of crisis bridges, and preparation and delivery of incident reports for executives
+ Knowledge of malware trends and behaviors and the ability to work with other teams to detect and respond to these threats
+ Experience with attacker tactics, techniques, and procedures
+ Experience with Windows and Linux Operating Systems
+ Knowledge of common software, operating systems vulnerabilities, and Unix/Linux
+ Understanding of cybersecurity organizational practices, operations risk management processes, architectural requirements, and vulnerability risk
+ Experience with controls or frameworks such as NIST 800-53, NIST CSF, CIS, MITRE ATT&CK
+ Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization
+ Excellent written and verbal communication skills
+ Demonstrated ability to collaborate effectively with internal teams and industry peers
**Preferred Qualifications:**
+ Experience creating workflows and remediation plans for vulnerabilities
+ Incident Response experience in a healthcare environment
+ Experience with security assessment tools
**Minimum Qualifications:**
+ EDUCATION - Bachelor's or 4 years of work experience above the minimum qualification
+ EXPERIENCE - 4 Years of Experience
As a health care system committed to improving the health of those we serve, we are asking our employees to model the same behaviours that we promote to our patients. As of January 1, 2012, Baylor Scott & White Health no longer hires individuals who use nicotine products. We are an equal opportunity employer committed to ensuring a diverse workforce. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.
Senior Security Engineer, Cyber Risk Management
Security Engineer Job 12 miles from Sherwood
Headquartered in Dublin, Ohio, Cardinal Health, Inc. (NYSE: CAH) is a global, integrated healthcare services and products company, providing customized solutions for hospitals, health systems, pharmacies, ambulatory surgery centers, clinical laboratories and physician offices worldwide.
The company provides clinically-proven medical products and pharmaceuticals and cost-effective solutions that enhance supply chain efficiency from hospital to home. Cardinal Health connects patients, providers, payers, pharmacists and manufacturers for integrated care coordination and better patient management. Backed by nearly 100 years of experience, with approximately 50,000 employees in 46 countries, Cardinal Health ranks among the top 15 on the Fortune 500.
We currently have a full-time job opening for a Senior Security Engineer of Cyber Risk Management
_Department overview:_
Information Security and Risk Management (ISRM) at Cardinal Health enables Cardinal Health to securely deliver healthcare products and solutions that improve the lives of people every day by ensuring security and controls are embedded into Cardinal Health's people, process and technology. The Cyber Risk and Customer Security Assurance team fulfils our mission to strengthen our shield against cyber threats by providing a framework of processes and methodologies to manage Cardinal Health's cybersecurity risks through issue and exception management, cyber risk management, and customer third party risk assessment engagement.
Job Summary
Sr. Engineer, Cyber Risk Management, applies knowledge of Information Security, Risk Management, and Information Technology to lead the maturity of our Cyber Risk program. The primary responsibility of this role is to collaborate across the enterprise to measure the impact and likelihood of a variety of Cyber Risks.
This role is a senior position within the team and will work with all members of the Information Security team as well as Senior Leadership, Enterprise Risk Management, Business leaders, and IT teams.
Responsibilities:
+ Provide senior leaders and executives with information summarized at the correct level to make efficient, cost-effective, risk management decisions about the technology and information processing supporting their business functions
+ Work with all members of the Information Security team to drive information risk governance processes throughout the Cardinal Health enterprise
+ Implement the information risk management framework and related governance processes to cover not just the IT function, but all technology and information processing regardless of where the processing is in the enterprise (e.g., "shadow IT", manufacturing systems, operational technology, etc.)
+ Leverage and integrate with existing IT risk management and risk escalation / approval processes
+ Create an information risk register that catalogs key IT risks through an ongoing "top-down" risk assessment process
+ Define processes for summarizing "bottom-up" risk identified throughout various risk and compliance activities to add to risk register
+ Define and measure risk metrics that can be used to evaluate risk trends
_Qualifications:_
+ Excellent written and verbal communication skills
+ Experience in Information Technology, Information Security, and Risk Management
+ Experience implementing and maintaining processes at large enterprises
+ Experience with IT security principles, practices, technologies, programs and procedures, accompanied by an understanding of risk management methodologies and cybersecurity assessment frameworks
+ High-quality analytical skills, relationship management competencies
+ Relevant Information Security Certifications
**Anticipated salary range:** $121,600 - $182,385
**Bonus eligible:** Yes
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 4/27/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Information Security Engineer
Security Engineer Job 20 miles from Sherwood
The Information Security Engineer is responsible for supporting applications used by Information Security including automation, security architecture, and other critical functions. ESSENTIAL DUTIES AND RESPONSIBILITIES 1. Manage the applications & infrastructure specific to the Information Security teams, and ensure functionality & uptime meets operational needs.
2. Assist in designing and implementing an automation strategy for Information Security, including the selection and maintenance of automation platforms.
3. Execute the vulnerability management program, determining criticality of patches & working with Information Security Governance team to monitor compliance.
4. Manage Discovery and Data Loss Prevention security analytics platform and partner with stakeholders to develop the strategy for this environment to support future needs.
5. Ensure security tools are updated to reflect a complete, accurate and valid inventory of all systems, infrastructure and applications.
6. Conducts vulnerability assessments and other security reviews of systems to ensure remediation based on the risk profile of the asset.
7. Reviews and recommends improvements to company security posture leveraging concepts such as network segmentation, resilient authentication, least privileged access, privacy by design, etc.
8. Develop and maintain security architecture artifacts (models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
9. Participate in application and infrastructure projects to provide security planning advice.
10. Determine baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and other technologies.
11. Develop standards and practices for data protection within the company, including technologies such as encryption and tokenization.
12. Track developments and changes in the technology and threat environments to ensure that these are adequately addressed in security strategy plans and architecture artifacts.
13. Advocate security best practices & share insights with stakeholders in a variety of areas (secure coding, architecture, system/app administration, system hardening, etc.) and recommend changes to enhance security & reduce risk..
14. Participate in the Vendor Due Diligence process as needed to conduct security assessments of existing and prospective vendors.
15. Assists in e-discovery procedures when necessary.
16. Provide support and guidance for legal and regulatory compliance efforts, including audit support.
17. Assist in defining metrics and reporting that effectively communicate performance & maturity of the security program.
18. Assist Information Security leadership in developing strategy and roadmaps for Security team.
19. Complete required BSA/AML training and other compliance training as assigned.
20. The ability to work in a constant state of alertness and in a safe manner.
21.Perform any other related duties as required or assigned.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty mentioned satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required.
EDUCATION AND EXPERIENCE
Technical degree required in such disciplines as Computer Engineering, CPA, etc., plus 6 years related experience and/or training, and 2 years related management experience, or equivalent combination of education and experience.
COMMUNICATION SKILLS
Ability to read a limited number of words and recognize similarities and differences between words and between series of numbers; ability to write and speak simple sentences as a means for basic communication. Ability to read and understand simple instructions, short correspondence, notes, letters and memos; ability to write simple correspondence. Ability to read and understand documents such as policy manuals, safety rules, operating and maintenance instructions, and procedure manuals; ability to write routine reports and correspondence. ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization. Ability to read, analyze, and understand general business/company related articles and professional journals; ability to speak effectively before groups of customers or employees. ability to write reports, business correspondence, and policy/procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Ability to read, analyze, and understand common scientific and technical journals, financial reports, and legal documents; ability to respond to complex or difficult inquiries or complaints from customers, regulatory agencies, or members of the business community.
MATHEMATICAL SKILLS
Ability to calculate figures and amounts such as discounts, interest, commissions, proportions, percentages, area, circumference, and volume. Ability to apply concepts such as fractions, ratios, and proportions to practical situations.
CRITICAL THINKING SKILLS
Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal, logical or scientific symbolism such as formulas, scientific equations, and graphs. Ability to deal with a variety of abstract and concrete variables.
REQUIRED CERTIFICATES, LICENSES, REGISTRATIONS
Minimum, 1 certification in cybersecurity such as CISSP, CISM, or Azure Security Engineer Associate, or ability to obtain within 6 months.
PREFERRED CERTIFICATES, LICENSES, REGISTRATIONS
Microsoft Information Protection Administrator SC-400
Administering Information Security in Microsoft 365 SC-401
Information Systems Security Architecture Professional (ISSAP) ISC2
Certified Cloud Security Professional (CCSP) ISC2
SOFTWARE SKILLS REQUIRED
Intermediate: Database, Human Resources Systems, Presentation/PowerPoint, Spreadsheet, Word Processing/Typing
Basic: Other, Payroll Systems, Programming Languages
PHYSICAL ACTIVITIES
The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.
Semi-repetitive, low physical. Semi-repetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.
While performing the functions of this job, the employee is continuously required to sit, talk or hear; occasionally required to stand, walk, use hands to finger, handle, or feel. The employee must occasionally lift and/or move up to 10 pounds. Specific vision abilities required by this job include close vision; and color vision.
ENVIRONMENTAL CONDITIONS
The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
WORKING CONDITIONS
Somewhat disagreeable working conditions. Continuously exposed to one or two elements such as noise, intermittent standing, walking, pushing, carrying, or lifting. May involve some travel and/or work is at times, in the evening or during the night hours.
ADDITIONAL INFORMATION
Required:
* A four-year college degree in one of the following disciplines: Cybersecurity, Information Assurance, Management Information Systems, Computer Science, OR equivalent work experience
* Five (5) years of experience, in a dedicated technical role such as data loss prevention, vulnerability management, security engineering, etc
* Direct, hands-on experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, data loss prevention tools, vulnerability management tools
* Knowledge of applications, databases, operating systems, hypervisors, IP networks, storage networks, backup networks and media
* Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions to identify the best solution
* Strong problem-solving and trouble-shooting skills
* Ability to effectively influence without authority
* An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
* An understanding of organizational mission, values, and goals, and the ability to consistently apply this knowledge
* Strong leadership abilities, with the capability to develop and guide information security team members and IT operations personnel, and work with minimal supervision
* A strong understanding of the business impact of security tools, technologies and policies
* Ability to react quickly, decisively and deliberately in high-stress, high-impact situations
Preferred:
* 3+ years working with & defending a hybrid on-prem/cloud or full cloud environment, including Microsoft 365/Entra/Purview/Defender
* Experience in IT operations managing various technologies such as clients, servers, firewalls, etc
* Experience managing security infrastructure such as firewalls, IPSs, WAFs, endpoint protection, SIEM and log management technology
ISP Cyber Security Architect
Security Engineer Job 12 miles from Sherwood
The Cybersecurity Architect is responsible for the development and standardization of comprehensive security strategies to protect the organization’s network infrastructure, and develop/test proper identification, and response procedures for the client’s team. This role requires a deep understanding of network protocols, security technologies, and industry best practices.
Essential Job Functions:
• Designs and implements secure network architectures, including firewalls, VPNs, Service Provider DDOS, intrusion detection systems (IDS), log management, general service provider access/infrastructure security suites, and other security devices;
• Conducts risk assessments and security audits to identify vulnerabilities and recommend remediation strategies;
• Develop security policies, standards, and procedures to ensure compliance with regulatory requirements;
• Collaborates with Architecture, Engineering, and operational teams to integrate security into system design and development processes;
• Establishes standards for monitoring network traffic for suspicious activity and responding to security incidents promptly;
• Conduct red/blue team exercises;
• Stays current with emerging threats, vulnerabilities, and technology trends in the cybersecurity landscape;
• Conducts regular security assessments and vulnerability scans to identify potential risks and threats;
• Provides technical guidance and operational and engineering groups regarding network security practices;
• Documents network security configurations, processes, and incident response procedures;
• Provides support and final escalation for operational and engineering groups;
• Establishes lifecycles and budgets for all security equipment and products;
• Monitors baseline of firmware for security risks across all supported hardware;
• Leads change control by reviewing changes for technical accuracy and risk analysis;
• Partners with external vendors on solution architecture and procurement;
• Provides leadership to identify, manage, and resolve risks in a team environment;
• Works independently with little supervision on day-to-day tasks, receiving general instructions on new assignments;
• Travels to project areas, business-related events, and other client locations as required;
• Performs other duties as required.
Knowledge, Skills, and Abilities:
• Expert knowledge of firewalls, preferably Cisco (Meraki, ASA) and Palo Alto;
• Expert knowledge of DDOS platforms and how they apply to Service Providers, preferably Deepfield;
• Demonstrated knowledge of the SOC2, NIST, or ISO 27001 Cyber Security Framework and associated best practices;
• Expert knowledge of packet traces, Sflow/Cflow;
• Demonstrated knowledge of security best practices in multi-tenant environments;
• Demonstrated knowledge of risk management for infrastructure as well as CPE equipment;
• Excellent verbal and written communication skills to both technical and non-technical stakeholders;
• Adept at strategic thinking, time management, and problem-solving;
• Ability to travel for business requirements; must possess a valid Driver’s License with a satisfactory driving record.
Education and Experience:
• BA or BS in information security, engineering, or related area or a minimum of 5 years in the service provider industry, with at least two of the preferred related certifications.
• Preferred Certifications or equivalent:
· Certified Information Systems Security Professional (CISSP)
· GIAC Security Essentials Certification (GSEC)
· Systems Security Certified Practitioner (SSCP)
· Certified Information Security Manager (CISM)
• Experience in creating and maintaining project plans is highly preferred.
• Experience in cyber security and related infrastructure technologies, cloud-based infrastructure, and software defined networks required.
Sirius Staffing is an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to characteristics such as race, color, national origin, religion, gender, age, marital status, disability, veteran status, citizenship status, sexual orientation, gender identity, or any other status protected by law.
Cyber Security Architect
Security Engineer Job 12 miles from Sherwood
**Job Title - Cyber Security Architect** **Remote** The Cyber Security Architect role involves designing and implementing robust security solutions to protect the organizations digital assets. With a focus on solution design and architecture, the candidate will ensure the security infrastructure aligns with business objectives. This hybrid role requires a strategic thinker who can adapt to evolving threats and collaborate effectively across teams.
**Responsibilities**
+ Develop comprehensive security architectures that safeguard the organizations digital assets and support business objectives - Collaborate with cross-functional teams to integrate security measures into existing systems and processes - Conduct thorough risk assessments to identify vulnerabilities and recommend appropriate mitigation strategies - Implement advanced security protocols and technologies to enhance the organizations defense mechanisms - Monitor and analyze security systems to detect and respond to potential threats in a timely manner - Provide expert guidance on security best practices and ensure compliance with industry standards and regulations - Design and implement security solutions that are scalable and adaptable to changing business needs - Evaluate emerging security technologies and recommend their adoption to enhance the organizations security posture - Lead efforts to educate and train staff on security awareness and protocols - Develop incident response plans and conduct regular drills to ensure preparedness for potential security breaches - Collaborate with external partners and vendors to ensure the integration of secure solutions - Oversee the implementation of security policies and procedures across the organization - Contribute to the development of strategic security initiatives that align with the company goals.
**Certifications Required**
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM)
Salary and Other Compensation:Applications will be accepted until June 28th 2025.The annual salary for this position is between $110K- 134K depending on experience and other qualifications of the successful candidate.This position is also eligible for Cognizant's discretionary annual incentive program, based on performance and subject to the terms of Cognizant's applicable plans.Benefits: Cognizant offers the following benefits for this position, subject to applicable eligibility requirements:· Medical/Dental/Vision/Life Insurance· Paid holidays plus Paid Time Off· 401(k) plan and contributions· Long-term/Short-term Disability· Paid Parental Leave· Employee Stock Purchase PlanDisclaimer: The salary, other compensation, and benefits information is accurate as of the date of this posting. Cognizant reserves the right to modify this information at any time, subject to applicable law.
Cognizant is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
Security Engineer II
Security Engineer Job 12 miles from Sherwood
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Physical Security Systems Analyst
Security Engineer Job 12 miles from Sherwood
The primary responsibility of the Corporate Security Analyst (Physical Security Systems Analyst) is to assist in the management of electronic security systems and applications. Other responsibilities include creating and maintaining security reports, assisting with electronic security projects, conducting branch risk assessments, assisting with access control provisioning and auditing, and assisting with Corporate Security's response to crisis events.
ESSENTIAL DUTIES AND RESPONSIBILITIES
* Partner with vendors and internal partners to manage all electronic security systems.
* Assist with annual or bi-annual site risk assessments.
* Assist with provisioning and auditing of access control systems
* Assist with physical security projects.
* Assist with Disaster Recovery planning and implementation during crisis events.
* Inventory and maintain electronic security equipment for storage and deployment.
* Performs all other duties as assigned.
SUPERVISORY RESPONSIBILITIES
* No supervisory responsibilities
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Additionally, the qualifications listed below are representative of the knowledge, skills, and/or abilities required in this position:
* Bachelor (4-year college) degree and 2-5 years of experience or equivalent combination of education and experience.
COMPUTER AND OFFICE EQUIPMENT SKILLS
* Microsoft Office suite
CERTIFICATES, LICENSES, REGISTRATIONS (Ex: CPA, Series 6 or 7 license, etc)
None required
About Us
First Horizon Corporation is a leading regional financial services company, dedicated to helping our clients, communities and associates unlock their full potential with capital and counsel. Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. First Horizon has been recognized as one of the nation's best employers by Fortune and Forbes magazines and a Top 10 Most Reputable U.S. Bank. More information is available at *********************
Benefit Highlights
* Medical with wellness incentives, dental, and vision
* HSA with company match
* Maternity and parental leave
* Tuition reimbursement
* Mentor program
* 401(k) with 6% match
* More -- FirstHorizon.com/First-Horizon-National-Corporation/Careers/Our-Benefits
Follow Us
Facebook
X formerly Twitter
LinkedIn
Instagram
YouTube
Principal Security Engineer
Security Engineer Job 12 miles from Sherwood
At Oracle Cloud Infrastructure (OCI) we build the future of the cloud for Enterprises. We act with the speed and attitude of a start-up along with the scale and customer focus of the leading enterprise software company in the world. **About the team:**
The Enterprise Engineering SRE team is tasked with ensuring the security and compliance of internal systems by conducting regular audits, identifying potential gaps in existing standards and proactively improving the organization's overall security posture. The team plays a critical role in safeguarding the integrity, confidentiality and availability of all systems while driving risk management initiatives across departments including disaster recovery planning and execution. We are also responsible for liaising with various internal teams during audits, ensuring data sharing is concise, accurate and aligned for successful audit outcomes.
**Ideally, the candidate will possess several of the following skills:**
Supports the strengthening of Oracle's security posture, focusing on one or more of the following: regulatory compliance; risk management; incident management and response; security policy development and enforcement; Threat and Vulnerability Management; Incident Management and response and similar focus areas.
+ **Regulatory Compliance:** Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, CMMC, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance
+ **Risk Management:** Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. Conduct and document very complex information security risk assessments and assist in the creation and implementation of security solutions and programs
+ **Cloud Security:** In-dept knowledge of cloud security principles and best practices, including securing cloud infrastructure, services, and applications in platforms, OCI experience is a plus
+ **Threat and Vulnerability Management:** Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required
+ **Incident Management and response:** Brings advanced level skills to respond to security events and responding in line with Oracle incident response playbooks to mitigate vulnerabilities
+ Mentors and trains other team members
+ Compiles information and reports for management
**Qualifications:**
+ Bachelor's degree in computer science, Information Security, or a related field. Master's degree preferred
+ 10+ years of experience in cybersecurity, security architecture, or a related technical security role securing cloud environments and developing automation workflows, incident detection, response, and vulnerability remediation
+ Industry certifications such as CISSP, OSCP, CISM, GIAC, or OCI/AWS/Azure Security Specialty highly preferred.
+ Proven experience in security architecture, threat modeling, and risk management at an enterprise level.
+ Expertise in network security, cloud security (OCI, AWS, Azure, GCP), endpoint security, Operating systems (Linux, Windows), MiddleTier, Database and identity management.
+ Develop and enforce security policies, governance frameworks, and compliance controls (NIST, ISO 27001, SOC 2, GDPR, HIPAA, etc.).
+ Hands-on experience with firewalls, SIEM tools, IDS/IPS, EDR solutions, and security automation.
+ Oversee security incident response, forensic analysis, red/blue teaming experience, containment, and remediation of cyber threats
+ Strong knowledge of cryptography, secure coding practices, zero-trust architecture, and IAM.
+ Scripting experience with one or more scripting languages: bash, python, perl, YAML or infrastructure as code tools such as Terraform or Cloudformation.
+ Familiarly with container orchestration technologies such as Kubernetes, Openshift, EKS, AKS, container image scanning and vulnerability management
+ Excellent communication skills with the ability to effectively communicate technical concepts to both technical and non-technical stakeholders. Exhibits excellent written and verbal communication skills
Career Level - IC4
**Responsibilities**
+ Develop and manage information security governance, including creating policies, procedures, standards, baselines, and guidelines to ensure the secure operation of information systems.
+ Collaborate with cross-functional teams to establish and maintain robust security policies and procedures, ensuring alignment with industry best practices
+ Build application security frameworks review process (e.g., OWASP Top 10) to identify vulnerabilities such as SQL injection, XSS, and insecure APIs.
+ Designing secure system architectures, both on-premise and in the cloud, with knowledge of zero-trust security models, segmentation, and access control models
+ Evaluate and implement encryption at rest and in transit to secure sensitive data using encryption algorithms (e.g., AES, RSA), public key infrastructure (PKI), SSL/TLS, secrets in vault and key management practices.
+ Build security patterns for hosting platforms (compute, OKE, containers, cloud native services), SaaS, and PaaS services, conduct security architecture and design review
+ Perform code reviews, security testing (e.g., SAST, DAST), and the implementation of secure coding practices within SDLC pipeline, and utilizing CI/CD tools (Jenkins, Git, GitHub Actions, Artifactory, sonarqube), as well as managing secrets, SCA, and open-source tools
+ Build, develop and monitor systems configuration management automation and infrastructure as code (IaC) strategies to achieve secure by design framework
+ Monitors information systems for security incidents and vulnerabilities; develops monitoring and visibility capabilities; reports on incidents, vulnerabilities, and trends to IT or executive management.
+ Proven leadership abilities with experience leading security projects and initiatives independently with Agile or Waterfall methodologies
+ Architects, designs, implements, maintains and operates information system security controls and countermeasures; supervises and trains operators in the administration of these systems; documents the operation, use, and expected outputs of these systems
+ Develop and maintain cybersecurity documentation such as the System Security Plan (SSP), Privacy Impact Assessment (PIA), Configuration Management Plan (CMP), Plan of Action and Milestones (POA&M), and Standard Operating Procedures (SOP) as necessary
+ Write stakeholder reports to explain the assessment, audit results, and recommendations. Create and provide metrics for cybersecurity leadership. Brief executive leadership on compliance matters
+ Participate in internal and external audit and provide executive leadership with briefings on compliance issues, assessment findings, audit results, and recommended actions.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Client Security Engineer
Security Engineer Job 12 miles from Sherwood
Meta's Client Security team is seeking experienced Security Engineer who have a track record of solving complex security problems at scale. Client Security Engineers design and develop solutions to ensure Meta's data and systems can only be accessed by trusted devices, and that applicable security policies are enforced on devices.
**Required Skills:**
Client Security Engineer Responsibilities:
1. Drive Meta's trusted devices strategy by building tools that enable connectivity to our infrastructure only from Meta owned and managed devices
2. Build machine attestation and secure certificate storage solutions to enable provable client identity
3. Deploy systems that help mitigate security risks by understanding and controlling what software is allowed to execute on our client devices
4. Develop, validate, and enforce our client security policies
5. Build and deploy tools and automation that proactively detect and respond to security risks and threats to internal corporate services
6. Advise and collaborate with other teams
**Minimum Qualifications:**
Minimum Qualifications:
7. 5+ years of combined experience designing and deploying security infrastructure (such as PKI, key management, and certificate management)
8. 2+ years of software development experience in PHP, Golang, Python, C\C++, Rust, or Ruby
9. Experience applying fundamental security concepts to systems
10. B.S. in Computer Science or a related field, or equivalent experience
**Preferred Qualifications:**
Preferred Qualifications:
11. Mobile Security Experience on iOS and Android platforms including MDM, security policy
12. OS development experience (Windows, Mac, Linux)
13. Experience managing PKI for client devices
**Public Compensation:**
$147,000/year to $208,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Engineer, Cyber Security Operations (IR)
Security Engineer Job 12 miles from Sherwood
Headquartered in Dublin, Ohio, Cardinal Health, Inc. (NYSE: CAH) is a global, integrated healthcare services and products company connecting patients, providers, payers, pharmacists and manufacturers for integrated care coordination and better patient management. Backed by nearly 100 years of experience, with more than 50,000 employees in nearly 60 countries, Cardinal Health ranks among the top 20 on the Fortune 500.
Cardinal Health's Information Security team is on a tremendous growth journey adding a number of new team members in our Cyber Threat Operations Center (CTOC). We aim to be a world-class cybersecurity organization that enables Cardinal Health to be healthcare's most trusted partner.
We boast tremendous opportunities to grow and apply technical skills to meet organizational needs, empowering talented team members who mentor and uplift others, led by leaders with a maniacal focus on employee development and well-being, dedicated training programs, and a fun and collaborative atmosphere. We currently have a career opening for an Engineer, Cyber Security Operations (IR).
Cyber Threat Operations Center (CTOC) Overview
The is a pivotal role on the Security Incident Response Team within the Cyber Threat Operation Center (CTOC) at Cardinal Health. This person is responsible for the CTOC's visibility into Cardinal's network, infrastructure, endpoints and applications and ensuring our operations team can quickly identify and respond to threats. The ideal candidate's unique blend of platform engineering and data science skills will help influence cybersecurity strategy and future roadmap initiatives.
+ We exist to ensure availability, integrity and confidentiality of healthcare infrastructure that safeguards the patient
+ We promote a culture that protects information assets, manages risk and embeds security in people, process and technology
+ Defines solutions that balance information security requirements against business needs.
+ Investigates and resolves security incidents and recommends enhancements to improve security.
Accountabilities:
+ Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to perform initial, forensically sound collection on endpoints of security incident related artifacts.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to effectively use Enterprise Detection and Response solutions (FireEye HX, CrowdStrike, CarbonBlack) to respond, investigate, and remediate security incidents involving enterprise assets.
+ Develop and implement advanced threat detection mechanisms to identify potential security incidents.
+ Create custom alerts using our SIEM technologies to enhance visibility and response capabilities.
+ Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
+ Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
+ Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
+ Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
+ Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
+ Perform cyber defense trend analysis and reporting.
+ Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
+ Coordinate with intelligence analysts to correlate threat assessment data.
+ Write and publish after action reviews.
Qualifications:
+ Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
+ Ability to apply techniques for responding to host and network-based intrusions using incident response technologies and techniques.
+ 5+ years of experience in a related field preferred
+ Bachelor's or above in related field or equivalent work experience
+ Strong analytical, collaborative, problem solving, organizational and planning skills.
+ Strong written and oral interpersonal skills.
+ Proficient PC skills; including working knowledge of Microsoft Office products.
+ Skill of identifying, capturing, containing, and reporting malware.
+ Skill in preserving evidence integrity according to standard operating procedures or national standards.
+ Skill in securing network communications.
+ Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
+ Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
+ Skill in performing damage assessments.
+ Skill in using security event correlation tools.
+ Skill to design incident response for cloud service models.
+ Knowledge of Endpoints (laptop/desktop/server) related to cyber security incident response
+ Knowledge of Incident response case management and automation (SOAR)
+ Knowledge of Incident Response toolsets and specifically phishing group mailbox support
+ Knowledge of SIEM technologies and utilization within a cyber security environment
+ Knowledge of Logging/monitoring solutions and implementations
+ Ability to apply comprehensive knowledge and a thorough understanding of concepts, principles, and technical capabilities to perform varied tasks and projects related to incident response
**Anticipated salary range:** $93,500 - $140,280
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 5/28/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Physical Security Analyst
Security Engineer Job 20 miles from Sherwood
The position of Physical Security Analyst reports to the Sr Physical Security Officer. This job is responsible for ensuring that company employees and customers have a safe and secure environment from which to work and transact business. In doing so, the SAI will assist in overseeing security policies and procedures, monitor and respond to security incidents, as well as conduct security scans of company facilities (both in person and virtually) to ensure adherence to policies and procedures. Additionally, the Physical Security Analyst is responsible for assisting in the assessment of risks and the offering solutions for mitigation.
ESSENTIAL DUTIES AND RESPONSIBILITIES
1. Conduct physical security and risk vulnerability inspections, evaluate and provide recommendations for mitigation.
2. Develop and implement physical security standards and procedures. This duty is performed as needed.
3. Evaluate existing security policies and procedures.
4. Assist in the development of security training for company personnel.
5. Recommend actions to avoid conditions conducive to threats such as vandalism, terrorism or theft.
6. Evaluate clearances for management and personnel according to the information and property they may access.
7. Review facilities designs and assist in designing the appropriate security measures for the property to include access, alarms, cameras, DVRs, etc.
8. Prepare reports related to security incidents, access, effectiveness of the security program, and risk assessments.
9. Serve as a conduit between retail staff and third party security providers.
10. Assist with developing a strategic framework to ensure security upgrades are completed timely and in order of risk posed to the company.
11. Conduct video reviews such as pulls for Law Enforcement , HR and Subpoenas and respond in a timely manner.
12.Completes required BSA/AML training and other compliance training as assigned.
13. The ability to work in a constant state of alertness and in a safe manner.
14. Perform any other related duties as required or assigned.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty mentioned satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required.
EDUCATION AND EXPERIENCE
Knowledge of a specialized field (however acquired), such as basic accounting, computer, etc. Equivalent of four years in high school, plus night, trade extension, or correspondence school specialized training, equal to two years of college, plus 2 years related experience and/or training, and 1 to 6 months related management experience, or equivalent combination of education and experience.
COMMUNICATION SKILLS
Ability to effectively communicate information and respond to questions in person-to-person and small group situations with customers, clients, general public and other employees of the organization. ability to write reports, business correspondence, and policy/procedure manuals; ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public.
MATHEMATICAL SKILLS
Ability to add, subtract, multiply, and divide in all units of measure, using whole numbers, common fractions, and decimals. Ability to compute rate, ratio, and percent and to prepare and interpret bar graphs.
CRITICAL THINKING SKILLS
Ability to solve practical problems and deal with a variety of known variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, or diagram formats.
REQUIRED CERTIFICATES, LICENSES, REGISTRATIONS
Not indicated.
PREFERRED CERTIFICATES, LICENSES, REGISTRATIONS
CompTIA A+ Certification
CompTIA Security+ Certification
SOFTWARE SKILLS REQUIRED
Intermediate: 10-Key, Alphanumeric Data Entry, Contact Management, Presentation/PowerPoint, Spreadsheet, Word Processing/Typing
Basic: Accounting, Database
WORKING CONDITIONS
Periodically exposed to such elements as noise, intermittent standing, walking, pushing, carrying, or lifting; but none are present to the extent of being disagreeable.
ENVIRONMENTAL CONDITIONS
The following work environment characteristics described here are representative of those an employee encounters while performing essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
The noise level in the work environment is usually moderate.
PHYSICAL ACTIVITIES
The following physical activities described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions and expectations.
Semi-repetitive, low physical. Semi-repetitive type work which requires periods of concentration for varied time cycles as prescribed by the tasks.
While performing the functions of this job, the employee is regularly required to sit, use hands to finger, handle, or feel, talk or hear; frequently required to reach with hands and arms; and occasionally required to stand, walk, climb or balance, stoop, kneel, crouch, or crawl. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision; and distance vision.
ADDITIONAL INFORMATION
* General knowledge related to physical security, DVRs, and video surveillance preferred
* Knowledge and experience with Verint Systems' Ops-Center and Vid-Center preferred
* Knowledge and experience with Pacom Systems preferred
* 1 year of experience in Retail Banking/Financial Services preferred
Physical Security Systems Analyst
Security Engineer Job 12 miles from Sherwood
The primary responsibility of the Corporate Security Analyst (Physical Security Systems Analyst) is to assist in the management of electronic security systems and applications. Other responsibilities include creating and maintaining security reports, assisting with electronic security projects, conducting branch risk assessments, assisting with access control provisioning and auditing, and assisting with Corporate Security's response to crisis events.
**ESSENTIAL DUTIES AND RESPONSIBILITIES**
+ Partner with vendors and internal partners to manage all electronic security systems.
+ Assist with annual or bi-annual site risk assessments.
+ Assist with provisioning and auditing of access control systems
+ Assist with physical security projects.
+ Assist with Disaster Recovery planning and implementation during crisis events.
+ Inventory and maintain electronic security equipment for storage and deployment.
+ Performs all other duties as assigned.
**SUPERVISORY RESPONSIBILITIES**
1. No supervisory responsibilities
**QUALIFICATIONS**
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. Additionally, the qualifications listed below are representative of the knowledge, skills, and/or abilities required in this position:
1. Bachelor (4-year college) degree and 2-5 years of experience or equivalent combination of education and experience.
**COMPUTER AND OFFICE EQUIPMENT SKILLS**
1. Microsoft Office suite
**CERTIFICATES, LICENSES, REGISTRATIONS (Ex: CPA, Series 6 or 7 license, etc)**
None required
**About Us**
First Horizon Corporation is a leading regional financial services company, dedicated to helping our clients, communities and associates unlock their full potential with capital and counsel. Headquartered in Memphis, TN, the banking subsidiary First Horizon Bank operates in 12 states across the southern U.S. The Company and its subsidiaries offer commercial, private banking, consumer, small business, wealth and trust management, retail brokerage, capital markets, fixed income, and mortgage banking services. First Horizon has been recognized as one of the nation's best employers by Fortune and Forbes magazines and a Top 10 Most Reputable U.S. Bank. More information is available at ******************** (https://urldefense.com/v3/\_\_https:/********************/\_\_;!!Cz2fjcuE!hpq9hPnrucZCPIAVPojVESItIq-FPzhurNdCrQ3JE8Rkx3gMd70nIk6\_kmPxl66\_oJCEsXs0gNunPowMAMHCmBYPOtUxUGI$) .
**Benefit Highlights**
- Medical with wellness incentives, dental, and vision
- HSA with company match
- Maternity and parental leave
- Tuition reimbursement
- Mentor program
- 401(k) with 6% match
- More -- FirstHorizon.com/First-Horizon-National-Corporation/Careers/Our-Benefits
**Follow Us**
Facebook (******************************************
X formerly Twitter
LinkedIn (***************************************************
Instagram
YouTube (**********************************************************
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
This employer is required to notify all applicants of their rights pursuant to federal employment laws.
For further information, please review the Know Your Rights (**************************** notice from the Department of Labor.
Information Security Analyst
Security Engineer Job 12 miles from Sherwood
Directly accountable for safeguarding the organization's information assets. The role involves designing, implementing, and enforcing security protocols and procedures that mitigate risks and ensure compliance. With heavy focus in information security operations, including vulnerability management, incident/event management, compliance management, policy/procedure development and information security awareness.
This responsibility will be carried out through the development of information security requirements, planning, design, implementation, and periodic audit/validation of effectiveness of all security controls.
Accountabilities:
+ Determine information security requirements by evaluating and researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; and identifying integration issues.
+ Design, and implement security controls for our infrastructure and critical systems.
+ Verify information security systems effectiveness by developing and implementing testing and validation processes to periodically audit systems.
+ Collaborate with managed security service provider (MSSP) to ensure their services are effectively delivered to our organization and validate that alerts are properly acted upon to mitigate identified threats.
+ Support security incident response activities utilizing security tools (SIEM/SOAR)
+ Collaborate in the development of a Business Continuity and Disaster Recovery plan.
+ Prepare system security reports by collecting, analyzing, and summarizing data and trends.
+ Track and understand emerging security practices and threats. Leverage this knowledge to improve security configurations across the enterprise and hunt for potential or active threats.
+ This role will be responsible for monitoring Healthcare industry and regulatory trends to ensure prompt and complete action plans are developed and implemented to address such requirements.
+ Serve as the liaison for audit activities related to the areas of information security.
+ This will also include maintaining ongoing cybersecurity risk profile using the recommended industry tools, and being certain that activities which keep us aligned with our target levels are implemented.
+ Demonstrable expertise in implementing, managing, and fine-tuning security controls using a variety of security tools and frameworks. Specific experience with Palo Alto firewalls and Palo Alto suite of security tools, Fortinet Fortigate Firewalls, Meraki, Active Directory and other infrastructure tools as identified.
+ In-depth experience with Identity and Access Management (IAM), specifically in designing and implementing IAM solutions for provisioning, de-provisioning, and role-based access controls within the organization. Familiarity with industry standard IAM solutions and best practices is a must.
+ Familiarity with monitoring and managing security incidents, including the use of Security Information and Event Management (SIEM) tools.
+ Proven track record in working with cross-functional teams to address security and compliance challenges, specifically in a Healthcare environment.
+ Experience in developing and implementing security policies and procedures that align with industry regulations such as PCI and HIPPA.
+ Previous involvement in handling external and internal audits related to information security, along with remediation of identified issues.
+ A high level of problem-solving skills and the ability to communicate in a clear, concise manner.
+ Must be able to communicate effectively in both oral and written form and explain technical concepts in non-technical terms to staff and prepare clear and concise written communications.
+ Must be able to manage multiple projects/tasks concurrently; and prioritize requests and complete assignments within an estimated timeframe; and organize, schedule, and coordinate a variety of activities and projects.
+ Must have the ability to learn new software and hardware packages and adapt to changes in technology.
Qualifications:
+ Bachelor's Degree in computer science or Equivalent work experience
+ At least 5 years of experience in information security preferred
+ Excellent written communication skills.
+ Strong organizational and planning skills.
+ Demonstrates a high degree of personal integrity and practices ethical standards. Must remain objective and independent when completing assignments, and consistently demonstrate the ability to hold information in confidence.
+ Demonstrated proactiveness and an ability to work independently and self-directed in managing multiple concurrent projects.
+ Excellent analytical and problem-solving skills.
**Anticipated salary range:** $79,700 - $119,490
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 5/28/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************