Principal Security Engineer
Security engineer job in Cheyenne, WY
The Oracle Cloud Security and Safety team is seeking dedicated security engineers looking to make their mark in a new security domain. The team is committed to bridging the gap between operations and security, empowering the engineering and operations teams within Oracle to operate their services without fear of security impacting mistakes or malicious behavior. Oracle Cloud Infrastructure is committed to constantly improving and securing our suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. We are committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges.
We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult architecture, engineering, and process problems. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services. Our ideal candidate is a security engineer with expertise and passion in finding and improving areas of weakness, while developing new standards in the security and safe operation of distributed systems, multi-tenant services and large-scale infrastructures. If this is you, joining Oracle Cloud Infrastructure (OCI) will enable you to design and build innovative new security models & systems from the ground up. These are exciting times in our space - we are growing fast and working on ambitious new initiatives. A security-focused engineer at any level can make significant technical and business impact
**Responsibilities**
+ Prototype, design, and implement security solutions for new and challenging problems
+ Drive and champion security tool development (e.g. scanning tools)
+ Consult software development teams in design and architecture of safe and secure systems through Threat Modeling and modeling exercises
+ Champion and consult on secure development lifecycle practices
+ Design and integrate verification and posture reporting mechanisms
+ Define security configuration and implementation best practices
Qualifications:
+ Bachelor's or Master's degree in Computer Science or related field
+ 5+ years of experience in security engineering or related field or equivalent experience
+ Experience building automated security solutions
+ Strong security experience, particularly with focus in one of the following areas:
+ Defensive Security
+ Offensive Security
+ Service architecture and Design Patterns
+ Strong collaboration and communication skills
Preferred Skills
+ Experience scaling operational activities via Python, Bash, and other tools
+ DevOps or SRE experience operating large, distributed, continuously deployed services
+ Experience operating large, distributed, continuously deployed services
+ Expertise in designing databases schemas in (NoSQL / SQL).
+ Knowledge on bridging security engineering requirements into the software development life cycle.
+ Security training and mentoring experience
+ Experience with statistical/mathematical predictive modeling
+ Experience with machine learning / artificial intelligence
+ Experience designing resilient systems that support quick recovery
+ Experience with container orchestration and management
+ History of collaborating and integrating processes with software development teams, data scientists, business and other technical roles
+ Experience with Java or Python development
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Product Security Engineer, AI
Security engineer job in Cheyenne, WY
Meta's Product Security team is seeking a experienced hacker who derives purpose in life by revealing potential weaknesses and then crafting creative solutions to eliminate those weaknesses. Your skills will be the foundation of security initiatives that protect the security and privacy of over two billion people. You will be relied upon to provide engineering and product teams with the web, mobile, or native code security expertise necessary to make informed product decisions. Come help us make life hard for the bad guys.
**Required Skills:**
Product Security Engineer, AI Responsibilities:
1. Security Reviews: perform manual design and implementation reviews of products and services that make up the Meta ecosystem, like Instagram, WhatsApp, Oculus, Portal, and more
2. Developer Guidance: provide guidance and education to developers that help prevent the authoring of vulnerabilities
3. Automated Analysis and Secure Frameworks: build automation (static and dynamic analysis) and frameworks with software engineers that enable Meta to scale consistently across all of our products
**Minimum Qualifications:**
Minimum Qualifications:
4. BS or MS in Computer Science or a related field, or equivalent experience
5. 8+ years of experience finding vulnerabilities in interpreted languages. Knowledge of best practice secure code development
6. Experience with exploiting common security vulnerabilities
7. Knowledge of common exploit mitigations and how they work
8. Coding and scripting experience in one or more general purpose languages
**Preferred Qualifications:**
Preferred Qualifications:
9. Experience creating software that enables security processes, especially those leveraging AI/ML for automation or augmentation
10. Experience integrating or building AI-powered tools to assist with vulnerability detection, code review, or threat modeling
11. Experience creating software that enables security processes
12. 8+ years of experience finding vulnerabilities in C/C++ code
13. Contributions to the security community (public research, blogging, presentations, bug bounty)
14. Demonstrated ability to collaborate with AI researchers or engineers to apply AI in security workflows
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Staff AI Security Architect
Security engineer job in Cheyenne, WY
Datavant is a data platform company and the world's leader in health data exchange. Our vision is that every healthcare decision is powered by the right data, at the right time, in the right format. Our platform is powered by the largest, most diverse health data network in the U.S., enabling data to be secure, accessible and usable to inform better health decisions. Datavant is trusted by the world's leading life sciences companies, government agencies, and those who deliver and pay for care.
By joining Datavant today, you're stepping onto a high-performing, values-driven team. Together, we're rising to the challenge of tackling some of healthcare's most complex problems with technology-forward solutions. Datavanters bring a diversity of professional, educational and life experiences to realize our bold vision for healthcare.
**What We're Looking For**
As a Staff AI Security Architect at Datavant, you will lead the design, evolution, and adoption of secure by design principles across our AI and Machine Learning (ML) systems. This role sits at the intersection of AI innovation and security architecture. You will define and operationalize AI security strategy, embed security into the AI/ML development lifecycle, and partner deeply with data science, engineering, product, legal, and compliance teams to ensure our AI systems are secure, trustworthy, and scalable.
**What You Will Do**
+ Establish AI security architectural standards, design patterns, and best practices adopted across engineering teams.
+ Architect and advise on secure end-to-end AI systems, including data pipelines, model training, evaluation, deployment, runtime monitoring, and agentic workflows.
+ Lead threat modeling, architecture reviews, and risk assessments for AI-driven products, including LLMs, agent frameworks, and multi-agent systems.
+ Define and evolve a comprehensive AI/ML secure development lifecycle integrated into existing SDLC practices.
+ Develop reference architectures, documentation, and reusable security components to accelerate secure AI adoption.
+ Collaborate with legal, privacy, compliance, and responsible AI stakeholders to align security controls with regulatory and ethical requirements.
+ Act as a trusted advisor to senior leadership on AI security risks, trade-offs, and long-term strategy.
**What You Need to Succeed**
+ 8+ years of experience in security architecture, application security, or product security, with meaningful focus on AI/ML systems.
+ Hands-on experience securing AI/ML or LLM-based systems, including familiarity with modern AI architectures and agentic workflows.
+ Strong understanding of AI threat models, including adversarial ML, prompt injection, data poisoning, model theft, and abuse scenarios.
+ Proven ability to design and influence security architectures for large-scale, distributed systems.
+ Strong communication skills with the ability to translate complex technical concepts to both technical and non-technical stakeholders.
+ Have a strong understanding of security controls, both those that exist in audit standards as well as practical controls that can help reduce risk and increase safety.
**What Helps You Stand Out**
+ Hands-on experience building, testing, or tinkering with agentic AI workflows, with an understanding of the security risks they introduce.
+ Experience securing AI/ML workloads in Databricks, with a deep understanding of its platform-specific security risks.
+ You have experience with security in healthcare or other highly regulated space. Examples: HIPAA, HITRUST, SOC 2, PCI, FedRamp experience from an operational response standpoint.
We are committed to building a diverse team of Datavanters who are all responsible for stewarding a high-performance culture in which all Datavanters belong and thrive. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
At Datavant our total rewards strategy powers a high-growth, high-performance, health technology company that rewards our employees for transforming health care through creating industry-defining data logistics products and services.
The range posted is for a given job title, which can include multiple levels. Individual rates for the same job title may differ based on their level, responsibilities, skills, and experience for a specific job.
The estimated total cash compensation range for this role is:
$224,000-$280,000 USD
To ensure the safety of patients and staff, many of our clients require post-offer health screenings and proof and/or completion of various vaccinations such as the flu shot, Tdap, COVID-19, etc. Any requests to be exempted from these requirements will be reviewed by Datavant Human Resources and determined on a case-by-case basis. Depending on the state in which you will be working, exemptions may be available on the basis of disability, medical contraindications to the vaccine or any of its components, pregnancy or pregnancy-related medical conditions, and/or religion.
This job is not eligible for employment sponsorship.
Datavant is committed to a work environment free from job discrimination. We are proud to be an Equal Employment Opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status. To learn more about our commitment, please review our EEO Commitment Statement here (************************************************** . Know Your Rights (*********************************************************************** , explore the resources available through the EEOC for more information regarding your legal rights and protections. In addition, Datavant does not and will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay.
At the end of this application, you will find a set of voluntary demographic questions. If you choose to respond, your answers will be anonymous and will help us identify areas for improvement in our recruitment process. (We can only see aggregate responses, not individual ones. In fact, we aren't even able to see whether you've responded.) Responding is entirely optional and will not affect your application or hiring process in any way.
Datavant is committed to working with and providing reasonable accommodations to individuals with physical and mental disabilities. If you need an accommodation while seeking employment, please request it here, (************************************************************** Id=**********48790029&layout Id=**********48795462) by selecting the 'Interview Accommodation Request' category. You will need your requisition ID when submitting your request, you can find instructions for locating it here (******************************************************************************************************* . Requests for reasonable accommodations will be reviewed on a case-by-case basis.
For more information about how we collect and use your data, please review our Privacy Policy (**************************************** .
Lead Adversarial Security Engineer
Security engineer job in Cheyenne, WY
**_Job Title:_** Lead Adversarial Security Engineer **About** **Trellix:** **Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work.** Our comprehensive, GenAI-powered platform helps organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Along with an extensive partner ecosystem, we accelerate technology innovation through artificial intelligence, automation, and analytics to empower over 53,000 customers with responsibly architected security solutions.
We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking a meaningful future in cybersecurity and look for candidates across industries to join us in soulful work. More at ************************ .
**_Role Overview:_**
Trellix is seeking an Adversarial Security Engineer to lead the evolution of its cybersecurity posture. This is a senior, hands-on, remote-first role for a red/blue/purple expert who possesses a valuable blend of offensive tradecraft and defensive-engineering skills.
**Role Overview:**
As a lead member of the security operations team, and reporting to the Deputy CISO the mission of this role is to bridge the gap between "what if" and "what is" to continuously test the organization's defenses, find gaps, and personally lead the engineering effort to close them. By collaborating with the Security Operations Center (SOC), Threat Intelligence, and infrastructure teams, this expert will act as a force multiplier, mentoring junior security operations staff and providing the technical leadership to measurably improve the ability to detect and respond to advanced threats.
**About the role:**
+ Plan and execute sophisticated, end-to-end red team engagements against our on-premise and cloud infrastructure.
+ Develop and validate new detection logic, transforming the results of your own attacks into high-fidelity alerts.
+ Lead continuous purple team exercises, acting as the primary bridge between the SOC, Threat Intelligence, and Detection Engineering teams.
+ Leverage Attack Surface Management (ASM) data to find "Shadow IT" and prioritize your offensive operations based on the most likely and impactful attack vectors.
+ Act as a senior technical leader, mentoring SOC analysts and junior engineers on advanced attack chains, detection theory, and defensive best practices.
+ Communicate complex findings and remediation strategies to a wide range of stakeholders, from highly technical engineers to executive leadership.
**About you:**
+ You have a blended career path of 7+ years, demonstrating experience in both offensive security (like Red Teaming) and defensive operations (like Detection Engineering or Threat Hunting).
+ You possess exceptional communication skills, with an ability to create reports and presentations for both highly technical and executive audiences.
+ You are a U.S. citizen.
+ Your technical expertise is built on a deep, practical understanding of frameworks like MITRE ATT&CK and the Diamond Model.
+ You have proficiency in modern offensive tools and C2 frameworks (e.g., Cobalt Strike, Metasploit) and/or experience developing custom attack methods to evade EDR and network controls.
+ You are proficient in writing, tuning, and validating detection logic in SIEM and EDR platforms.
+ Your knowledge of automation is clear from your proficiency in any scripting languages such as Python or PowerShell.
+ You have practical experience assessing and defending modern cloud environments.
+ You may hold advanced offensive (e.g., OSCP, OSEP, GXPN) or defensive (e.g., GCIH, GDAT) certifications.
+ You may contribute to the community through public-facing research, conference talks, or open-source tools.
**_Company Benefits and Perks:_**
We believe that the best solutions are developed by teams who embrace each other's unique experiences, skills, and abilities. We work hard to create a dynamic workforce where we encourage everyone to bring their authentic selves to work every day. We offer a variety of social programs, flexible work hours and family-friendly benefits to all of our employees.
+ Retirement Plans
+ Medical, Dental and Vision Coverage
+ Paid Time Off
+ Paid Parental Leave
+ Support for Community Involvement
We're serious about our commitment to a workplace where everyone can thrive and contribute to our industry-leading products and customer support, which is why we prohibit discrimination and harassment based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.
Security Consultant - Engineering
Security engineer job in Cheyenne, WY
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Security Consultant - Engineering provides subject matter expertise and technical support on Security Incident and Event Management (SIEM) platforms, supporting and delivering practice focused solutions to our customers. This role involves developing governance models, collaborating with sales and technical teams, delivering training content, and staying informed on industry trends to ensure successful solution delivery and continuous improvement in security practices. Help clients gain insight and context to their complex operating environments and provide services and technology to assess and optimize their existing security platforms to meet the client's security specific needs.
This position is remote with a Home Office setup as determined by Stratascale management.
+ Provide subject matter expertise on Security Incident and Event Management (SIEM) platforms to ensure successful delivery of services to include technologies such as, but not limited to, Palo Alto XSIAM
+ Proactively identify customer needs and requirements through data, customer engagement and other methods to recommend appropriate solutions and drive these solutions through implementation and adoption.
+ Engage with internal team members and client stakeholders to ensure successful solution delivery
+ Stay educated on new product technology, tangential team capabilities, and other specific offerings or programs emerging within our company and within the practice industry
+ Identify areas for continued advancement of strategies aligned with Industry direction, client need, practice scope and present solutions to leadership
+ Execute services by ensuring client needs and practice obligations are met successfully
+ Participate in the development of cross practice training or delegate trainings to team members on practice discipline capability, associated offerings, industry positioning and selling strategies
+ Collaborate with peers to develop and optimize cross practice capabilities as appropriate
+ Serve as a subject matter expert in maintaining, optimizing, and delivering security engineering solutions
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Deep knowledge of Palo Alto Networks XSIAM: Hands-on experience with XSIAM (Extended Security Intelligence & Automation Management), including deployment, configuration, and ongoing management.
+ Log Management: Experience with log ingestion, parsing, normalization, and correlation.
+ Threat Intelligence: Ability to integrate and operationalize threat intelligence feeds within XSIAM.
+ Outstanding written and verbal communication and strong ability to build relationships with customers, partners and staff members
+ Ability to resolve and close complex technical and selling situations while support competitive selling motions
+ Ability to train and disseminate information within an area or operation and work effectively within all levels of an organization, both internally and externally
+ Ability to influence and lead all aspects of sales cycle and engage appropriate internal and external subject matter experts as needed
+ Ability to engage and discuss technical and non-technical concepts and explain complex problems with a wide array of customer audience types including C-Suite, VP/Director,
+ Willingness, drive and winning mindset to compete in customer opportunities
+ Entrepreneurial mindset with ability to identify value in unstructured situations
+ Problem solving skills with the ability to serve as an escalation point and knowledgeable resource and direct resolution while accessing circumstances and current information to make informed and best decision
+ Security Frameworks: Familiarity with MITRE ATT&CK, NIST, and other security frameworks.
**Other Requirements**
+ Completed Bachelor's Degree or relevant work experience required
+ 5+ years of experience working with large organizations on security engineering projects
+ Familiarity with SOC workflows, incident response, threat detection, and security automation.
+ Experience with SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms, especially Palo Alto Cortex XSOAR and XSIAM.
+ Understanding of cloud platforms (AWS, Azure, GCP) and their integration with XSIAM.
+ Ability to travel to SHI, Partner, and Customer Events
+ Advanced industry certifications preferred
The estimated annual pay range for this position is $130,000 - $153,900 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Engineer, Information Security and Risk
Security engineer job in Cheyenne, WY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding.
**Responsibilities:**
+ **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders.
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Engineer II
Security engineer job in Cheyenne, WY
Trustmark's mission is to improve wellbeing - for everyone. It is a mission grounded in a belief in equality and born from our caring culture. It is a culture we can only realize by building trust. Trust established by ensuring associates feel respected, valued and heard. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture of diversity and inclusion where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves. At Trustmark, we have a commitment to welcoming people, no matter their background, identity or experience, to a workplace where they feel safe being their whole, authentic selves. A workplace made up of diverse, empowered individuals that allows ideas to thrive and enables us to bring the best to our colleagues, clients and communities.
We are seeking a highly skilled Cyber Security Engineer to join our team and play a pivotal role in safeguarding our organization's digital assets. The ideal candidate will possess a deep understanding of cybersecurity principles, a strong technical background, and a passion for protecting sensitive information.
You will be responsible for engineering, implementing and monitoring security measures for the protection of Trustmark's computer systems, networks and information. The role helps identify and define system security requirements as well as develop detailed cyber security designs.
**Responsibilities:**
+ Design, implement, and maintain security architectures, systems, and solutions to protect critical infrastructure and data.
+ Conduct vulnerability assessments and penetration testing to identify and mitigate risks.
+ Develop and implement security policies, standards, and procedures.
+ Monitor security systems and respond to incidents promptly and effectively.
+ Stay up-to-date with the latest cybersecurity threats and trends.
+ Collaborate with cross-functional teams to ensure security is integrated into all aspects of the business.
+ Provide technical guidance and support to internal stakeholders.
**Qualifications:**
+ Bachelor's degree in Computer Science, Information Technology, or a related field or
+ 3-5 Years of network engineering or cyber engineering experience
+ Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001).
+ Proficiency in network security, systems security, application security, and data security.
+ Hands-on experience with security tools and technologies (e.g., firewalls, intrusion detection systems, encryption, SIEM).
+ Excellent problem-solving and analytical skills.
+ Strong communication and interpersonal skills.
+ Ability to work independently and as part of a team.
**Preferred Qualifications:**
+ Certifications such as CISSP, CISA, or CEH.
+ Experience with cloud security (e.g., AWS, Azure, GCP).
+ Knowledge of scripting and programming languages (e.g., Python, PowerShell).
Brand: Trustmark
Come join a team at Trustmark that will not only utilize your current skills but will enhance them as well. Trustmark benefits include health/dental/vision, life insurance, FSA and HSA, 401(k) plan, Employee Assistant Program, Back-up Care for Children, Adults and Elders and many health and wellness initiatives. We also offer a Wellness program that enables employees to participate in health initiatives to reduce their insurance premiums.
**For the fourth consecutive year we were selected as a Top Workplace by the Chicago Tribune.** The award is based exclusively on Trustmark associate responses to an anonymous survey. The survey measured 15 key drivers of engaged cultures that are critical to the success of an organization.
All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, sex, sexual orientation, sexual identity, age, veteran or disability.
Join a passionate and purpose-driven team of colleagues who contribute to Trustmark's mission of helping people increase wellbeing through better health and greater financial security. At Trustmark, you'll work collaboratively to transform lives and help people, communities and businesses thrive. Flourish in a culture where appreciation, mutual respect and trust are constants, not just for our customers but for ourselves.
Introduce yourself to our recruiters and we'll get in touch if there's a role that seems like a good match.
When you join Trustmark, you become part of an organization that makes a positive difference in people's lives. You will play a vital role in delivering on our mission of helping people increase wellbeing through better health and greater financial security. Our customers tell us they simply appreciate the personal attention and knowledgeable service. Others tell us we've changed their lives.
At Trustmark, you'll be part of a close-knit team. You'll enjoy abundant opportunities to grow your career. That's why so many of our associates stay at Trustmark and thrive. Trustmark benefits from more than 100 years of experience but pairs that rich history with a palpable sense of optimism, growth and excitement for what's ahead - and beyond. This is a place where associates bring their whole selves to work each day. A place where you can be yourself. Whatever your beyond is, you can achieve it at Trustmark.
Senior Security Engineer - Privacy & ZKP
Security engineer job in Cheyenne, WY
Shape the Future of Blockchain-Bringing Business On-Chain
We're offering a unique opportunity to join Launch Legends (and Autheo) as a part-time Equity Cofounder. Founded nearly four years ago, Launch Legends is at the forefront of bridging Web3 blockchain technology with the next evolution of Web2 integration-bringing businesses on-chain through enterprise-grade solutions, DePIN innovations, and decentralized financial infrastructure.
Our flagship project, Autheo, is an AI enabled Layer-Zero OS with an integrated Layer-1 blockchain and complete decentralized infrastructure thast includes decentralized compute, storage, identity, and service marketplaces, as well as a Full-stack development enveronment (DevHub)-engineered for scalable enterprise adoption, developer innovation, and real-world blockchain integration.
Our Projects
Autheo - **************
Autheo Team - https://**************/teams
Launch Legends (Parent Company) - ********************
Twitter: ****************************
About Autheo
With nearly 100 equity cofounders from leading companies and institutions-many with advanced degrees and PhDs-Autheo is solving the critical challenges blocking business adoption of blockchain technology.
Key Features:
Enterprise-Grade Layer-1 Blockchain - High-speed, self-securing, and cost-efficient infrastructure built for scale.
Developer Hub & Application Marketplace - A decentralized platform where developers build, deploy, and monetize real-world apps.
Web2-Web3 Integration - Microservices, SDKs, and governance frameworks for seamless business migration.
Decentralized Cloud & Compute - Secure, privacy-preserving storage and AI-powered compute for next-gen applications.
DePIN Infrastructure - On-chain networks powering real-world infrastructure ownership and resource sharing.
Traction (Testnet Launch):
Wallet Accounts: 290,000+
Twitter Followers: 30,000+
Discord Members: 19,000+
Smart Contracts Deployed: 30,000+
Developers Registered for MVP DevHub: 7,500+
Compensation & Growth Path
This is a part time equity / token-based cofounder opportunity. You will receive equity in Launch Legends, Autheo, and the WFO Creator Network, along with token allocations in the Autheo blockchain. We have already completed an initial financing round to support infrastructure and marketing, and are currently in discussions with VCs and crypto investors to fund expansion and salaries. Salaried compensation is expected to begin within 4 to 5 months, following our node, token sales or funding.
ROLE: Senior Security Engineer - Privacy & ZKP
About the Role
We are seeking an exceptional Senior Security Engineer - Privacy & ZKP to join our pioneering team as an Equity Co-Founder at the forefront of native blockchain execution. At Autheo, we are building the platform that redefines decentralized computation, delivering sub-microsecond execution speeds, billions of transactions per second throughput, and mathematically proven security against adversaries.
You will own the entire privacy stack that makes surveillance mathematically impossible - 1-5 ms zk-SNARK/STARK proofs at 50 B+ TPS, ε=0.5 differential privacy on all metadata, CKKS/TFHE homomorphic queries at 25 μs, secure MPC across 10,000+ nodes, and full GDPR/CCPA/HIPAA/HITRUST compliance baked into every layer.
Key Responsibilities
• Ship production zk-SNARK + zk-STARK systems generating 1-5 ms proofs at 50 B+ TPS with GPU tensor-core acceleration
• Build recursive + incremental proof composition for constant-size aggregation of millions of transactions
• Implement global ε=0.5 differential privacy with tight privacy-budget accounting (δ
• Deploy CKKS/TFHE homomorphic pipelines enabling encrypted queries and analytics at 25 μs latency
• Design secure MPC protocols for federated training and private set intersection on sensitive healthcare/DeFi data
• Embed automated right-to-be-forgotten via zk-redaction while preserving chain integrity
• Deliver formal privacy proofs (IND-CPA, RUP, DP) using EasyCrypt/Coq and automated CI verification
• Build developer SDKs that make “private by default” zero-config for dApps
Research, Innovation & Thought Leadership
• Publish privacy + zk breakthroughs at IEEE S&P, USENIX Security, PETS, CCS
• Keynote at PETS 2026 / ZKProof 2026 on “50 Billion Private TPS with Formal Guarantees
Requirements - Must Have
• 8+ years shipping production privacy systems (zk-SNARKs/STARKs, FHE, MPC, DP)
• Multiple mainnet deployments with ≥10 B private transactions processed
• Proven formal verification of privacy properties in Coq/EasyCrypt/F*
• Hands-on GPU-accelerated proof generation and homomorphic computation
• Experience passing SOC 2 Type II / HITRUST / HIPAA audits for privacy tech
Nice to Have
• First-author papers at PETS, IEEE S&P, CCS, or ZKProof
• Patents in recursive proofs, private smart contracts, or regulatory-compliant zk
• Experience leading GDPR/CCPA compliance certification
First 90-Day Deliverables
• Live zk-proof system proving 50 B+ TPS state transitions in 1-5 ms
• Global ε=0.5 differential privacy layer protecting all metadata
• Production FHE query engine at 25 μs on encrypted data
• Automated compliance framework passing HIPAA/HITRUST mock audits
• Privacy SDK with one-line “make private” for developers
• Open-source privacy component suite → 2,000+ stars
• Accepted paper + keynote at PETS 2026
Top candidates: 6-hour live privacy design + Rust/CUDA session building recursive zk-proof + DP pipeline from scratch.
About Our Organization
Autheo is a visionary technology company building the virtual machine platform that surpasses Ethereum EVM, Solana SVM, and all legacy execution environments with microsecond latencies, and mathematically proven security. Our mission is to create unbreakable execution infrastructure that empowers developers to build sovereign dApps, confidential DeFi protocols, secure enterprise solutions, and privacy-preserving AI systems. We are developing revolutionary technologies including Layer 0/1 blockchains with attack-resistant consensus, execution environments supporting encrypted computation, sovereign communication systems with perfect forward secrecy, and DePIN networks delivering 200GB/s secure compute. Backed by pioneering runtime leadership and a global team of elite systems engineers, cryptographers, and blockchain architects, Autheo is positioned to dominate the $300B+ smart contract execution market while establishing new standards for secure, scalable decentralized computation. Join us to build the execution foundation that will power the sovereign digital economy of the 21st century.
🌐 🚀 WHY JOIN LAUNCH LEGENDS?
Traction with Momentum: Autheo is already gaining significant traction in the blockchain space, with rapid developer adoption, platform growth, and partnership interest.
Cross-Industry Impact; Autheo is positioned to transform not only the Web3 ecosystem-but also Web2 and the broader technology sector-by enabling real-world business adoption of decentralized infrastructure.
Real Innovation, Not Hype: Unlike many blockchain ventures, Autheo is focused on substance over speculation. We are building real solutions: modular fullstack infrastructure, enterprise-grade toolkits, decentralized identity, cloud, compute, and service orchestration.
Backed by Elite Talent: You'll join a team composed of professionals from top-tier universities, Fortune 500 companies, and major blockchain platforms. Our team includes multiple PhDs and senior engineers who have launched and scaled world-class technologies.
If you're ready to redefine blockchain adoption, empower global business integration, and help shape the next generation of Web3 and developer ecosystems, we invite you to take the next step.
Let's build the future-together.
Power System Studies Engineer - Data Center
Security engineer job in Cheyenne, WY
Arizona - Remote; Arkansas - Remote; Florida - Remote; Georgia - Remote; Idaho - Remote; Illinois - Remote; Indiana - Remote; Iowa - Remote; Kansas - Remote; Kentucky - Remote; Louisiana - Remote; Michigan - Remote; Minnesota - Remote; Mississippi - Remote; Missouri - Remote; Montana - Remote; Nebraska - Remote; Nevada - Remote; New Mexico - Remote; North Carolina - Remote; North Dakota - Remote; Ohio - Remote; Oklahoma - Remote; South Carolina - Remote; South Dakota - Remote; Tennessee - Remote; Texas - Remote; Utah - Remote; Virginia - Remote; West Virginia - Remote; Wisconsin - Remote; Wyoming - Remote
**Company Description**
We are Olsson. We engineer and design solutions that improve the world around us. As a company, we promise to always be responsive, transparent, and focused on results - for our people, our clients, and our company.
We're a people-centric firm, so it's no surprise our greatest asset is our people. The impact this creates is an environment that encourages our people to grow and be creative with their talents. This approach builds a culture that is uniquely Olsson. It allows us to grow our people as we grow our business. This, in turn, creates a lasting impact on the world around us.
**Job Description**
As a Electrical Engineer, on the Power Systems Studies group you will work directly with some of the world's largest technology companies and other mission-critical clients. You will serve as an electrical engineer on projects, design calculations, write technical reports, and prepare documents. Experience in performing short circuit analysis and producing arc flash studies is required. You will also coordinate with other Olsson teams, professional staff, technical staff, and clients. You may travel to job sites for observation and attend client meetings.
_We currently have one opening and will consider candidates interested in being located in most locations across the United States._
**Qualifications**
**You are passionate about:**
+ Working collaboratively with others.
+ Having ownership in the work you do.
+ Using your talents to positively affect communities.
**You bring to the team:**
+ Strong communication skills
+ Ability to contribute and work well on a team
+ Ability to be a self-starter to take on a variety of tasks to best serve the client and their project work
+ Investigation and troubleshooting of problems to find solutions
+ Ability to contribute and work well on a team
+ Bachelor's Degree in electrical engineering
+ 2+ years or related electrical engineering experience
+ EIT required
+ SKM and ETAP software experience is preferred
\#LI-DD1
**Additional Information**
Olsson specializes in engineering and design, client advisory services, planning, field services, and environmental. Improving the world has been our mindset from the very beginning, back when Olsson first opened for business in 1956. And it will be our mindset for years to come.
As an Olsson employee, you will:
+ Receive a competitive 401(k) match
+ Be empowered to build your career with tailored development paths
+ Have the possibility for flexible work arrangements
+ Engage in work that has a positive impact on communities
+ Participate in a wellness program promoting balanced lifestyles
In addition, full-time employees will receive our traditional benefits package (health care, vision, dental, paid time off, etc.) and the opportunity to participate in a bonus system that rewards performance.
Olsson is an Equal Opportunity Employer. We encourage qualified minority, female, veteran, and disabled candidates to apply and be considered for open positions. We do not discriminate against any applicant for employment or any employee because of race, color, religion, national origin, sex, sexual orientation, gender identity, gender, disability, age, military status, or other protected status.
Olsson understands the importance of privacy and is committed to protecting job applicants' personal information. Pursuant to the California Consumer Privacy Act, as amended by the California Privacy Rights Act (collectively, the "CCPA"), this notice explains Olsson's practices regarding the collection, use, and disclosure of personal information for job applicants residing in California. Please read this Notice carefully to understand our privacy practices.
For more information about the types of information we collect and how we use it in connection with your general access and use of our website, please review our general California Privacy Noticehere (************************************** .
Create a Job Alert
Interested in building your career at Olsson? Get future opportunities sent straight to your email.
Network Engineer
Security engineer job in Laramie, WY
Job DescriptionDescription:
A successful candidate will implement, provide, and monitor technical support of customer environments, conduct, and maintain inventories of client systems, support operating systems, desktop peripherals, software, core desktop applications and imaging of computers. The Network Specialist will have an in-depth knowledge of Cisco, Palo Alto, F5 and the maintenance of computer systems and computer environments.
Requirements:
Install, configure, maintain, and optimize LAN and WAN infrastructure, including routers, switches, VPN appliances, load balancers, and security devices.
Ensure timely application of security patches to all network infrastructure devices, including routers, switches, voice and video systems, and security appliances.
Monitor and analyze network performance using network management tools, troubleshooting network issues, and optimizing performance based on industry best practices.
Maintain an up-to-date inventory of network assets, including hardware and software components, and ensure efficient asset tracking and lifecycle management.
Provide design recommendations, technical feedback, and support during engineering meetings to contribute to the planning and execution of network projects.
Manage data center network infrastructure, assist with storage and virtualization systems, and collaborate with relevant teams on infrastructure expansion and improvements.
Stay informed of emerging technologies, trends, and best practices in communications, networking devices, and system security.
Troubleshoot and resolve network-related problems and outages, including those affecting voice, video, and data services, schedule necessary network upgrades and optimizations.
Demonstrate expertise in routing, switching, and firewall configuration, supporting complex and secure LAN/WAN networks.
Understand and support Linux/Unix and Windows operating systems, including system security management, to ensure smooth integration with network services.
Submit detailed and accurate reports on network performance, incidents, upgrades, and infrastructure status as required.
Act as the primary point of contact for clients, addressing software and hardware-related inquiries and troubleshooting issues promptly.
Actively participate in team meetings to share updates, ideas, and solutions; lead or assist in network or related projects, ensuring timely completion and adherence to objectives.
Lead or assist in the execution of network or system-related projects, ensuring proper planning, coordination, and adherence to timelines.
Implement and enforce security protocols for network infrastructure and systems to prevent unauthorized access, malware, and other security threats.
Work with the team to plan and implement backup and disaster recovery solutions to ensure the resilience of network and data services.
Collaborate with cross-functional teams to troubleshoot complex technical issues, ensuring swift resolution or escalation when necessary.
Perform additional tasks and duties as assigned, contributing to the overall success and functioning of the team and organization.
Critical Skills:
Excellent customer service skills complemented by an ability to listen to and interpret client requests
Cisco Router and switch configuration?(IOS/NX-OS)
Palo Alto NextGen Firewall and VPN configuration experience
Experience with General Dynamics Taclanes and/or GEMOne??
F5 Load Balancer Knowledge
GTM/Big DNS Knowledge
Technically proficient and experienced with Windows and Unix/Linux operating systems, network security, network traffic analysis, incident response, vulnerability analysis, packet analysis, and systems hardening.
Possesses proficient knowledge of layer 2 switching and layer 3 routing protocols, encryption protocols, communication protocols. Examples include but not limited to: TLS/SSL, IPsec, SSH, BGP, VLAN, LLDP, LACP, ARP, 802.1x, DNS, AES, NTP, etc.
Network Design and Implementation
Network Troubleshooting
Network Performance Tuning
Ability to identify, track and complete tasks for multiple projects under prescribed timeframes.
Non-Negotiable Requirements:
Top Secret with investigation current within the last 5 years?
On-site, no remote?
Technical Environment: Microsoft, Linux, Splunk, Ansible, Tenable, GEMS
A notification to prospective applicants that reviews, and tests for the absence of any illegal drug as defined in 10 CFR 707.4, will be conducted by the employer and a background investigation by the Federal government may be required to obtain an access authorization prior to employment, and that subsequent reinvestigations may be required. If the position is covered by the Counterintelligence Evaluation Program regulations at 10 CFR part 709, the announcement should also alert applicants that successful completion of a counterintelligence evaluation may include a counterintelligence-scope polygraph examination.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.
Principal Security Engineer - Hardware Security
Security engineer job in Cheyenne, WY
The Oracle Cloud Infrastructure (OCI) team can provide you the opportunity to build and operate a suite of massive scale, integrated cloud services in a broadly distributed, multi-tenant cloud environment. OCI is committed to providing the best in cloud products that meet the needs of our customers who are tackling some of the world's biggest challenges.
We offer unique opportunities for smart, hands-on security engineers with the expertise and passion to solve difficult problems in distributed highly available services and virtual infrastructure. At every level, our engineers have a significant technical and business impact designing and building innovative new systems to power our customer's business critical applications. Our customers run their businesses on our cloud, and our mission is to provide them with the most secure cloud services.
The OCI Hardware Security group conducts Security assessments of the production hardware that runs our cloud, and develops the requirements for future Networking, Storage, Compute components. We work closely across Oracle, with third party vendors, and with standards organization to influence the next generation of hardware platform security. In addition to defining the best hardware, OCI HW Security knows that platform security also depends on how that hardware is used. To that end, HW Security also works closely with OCI's operations and engineering teams, constantly striving to improve Oracle Cloud's overall operational security posture by defining the supply chain and operational requirements to establish best practices for managing security for every device in our data centers.
A security-focused engineer at any level can have significant technical and business impact. Come shape the future of one of the largest clouds on earth with us. Overall, the OCI Security Architecture team performs a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration.
The biggest challenges for the team are the dynamic and fast growth of the business, driving us to improve our systems, tools, and automation to scale to our security expertise several orders of magnitude greater than what we can support today. We understand that software is living and needs investment. The challenge is making the right tradeoffs, communicating those decisions effectively, and crisp execution.
**Responsibilities**
Career Level - IC4
+ Develop and communicate requirements for new vendors and hardware (compute, storage, networking)
+ Perform architectural reviews, penetration testing, vulnerability analysis of compute infrastructure hardware such as
o Servers (Intel, AMD and ARM)
o Baseboard Management Controllers such as Oracle's ILOM
o UEFI and platform firmware
o Smart NICS
o Storage devices
o Network controllers and other peripherals
Network hardware/firmware, topology, and security expertise
+ Provide consulting on security risk associated with compute hardware and firmware in the context of cloud usage.
+ Provide consulting and review of device sanitization as per NIST-800-88 R1 standards.
+ Provide standard operating procedures for safe use of compute hardware through its lifecycle i.e., provisioning, operations and reuse/decommission.
Skills
+ Engage with Oracle Hardware Division and third-party vendors to understand their roadmaps.
+ Create planning roadmaps to drive multi-year security improvements across the OCI Infrastructure
+ Review or assess engineering changes, or revisions of, an existing component. E.g.: new firmware for a device, vendor revision of an existing device Identify and participate in external standards groups to drive improvements across the industry
+ Consult development teams and third-party vendors in design and architecture of secure systems.
+ Champion and consult on secure development life cycle practices.
+ Communicate and educate Senior Management on key Security topics and directions.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $109,200 to $223,400 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC4
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Product Security Engineer, Instagram
Security engineer job in Cheyenne, WY
The Instagram Security Ecosystems team is seeking a product-focused security engineer interesting in enabling Instagram product teams to develop features with a focus on security and user safety. You will be relied upon to directly work with Instagram engineers, hardening both product features and our protective frameworks that make life harder for bad actors on the Instagram platform.
**Required Skills:**
Product Security Engineer, Instagram Responsibilities:
1. Threat Modeling and Security Architecture: Work directly with product managers and technical leads on threat models and security architecture for novel Instagram features or products
2. Security Reviews: Perform manual design and implementation reviews of web, mobile, and native code
3. Developer Guidance: Provide guidance and education to developers that help prevent the authoring of vulnerabilities
4. Automated Analysis and Secure Frameworks: Work with other security teams to improve Instagram's static and dynamic analysis and frameworks to scale coverage
5. Bug Bounty: Help provide technical guidance to our world class bug bounty program and independent security researchers
6. Industry Impact: Push the industry forward through conference talks and open source projects to contribute broadly to security for the world
**Minimum Qualifications:**
Minimum Qualifications:
7. B.S. or M.S. in Computer Science, Cybersecurity, or related field, or equivalent experience
8. 8+ years of experience finding vulnerabilities in interpreted languages (Python, PHP)
9. Extensive, proven experience in threat modeling and secure systems design
10. Experience with exploiting common security vulnerabilities
**Preferred Qualifications:**
Preferred Qualifications:
11. Product software engineering or product management experience
12. Experience in security consulting or other leadership-facing security advisory roles
13. Familiarity with cybersecurity investigations, abuse operations, and/or security incident response
14. Contributions to the security community (public research, blogging, presentations, bug bounty, etc.)
**Public Compensation:**
$177,000/year to $251,000/year + bonus + equity + benefits
**Industry:** Internet
**Equal Opportunity:**
Meta is proud to be an Equal Employment Opportunity and Affirmative Action employer. We do not discriminate based upon race, religion, color, national origin, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender, gender identity, gender expression, transgender status, sexual stereotypes, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Meta participates in the E-Verify program in certain locations, as required by law. Please note that Meta may leverage artificial intelligence and machine learning technologies in connection with applications for employment.
Meta is committed to providing reasonable accommodations for candidates with disabilities in our recruiting process. If you need any assistance or accommodations due to a disability, please let us know at accommodations-ext@fb.com.
Sr. Security Consultant - Penetration Testing
Security engineer job in Cheyenne, WY
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Senior Security Consultant - Penetration Testing is a critical role within Stratascale's Adversarial Operations team who will assist in leading and supporting the development and delivery of a diverse range of continuous threat and exposure management consulting, penetration testing, and operational service programs to a portfolio of our clients.
This position is remote with a Home Office setup as determined by Stratascale management.
**Role Description**
+ Perform penetration testing against complex environments covering both external, internal, web application, and other forms of offensive security engagements.
+ Consult and document attack surface, threats, and vulnerability improvements based on team's overall assessment of client's environment.
+ Perform full assessment and threat modeling against industry best practices to identify control weaknesses and assess the effectiveness of existing controls.
+ Perform root cause analysis on identified vulnerabilities and attack surface weaknesses to determine technical solutions to be presented to client along with recommendations for remediations.
+ Collaborate with client's security teams to understand mitigation or resolutions for findings discovered by analysts.
+ Review threat intelligence for specific threat vectors that align with client's industry or potentially impacted by to utilize in attack path modeling.
+ Assist in defining, measuring, and quantifying business risk and vulnerability impacts to clients their stakeholders.
+ Provide subject matter expertise and technical support on remediation, cloud security, governance, compliance, and core infrastructure systems.
+ Assist customers with strategies, use of platforms, technical and compliance analysis, and implementing automation.
+ Develop and deliver governance models, security frameworks, compliance reporting, and security assessments.
+ Collaborate with internal sales and technical teams to support the solution sales cycle, qualify opportunities, and ensure successful solution delivery.
+ Identify customer needs and requirements, recommend appropriate solutions, and proactively identify areas for improvement.
+ Execute consulting projects by creating and completing deliverables, ensuring client needs and practice obligations are met.
+ Develop and deliver training content, curricula, and workforce development programs, including in-person and remote sessions.
+ Participate in customer and internal meetings, providing technical guidance and facilitating discussions.
+ Stay educated on new product technologies, industry trends, and emerging capabilities within the practice.
+ Develop and optimize cross practice capabilities, collaborate with peer practice leaders, and mentor other consultants.
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Expertise in planning, executing, and leading penetration tests across networks, web and mobile applications, APIs, wireless, and cloud environments, including scoping, rules of engagement, and debriefs. - Intermediate
+ Proficiency with offensive security methodologies and frameworks such as PTES, OWASP (WSTG/MASVS/ASVS), MITRE ATT&CK, and threat modeling to drive risk-based testing. - Intermediate
+ Deep hands-on experience with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation, post-exploitation, lateral movement, and data exfiltration, along with strong operational security practices. - Intermediate
+ Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless, container/orchestration, and cloud networking, and communicate cloud-specific remediation guidance. - Intermediate
+ Strong web application testing skills including auth flows, access control, injection, deserialization, SSRF, XXE, business logic abuse, and modern app architectures (SPAs, microservices, GraphQL, WebSockets). - Intermediate
+ Working knowledge of Active Directory and Azure AD attack paths (Kerberoasting, constrained/unconstrained delegation, ACL abuses, LAPS/MAPS, certificate services), and the ability to simulate realistic enterprise attack chains. - Intermediate
+ Proficiency with social engineering and phishing engagements, including payload development, infrastructure setup, pretexting, and measurement aligned to customer policies and legal constraints. - Intermediate
+ Competence in scripting and automation to accelerate testing and proof-of-concept development using Python, PowerShell, Bash, and basic Go or JavaScript as needed. - Intermediate
+ Ability to develop clear exploit proofs-of-concept, reproduce vulnerabilities reliably, and validate fixes; familiarity with exploit development fundamentals is a plus. - Intermediate
+ Strong reporting and communication skills, including writing executive summaries and technical reports with reproducible steps, risk ratings, and actionable remediation, and presenting findings to both technical and non-technical stakeholders. - Intermediate
+ Experience collaborating in red/purple team exercises, working with blue teams, and translating findings into detection and hardening recommendations (e.g., SIEM detections, EDR tuning, hardening baselines). - Intermediate
+ Familiarity with vulnerability management workflows, responsible disclosure practices, and integration of pen test results into remediation programs and retesting cycles. - Intermediate
+ Proficiency with productivity and documentation tools such as Word, Excel, PowerPoint, and Outlook to efficiently produce statements of work, test plans, and final reports. - Intermediate
**Other Requirements**
+ Completed Bachelor's Degree in a related field or relevant work experience required
+ 5-7 years of hands-on penetration testing/red team experience delivering engagements for mid-to-large enterprises, including leading complex assessments.
+ Ability to travel to SHI, Partner, Customer events, and on-site testing engagements as needed.
+ Advanced industry certifications preferred (e.g., OSCP, OSEP, OSWE, GXPN, GPEN, CRTO, CRTP, PNPT; CISSP or CSSLP a plus).
+ Demonstrated understanding of legal/ethical considerations, testing authorization, and safe handling of client data
The estimated annual pay range for this position is $165,000 - $205,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Engineer, Information Security and Risk
Security engineer job in Cheyenne, WY
Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.
**_Department Overview:_**
**Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
**Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.
We are seeking a highly skilled and experienced Identity and Access Management (IAM) Engineer to join our team. In this pivotal role, you will be instrumental in designing, implementing, and managing IAM solutions that secure our enterprise applications and facilitate the secure, efficient, and seamless integration of identity and access systems in context of our rapid growth through Mergers and Acquisitions. You will ensure robust access controls, streamline user experiences, and maintain operational continuity across our diverse IT landscape. The ideal candidate will have deep technical expertise in modern IAM principles, protocols and products along with strong management and communication skills.
**Responsibilities:**
+ **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning.
+ **M&A Integration Strategy & Execution:** Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
+ **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
+ **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
+ **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), Privileged Access Management (PAM), and Role-Based Access Control (RBAC) frameworks.
+ **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
+ **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration.
+ **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders.
+ **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends.
**Qualifications:**
+ **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
+ **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred.
+ **Technical Expertise:**
+ Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP).
+ Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA, and privileged access management (PAM).
+ Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint).
+ Experience with scripting languages (e.g., PowerShell, Python) for automation and integration.
+ Strong understanding of security principles, risk management, and access control models (e.g., RBAC).
+ Understanding of DevOps practices.
+ Familiarity with Zero Trust architecture principles.
+ Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context.
+ **M&A Specific Skills:** Proven track record of managing complex integration projects, including assessing existing IAM capabilities, workflow, systems, and processes of acquired entities. Ability to navigate the complexities of integrating diverse identity infrastructures.
+ Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders.
+ Detail-oriented mindset to ensure precise access control configurations and compliance.
+ Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements
+ Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform.
+ Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment.
+ Adaptability to stay ahead of evolving IAM technologies and security threats.
**Anticipated salary range:** $94,900 - $135,600
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Security Architect
Security engineer job in Cheyenne, WY
As a Product Security architect, you will be performing security reviews and providing hands-on help to development teams to address security issues systematically. We're looking for passionate engineer who is able to consider business impact and risk to Oracle and its customers while dealing with any security issues. You will work a trusted partner with one or more SaaS product development teams, while simultaneously collaborating with your peers in evolving or creating new security patterns or standards to address any security issues/gaps in an efficient way. You will research the product security landscape and help steer product security architecture for solutions that will provide a competitive edge for Oracle SaaS.
This position requires strong product security and application security experience. It will be highly valuable to have past experience in working in or with product development teams.
**Responsibilities**
**Key responsibilities:**
+ Evaluate existing and proposed SaaS Service architectures and perform security architecture reviews, threat modeling, risk assessment and provide guidance on mitigating the security risks.
+ Partner and collaborate with development teams for SaaS products and provide security expertise to product design conversations and implementation decisions.
+ Work with product teams and peers in security operations to analyze and triage security issues in production and deploy any mitigation such as WAF policies
+ Review and assess security posture and CVEs in third party libraries or products.
+ May perform source code review for vulnerability fixes by development teams.
+ Keep up to date on emerging threats and standards and translate into actionable guidance including but not limited to crypto, AI Security, Identity, Web security, multi-tenant deployment
+ Evolve security processes and integrate security architecture into SDLC leveraging AI and automation, as appropriate.
+ Engage in technical discussions, as needed and serve as a subject matter expert for security architecture and trusted advisor to executive leadership and key stakeholders.
+ Define and influence secure-by-design architecture standards, security patterns, and reference implementations for SaaS Services
+ May train and mentor team members
**Qualifications:**
+ 7+ years of information security experience including product security, application security, security testing/offensive security, security tools and security architecture.
+ Experience in helping or leading a product security architecture and assurance effort in a large-scale IaaS/PaaS/SaaS Cloud Service Provider, or Fortune 500 company.
+ Expert knowledge of modern vulnerability types and threats including intelligence, discovery, mitigation, remediation, and root cause.
+ Understanding of security risks in AI based solutions including AI Agents, MCP, Generative AI and ML.
+ Hands-on experience with at-least one programming languages such as Java, Python.
+ Hands-on experience and knowledge of product development lifecycle in a large enterprise software company.
+ Understanding of industry standard frameworks such as OWASP, MITRE, NIST, PCI, FedRAMP, etc.
+ Ability to guide and engage individuals and development teams located across multiple geographies and or cultures.
+ Knowledge of Oracle Cloud Infrastructure or Oracle SaaS Services is a plus.
+ Excellent written and verbal communication skills, strong analytical and problem-solving skills.
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $96,800 to $251,600 per annum. May be eligible for bonus, equity, and compensation deferral.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC5
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Consultant - Penetration Testing
Security engineer job in Cheyenne, WY
**About Us** **Since 1989, SHI International Corp. has helped organizations change the world through technology. We've grown every year since, and today we're proud to be a $16 billion global provider of IT solutions and services.** **Over 17,000 organizations worldwide rely on SHI's concierge approach to help them solve what's next. But the heartbeat of SHI is our employees - all 7,000 of them. If you join our team, you'll enjoy:**
+ **Our commitment to diversity, as the largest minority- and woman-owned enterprise in the U.S.**
+ **Continuous professional growth and leadership opportunities.**
+ **Health, wellness, and financial benefits to offer peace of mind to you and your family.**
+ **World-class facilities and the technology you need to thrive - in our offices or yours.**
**Job Summary**
The Security Consultant - Penetration Testing is a critical role within Stratascale's Adversarial Operations team who will assist in leading and supporting the development and delivery of a diverse range of continuous threat and exposure management consulting, penetration testing, and operational service programs to a portfolio of our clients.
**Role Description**
+ Independently perform penetration testing against complex environments covering both external, internal, web application, and other forms of offensive security engagements.
+ Consult and document attack surface, threats, and vulnerability improvements based onteam'soverall assessment ofclient'senvironment.
+ Perform full assessment and threat modeling against industry best practices to identify control weaknesses and assess the effectiveness of existing controls.
+ Perform root cause analysis on identified vulnerabilities and attack surface weaknesses to determine technical solutions to be presented to client along with recommendations for remediations.
+ Collaborate withclient'ssecurity teams to understand mitigation or resolutions for findings discovered by analysts.
+ Review threat intelligence for specific threat vectors that align with client's industry or potentially impacted by to utilize in attack path modeling.
+ Assist in defining, measuring, and quantifying business risk and vulnerability impacts toclientstheir stakeholders.
+ Provide subject matterexpertiseand technical support on remediation, cloud security, governance, compliance, and core infrastructure systems.
+ Assistcustomers with strategies, use of platforms, technical and compliance analysis, and implementing automation.
+ Execute consulting projects by creating and completing deliverables, ensuring client needs and practice obligations are met.
+ Develop and deliver training content, curricula, and workforce development programs, including in-person and remote sessions.
+ Participate in customer and internal meetings,providingtechnical guidance andfacilitatingdiscussions.
+ Stay educated on new product technologies, industry trends, and emerging capabilities within the practice.
+ Develop andoptimizecross practicecapabilities, collaborate with peer practice leaders, and mentor other consultants.
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Expertisein planning, executing, and leading penetration tests across networks, web and mobile applications, APIs, wireless, and cloud environments, including scoping, rules of engagement, and debriefs. - Intermediate
+ Proficiencywith offensive security methodologies and frameworks such as PTES, OWASP (WSTG/MASVS/ASVS), MITRE ATT&CK, and threat modeling to drive risk-based testing. - Intermediate
+ Deep hands-on experience with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation, post-exploitation, lateral movement, and data exfiltration, along with strong operational security practices. - Intermediate
+ Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless,container/orchestration,and cloud networking, and communicate cloud-specific remediation guidance. - Intermediate
+ Strong web applicationtesting skills includingauth flows, access control, injection, deserialization, SSRF, XXE, business logic abuse, and modern app architectures (SPAs, microservices,GraphQL,WebSockets). - Intermediate
+ Working knowledge of Active Directory and Azure AD attack paths (Kerberoasting,constrained/unconstraineddelegation, ACL abuses, LAPS/MAPS, certificate services), and the ability to simulate realistic enterprise attack chains. - Intermediate
+ Proficiencywith social engineering and phishing engagements, including payload development, infrastructure setup, pretexting, and measurement aligned to customer policies and legal constraints. - Intermediate
+ Competence in scripting and automation to accelerate testing and proof-of-concept development using Python, PowerShell, Bash, and basic Go or JavaScript as needed. - Intermediate
+ Ability to develop clear exploit proofs-of-concept, reproduce vulnerabilities reliably, andvalidatefixes; familiarity with exploit development fundamentals is a plus. - Intermediate
+ Strong reporting andcommunication skills,including writing executive summaries and technical reports with reproducible steps, risk ratings, and actionable remediation, and presenting findings to both technical and non-technical stakeholders. - Intermediate
+ Experience collaborating in red/purple team exercises, working with blue teams, and translating findings into detection and hardening recommendations (e.g., SIEM detections, EDR tuning, hardening baselines). - Intermediate
+ Familiarity with vulnerability management workflows, responsible disclosure practices, and integration of pen test results into remediation programs and retesting cycles. - Intermediate
+ Proficiencywith productivity and documentation tools such as Word, Excel, PowerPoint, and Outlook to efficiently produce statements of work, test plans, and final reports. - Intermediate
**Other Requirements**
+ CompletedBachelor's Degreein a related field or relevant work experiencerequired
+ 3-5years of hands-on penetration testing/red team experience delivering engagements for mid-to-large enterprises, includingleadingcomplex assessments.
+ Ability to travel to SHI, Partner, Customer events, and on-site testing engagements as needed.
+ Advanced industry certifications preferred (e.g., OSCP, OSEP, OSWE, GXPN, GPEN, CRTO, CRTP,PNPT;CISSP or CSSLP a plus).
+ Demonstrated understanding of legal/ethical considerations, testing authorization, and safe handling of client data.
The estimated annual pay range for this position is $110,000 - $145,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Network Engineer
Security engineer job in Cheyenne, WY
What IT Network & Telecommunications contributes to Cardinal Health Information Technology oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.
IT Network & Telecommunications designs, operates and maintains the organization's local and wide area networks and telecommunications systems and manages relationships with telecommunications service and maintenance vendors. This job family evaluates existing network systems and develops long-term strategies to ensure network capacity meets current and future network requirements. IT Network & Telecommunications performs technical analyses of software, hardware, and network systems as well as systems engineering for front-end processors, multiplexors, LAN/WAN communications, network nodes, switches, and various transmission systems.
IT Network Analyst for the Voice Team will be deploying and supporting enterprise voice technologies with a focus on voice services including but not limited to Cisco Unified Communications Manager/Unity Connection, Ribbon SBC's and SIP. This position is responsible for deploying and supporting as well as enhancing complex data and voice communication networks: 1) Research and development of voice, contact center & networking technologies; 2) Understand business requirements and design solutions to meet requirements; 3) Develop project plans and coordinate across IT functions 4) Implementation of new technology and systems, installation and maintenance of infrastructure; 5) and contribution to establishing and maintaining standards and best practices.
Qualifications
- 7+ years of proven experience in the data/voice communications field preferred
- Expert level understanding of Cisco UC technologies is required
- Must have familiarity with troubleshooting and maintaining Ribbon SBCs preferred
- Experience setting up and maintaining Cisco CUCE appliances also preferred
- Experience standing up and maintaining new CUCM/CUC/Cisco Satellite servers required
- Experience with migrating large groups of phones to CUCM required
- Experience setting up international dialing on a Cisco voice gateway preferred
- Experience troubleshooting Cisco IP Communicator, Cisco Jabber, Cisco WebEx, Microsoft Team and Zoom required
- Familiarity with Agile methodology preferred
- Experience with troubleshooting tools Wireshark, Splunk and RTMT preferred
- Experience integrating Axis intercoms and paging systems, as well as Poly conference phones with CUCM preferred
- Experience using West Safety Systems platform required
- Must have experience with setting up and troubleshooting carrier SIP and PRI trunks as well as analog lines preferred
- Experience with configuring and troubleshooting AudioCodes ATAs such as MP114s, MP118, MP124s required
- Experience with configuring and troubleshooting Cisco ATAs such as VG202XMs, VG204XMs, VG310 and VG320s required
- Must have experience configuring and troubleshooting CIMC as well as vSphere
- Experience designing, implementing, and troubleshooting voice technologies
- Understanding of IP data, voice, and video networking concepts and systems is preferred
- Experience with MS Office Suite and LucidChart preferred
- Leadership and customer service skills essential preferred
- Analytical, troubleshooting and problem resolution skills
Experience in logical design of voice & contact center solutions, research and development, and hands-on configuration
required
- Up to 10% travel (Domestic & International)
Minimum required levels of education:
- Masters degree in Computer Engineering (or higher) preferred
- Bachelors degree in Electronics and Electrical Engineering (or higher) preferred
Responsibilities
- Participating in project work to deploy new voice solutions
- Performs analysis of maintenance failures, research trends, causes of failures, and recommend solutions to avert future failures.
- Design, implementation, and support of Cisco UC and UCCE.
- Call recording, SIP, SBC's, CVP
- CCNP, ITIL v3
- Demonstrated knowledge of Cisco related voice and contact center components
- Project management
- Strategic approach to Unified Communications
- Provides topology documents or the flow of the voice data
What is expected of you and others at this level
- Applies comprehensive knowledge and a thorough understanding of concepts, principles, and technical capabilities to perform varied tasks and projects
- May contribute to the development of policies and procedures
- Works on complex projects of large scope
- Develops technical solutions to a wide range of difficult problems
- Solutions are innovative and consistent with organization objectives
- Completes work; independently receives general guidance on new projects
- Work reviewed for purpose of meeting objectives
- May act as a mentor to less experienced colleagues
**Anticipated salary range:** $80,900 - $127,050
**Bonus eligible:** No
**Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being.
+ Medical, dental and vision coverage
+ Paid time off plan
+ Health savings account (HSA)
+ 401k savings plan
+ Access to wages before pay day with my FlexPay
+ Flexible spending accounts (FSAs)
+ Short- and long-term disability coverage
+ Work-Life resources
+ Paid parental leave
+ Healthy lifestyle programs
**Application window anticipated to close:** 2/15/2026 *if interested in opportunity, please submit application as soon as possible.
The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity.
_Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._
_Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._
_To read and review this privacy notice click_ here (***************************************************************************************************************************
Senior Security Engineer - Data Loss Prevention Operations
Security engineer job in Cheyenne, WY
Our rapidly growing team specializes in threat hunting, analyzing indicators of compromise (IOCs), investigating security incidents, managing incident responses, and conducting digital forensics across IaaS, PaaS, and SaaS platforms. In this role, you will be part of a dedicated security operations team, leveraging data loss prevention, case management tools, and developing automation to detect and respond to security threats in real time. Additionally, you will play a critical role in designing and implementing data loss prevention strategies to proactively mitigate potential data security risks. As the last line of defense when security controls are breached, your expertise will be instrumental in securing Oracle's data and infrastructure.
The ideal candidate is a proactive self-starter with a strong sense of ownership, accountability, and capable of delivering effective results under pressure. By bringing deep expertise in security engineering, you will help drive the strategic development of our enterprise security threat program. An acute attention to detail and a tenacious investigative and analytical approach will be key to success.
**The Role**
We are seeking a seasoned security engineering professional to join our T1/2 DLP operations team to investigate alerts through tooling and perform triage and response to DLP related events. Support build-out of advanced security tools, processes, and automation to identify and mitigate risks related to proprietary data across OCI and Oracle's broader enterprise. You will drive sensitive investigations, conduct thorough root cause analyses, and work collaboratively with partner teams-including SOC, digital forensics, incident response, physical security, and engineering-to respond effectively to diverse and sophisticated threats.
**Responsibilities**
**Key Responsibilities**
+ **Incident Investigation and Response:** Analyze DLP security alerts through DLP intake systems and escalated through DLP tools and case management, triage, investigate and respond to potential security incidents, and coordinate appropriate incident response actions.
+ **Advanced Threat Analysis:** Assess and triage complex DLP events (alerts) across OCI and the Oracle enterprise CSP environments using security monitoring tools, logs, and threat intelligence to identify indicators of compromise and recommend remediation steps.
+ **Monitor and Analyze User Activity:** Continuously monitor, analyze, and investigate user behaviors and activities across networks, applications, and endpoints to detect suspicious patterns or potential insider threats.
+ **Build and Maintain Detection and Response Systems:** Develop, implement, and manage tools, analytics, and automated detection systems specifically designed to identify potentially malicious activity.
+ **Data Loss Prevention (DLP):** Participate with the DLP team to enhance data loss prevention strategies, including deploying and tuning DLP technologies to prevent unauthorized access or transmission of sensitive proprietary data.
+ **Incident Investigations:** Conduct thorough investigations of security incidents related to potential or confirmed threats, collaborating closely with legal, HR, and compliance teams as needed.
+ **Case Management:** Document and manage cases from detection through to resolution, ensuring proper documentation and reporting processes are followed.
+ **Security Awareness and Training:** Support the development and delivery of targeted security awareness training at all levels of the company. Training to be focused on reducing data security risk and how to recognize and report suspicious behaviors.
+ **Collaboration and Coordination:** Work with cross-functional teams such as HR, legal, compliance, physical security and other engineering organizations to coordinate incident response and security policy and standards of enforcement.
+ **Threat Hunting:** Proactively hunt for evidence of threats by analyzing system logs, access records, and behavioral analytics.
+ **Tool and Process Enhancement:** Evaluate and recommend improvements to detection tools, response processes, and operational playbooks.
+ **Reporting and Analytics:** Prepare reports and metrics on insider threat trends, investigation outcomes, and security posture for management and leadership.
**Preferred Qualifications**
+ Five years of experience in DLP (client/server/cloud), incident response and/or security operations center activities at a cloud service provider
+ Effective written and oral communications skills with the ability to deliver technical information to non-technical staff
+ Comfortable working in an ambiguous, fast-paced, unpredictable environment
+ Experience working in a highly collaborative, team centric, event driven operations team
+ Experience with variety of technologies and how they are used to exfiltrate data
+ Experience with a variety of DLP tools (data at rest, data in motion, data in use)
+ Experience with a wide variety of logs and telemetry including AV, web server, SIEM, etc.
+ Experience with sophisticated threat actors and complex security incidents
+ Understanding of insider threat actor tactics, techniques, and procedures (TTPs) and threat analysis models like MITRE ATT&CK Framework
+ Experience developing and hunting using DLP-related indicators of compromise (IOC's)
+ Experience performing open-source research on a variety of topics
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $82,200 to $178,100 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC3
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
Security Consultant - Penetration Testing
Security engineer job in Cheyenne, WY
**About Us** **As a digital and cybersecurity services company, Stratascale exists to help the Fortune 1000 transform the way they use technology to advance the business, generate revenue, and respond quickly to market demands. We call it Digital Agility.**
**To learn more about how we're shaping the future of digital business and a more secure world, visit stratascale.com.**
**Job Description Summary**
The Security Consultant - Penetration Testing is a critical role within Stratascale's Adversarial Operations team who will assist in leading and supporting the development and delivery of a diverse range of continuous threat and exposure management consulting, penetration testing, and operational service programs to a portfolio of our clients.
**Role Description**
+ Independently perform penetration testing against complex environments covering both external, internal, web application, and other forms of offensive security engagements.
+ Consult and document attack surface, threats, and vulnerability improvements based onteam'soverall assessment ofclient'senvironment.
+ Perform full assessment and threat modeling against industry best practices to identify control weaknesses and assess the effectiveness of existing controls.
+ Perform root cause analysis on identified vulnerabilities and attack surface weaknesses to determine technical solutions to be presented to client along with recommendations for remediations.
+ Collaborate withclient'ssecurity teams to understand mitigation or resolutions for findings discovered by analysts.
+ Review threat intelligence for specific threat vectors that align with client's industry or potentially impacted by to utilize in attack path modeling.
+ Assist in defining, measuring, and quantifying business risk and vulnerability impacts toclientstheir stakeholders.
+ Provide subject matterexpertiseand technical support on remediation, cloud security, governance, compliance, and core infrastructure systems.
+ Assistcustomers with strategies, use of platforms, technical and compliance analysis, and implementing automation.
+ Execute consulting projects by creating and completing deliverables, ensuring client needs and practice obligations are met.
+ Develop and deliver training content, curricula, and workforce development programs, including in-person and remote sessions.
+ Participate in customer and internal meetings,providingtechnical guidance andfacilitatingdiscussions.
+ Stay educated on new product technologies, industry trends, and emerging capabilities within the practice.
+ Develop andoptimizecross practicecapabilities, collaborate with peer practice leaders, and mentor other consultants.
**Behaviors and Competencies**
+ Communication: Can effectively communicate complex ideas and information to diverse audiences, facilitate effective communication between others, and mentor others in effective communication.
+ Relationship Building: Can take ownership of complex team initiatives, collaborate with diverse groups, and drive results through effective relationship management.
+ Self-Motivation: Can take ownership of complex personal or professional initiatives, collaborate with others when necessary, and drive results through self-motivation.
+ Negotiation: Can take ownership of complex negotiations, collaborate with others, and drive consensus.
+ Impact and Influence: Can rally a team or group towards a common goal, creating a positive and persuasive influence.
+ Business Development: Can take ownership of significant business initiatives, collaborate with various stakeholders, and drive business results.
+ Emotional Intelligence: Can use emotional information to guide thinking and behavior, manage and/or adjust emotions to adapt to environments or achieve one's goal(s), and help others do the same.
+ Detail-Oriented: Can oversee multiple projects, maintaining a high level of detail orientation, identifying errors or inconsistencies in work, and ensuring accuracy across all tasks.
+ Follow-Up: Can take ownership of tasks, collaborate with others in managing follow-ups, and drive results through effective task completion.
+ Presenting: Can effectively use visual aids, storytelling, and persuasive techniques to enhance presentations and engage audiences.
+ Delegation: Can delegate responsibilities across a team, balancing workload, and ensuring all members understand their roles.
+ Analytical Thinking: Can use advanced analytical techniques to solve complex problems, draw insights, and communicate the solutions effectively.
+ Critical Thinking: Can integrate and synthesize information from various sources to inform strategic decision-making and problem-solving.
+ Technical Troubleshooting: Can take ownership of complex technical problems, collaborate with others to manage solutions, and drive results in problem resolution.
**Skill Level Requirements**
+ Expertisein planning, executing, and leading penetration tests across networks, web and mobile applications, APIs, wireless, and cloud environments, including scoping, rules of engagement, and debriefs. - Intermediate
+ Proficiencywith offensive security methodologies and frameworks such as PTES, OWASP (WSTG/MASVS/ASVS), MITRE ATT&CK, and threat modeling to drive risk-based testing. - Intermediate
+ Deep hands-on experience with common offensive tooling and techniques, including reconnaissance, enumeration, exploitation, post-exploitation, lateral movement, and data exfiltration, along with strong operational security practices. - Intermediate
+ Ability to assess and attack cloud services (AWS, Azure, GCP) including IAM misconfigurations, storage, serverless,container/orchestration,and cloud networking, and communicate cloud-specific remediation guidance. - Intermediate
+ Strong web applicationtesting skills includingauth flows, access control, injection, deserialization, SSRF, XXE, business logic abuse, and modern app architectures (SPAs, microservices,GraphQL,WebSockets). - Intermediate
+ Working knowledge of Active Directory and Azure AD attack paths (Kerberoasting,constrained/unconstraineddelegation, ACL abuses, LAPS/MAPS, certificate services), and the ability to simulate realistic enterprise attack chains. - Intermediate
+ Proficiencywith social engineering and phishing engagements, including payload development, infrastructure setup, pretexting, and measurement aligned to customer policies and legal constraints. - Intermediate
+ Competence in scripting and automation to accelerate testing and proof-of-concept development using Python, PowerShell, Bash, and basic Go or JavaScript as needed. - Intermediate
+ Ability to develop clear exploit proofs-of-concept, reproduce vulnerabilities reliably, andvalidatefixes; familiarity with exploit development fundamentals is a plus. - Intermediate
+ Strong reporting andcommunication skills,including writing executive summaries and technical reports with reproducible steps, risk ratings, and actionable remediation, and presenting findings to both technical and non-technical stakeholders. - Intermediate
+ Experience collaborating in red/purple team exercises, working with blue teams, and translating findings into detection and hardening recommendations (e.g., SIEM detections, EDR tuning, hardening baselines). - Intermediate
+ Familiarity with vulnerability management workflows, responsible disclosure practices, and integration of pen test results into remediation programs and retesting cycles. - Intermediate
+ Proficiencywith productivity and documentation tools such as Word, Excel, PowerPoint, and Outlook to efficiently produce statements of work, test plans, and final reports. - Intermediate
**Other Requirements**
+ CompletedBachelor's Degreein a related field or relevant work experiencerequired
+ 3-5years of hands-on penetration testing/red team experience delivering engagements for mid-to-large enterprises, includingleadingcomplex assessments.
+ Ability to travel to SHI, Partner, Customer events, and on-site testing engagements as needed.
+ Advanced industry certifications preferred (e.g., OSCP, OSEP, OSWE, GXPN, GPEN, CRTO, CRTP,PNPT;CISSP or CSSLP a plus).
+ Demonstrated understanding of legal/ethical considerations, testing authorization, and safe handling of client data.
The estimated annual pay range for this position is $110,000 - $145,000 which includes a base salary and bonus. The compensation for this position is dependent on job-related knowledge, skills, experience, and market location and, therefore, will vary from individual to individual. Benefits may include, but are not limited to, medical, vision, dental, 401K, and flexible spending.
Equal Employment Opportunity - M/F/Disability/Protected Veteran Status
Sr Principal Physical Security Design Engineer
Security engineer job in Cheyenne, WY
The Senior Physical Security Design Engineer is responsible for leading the development, design, and implementation of advanced physical security solutions for Oracle's global facilities-including data centers, sensitive compartmented information facilities (SCIFs), and other mission-critical environments. This highly experienced role collaborates across multiple functions within Oracle, ensures compliance with strict regulatory standards, and provides design leadership from concept through execution.
**Responsibilities**
Key Responsibilities:
+ Lead the physical security design and architecture for new and existing Oracle facilities.
+ Collaborate with Oracle's industrial security and compliance organizations to develop and maintain physical security design standards, evaluate associated cost, risk, and benefits, and facilitate intelligence community compliant designs.
+ Remain current on the latest physical security technologies, trends, and best practices, especially for sensitive compartmented information facilities (SCIFs) and critical infrastructure.
+ Develop and maintain comprehensive Physical Security Basis of Design documents, prototype layouts, and template specifications.
+ Prepare detailed scopes of work and Requests for Proposals (RFPs) for security design services.
+ Review, direct, and approve the work of physical security engineering design consultants and contractors.
+ Coordinate and manage multiple security design projects, ensuring milestone achievement, quality, compliance, and adherence to company and regulatory standards.
+ Conduct site assessments, participate in design meetings, review construction phases, and serve as a technical liaison with consultants, stakeholders, and project partners.
+ Travel, as required, for site assessments, design meetings, construction review, and consultant coordination.
Technical Competency:
+ Expertise in design and integration of physical security systems, including access control, video surveillance, intrusion detection, mantraps, and security barriers.
+ Advanced proficiency using AutoCAD for creating, editing, and reviewing 2D and 3D security layouts and technical drawings.
+ Proficient in Revit for Building Information Modeling (BIM), including the creation and coordination of detailed security system models.
+ Experience using additional design and visualization tools, such as Bluebeam, Navisworks, SketchUp, and Microsoft Visio.
+ Strong understanding of applicable standards, regulations, and best practices (e.g., ICD 705, UL 2050, NFPA, ISO/IEC 27001, and relevant local/international codes) for regulated and mission-critical environments.
+ Ability to generate, interpret, and review construction documents, system schematics, and technical specifications for physical security systems.
+ Skilled in the preparation of clear, comprehensive scopes of work and technical specifications for procurement and implementation.
+ Experienced in project coordination, integrating security solutions with architectural, electrical, mechanical, and IT systems.
+ Proficient in the Microsoft Office Suite (Word, Excel, PowerPoint, Project) for documentation, analysis, and reporting.
+ Demonstrated experience in consultant and stakeholder management, including technical review and direction.
+ Strong ability to perform site assessments, risk analyses, and comprehensive security needs evaluations.
+ Familiarity with change management, quality assurance, and shop drawing/submittal review within complex project environments.
Qualifications:
+ Bachelor's degree in electrical, mechanical, architectural engineering, or a closely related discipline-or equivalent additional experience.
+ Minimum 10 years of physical security design experience in regulated, mission-critical environments.
+ Minimum 3 years of specialized physical security design experience in data centers, SCIFs, or comparable mission-critical projects.
25% Travel
\#LI-CG2
Disclaimer:
**Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.**
**Range and benefit information provided in this posting are specific to the stated locations only**
US: Hiring Range in USD from: $120,100 to $251,600 per annum. May be eligible for bonus, equity, and compensation deferral.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle's differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance
The role will generally accept applications for at least three calendar days from the posting date or as long as the job remains posted.
Career Level - IC5
**About Us**
As a world leader in cloud solutions, Oracle uses tomorrow's technology to tackle today's challenges. We've partnered with industry-leaders in almost every sector-and continue to thrive after 40+ years of change by operating with integrity.
We know that true innovation starts when everyone is empowered to contribute. That's why we're committed to growing an inclusive workforce that promotes opportunities for all.
Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs.
We're committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_************* or by calling *************** in the United States.
Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.