Headquartered in Colorado Springs, Colorado, Focus on the Family has nearly 700 employees who work to achieve the mission of enriching the lives of families, engaging the culture, advocating for life and spreading the Gospel of Jesus Christ. The work is meaningful, the culture is rewarding, and the purpose is eternal. The Chief Digital & Innovation Officer (CDIO) is accountable for shaping and enabling the ministry's digital future in direct service of mission, scale, and constituent trust. This role establishes technology, data, and digital platforms as a unified, enterprise capability that advances clarity, agility, stewardship, and measurable ministry impact. The CDIO defines the enterprise digital vision, establishes architectural and data coherence; owns the decision frameworks governing enterprise digital investment and prioritization; and builds empowered leadership teams capable of sustaining today's mission while intentionally preparing the ministry for future opportunities and risks. Through this leadership, technology functions as a strategic enterprise capability that enables ministry delivery, deepens constituent engagement, and strengthens organizational decision making, integrated into how the ministry plans and operates. Essential Duties/Responsibilities Enterprise Digital Strategy & Vision: Owns and articulates the enterprise digital strategy aligned to ministry mission, long term organizational strategy, and a constituent intimacy value discipline. Establishes a clear digital north star that governs platform choices, investment prioritization, sequencing, and trade offs across the enterprise. Defines enterprise decision frameworks that balance speed, scale, risk, and stewardship, prevent fragmentation, duplicative platforms, and siloed innovation. Makes digital strategy inseparable from ministry strategy, shaping how the organization delivers impact today while positioning it for future growth and resilience. Digital Architecture & Operational Enablement: Owns enterprise architectural direction across applications, data, integration, infrastructure, and security to reduce complexity, improve interoperability, and enable scalable ministry delivery. Is accountable for ensuring core platforms (e.g., CRM, ERP, CMS, marketing automation, digital experience, data platforms) are selected, evolved, and governed based on enterprise outcomes rather than local optimization. Holds senior leaders accountable for reliable, secure, and resilient technology operations, with cybersecurity, risk management, compliance, and business continuity operating as foundational enablers of ministry effectiveness. Establishes enterprise operating principles and service expectations that reinforce partnership, stewardship, clarity of ownership, and shared accountability. Innovation, Experimentation & Emerging Capability: Establishes a disciplined enterprise approach to innovation that includes experimentation, piloting, learning, and intentional scaling. Identifies and evaluates emerging technologies and delivery models (e.g., AI, automation, personalization, new engagement channels) with the potential to advance ministry reach, relevance, and effectiveness. Balances innovation with mission integrity, ethical responsibility, operational sustainability, and constituent trust. Data Strategy, AI Enablement & Governance: Owns the enterprise data and analytics strategy, ensuring leaders and teams have access to trusted, decision grade information. Guides the strategic application of analytics and AI to enhance ministry outcomes, strengthen constituent engagement, and enable insight led decision making at all levels of the organization. Establishes and governs responsible data and AI frameworks that protect constituent privacy, reinforce trust, and safeguard the ministry's credibility. Institutionalizes the use of insight across planning, execution, and measurement, embedding data informed decision making into how the ministry operates. Executive Partnership & Enterprise Change Leadership: Serves as a trusted strategic advisor to the CEO and executive leadership team on the digital, data, and technology implications of ministry strategy, investment decisions, and enterprise priorities. Partners closely with the Chief Constituent Experience Officer (CCXO), sharing accountability for translating mission into coherent, digitally enabled constituent experiences across the ministry. Leads enterprise change by shaping culture, clarifying decision rights, and aligning cross functional leaders-rather than through systems deployment alone. Leadership, Culture & Talent Development: Builds and leads an enterprise digital and technology leadership team oriented toward outcomes, learning, and accountability. Develops future ready leaders capable of operating in ambiguity, managing complexity, and leading sustained change. Creates a culture where clarity of ownership, measurable outcomes, and continuous improvement replace heroics and reactive execution. Models servant leadership consistent with Focus on the Family's Christian mission, values, and commitment to people. Other Duties/Responsibilities Performs other duties as assigned. Managerial Breadth/Scope of Job Leads an enterprise digital and technology organization of 50+ employees. Direct reports include senior leaders responsible for applications, data and analytics, infrastructure and security, and operations. Accountable for strategic partners and offshore teams through clearly defined leadership and governance structures. Working Environment/Physical Requirements Onsite office environment. Job Qualifications/Requirements Character/Spiritual Exemplifies Ephesians 5:1-2, "Therefore be imitators of God as dear children and walk in love, as Christ also has loved us and given Himself for us " Pursues the Great Commission given by Jesus Christ in Matthew 28:19-20, "Go therefore and make disciples of all the nations, baptizing them in the name of the Father and of the Son and of the Holy Spirit, teaching them to observe all things that I have commanded you; and lo, I am with you always, even to the end of the age." Is a consistent witness for Jesus Christ; maintains a courteous, Christ like attitude in dealing with people within and outside of Focus; adheres to the Standard of Moral Conduct and Statement of Faith; upholds Focus on the Family's ministry in prayer. Prays personally for Focus on the Family's staff and constituents and may occasionally lead in a public prayer. Engages in Christian ministry. Demonstrates behaviors aligned with FOF core values. This position is a "position of responsibility" as defined in the Focus on the Family Moral Policy and is subject to the parameters defined therein regarding divorce. This role is considered a Spokesperson for Focus on the Family and should represent Focus' position and tone at all times. Personal Characteristics Senior leadership skills, able to work with, motivate and direct others - individually and as a team. Mature and professional / can represent the ministry to internal and external constituencies. Diplomatic, peacemaker, flexible, approachable. Detail oriented, self motivated, self accountable, concern for long term effectiveness. Assertive, articulate, decisive. Establishes high personal work standards and works to achieve them because of internal motivation. Maintains a high level of motivation for work despite problems, changes, or daily work demands. Knowledge/Experience Demonstrated experience as a senior enterprise leader responsible for defining and executing digital, data, and technology strategy aligned to organizational mission and long term goals. Proven track record of leading large scale digital transformation involving organizational change, platform consolidation, and cultural shift-not solely technology implementation. Experience operating as a peer within a C suite or executive leadership team, influencing strategy, investment decisions, and enterprise priorities. Strong background in establishing enterprise architecture, data strategy, and governance models that enable agility, trust, and scalability. Demonstrated ability to balance innovation and experimentation with stewardship, risk management, and operational sustainability. Experience enabling constituent or customer centric models through digital platforms, data, and integrated experiences. Sufficient technical depth across modern platforms (cloud, CRM, ERP, digital experience, data, AI enabled capabilities) to set direction, ask incisive questions, and hold leaders accountable without serving as the primary technical expert. Thorough understanding of Focus on the Family's mission, values, and the cultural, social, and political issues impacting families. Skills, Abilities, and Special Talents/Gifts Strategic and collaborative leader with strong servant leadership instincts. Executive presence. Strong organizational skills. Polished social skills. Ability to develop strategic plans for multiple function division. Requires considerable ingenuity and judgment to solve complex problems. Leadership: Strong change management capabilities, with the ability to influence and lead cross functional teams. Business Acumen: Ability to translate technical capabilities into measurable business outcomes. Pay Range $197,600 to $281,040 Application Materials Required Colorado Residents: In any materials you submit . click apply for full job details
04/04/2026
Full time
Headquartered in Colorado Springs, Colorado, Focus on the Family has nearly 700 employees who work to achieve the mission of enriching the lives of families, engaging the culture, advocating for life and spreading the Gospel of Jesus Christ. The work is meaningful, the culture is rewarding, and the purpose is eternal. The Chief Digital & Innovation Officer (CDIO) is accountable for shaping and enabling the ministry's digital future in direct service of mission, scale, and constituent trust. This role establishes technology, data, and digital platforms as a unified, enterprise capability that advances clarity, agility, stewardship, and measurable ministry impact. The CDIO defines the enterprise digital vision, establishes architectural and data coherence; owns the decision frameworks governing enterprise digital investment and prioritization; and builds empowered leadership teams capable of sustaining today's mission while intentionally preparing the ministry for future opportunities and risks. Through this leadership, technology functions as a strategic enterprise capability that enables ministry delivery, deepens constituent engagement, and strengthens organizational decision making, integrated into how the ministry plans and operates. Essential Duties/Responsibilities Enterprise Digital Strategy & Vision: Owns and articulates the enterprise digital strategy aligned to ministry mission, long term organizational strategy, and a constituent intimacy value discipline. Establishes a clear digital north star that governs platform choices, investment prioritization, sequencing, and trade offs across the enterprise. Defines enterprise decision frameworks that balance speed, scale, risk, and stewardship, prevent fragmentation, duplicative platforms, and siloed innovation. Makes digital strategy inseparable from ministry strategy, shaping how the organization delivers impact today while positioning it for future growth and resilience. Digital Architecture & Operational Enablement: Owns enterprise architectural direction across applications, data, integration, infrastructure, and security to reduce complexity, improve interoperability, and enable scalable ministry delivery. Is accountable for ensuring core platforms (e.g., CRM, ERP, CMS, marketing automation, digital experience, data platforms) are selected, evolved, and governed based on enterprise outcomes rather than local optimization. Holds senior leaders accountable for reliable, secure, and resilient technology operations, with cybersecurity, risk management, compliance, and business continuity operating as foundational enablers of ministry effectiveness. Establishes enterprise operating principles and service expectations that reinforce partnership, stewardship, clarity of ownership, and shared accountability. Innovation, Experimentation & Emerging Capability: Establishes a disciplined enterprise approach to innovation that includes experimentation, piloting, learning, and intentional scaling. Identifies and evaluates emerging technologies and delivery models (e.g., AI, automation, personalization, new engagement channels) with the potential to advance ministry reach, relevance, and effectiveness. Balances innovation with mission integrity, ethical responsibility, operational sustainability, and constituent trust. Data Strategy, AI Enablement & Governance: Owns the enterprise data and analytics strategy, ensuring leaders and teams have access to trusted, decision grade information. Guides the strategic application of analytics and AI to enhance ministry outcomes, strengthen constituent engagement, and enable insight led decision making at all levels of the organization. Establishes and governs responsible data and AI frameworks that protect constituent privacy, reinforce trust, and safeguard the ministry's credibility. Institutionalizes the use of insight across planning, execution, and measurement, embedding data informed decision making into how the ministry operates. Executive Partnership & Enterprise Change Leadership: Serves as a trusted strategic advisor to the CEO and executive leadership team on the digital, data, and technology implications of ministry strategy, investment decisions, and enterprise priorities. Partners closely with the Chief Constituent Experience Officer (CCXO), sharing accountability for translating mission into coherent, digitally enabled constituent experiences across the ministry. Leads enterprise change by shaping culture, clarifying decision rights, and aligning cross functional leaders-rather than through systems deployment alone. Leadership, Culture & Talent Development: Builds and leads an enterprise digital and technology leadership team oriented toward outcomes, learning, and accountability. Develops future ready leaders capable of operating in ambiguity, managing complexity, and leading sustained change. Creates a culture where clarity of ownership, measurable outcomes, and continuous improvement replace heroics and reactive execution. Models servant leadership consistent with Focus on the Family's Christian mission, values, and commitment to people. Other Duties/Responsibilities Performs other duties as assigned. Managerial Breadth/Scope of Job Leads an enterprise digital and technology organization of 50+ employees. Direct reports include senior leaders responsible for applications, data and analytics, infrastructure and security, and operations. Accountable for strategic partners and offshore teams through clearly defined leadership and governance structures. Working Environment/Physical Requirements Onsite office environment. Job Qualifications/Requirements Character/Spiritual Exemplifies Ephesians 5:1-2, "Therefore be imitators of God as dear children and walk in love, as Christ also has loved us and given Himself for us " Pursues the Great Commission given by Jesus Christ in Matthew 28:19-20, "Go therefore and make disciples of all the nations, baptizing them in the name of the Father and of the Son and of the Holy Spirit, teaching them to observe all things that I have commanded you; and lo, I am with you always, even to the end of the age." Is a consistent witness for Jesus Christ; maintains a courteous, Christ like attitude in dealing with people within and outside of Focus; adheres to the Standard of Moral Conduct and Statement of Faith; upholds Focus on the Family's ministry in prayer. Prays personally for Focus on the Family's staff and constituents and may occasionally lead in a public prayer. Engages in Christian ministry. Demonstrates behaviors aligned with FOF core values. This position is a "position of responsibility" as defined in the Focus on the Family Moral Policy and is subject to the parameters defined therein regarding divorce. This role is considered a Spokesperson for Focus on the Family and should represent Focus' position and tone at all times. Personal Characteristics Senior leadership skills, able to work with, motivate and direct others - individually and as a team. Mature and professional / can represent the ministry to internal and external constituencies. Diplomatic, peacemaker, flexible, approachable. Detail oriented, self motivated, self accountable, concern for long term effectiveness. Assertive, articulate, decisive. Establishes high personal work standards and works to achieve them because of internal motivation. Maintains a high level of motivation for work despite problems, changes, or daily work demands. Knowledge/Experience Demonstrated experience as a senior enterprise leader responsible for defining and executing digital, data, and technology strategy aligned to organizational mission and long term goals. Proven track record of leading large scale digital transformation involving organizational change, platform consolidation, and cultural shift-not solely technology implementation. Experience operating as a peer within a C suite or executive leadership team, influencing strategy, investment decisions, and enterprise priorities. Strong background in establishing enterprise architecture, data strategy, and governance models that enable agility, trust, and scalability. Demonstrated ability to balance innovation and experimentation with stewardship, risk management, and operational sustainability. Experience enabling constituent or customer centric models through digital platforms, data, and integrated experiences. Sufficient technical depth across modern platforms (cloud, CRM, ERP, digital experience, data, AI enabled capabilities) to set direction, ask incisive questions, and hold leaders accountable without serving as the primary technical expert. Thorough understanding of Focus on the Family's mission, values, and the cultural, social, and political issues impacting families. Skills, Abilities, and Special Talents/Gifts Strategic and collaborative leader with strong servant leadership instincts. Executive presence. Strong organizational skills. Polished social skills. Ability to develop strategic plans for multiple function division. Requires considerable ingenuity and judgment to solve complex problems. Leadership: Strong change management capabilities, with the ability to influence and lead cross functional teams. Business Acumen: Ability to translate technical capabilities into measurable business outcomes. Pay Range $197,600 to $281,040 Application Materials Required Colorado Residents: In any materials you submit . click apply for full job details
What's the Role? The Senior IAM Directory Services Engineer plays a critical role in shaping the future of identity at Northwestern Mutual. This position partners with engineering teams, security architects, product managers, and vendors to design, automate, and modernize our identity ecosystem. We are looking for an engineer who is forward thinking, automation driven, and passionate about leveraging modern identity technologies, including AI-assisted threat detection, advanced authentication patterns, and infrastructure as code. This role is responsible for engineering, enhancing, and supporting Identity and Access Management capabilities with a focus on Entra ID, Active Directory, application integrations, Identity Provider (IdP) technologies, and Zero Trust authentication models. What You'll be doing: Engineer and support enterprise identity solutions across Entra ID, Active Directory, SSO, and federated identity platforms (OAuth/OIDC, SAML, WS Fed). Design and maintain policies for MFA, Conditional Access, workload identities, and modern authentication protocols. Develop automated IAM workflows using PowerShell, Python, Terraform, GitLab/GitHub CI/CD, and other IaC frameworks. Create predictable and repeatable deployment patterns for identity services through CI/CD pipelines. Identify opportunities for automation and help evolve an "automate first" engineering culture. Use tools such as Splunk, Crowdstrike Identity Protection, Bloodhound and other monitoring platforms to analyze identity logs, detect anomalies, and drive resolution. Work with product and engineering leaders to assess and pilot AI-driven identity technologies. Lead complex problem resolution and support escalations requiring deep IAM expertise. Document architecture, decisions, playbooks, and engineering patterns. Collaborate in agile teams and mentor engineers on identity engineering best practices. What You'll Bring to the role: Bachelor's degree in computer science, Cybersecurity, Information Systems, or equivalent experience. 5+ years of professional engineering experience in IAM or directory services. Strong experience with Active Directory, Entra ID, SSO/IdP integrations, identity lifecycle automation, and Conditional Access. Hands-on experience with scripting/automation (PowerShell and/or Python). Experience with CI/CD pipelines (GitLab, GitHub, Azure DevOps). Knowledge of cloud identity patterns across Azure, AWS, and SaaS providers. Strong problem solving ability and communication skills. Strong documentation, testing and automation skills. What Sets you apart: Experience with Terraform, Bicep, Ansible, or other IAC tools. Background in Splunk, Sentinel, or equivalent SIEM platforms. Familiarity with AI/ML-driven identity tooling and adaptive access policies. Understanding of Zero Trust architectures. Relevant certifications (Microsoft Identity, Azure Architect, AWS, Security+, CCSP, CISSP). Compensation Range: Pay Range - Start: $104,090.00 Pay Range - End: $193,310.00 Geographic Specific Pay Structure: Structure 110: $114,520.00 USD - $212,680.00 USD Structure 115: $119,700.00 USD - $222,300.00 USD We believe in fairness and transparency. It's why we share the salary range for most of our roles. However, final salaries are based on a number of factors, including the skills and experience of the candidate; the current market; location of the candidate; and other factors uncovered in the hiring process. The standard pay structure is listed but if you're living in California, New York City or other eligible location, geographic specific pay structures, compensation and benefits could be applicable, click here to learn more. Grow your career with a best-in-class company that puts our clients' interests at the center of all we do. Get started now! Northwestern Mutual is an equal opportunity employer who welcomes and encourages diversity in the workforce. We are committed to creating and maintaining an environment in which each employee can contribute creative ideas, seek challenges, assume leadership and continue to focus on meeting and exceeding business and personal objectives. Skills Compliance (NM) - Advanced, Analytical Thinking (NM) - Advanced, Security Practices (NM) - Advanced, Strategic Thinking (NM) - Advanced, Cross Functional Partnering & Planning (NM) - Advanced, Continuous Improvement (NM) - Advanced, Cloud Deployment Models (NM) - Advanced, Business Automation (NM) - Advanced, Customer Centricity (NM) - Intermediate, Technical Problem Solving (NM) - Advanced, Identity Protocols (NM) - Advanced, Adaptive Communication (NM) - Advanced, Identity & Access Management Industry Standards (NM) - Advanced, DevSecOps (NM) - Advanced, Learning Agility & Critical Thinking (NM) - Advanced, Access Management Tools & Technologies (NM) - Advanced, Stakeholder Relationship (NM) - Intermediate FIND YOUR FUTURE We're excited about the potential people bring to Northwestern Mutual. You can grow your career here while enjoying first-class perks, benefits, and our commitment to a culture of belonging. Flexible work schedules Concierge service Comprehensive benefits Employee resource groups PandoLogic. Category:Technology,
04/04/2026
Full time
What's the Role? The Senior IAM Directory Services Engineer plays a critical role in shaping the future of identity at Northwestern Mutual. This position partners with engineering teams, security architects, product managers, and vendors to design, automate, and modernize our identity ecosystem. We are looking for an engineer who is forward thinking, automation driven, and passionate about leveraging modern identity technologies, including AI-assisted threat detection, advanced authentication patterns, and infrastructure as code. This role is responsible for engineering, enhancing, and supporting Identity and Access Management capabilities with a focus on Entra ID, Active Directory, application integrations, Identity Provider (IdP) technologies, and Zero Trust authentication models. What You'll be doing: Engineer and support enterprise identity solutions across Entra ID, Active Directory, SSO, and federated identity platforms (OAuth/OIDC, SAML, WS Fed). Design and maintain policies for MFA, Conditional Access, workload identities, and modern authentication protocols. Develop automated IAM workflows using PowerShell, Python, Terraform, GitLab/GitHub CI/CD, and other IaC frameworks. Create predictable and repeatable deployment patterns for identity services through CI/CD pipelines. Identify opportunities for automation and help evolve an "automate first" engineering culture. Use tools such as Splunk, Crowdstrike Identity Protection, Bloodhound and other monitoring platforms to analyze identity logs, detect anomalies, and drive resolution. Work with product and engineering leaders to assess and pilot AI-driven identity technologies. Lead complex problem resolution and support escalations requiring deep IAM expertise. Document architecture, decisions, playbooks, and engineering patterns. Collaborate in agile teams and mentor engineers on identity engineering best practices. What You'll Bring to the role: Bachelor's degree in computer science, Cybersecurity, Information Systems, or equivalent experience. 5+ years of professional engineering experience in IAM or directory services. Strong experience with Active Directory, Entra ID, SSO/IdP integrations, identity lifecycle automation, and Conditional Access. Hands-on experience with scripting/automation (PowerShell and/or Python). Experience with CI/CD pipelines (GitLab, GitHub, Azure DevOps). Knowledge of cloud identity patterns across Azure, AWS, and SaaS providers. Strong problem solving ability and communication skills. Strong documentation, testing and automation skills. What Sets you apart: Experience with Terraform, Bicep, Ansible, or other IAC tools. Background in Splunk, Sentinel, or equivalent SIEM platforms. Familiarity with AI/ML-driven identity tooling and adaptive access policies. Understanding of Zero Trust architectures. Relevant certifications (Microsoft Identity, Azure Architect, AWS, Security+, CCSP, CISSP). Compensation Range: Pay Range - Start: $104,090.00 Pay Range - End: $193,310.00 Geographic Specific Pay Structure: Structure 110: $114,520.00 USD - $212,680.00 USD Structure 115: $119,700.00 USD - $222,300.00 USD We believe in fairness and transparency. It's why we share the salary range for most of our roles. However, final salaries are based on a number of factors, including the skills and experience of the candidate; the current market; location of the candidate; and other factors uncovered in the hiring process. The standard pay structure is listed but if you're living in California, New York City or other eligible location, geographic specific pay structures, compensation and benefits could be applicable, click here to learn more. Grow your career with a best-in-class company that puts our clients' interests at the center of all we do. Get started now! Northwestern Mutual is an equal opportunity employer who welcomes and encourages diversity in the workforce. We are committed to creating and maintaining an environment in which each employee can contribute creative ideas, seek challenges, assume leadership and continue to focus on meeting and exceeding business and personal objectives. Skills Compliance (NM) - Advanced, Analytical Thinking (NM) - Advanced, Security Practices (NM) - Advanced, Strategic Thinking (NM) - Advanced, Cross Functional Partnering & Planning (NM) - Advanced, Continuous Improvement (NM) - Advanced, Cloud Deployment Models (NM) - Advanced, Business Automation (NM) - Advanced, Customer Centricity (NM) - Intermediate, Technical Problem Solving (NM) - Advanced, Identity Protocols (NM) - Advanced, Adaptive Communication (NM) - Advanced, Identity & Access Management Industry Standards (NM) - Advanced, DevSecOps (NM) - Advanced, Learning Agility & Critical Thinking (NM) - Advanced, Access Management Tools & Technologies (NM) - Advanced, Stakeholder Relationship (NM) - Intermediate FIND YOUR FUTURE We're excited about the potential people bring to Northwestern Mutual. You can grow your career here while enjoying first-class perks, benefits, and our commitment to a culture of belonging. Flexible work schedules Concierge service Comprehensive benefits Employee resource groups PandoLogic. Category:Technology,
RELOCATION ASSISTANCE: No relocation assistance availableCLEARANCE REQUIRED FOR START: YesCLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the Time Description At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and secure technological solutions to enable strategic objectives. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we will support yours of expanding your personal network and developing skills, whether you are new to the field or an industry thought leader. At Northrop Grumman, you will have the resources, support, and team to do some of the best work of your career. Northrop Grumman's Chief Information and Digital Office (CIDO) is seeking an innovative and dynamic IT Program Manager. This leader will support the Tactical Fighters (TF) business unit in the Mission Systems Airborne Multifunction Sensors Division and is based in our Linthicum, MD location. Reporting to the MS CIDO Lead for TF, you will lead cross-functional support teams in a matrixed organizational structure. The candidate selected for this position will be required to work on-site, full-time at our Linthicum, MD campus - this is not a remote work opportunity. The ideal candidate will bring a diverse perspective to the team, enhancing the overall organizational experience with proven cross-functional leadership and team-building skills. In this role, you will be an essential member of the CIDO team, acting as a crucial liaison between CIDO and NGMS. Responsibilities will include but not be limited to the following: Ensure the timely and cost-effective delivery of IT and Cybersecurity services, with an emphasis on alignment with enterprise strategy and technology roadmaps. Ensure operations adhere to sound technical processes in IT/Cybersecurity and are in line with company policies, procedures, and quality standards Manage daily activities and priorities, while leading the design, development, integration, and testing of digital solutions. Oversee the technical quality, performance, budget, and schedule for IT/Cybersecurity aspects related to TF-+ programs. Drive the implementation and adoption of standardized, digital solutions, while actively seeking to identify and retire technical debt. Basic Qualifications: Associate's degree with 10 years of relevant experience, or a Bachelor's degree with 8 years of relevant experience, or a Master's degree with 6 years of relevant experience, or a PhD with 4 years of relevant experience; a High School diploma or equivalent with 12 years of relevant experience may be considered in lieu of a completed degree. Applicants must have an active DoD Secret level security clearance (at a minimum), to include a closed investigation date completed within the last 6 years, or must be enrolled in the DoD Continuous Evaluation Program (CEP) in order to be considered; the required security clearance must be maintained as a condition of continued employment. The selected candidate will be required to obtain and maintain a Special Access Program (SAP/SAR) clearance; maintaining the required clearance will be a condition of continued employment. Demonstrated ability to effectively communicate and interact with a wide range of stakeholders ranging from very technical to non-technical, individual contributors, and executive management. Customer satisfaction and continuous improvement (concepts, processes, and tools) experience (e.g. implementation of Service Now for project and service request tracking). 3+ Years of IT project management experience and demonstrated leadership skills, including planning, scheduling, and workload forecasting. The ability to handle a rapidly changing set of projects and priorities while maintaining a strong, professional presence. Customer-focused with proven leadership and excellent communication skills, with an ability to drive cross functional teams to action when working in a matrix organization. Familiarity with Artificial Intelligence (AI). Preferred Qualifications: Bachelor's or Master's degree in Computer Science, Engineering, or similar STEM related discipline. Project Management Professional (PMP) certification. Experience with Agile based practices or Lean Six Sigma methodologies. Understanding of data analytics/data science principles and practices. Self-starter who works efficiently and effectively, can get up to speed with program processes quickly, and enjoys a fast paced, dynamic environment. Entrepreneurial spirit and an ability to effectively challenge the status quo while providing innovative solutions to complex IT requirements. We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly team environment. Our Employee Resource Groups (ERGs) offer opportunities to be a friend, be active, be a volunteer, be a leader, be recognized, and to be yourself. At Northrop Grumman, we are on the cutting edge of innovation. Our diverse portfolio of programs means there are endless paths to cultivate your career. We also offer exceptional benefits/healthcare, a 9/80 work schedule, and a great 401k matching program. Come join us! Primary Level Salary Range: $135,800.00 - $203,600.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions. Powered by SonicJobs (an advertiser on JobG8). By applying, you consent to share your data with SonicJobs and the employer. JobG8 or SonicJobs does not store or use your application data beyond facilitating the application. See Northrop Grumman Terms & Conditions at northropgrumman and Privacy Policy at and SonicJobs Privacy Policy at and Terms of Use at
04/04/2026
Full time
RELOCATION ASSISTANCE: No relocation assistance availableCLEARANCE REQUIRED FOR START: YesCLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the Time Description At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and secure technological solutions to enable strategic objectives. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we will support yours of expanding your personal network and developing skills, whether you are new to the field or an industry thought leader. At Northrop Grumman, you will have the resources, support, and team to do some of the best work of your career. Northrop Grumman's Chief Information and Digital Office (CIDO) is seeking an innovative and dynamic IT Program Manager. This leader will support the Tactical Fighters (TF) business unit in the Mission Systems Airborne Multifunction Sensors Division and is based in our Linthicum, MD location. Reporting to the MS CIDO Lead for TF, you will lead cross-functional support teams in a matrixed organizational structure. The candidate selected for this position will be required to work on-site, full-time at our Linthicum, MD campus - this is not a remote work opportunity. The ideal candidate will bring a diverse perspective to the team, enhancing the overall organizational experience with proven cross-functional leadership and team-building skills. In this role, you will be an essential member of the CIDO team, acting as a crucial liaison between CIDO and NGMS. Responsibilities will include but not be limited to the following: Ensure the timely and cost-effective delivery of IT and Cybersecurity services, with an emphasis on alignment with enterprise strategy and technology roadmaps. Ensure operations adhere to sound technical processes in IT/Cybersecurity and are in line with company policies, procedures, and quality standards Manage daily activities and priorities, while leading the design, development, integration, and testing of digital solutions. Oversee the technical quality, performance, budget, and schedule for IT/Cybersecurity aspects related to TF-+ programs. Drive the implementation and adoption of standardized, digital solutions, while actively seeking to identify and retire technical debt. Basic Qualifications: Associate's degree with 10 years of relevant experience, or a Bachelor's degree with 8 years of relevant experience, or a Master's degree with 6 years of relevant experience, or a PhD with 4 years of relevant experience; a High School diploma or equivalent with 12 years of relevant experience may be considered in lieu of a completed degree. Applicants must have an active DoD Secret level security clearance (at a minimum), to include a closed investigation date completed within the last 6 years, or must be enrolled in the DoD Continuous Evaluation Program (CEP) in order to be considered; the required security clearance must be maintained as a condition of continued employment. The selected candidate will be required to obtain and maintain a Special Access Program (SAP/SAR) clearance; maintaining the required clearance will be a condition of continued employment. Demonstrated ability to effectively communicate and interact with a wide range of stakeholders ranging from very technical to non-technical, individual contributors, and executive management. Customer satisfaction and continuous improvement (concepts, processes, and tools) experience (e.g. implementation of Service Now for project and service request tracking). 3+ Years of IT project management experience and demonstrated leadership skills, including planning, scheduling, and workload forecasting. The ability to handle a rapidly changing set of projects and priorities while maintaining a strong, professional presence. Customer-focused with proven leadership and excellent communication skills, with an ability to drive cross functional teams to action when working in a matrix organization. Familiarity with Artificial Intelligence (AI). Preferred Qualifications: Bachelor's or Master's degree in Computer Science, Engineering, or similar STEM related discipline. Project Management Professional (PMP) certification. Experience with Agile based practices or Lean Six Sigma methodologies. Understanding of data analytics/data science principles and practices. Self-starter who works efficiently and effectively, can get up to speed with program processes quickly, and enjoys a fast paced, dynamic environment. Entrepreneurial spirit and an ability to effectively challenge the status quo while providing innovative solutions to complex IT requirements. We offer flexible work arrangements, phenomenal learning opportunities, exposure to a wide variety of projects and customers, and a very friendly team environment. Our Employee Resource Groups (ERGs) offer opportunities to be a friend, be active, be a volunteer, be a leader, be recognized, and to be yourself. At Northrop Grumman, we are on the cutting edge of innovation. Our diverse portfolio of programs means there are endless paths to cultivate your career. We also offer exceptional benefits/healthcare, a 9/80 work schedule, and a great 401k matching program. Come join us! Primary Level Salary Range: $135,800.00 - $203,600.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions. Powered by SonicJobs (an advertiser on JobG8). By applying, you consent to share your data with SonicJobs and the employer. JobG8 or SonicJobs does not store or use your application data beyond facilitating the application. See Northrop Grumman Terms & Conditions at northropgrumman and Privacy Policy at and SonicJobs Privacy Policy at and Terms of Use at
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City Fort Meade State MD Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in Ft Meade, MD, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in Ft Meade, MD up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City Fort Meade State MD Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in Ft Meade, MD, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in Ft Meade, MD up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
04/04/2026
Full time
General information Job Posting Title Cyber Security Engineer Date Tuesday, February 24, 2026 City San Antonio State TX Country United States Working time Full-time Description & Requirements Maximus is a trusted federal partner supporting mission critical programs across national security, defense, and public service delivery. Recent contract awards in cybersecurity and operational readiness underscore Maximus' role as a reliable prime for high impact government missions. Joining Maximus means contributing to meaningful work in fast paced environments alongside professionals committed to service, accountability, and results. This position is contingent upon contract award and position availability. Selected candidates will receive a contingent offer of employment, which will become final only upon successful contract award to Maximus, availability of the position, and receipt of authorization to proceed. This position is onsite five days a week in San Antonio, TX, and requires a TS/SCI security clearance. Maximus TCS (Technology and Consulting Services) Internal Job Profile Code: TCS051, T3, Band 6 Job-Specific Essential Duties and Responsibilities: - Implements and maintains cybersecurity controls supporting JCC2 operational systems. - Conducts risk assessments, vulnerability scans, and threat analysis activities. - Performs security testing and validation to identify and mitigate system vulnerabilities. - Investigates and responds to cybersecurity incidents and security events. - Develops remediation actions and supports incident recovery activities. - Maintains security documentation, playbooks, and reporting artifacts. - Ensures compliance with DoD cybersecurity policies, RMF, and security standards. - Supports system accreditation and security assessment activities. - Collaborates with engineering and operations teams to improve system security posture. - Participates in Agile program increment (PI) planning and activities requiring periodic travels. Job-Specific Minimum Requirements: - Active TS/SCI clearance is required. - Bachelor's degree in Cyber Security, Information Technology, Computer Science, or related field. - Must be able to report on-site in San Antonio, TX up to five days per week based on customer requirements. - IAT Level II certification required. - 5 years experience with DoD cybersecurity policies and frameworks (RMF, NIST, ISO 27001, CIS Controls, DISA STIGs). - 5 years experience with security technologies (firewalls, IDS/IPS, SIEM, endpoint protection). - 5 years experience securing network protocols, operating systems, and databases. - 5 years experience scripting for automation and reporting (Python, PowerShell, or Bash). Preferred Skills and Qualifications: - Certified Information Systems Security Professional (CISSP). - Certified Ethical Hacker (CEH). - Certified Information Security Manager (CISM). - Offensive Security Certified Professional (OSCP) IAT Level III. - Experience supporting DoD DevSecOps environments. - Experience supporting accredited classified systems. - Experience performing incident response and forensic analysis. Minimum Requirements TCS051, T3, Band 6 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at . Minimum Salary $ 125,000.00 Maximum Salary $ 144,000.00
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post-secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills and Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem-solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point of market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Job Range Target Minimum: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Regions offers a benefits package that is flexible, comprehensive and recognizes that "one size does not fit all" for benefits eligible associates. Listed below is a synopsis of the benefits offered by Regions for informational purposes, which is not intended to be a complete summary of plan terms and conditions. Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please copy the link below to your browser. Location Details Riverchase Operations Center Location: Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/04/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post-secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills and Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem-solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point of market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Job Range Target Minimum: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Regions offers a benefits package that is flexible, comprehensive and recognizes that "one size does not fit all" for benefits eligible associates. Listed below is a synopsis of the benefits offered by Regions for informational purposes, which is not intended to be a complete summary of plan terms and conditions. Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please copy the link below to your browser. Location Details Riverchase Operations Center Location: Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
SUMMARY Arcticom, LLC, a company within the BSNC family, is currently seeking a qualified Radio Frequency (RF) Systems Engineer to support the technical operations, maintenance, and optimization for various clients including agencies within DOD. This role focuses on system configuration, troubleshooting, RF optimization, and supporting functional system administration (FSA) tasks under the guidance of the operations manager and customer. RF Systems Engineer ensures RF networks operate efficiently, comply with cybersecurity requirements (as required) and reporting needs in alignment with Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS) standards. Applicants will be notified via phone or email within ten (10) business days of submittal. ESSENTIAL DUTIES & RESPONSIBILITIES The Essential Duties and Responsibilities are intended to present a descriptive list of the range of duties performed for this position and are not intended to reflect all duties performed within the job. Other duties may be assigned. o RF System Configuration and Operations: Configuring and maintaining all components of RF system configuration, ensuring reliable system performance and support of all system designed and maximum efficient transmission. o Technical Support and Troubleshooting: Provide technical support for electromagnetic networks, including diagnosing and resolving system issues to maintain performance. o Cybersecurity Compliance: Implement and maintain security controls in accordance with DOD 8570.01-M, NIST SP 800-53, and DODI 8510.01 Risk Management Framework (RMF) requirements. Ensure compliance with DOD cybersecurity policies. (Reference - R56, FCC, LMR/ATG) o Network and System Access: Support the establishment and maintenance of secure communication links. Conduct reviews of contractor access to verify continued need. o End-of-Year Surge Support: Provide additional technical support during the FY surge period, to meet year-end project proposals and SOW requirements. o Documentation and Compliance: Contribute to the development of Standard Operating Procedures (SOPs) and other technical documentation as needed. o Meeting Support: Assist in preparing technical materials for organizational meetings and documenting outcomes as directed o Ensure technical support and troubleshooting align with performance requirements, maintaining system reliability and user satisfaction QUALIFICATIONS - EXPERIENCE, EDUCATION AND CERTIFICATION To perform this job successfully, an individual must be able to satisfactorily perform each essential duty. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. Required (Minimum Necessary) Qualifications o Bachelor's degree in a relevant field (e.g., Telecom Engineer, RF Engineer, Engineering, or related discipline) can be substituted for 8 years in the same field. o Minimum of four (4) years of experience in systems engineering, preferably with exposure to DOD. o Must be able to obtain and maintain DOD-approved Information Assurance (IA) certifications per DOD 8140 for IA technical positions. o Must pass the mandatory background investigation and the security awareness training and comply with DOD Personnel Security Office guidelines as required. Knowledge, Skills, Abilities, and Other Characteristics o Proficiency in system configuration, maintenance, and troubleshooting for enterprise applications. o Strong technical and analytical skills for diagnosing system issues. o Ability to work collaboratively under the direction of senior staff and communicate effectively with technical and non-technical stakeholders. Preferred o DOD Secret or higher clearance. o Prior experience with a government contractor or other government entity and understanding of radios and IT systems. o Strong computer skills; Microsoft Office Suite programs such as WORD, EXCEL, PowerPoint, Visio, and Microsoft Project. o CAD programs. NECESSARY PHYSICAL REQUIREMENTS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Employees must maintain a constant state of mental alertness at all times. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Essential and marginal functions may require availability of excess/overtime hours as required by the customer during surge periods, maintaining physical condition necessary for lifting 50lbs from the ground and 20lbs overhead, bending, stooping, sitting, walking or standing for prolonged periods of time; most of time is spent sitting in a comfortable position with frequent opportunity to move about. DOT COVERED/SAFETY-SENSITIVE ROLE REQUIREMENTS o This position is not subject to federal requirements regarding the Department of Transportation "safety-sensitive" functions. WORK ENVIRONMENT Work Environment characteristics described here are representative of those that must be borne by an employee to successfully perform the essential functions of this job. The job is performed in an office setting with exposure to computer screens and requires extensive use of a computer, keyboard, mouse, and multi-line telephone system. The work described herein is primarily in a modern office setting. Occasional travel may be required. SUPERVISORY RESPONSIBILITIES o Support Operation and Service Managers in identifying technicians with technical requirements of the job. o Subject matter expert enforcing quality control manner for all technicians and system design. ADDITIONAL QUALIFYING FACTORS As a condition of employment, you will be required to pass a pre-employment drug screening and have acceptable background check results. If applicable to the contract, you must also obtain the appropriate clearance levels required and be able to obtain access to military installations. Shareholder Preference BSNC gives hiring, promotion, training, and retention preference to BSNC shareholders, shareholder descendants and shareholder spouses who meet the minimum qualifications for the job. Bering Straits Native Corporation is an equal opportunity employer. All applicants will receive consideration for employment without regard to any status protected by state or federal law, or any other basis prohibited by law.
04/04/2026
Full time
SUMMARY Arcticom, LLC, a company within the BSNC family, is currently seeking a qualified Radio Frequency (RF) Systems Engineer to support the technical operations, maintenance, and optimization for various clients including agencies within DOD. This role focuses on system configuration, troubleshooting, RF optimization, and supporting functional system administration (FSA) tasks under the guidance of the operations manager and customer. RF Systems Engineer ensures RF networks operate efficiently, comply with cybersecurity requirements (as required) and reporting needs in alignment with Federal Acquisition Regulation (FAR) and Defense Federal Acquisition Regulation Supplement (DFARS) standards. Applicants will be notified via phone or email within ten (10) business days of submittal. ESSENTIAL DUTIES & RESPONSIBILITIES The Essential Duties and Responsibilities are intended to present a descriptive list of the range of duties performed for this position and are not intended to reflect all duties performed within the job. Other duties may be assigned. o RF System Configuration and Operations: Configuring and maintaining all components of RF system configuration, ensuring reliable system performance and support of all system designed and maximum efficient transmission. o Technical Support and Troubleshooting: Provide technical support for electromagnetic networks, including diagnosing and resolving system issues to maintain performance. o Cybersecurity Compliance: Implement and maintain security controls in accordance with DOD 8570.01-M, NIST SP 800-53, and DODI 8510.01 Risk Management Framework (RMF) requirements. Ensure compliance with DOD cybersecurity policies. (Reference - R56, FCC, LMR/ATG) o Network and System Access: Support the establishment and maintenance of secure communication links. Conduct reviews of contractor access to verify continued need. o End-of-Year Surge Support: Provide additional technical support during the FY surge period, to meet year-end project proposals and SOW requirements. o Documentation and Compliance: Contribute to the development of Standard Operating Procedures (SOPs) and other technical documentation as needed. o Meeting Support: Assist in preparing technical materials for organizational meetings and documenting outcomes as directed o Ensure technical support and troubleshooting align with performance requirements, maintaining system reliability and user satisfaction QUALIFICATIONS - EXPERIENCE, EDUCATION AND CERTIFICATION To perform this job successfully, an individual must be able to satisfactorily perform each essential duty. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions. Required (Minimum Necessary) Qualifications o Bachelor's degree in a relevant field (e.g., Telecom Engineer, RF Engineer, Engineering, or related discipline) can be substituted for 8 years in the same field. o Minimum of four (4) years of experience in systems engineering, preferably with exposure to DOD. o Must be able to obtain and maintain DOD-approved Information Assurance (IA) certifications per DOD 8140 for IA technical positions. o Must pass the mandatory background investigation and the security awareness training and comply with DOD Personnel Security Office guidelines as required. Knowledge, Skills, Abilities, and Other Characteristics o Proficiency in system configuration, maintenance, and troubleshooting for enterprise applications. o Strong technical and analytical skills for diagnosing system issues. o Ability to work collaboratively under the direction of senior staff and communicate effectively with technical and non-technical stakeholders. Preferred o DOD Secret or higher clearance. o Prior experience with a government contractor or other government entity and understanding of radios and IT systems. o Strong computer skills; Microsoft Office Suite programs such as WORD, EXCEL, PowerPoint, Visio, and Microsoft Project. o CAD programs. NECESSARY PHYSICAL REQUIREMENTS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Employees must maintain a constant state of mental alertness at all times. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Essential and marginal functions may require availability of excess/overtime hours as required by the customer during surge periods, maintaining physical condition necessary for lifting 50lbs from the ground and 20lbs overhead, bending, stooping, sitting, walking or standing for prolonged periods of time; most of time is spent sitting in a comfortable position with frequent opportunity to move about. DOT COVERED/SAFETY-SENSITIVE ROLE REQUIREMENTS o This position is not subject to federal requirements regarding the Department of Transportation "safety-sensitive" functions. WORK ENVIRONMENT Work Environment characteristics described here are representative of those that must be borne by an employee to successfully perform the essential functions of this job. The job is performed in an office setting with exposure to computer screens and requires extensive use of a computer, keyboard, mouse, and multi-line telephone system. The work described herein is primarily in a modern office setting. Occasional travel may be required. SUPERVISORY RESPONSIBILITIES o Support Operation and Service Managers in identifying technicians with technical requirements of the job. o Subject matter expert enforcing quality control manner for all technicians and system design. ADDITIONAL QUALIFYING FACTORS As a condition of employment, you will be required to pass a pre-employment drug screening and have acceptable background check results. If applicable to the contract, you must also obtain the appropriate clearance levels required and be able to obtain access to military installations. Shareholder Preference BSNC gives hiring, promotion, training, and retention preference to BSNC shareholders, shareholder descendants and shareholder spouses who meet the minimum qualifications for the job. Bering Straits Native Corporation is an equal opportunity employer. All applicants will receive consideration for employment without regard to any status protected by state or federal law, or any other basis prohibited by law.
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
04/04/2026
Full time
The Cybersecurity Manager leads and coordinates cybersecurity operations, governance execution, and security technology programs across IT Shared Services, providing operational and strategic leadership for enterprise IT environments. This role oversees key cybersecurity functions including coordination with a third-party Security Operations Center (SOC), Identity & Access Management and Identity Governance (IAM/IGA), vulnerability management, data security, and security awareness initiatives. The Cybersecurity Manager continuously improves cybersecurity capabilities aligned with industry-recognized frameworks (such as the NIST Cybersecurity Framework) while advancing program maturity using CMMI-based practices. The position ensures cybersecurity controls and operational processes align with the organization's defined risk appetite and partners closely with Infrastructure, IT, Compliance, Risk, and business stakeholders to ensure effective implementation, clear accountability, and consistent security outcomes. This position is directly accountable for the timely completion of high-quality products and services in addition to budget management, performance management, personnel development, resource utilization, technical directions, and team dynamics. Ensures staff compliance with all applicable laws, regulations, industry standards, corporate policies, guidelines and procedures, including but not limited to, SOX, RUS, OSHA, NERC, FERC and ITS requirements. Promotes an environment of compliance and continuous improvement to meet the Corporation's goals and objectives. Job Duties: Strategic Management: Works closely with IT and business stakeholders to understand their IT security needs and aligns these needs with strategic initiatives. Develops and maintains IT security policies and processes. Identifies, prioritizes, and develops new solution ideas and leads the implementation of chosen initiatives that integrate company strategy and best practices. Ensures the department's ability to manage change based on evolving business needs and security requirements. Relationship Management: Builds and maintains positive relationships with IT peers and business stakeholders, ensuring a high level of customer satisfaction. Understands stakeholders' requirements and stays apprised of their operating environments to ensure accuracy and value in the security services rendered. Communicates clearly, effectively, and on a timely basis, fostering an environment where stakeholders feel comfortable bringing issues, concerns, and opportunities for exploration. Financial Management: Manages the budget for IT Cybersecurity, ensuring adherence to budgets and strategic plans. Directs the preparation, review, and consolidation of department budgets, projections, and variance analysis. Develops and manages annual budget, performs monthly forecasts, and oversees routine cost-management duties, such as overseeing expenditures and developing and administering contracts and purchase orders. Personnel Management: Manages individual and departmental team performance towards achieving desired results and client perceptions. Ensures that experienced and knowledgeable personnel are hired and retained. Monitors progress of associates' work to ensure deliverables meet the expectations of management and clients. Provides feedback to associates regarding their work, skills, and development. Trains associates to ensure optimum staff development and coverage plans are in place. Leadership: Communicates a vision, strategy, and initiatives that inspire the team to succeed. Sets and models standards for integrity, cooperation, and work habits. Leads the department in research and development of strategic programs and services for OPC, GTC, GSOC, and the Members. Administration: Manages the execution of routine departmental tasks. Provides department reporting and operational metrics. Administers the execution of personnel-related tasks, e.g., timesheets, compensation, etc. Operations Management: The Cybersecurity Manager ensures efficient, secure, and high-quality operation of the organization's cybersecurity function across IT Shared Services by leading security operations, policy and standards execution, and continuous improvement aligned with industry-recognized cybersecurity frameworks and regulatory requirements. The role oversees third-party SOC performance for threat monitoring, incident response, and forensics; leads IAM and IGA programs including identity architecture, privileged access management, and secure integration with cloud identity providers; and owns the vulnerability management program while partnering with Infrastructure teams responsible for patch deployment. Additional responsibilities include data protection controls, security architecture and engineering, security awareness and training, and coordination of incident response, disaster recovery security activities, penetration testing, threat intelligence, vendor security reviews, and privacy-related security controls. The Cybersecurity Manager drives automation, operational maturity, and consistency while maintaining clear accountability boundaries between cybersecurity oversight and infrastructure execution. Required Qualifications: Education: Bachelor Degree in Cybersecurity, Computer Science, IT, Information Systems, or related field. Experience: 10 years in the area of Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology Equivalent Experience: Associates Degree in Computer Science, Business Administration, IT, Engineering, or related field with at least 14 years of experience with Cybersecurity, IT Security, Network Security, IT Infrastructure, Cloud infrastructure, Virtualization, Business Analyst, IT, or Technology with at least 5 years of experience in a supervisory or leadership role. Eighteen (18) years of direct experience in the experience areas defined above in addition to at least 5 years of experience in a supervisory or leadership role. Licenses, Certifications, and/or Registrations: Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) desired. Specialized Skills: Strong verbal and written communication skills, excellent organization and time management skills, analytical and creative problem-solving skills, ability to establish and maintain effective working relationships as necessitated by the work.
Advance your career with Mindlance! We have been connecting talented IT professionals with world-class companies since 1999. Mindlance is here to help you to find the perfect fit with just the right company. Currently, we are seeking an Accounts Payable Clerk for an exciting career growth opportunity. Make your next big career move with the kind of position that will allow you to be genuinely passionate about the work you do! Our recruiters will work closely with you to help you get the edge over the competition. Let Mindlance advocate for you - apply today! "Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans." Job Title: IAM Engineer Job Category: IT Industry: Airlines Job Location: Remote Pay rate: 70-78/hr on w2 Duration: 7+ Months IAM Engineer Job Description Job Details: Notes: Strong Microsoft EntraID experience and passwordless multi-factor authentication experience. Top 5 Skill sets Configuring authentication (OIDC, SAML, OAuth) for applications Microsoft Entra conditional access policies Experience with enabling MFA and SSO Migration of applications between Identity Platforms/Providers Developing automation/scripts to support onboarding of applications and users to Identity platforms Nice to have skills or certifications: Duo Experience, Microsoft Entra, Oracle Access Manager Enable Microsoft Entra app proxy CISSP or Azure Certifications This is a senior-level position that will execute the implementation of designs and requirements provided by IAM architects and analysts and ensures that IAM capabilities and services are successfully integrated within systems across the organization while also providing ongoing support and maintenance as needed for IAM processes and technology. Job Summary The IAM Security Engineer is responsible for implementing, integrating, and supporting authentication and authorization solutions aligned with Cybersecurity and Digital Risk (CDR) principles. This role focuses on protecting enterprise data, reducing security risk, and enabling secure access for the Client workforce. The Senior IAM Engineer will lead the implementation and support of modern enterprise Workforce IAM systems. They will collaborate closely with cross-functional development teams, architects, analysts, and business stakeholders to ensure secure identity solutions are integrated throughout the product lifecycle. This role serves as a key technical contact for IAM authentication and authorization services across the organization. Essential Job Accountabilities (Core responsibilities accounting for 10% or more of the role) 1. IAM Platform Implementation & Support (40%) Implement, administer, and support workforce IAM platforms including Oracle Access Manager (OAM), Microsoft Entra, and Duo. Design, configure, and troubleshoot authentication and authorization solutions throughout the SDLC. Support automated migration of applications from Oracle Access Manager to Microsoft Entra. Onboard and integrate new applications with Microsoft Entra. Perform detailed root cause analysis of IAM issues and implement preventative solutions. Engineer scalable, secure, and high-performance IAM solutions. 2. IAM Process Engineering & Automation (20%) Develop, enhance, test, document, and maintain IAM integration processes. Simplify and automate access management workflows to improve user experience. Architect and implement accelerators and automation enablers for IAM operations. Identify optimization opportunities and execute strategies to improve efficiency, scalability, and service delivery. Job Title: IAM Engineer Job Category: IT Industry: Airlines Job Location: Remote Pay rate: 70-78/hr on w2 Duration: 7+ Months Email Qualified Resumes to: IAM Engineer Job Description Job Details: Notes: Strong Microsoft EntraID experience and passwordless multi-factor authentication experience. Top 5 Skill sets Configuring authentication (OIDC, SAML, OAuth) for applications Microsoft Entra conditional access policies Experience with enabling MFA and SSO Migration of applications between Identity Platforms/Providers Developing automation/scripts to support onboarding of applications and users to Identity platforms Nice to have skills or certifications: Duo Experience, Microsoft Entra, Oracle Access Manager Enable Microsoft Entra app proxy CISSP or Azure Certifications Job Summary The IAM Security Engineer is responsible for implementing, integrating, and supporting authentication and authorization solutions aligned with Cybersecurity and Digital Risk (CDR) principles. This role focuses on protecting enterprise data, reducing security risk, and enabling secure access for the Client workforce. 5. Metrics, KPIs & Operational Support (10%) Support delivery of IAM metrics and KPIs through system analysis and integrations. Provide ongoing operational support and maintenance for IAM services and processes. Required Qualifications & Experience IAM & Security Expertise In-depth knowledge of Workforce IAM, Single Sign-On (SSO), and Multi-Factor Authentication (MFA). Proven experience onboarding SSO applications and integrating MFA with cloud-based identity providers. Strong understanding of modern authentication protocols and standards: o FIDO2, SAML, OAuth, OIDC, Kerberos, Federation Hands-on experience with: o Passwordless authentication o API Gateways o SCIM connector development o Identity platforms such as Microsoft Entra, Duo, Oracle Access Manager, Ping Identity, Okta, or ForgeRock Compliance & Risk Practical knowledge of compliance and regulatory frameworks: o SOX, PCI, FAA, GDPR, PII Strong understanding of Zero Trust architecture, adaptive risk-based authorization, identity proofing, and verification technologies. Familiarity with security frameworks and governance standards: o ISO, NIST, CSA Controls Matrix Technical & Industry Experience Experience with large-scale identity transformation initiatives, including migration from on-premise to cloud-based IAM services. Prior experience implementing passwordless technologies in large enterprise environments. Experience supporting IAM functions within the airline or transportation industry (preferred). Exposure to AI/ML, algorithm development, or automation-driven technical solutions (preferred). Software Development & Delivery Expertise in modern software development lifecycles and Agile methodologies. Experience with automated cloud infrastructure deployment. Core Competencies Strong written and verbal communication skills; ability to communicate with both technical and non-technical audiences. Excellent attention to detail with qualitative and quantitative data. Strong analytical and problem-solving skills with the ability to adapt quickly to changing priorities. Demonstrated initiative and ownership of deliverables and outcomes.
04/04/2026
Full time
Advance your career with Mindlance! We have been connecting talented IT professionals with world-class companies since 1999. Mindlance is here to help you to find the perfect fit with just the right company. Currently, we are seeking an Accounts Payable Clerk for an exciting career growth opportunity. Make your next big career move with the kind of position that will allow you to be genuinely passionate about the work you do! Our recruiters will work closely with you to help you get the edge over the competition. Let Mindlance advocate for you - apply today! "Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans." Job Title: IAM Engineer Job Category: IT Industry: Airlines Job Location: Remote Pay rate: 70-78/hr on w2 Duration: 7+ Months IAM Engineer Job Description Job Details: Notes: Strong Microsoft EntraID experience and passwordless multi-factor authentication experience. Top 5 Skill sets Configuring authentication (OIDC, SAML, OAuth) for applications Microsoft Entra conditional access policies Experience with enabling MFA and SSO Migration of applications between Identity Platforms/Providers Developing automation/scripts to support onboarding of applications and users to Identity platforms Nice to have skills or certifications: Duo Experience, Microsoft Entra, Oracle Access Manager Enable Microsoft Entra app proxy CISSP or Azure Certifications This is a senior-level position that will execute the implementation of designs and requirements provided by IAM architects and analysts and ensures that IAM capabilities and services are successfully integrated within systems across the organization while also providing ongoing support and maintenance as needed for IAM processes and technology. Job Summary The IAM Security Engineer is responsible for implementing, integrating, and supporting authentication and authorization solutions aligned with Cybersecurity and Digital Risk (CDR) principles. This role focuses on protecting enterprise data, reducing security risk, and enabling secure access for the Client workforce. The Senior IAM Engineer will lead the implementation and support of modern enterprise Workforce IAM systems. They will collaborate closely with cross-functional development teams, architects, analysts, and business stakeholders to ensure secure identity solutions are integrated throughout the product lifecycle. This role serves as a key technical contact for IAM authentication and authorization services across the organization. Essential Job Accountabilities (Core responsibilities accounting for 10% or more of the role) 1. IAM Platform Implementation & Support (40%) Implement, administer, and support workforce IAM platforms including Oracle Access Manager (OAM), Microsoft Entra, and Duo. Design, configure, and troubleshoot authentication and authorization solutions throughout the SDLC. Support automated migration of applications from Oracle Access Manager to Microsoft Entra. Onboard and integrate new applications with Microsoft Entra. Perform detailed root cause analysis of IAM issues and implement preventative solutions. Engineer scalable, secure, and high-performance IAM solutions. 2. IAM Process Engineering & Automation (20%) Develop, enhance, test, document, and maintain IAM integration processes. Simplify and automate access management workflows to improve user experience. Architect and implement accelerators and automation enablers for IAM operations. Identify optimization opportunities and execute strategies to improve efficiency, scalability, and service delivery. Job Title: IAM Engineer Job Category: IT Industry: Airlines Job Location: Remote Pay rate: 70-78/hr on w2 Duration: 7+ Months Email Qualified Resumes to: IAM Engineer Job Description Job Details: Notes: Strong Microsoft EntraID experience and passwordless multi-factor authentication experience. Top 5 Skill sets Configuring authentication (OIDC, SAML, OAuth) for applications Microsoft Entra conditional access policies Experience with enabling MFA and SSO Migration of applications between Identity Platforms/Providers Developing automation/scripts to support onboarding of applications and users to Identity platforms Nice to have skills or certifications: Duo Experience, Microsoft Entra, Oracle Access Manager Enable Microsoft Entra app proxy CISSP or Azure Certifications Job Summary The IAM Security Engineer is responsible for implementing, integrating, and supporting authentication and authorization solutions aligned with Cybersecurity and Digital Risk (CDR) principles. This role focuses on protecting enterprise data, reducing security risk, and enabling secure access for the Client workforce. 5. Metrics, KPIs & Operational Support (10%) Support delivery of IAM metrics and KPIs through system analysis and integrations. Provide ongoing operational support and maintenance for IAM services and processes. Required Qualifications & Experience IAM & Security Expertise In-depth knowledge of Workforce IAM, Single Sign-On (SSO), and Multi-Factor Authentication (MFA). Proven experience onboarding SSO applications and integrating MFA with cloud-based identity providers. Strong understanding of modern authentication protocols and standards: o FIDO2, SAML, OAuth, OIDC, Kerberos, Federation Hands-on experience with: o Passwordless authentication o API Gateways o SCIM connector development o Identity platforms such as Microsoft Entra, Duo, Oracle Access Manager, Ping Identity, Okta, or ForgeRock Compliance & Risk Practical knowledge of compliance and regulatory frameworks: o SOX, PCI, FAA, GDPR, PII Strong understanding of Zero Trust architecture, adaptive risk-based authorization, identity proofing, and verification technologies. Familiarity with security frameworks and governance standards: o ISO, NIST, CSA Controls Matrix Technical & Industry Experience Experience with large-scale identity transformation initiatives, including migration from on-premise to cloud-based IAM services. Prior experience implementing passwordless technologies in large enterprise environments. Experience supporting IAM functions within the airline or transportation industry (preferred). Exposure to AI/ML, algorithm development, or automation-driven technical solutions (preferred). Software Development & Delivery Expertise in modern software development lifecycles and Agile methodologies. Experience with automated cloud infrastructure deployment. Core Competencies Strong written and verbal communication skills; ability to communicate with both technical and non-technical audiences. Excellent attention to detail with qualitative and quantitative data. Strong analytical and problem-solving skills with the ability to adapt quickly to changing priorities. Demonstrated initiative and ownership of deliverables and outcomes.
At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands on experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! The Senior Cyber Security Engineer will design, develop, and maintain reusable frameworks, libraries, APIs, and reference implementations for zero trust authentication and authorization. Responsibilities Create developer guides, documentation, and best practices to enable smooth integration with security services. Implement and support fine grained authorization patterns (entitlements, row level security, ABAC). Collaborate with architects and engineers to ensure security services meet performance, usability, and compliance requirements. Conduct code reviews and provide guidance to development teams on secure coding and integration practices. Research emerging zero trust and identity/access management technologies to recommend improvements. Here's what you need: 4 years of professional experience in software engineering, security engineering, or related roles. Bachelor's degree OR experience may be used in lieu of degree. Experience designing, developing, and deploying application components leveraging AWS cloud services in IL6+ classified environments. Proven experience implementing authentication and authorization frameworks (e.g., OAuth 2.0, OIDC, SAML). Hands on expertise with fine grained access control models (entitlements, row level security, ABAC). Strong proficiency in at least one programming language (e.g., Java Python) for building frameworks and libraries. Solid experience with zero trust architecture and principles. Experience creating developer documentation and integration guides. Strong grasp of secure coding practices and software development lifecycle (SDLC) security. Bonus points if you have: Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Eligibility Requirements Requires an active TS/SCI and polygraph As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland,Massachusetts,Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. () We accept applications on an on going basis and there is no fixed deadline to apply. The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is: $114,900-$151,300 USD What We Believe As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on. Equal Employment Opportunity Statement We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, and local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement. () Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an affirmative action employer for veterans and individuals with disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women. Requesting An Accommodation Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired. If you are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter. Other Employment Statements Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States. Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration. Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information. California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here () for additional important information.
04/03/2026
Full time
At Accenture Federal Services, nothing matters more than helping the US federal government make the nation stronger and safer and life better for people. Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Join Accenture Federal Services, a technology company and part of global Accenture, to do work that matters in a collaborative and caring community, where you feel like you belong and are empowered to grow, learn and thrive through hands on experience, certifications, industry training and more. Join us to drive positive, lasting change that moves missions and the government forward! The Senior Cyber Security Engineer will design, develop, and maintain reusable frameworks, libraries, APIs, and reference implementations for zero trust authentication and authorization. Responsibilities Create developer guides, documentation, and best practices to enable smooth integration with security services. Implement and support fine grained authorization patterns (entitlements, row level security, ABAC). Collaborate with architects and engineers to ensure security services meet performance, usability, and compliance requirements. Conduct code reviews and provide guidance to development teams on secure coding and integration practices. Research emerging zero trust and identity/access management technologies to recommend improvements. Here's what you need: 4 years of professional experience in software engineering, security engineering, or related roles. Bachelor's degree OR experience may be used in lieu of degree. Experience designing, developing, and deploying application components leveraging AWS cloud services in IL6+ classified environments. Proven experience implementing authentication and authorization frameworks (e.g., OAuth 2.0, OIDC, SAML). Hands on expertise with fine grained access control models (entitlements, row level security, ABAC). Strong proficiency in at least one programming language (e.g., Java Python) for building frameworks and libraries. Solid experience with zero trust architecture and principles. Experience creating developer documentation and integration guides. Strong grasp of secure coding practices and software development lifecycle (SDLC) security. Bonus points if you have: Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) Eligibility Requirements Requires an active TS/SCI and polygraph As required by local law, Accenture Federal Services provides reasonable ranges of compensation for hired roles based on labor costs in the states of California, Colorado, Hawaii, Illinois, Maryland,Massachusetts,Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland. The base pay range for this position in these locations is shown below. Compensation for roles at Accenture Federal Services varies depending on a wide array of factors, including but not limited to office location, role, skill set, and level of experience. Accenture Federal Services offers a wide variety of benefits. You can find more information on benefits here. () We accept applications on an on going basis and there is no fixed deadline to apply. The pay range for the states of California, Colorado, Hawaii, Illinois, Maryland, Massachusetts, Minnesota, New Jersey, New York, Washington, Vermont, the District of Columbia, and the city of Cleveland is: $114,900-$151,300 USD What We Believe As a company wholly dedicated to serving the US federal government, we bring together the best talent to help reinvent how federal agencies operate and deliver greater value for their mission and the American people. We have an unwavering commitment to creating a culture in which all our people are respected, feel a sense of belonging, and have equal opportunity. As a business imperative, every person at Accenture Federal Services has the responsibility to create and sustain a culture where everyone feels welcomed and included. This is grounded in our core values and our experience that hiring and developing great people who reflect different perspectives, experiences, and backgrounds is key to driving innovation and delivering the results that our clients and the country count on. Equal Employment Opportunity Statement We believe that no one should be discriminated against because of their differences. All employment decisions shall be made without regard to age, race, creed, color, religion, sex, national origin, ancestry, disability status, veteran status, sexual orientation, gender identity or expression, genetic information, marital status, citizenship status or any other basis as protected by federal, state, and local law. Our rich diversity makes us more innovative, more competitive, and more creative, which helps us better serve our clients and our communities. For details, view a copy of the Accenture Federal Services Equal Opportunity Policy Statement. () Accenture Federal Services is an Equal Employment Opportunity employer. Additionally, as an affirmative action employer for veterans and individuals with disabilities, Accenture Federal Services is committed to providing veteran employment opportunities to our service men and women. Requesting An Accommodation Accenture Federal Services is committed to providing equal employment opportunities for persons with disabilities or religious observances, including reasonable accommodation when needed. If you are hired by Accenture Federal Services and require accommodation to perform the essential functions of your role, you will be asked to participate in our reasonable accommodation process. Accommodations made to facilitate the recruiting process are not a guarantee of future or continued accommodations once hired. If you are being considered for employment opportunities with Accenture Federal Services and need an accommodation for a disability or religious observance during the interview process or for the job you are interviewing for, please speak with your recruiter. Other Employment Statements Applicants for employment in the US must have work authorization that does not now or in the future require sponsorship of a visa for employment authorization in the United States. Candidates who are currently employed by a client of Accenture Federal Services or an affiliated Accenture business may not be eligible for consideration. Job candidates will not be obligated to disclose sealed or expunged records of conviction or arrest as part of the hiring process. The Company will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. Additionally, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the Company's legal duty to furnish information. California requires additional notifications for applicants and employees. If you are a California resident, live in or plan to work from Los Angeles County upon being hired for this position, please click here () for additional important information.
Enterprise Software and Solutions Architect Bethesda Overview Black Canyon Consulting (BCC) is searching for an Enterprise Software and Solution Architect to support our work at the National Institutes of Health. This opportunity is full time and onsite at the NIH in Bethesda, MD and/or remote work. Job Summary Experienced Enterprise Software and Solution Architect to provide cross functional technical leadership in aligning IT strategy with the research, development, and operational goals of the program with the focus on agile delivery of enabling and holistic IT solutions, digital transformation, and platform modernization in support of the mission. The Enterprise Software and Solution Architect will work across the NLM/NCBI divisions and branches to bring together the relevant stakeholders to define, develop, and promote enterprise architecture (EA), solution standards, and governance. The incumbent will ensure that solution architectures and designs are aligned with the infrastructure and operational requirements, conform to the architecture standards and cybersecurity compliance, and are flexible and scalable. We are looking for a subject matter expert with proven experience in digital transformation, enterprise architecture, and design of complex systems, and who is also practical and hands on in providing thought leadership and support in the efforts to deliver MVPs and solution prototypes. Duties Lead, promote, and inspire crosscutting adoption of Enterprise Architecture (EA) practices and principles. Capture and document the current state of the software solutions, technology stacks, and system processes into a comprehensive catalog of existing resources. Identify gaps in the current EA and develop a roadmap and implementation plan based upon a current vs. future state in a cohesive architecture viewpoint. Work collaboratively with the key stakeholders and engage cross functional groups to develop consensus and credibility around the EA process. Own the EA process, from input capture to implementation, allowing for organic growth and dynamic expansion while focusing on the high priority projects and strategic initiatives. Be a creative and flexible consensus builder, provide deep subject matter expertise, advice, and coaching. Learn new technologies and keep up with both traditional and emerging best practices. Be practical and hands on: lead development of prototypes, contribute and participate in the MVP efforts, optimize for speed of product delivery rather than perfection of the solution. Ensure that solution architectures and designs are appropriately robust and address business, application, information and infrastructure architectural requirements. Partner with CTO, other architects, Technical Program Managers (TPMs), product owners and managers, tech leads (TLs), DevOps, and software engineers to build solutions that are aligned with the EA standards and principles, leverage common solutions and services, and conform to the cybersecurity requirements. Learn, understand, and champion organizational priorities. Within the solution development lifecycle, be accountable for architecting the solution design, starting with solution options evaluation and selection, buy vs. build decisions, and early phase project estimates. Establish the EA "community of practice" as an inclusive environment of collaboration with a diverse team to get the best outcomes, craft forward thinking applications and solutions, evaluate emerging technologies, and propose adoption path. As a Team Lead: Lead a team of Enterprise Software and Solution Architects. Define success metrics and KPIs for the overall team and the individual contributors, measure outcomes, and continuously assess effectiveness. Ensure team members understand their duties and responsibilities. Provide coaching and mentoring for the team, lead by example, and empower individual team members to meet and exceed expectations. Select candidates and interview for staffing open positions. Administrative supervisory duties: attendance, feedback for performance reviews. Requirements Management/Leadership/Coaching skills. Customer focused, team oriented disposition. Excellent communication and presentation skills, both oral and written. Excellent soft skills and demonstrated abilities dealing with customers, peers, and management. Good sound judgement, sense of integrity and responsibility. Experience as an Enterprise, Software, and/or Solution Architect. Generalist, technical skills across the stack. Expert in at least one programming language. Solid Linux skills. Experience with cloud technologies. Deep understanding of architectural building blocks such as web application firewalls, load balancers, gateways, proxies, caching, queuing, messaging, data streaming systems, SQL and No SQL data stores, file systems. Preferred Experience Familiarity with Cloud Native technologies such as Kubernetes, containers, service mesh and related observability tooling. Familiarity with API best practices, identity access management (IAM) and security concepts, frameworks and systems. Familiarity with workflow products and frameworks. Understanding of Agile process. Education B.Sc. in a STEM field (Engineering, Computer Science, Mathematics, Physics). OR equivalent industry experience in Software Development.
04/02/2026
Full time
Enterprise Software and Solutions Architect Bethesda Overview Black Canyon Consulting (BCC) is searching for an Enterprise Software and Solution Architect to support our work at the National Institutes of Health. This opportunity is full time and onsite at the NIH in Bethesda, MD and/or remote work. Job Summary Experienced Enterprise Software and Solution Architect to provide cross functional technical leadership in aligning IT strategy with the research, development, and operational goals of the program with the focus on agile delivery of enabling and holistic IT solutions, digital transformation, and platform modernization in support of the mission. The Enterprise Software and Solution Architect will work across the NLM/NCBI divisions and branches to bring together the relevant stakeholders to define, develop, and promote enterprise architecture (EA), solution standards, and governance. The incumbent will ensure that solution architectures and designs are aligned with the infrastructure and operational requirements, conform to the architecture standards and cybersecurity compliance, and are flexible and scalable. We are looking for a subject matter expert with proven experience in digital transformation, enterprise architecture, and design of complex systems, and who is also practical and hands on in providing thought leadership and support in the efforts to deliver MVPs and solution prototypes. Duties Lead, promote, and inspire crosscutting adoption of Enterprise Architecture (EA) practices and principles. Capture and document the current state of the software solutions, technology stacks, and system processes into a comprehensive catalog of existing resources. Identify gaps in the current EA and develop a roadmap and implementation plan based upon a current vs. future state in a cohesive architecture viewpoint. Work collaboratively with the key stakeholders and engage cross functional groups to develop consensus and credibility around the EA process. Own the EA process, from input capture to implementation, allowing for organic growth and dynamic expansion while focusing on the high priority projects and strategic initiatives. Be a creative and flexible consensus builder, provide deep subject matter expertise, advice, and coaching. Learn new technologies and keep up with both traditional and emerging best practices. Be practical and hands on: lead development of prototypes, contribute and participate in the MVP efforts, optimize for speed of product delivery rather than perfection of the solution. Ensure that solution architectures and designs are appropriately robust and address business, application, information and infrastructure architectural requirements. Partner with CTO, other architects, Technical Program Managers (TPMs), product owners and managers, tech leads (TLs), DevOps, and software engineers to build solutions that are aligned with the EA standards and principles, leverage common solutions and services, and conform to the cybersecurity requirements. Learn, understand, and champion organizational priorities. Within the solution development lifecycle, be accountable for architecting the solution design, starting with solution options evaluation and selection, buy vs. build decisions, and early phase project estimates. Establish the EA "community of practice" as an inclusive environment of collaboration with a diverse team to get the best outcomes, craft forward thinking applications and solutions, evaluate emerging technologies, and propose adoption path. As a Team Lead: Lead a team of Enterprise Software and Solution Architects. Define success metrics and KPIs for the overall team and the individual contributors, measure outcomes, and continuously assess effectiveness. Ensure team members understand their duties and responsibilities. Provide coaching and mentoring for the team, lead by example, and empower individual team members to meet and exceed expectations. Select candidates and interview for staffing open positions. Administrative supervisory duties: attendance, feedback for performance reviews. Requirements Management/Leadership/Coaching skills. Customer focused, team oriented disposition. Excellent communication and presentation skills, both oral and written. Excellent soft skills and demonstrated abilities dealing with customers, peers, and management. Good sound judgement, sense of integrity and responsibility. Experience as an Enterprise, Software, and/or Solution Architect. Generalist, technical skills across the stack. Expert in at least one programming language. Solid Linux skills. Experience with cloud technologies. Deep understanding of architectural building blocks such as web application firewalls, load balancers, gateways, proxies, caching, queuing, messaging, data streaming systems, SQL and No SQL data stores, file systems. Preferred Experience Familiarity with Cloud Native technologies such as Kubernetes, containers, service mesh and related observability tooling. Familiarity with API best practices, identity access management (IAM) and security concepts, frameworks and systems. Familiarity with workflow products and frameworks. Understanding of Agile process. Education B.Sc. in a STEM field (Engineering, Computer Science, Mathematics, Physics). OR equivalent industry experience in Software Development.
San Francisco Municipal Transportation Agency
San Francisco, California
1054 IS Business Analyst-Principal, Administration Division, TCUP - SF Municipal Transportation Agency Apply using SmartRecruiters, the City and County of San Francisco's application portal. APPOINTMENT TYPE:Temporary Exempt - Full Time not to exceed three (3) years - This position is excluded by the Charter from the competitive civil service examination process and shall serve at the discretion of the Appointing Officer. Application Opening: July 23, 2025 Deadline to Apply: 11:59pm Pacific Time on August 7, 2025 Salary: $149,994 to $188,682 annually Recruitment ID: 155470 Division: Administration Unit(s): Technology Solutions and Integration - Data Services Location: One South Van Ness Avenue, 3rd Floor, San Francisco, CA Hours: Monday - Friday, 8:00 AM - 5:00 PM ️IMPORTANT ️: A completed application must include the following by the filing deadline: Submission of online application Attach cover letter to online application The San Francisco Municipal Transportation Agency (SFMTA) is a department of the City and County of San Francisco responsible for the management of all ground transportation in the City. The SFMTA has oversight over the Municipal Railway public transit (Transit Division or "Muni"), as well as bicycling, paratransit, parking, traffic, walking, and taxis. SFMTA is currently in the process of implementing an upgrade of the technology used to manage light rail operations on the surface and in the subway. The Train Control Upgrade Project (TCUP) is a multi year, multimillion dollar project with the goal of replacing the existing train control system onboard vehicles and in the Muni Metro subway with a state of the art radio based technology. TCUP will expand supervision of trains by the train control system from the subway to the entire surface Muni light rail system. The TCUP vendor contract and installation work will be managed by a project management team within the Transit Division ("Muni"). Information Technology is at the core of TCUP. SFMTA's Technology Solutions and Integration (TSI) team will be delivering the technology scope for TCUP. The role will be supporting delivery of the information technology components. Success requires significant investments in expanded network infrastructure, data architecture, wireless communication systems, servers, databases, and cybersecurity. Project systems will need data integration with existing enterprise and intelligent transportationcutting ter. Changes need to be baselined, documented, designed, implemented, and Cu'd. More information included here clarifies all aspects. This is an opportunity to work with stakeholders and business units across the SFMTA and take a pivotal step in your career. Your work will impact the lives of all users of our transportation services and infrastructure. Position Description: Under the direction of the TCUP Technology Project Manager, the Business Analyst analyzes, plans, and executes changes to support data, database, and application integration of a new train control system into existing enterprise information systems.
04/02/2026
Full time
1054 IS Business Analyst-Principal, Administration Division, TCUP - SF Municipal Transportation Agency Apply using SmartRecruiters, the City and County of San Francisco's application portal. APPOINTMENT TYPE:Temporary Exempt - Full Time not to exceed three (3) years - This position is excluded by the Charter from the competitive civil service examination process and shall serve at the discretion of the Appointing Officer. Application Opening: July 23, 2025 Deadline to Apply: 11:59pm Pacific Time on August 7, 2025 Salary: $149,994 to $188,682 annually Recruitment ID: 155470 Division: Administration Unit(s): Technology Solutions and Integration - Data Services Location: One South Van Ness Avenue, 3rd Floor, San Francisco, CA Hours: Monday - Friday, 8:00 AM - 5:00 PM ️IMPORTANT ️: A completed application must include the following by the filing deadline: Submission of online application Attach cover letter to online application The San Francisco Municipal Transportation Agency (SFMTA) is a department of the City and County of San Francisco responsible for the management of all ground transportation in the City. The SFMTA has oversight over the Municipal Railway public transit (Transit Division or "Muni"), as well as bicycling, paratransit, parking, traffic, walking, and taxis. SFMTA is currently in the process of implementing an upgrade of the technology used to manage light rail operations on the surface and in the subway. The Train Control Upgrade Project (TCUP) is a multi year, multimillion dollar project with the goal of replacing the existing train control system onboard vehicles and in the Muni Metro subway with a state of the art radio based technology. TCUP will expand supervision of trains by the train control system from the subway to the entire surface Muni light rail system. The TCUP vendor contract and installation work will be managed by a project management team within the Transit Division ("Muni"). Information Technology is at the core of TCUP. SFMTA's Technology Solutions and Integration (TSI) team will be delivering the technology scope for TCUP. The role will be supporting delivery of the information technology components. Success requires significant investments in expanded network infrastructure, data architecture, wireless communication systems, servers, databases, and cybersecurity. Project systems will need data integration with existing enterprise and intelligent transportationcutting ter. Changes need to be baselined, documented, designed, implemented, and Cu'd. More information included here clarifies all aspects. This is an opportunity to work with stakeholders and business units across the SFMTA and take a pivotal step in your career. Your work will impact the lives of all users of our transportation services and infrastructure. Position Description: Under the direction of the TCUP Technology Project Manager, the Business Analyst analyzes, plans, and executes changes to support data, database, and application integration of a new train control system into existing enterprise information systems.
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
04/02/2026
Full time
Thank you for your interest in a career at Regions. At Regions, we believe associates deserve more than just a job. We believe in offering performance-driven individuals a place where they can build a career - a place to expect more opportunities. If you are focused on results, dedicated to quality, strength and integrity, and possess the drive to succeed, then we are your employer of choice. Regions is dedicated to taking appropriate steps to safeguard and protect private and personally identifiable information you submit. The information that you submit will be collected and reviewed by associates, consultants, and vendors of Regions in order to evaluate your qualifications and experience for job opportunities and will not be used for marketing purposes, sold, or shared outside of Regions unless required by law. Such information will be stored in accordance with regulatory requirements and in conjunction with Regions' Retention Schedule for a minimum of three years. You may review, modify, or update your information by visiting and logging into the careers section of the system. Job Description At Regions, the Cyber Security Engineer supports applicable services for cloud applications, infrastructure, platform security, and related technologies within the Cyber Security organization. Primary Responsibilities Designs, implements, and supports relevant cyber security technology solutions Provides technical administration to include troubleshooting support, break-fix operations, patching, and other day-to-day activities for relevant applications Stays abreast of industry trends and investigates organizational objectives and needs Maintains, and may assist with reviewing, operational documentation and reports to support monthly trend analysis as well as project components Assists with the research, proof-of-concept, selection, and implementation of technology solutions, including detailed analysis of pros and cons and build vs buy options Explores implementation of new technologies, solutions, and methods to improve business processes, efficiency, effectiveness, and value delivered to customers May participate in security incident response activities and post-event reviews of security incidents Supports subject-matter experts in the design, implementation, and maintenance of relevant cyber security solutions to business areas, project teams, and vendors Participates in efforts to examine the technology vision, opportunities and challenges regarding security standards and the impact of the technology within the Cyber Security organization Supports relevant metrics, controls, and other governance administration related to cyber security technology Participates in on-call rotation for the support of any relevant cyber security technologies Adheres to operational processes, standards, and procedures May offer advice and guidance to junior engineers This position is exempt from timekeeping requirements under the Fair Labor Standards Act and is not eligible for overtime pay. Requirements High School Diploma or GED and six (6) years of related post secondary education and/or experience in Information Security and/or Information Technology Preferences Bachelor's degree in Information Technology, Information Security, Information Systems Management, Computer Science, Engineering, or related field Applicable technology and/or security certifications (e.g. Certified Information Systems Security Professional (CISSP), CompTIA Security+, Cisco Certified Network Associate (CCNA), Microsoft Certified Solutions Associate (MCSA), etc.) Skills And Competencies Ability to prioritize conflicting demands Knowledge of common web technologies, cloud technologies, and enterprise and network architecture Knowledge of defense in depth, trust levels, privileges, and permissions Knowledge of modern security tools and controls Problem solving skills to offer sound solutions to issues Strong verbal, written communication, and organizational skills Strong analytical and evaluative thinking capability We're seeking a strategic storyteller who can bring our cyber security narrative to life for executive and enterprise audiences. In this role, you'll curate and synthesize complex cybersecurity initiatives into clear, compelling communications that articulate our strategic vision. You'll immerse yourself in our cyber security organization, connect the dots across programs, and craft a cohesive story that informs, engages, and influences leadership. The ideal candidate combines strong narrative development skills with a deep understanding of cybersecurity concepts, enabling them to guide how we communicate our priorities, progress, and long term direction. Preferred Qualifications Exceptional storytelling ability-turning technical cybersecurity topics into clear, compelling narratives Strong executive level communication skills (written, visual, and verbal) Ability to craft messaging for different audiences, especially senior leadership Skilled at simplifying complexity without losing accuracy Additional Information This position is intended to be onsite, now or in the near future. Associates will have regular work hours, including full days in the office three or more days a week. The manager will set the work schedule for this position, including in office expectations. Regions will not provide relocation assistance for this position, and relocation would be at your expense. The locations available for this role are Birmingham, AL, Atlanta, GA, Nashville, TN, or Charlotte, NC. Regions will not sponsor applicants for work visas for this position at this time. Applicants for this position must currently be authorized to work in the United States on a full time basis. Position Type Full time Compensation Details Pay ranges are job specific and are provided as a point-of-market reference for compensation decisions. Other factors which directly impact pay for individual associates include: experience, skills, knowledge, contribution, job location and, most importantly, performance in the job role. As these factors vary by individuals, pay will also vary among individual associates within the same job. The target information listed below is based on the Metropolitan Statistical Area Market Range for where the position is located and level of the position. Minimum Job Range Target: $89,329.90 USD Median: $122,940.00 USD Incentive Pay Plans: This job is not incentive eligible. Benefits Information Paid Vacation/Sick Time 401K with Company Match Medical, Dental and Vision Benefits Disability Benefits Health Savings Account Flexible Spending Account Life Insurance Parental Leave Employee Assistance Program Associate Volunteer Program Please note, benefits and plans may be changed, amended, or terminated with respect to all or any class of associate at any time. To learn more about Regions' benefits, please click or copy the link below to your browser. Location Details Riverchase Operations Center Location Hoover, Alabama Equal Opportunity Employer/including Disabled/Veterans Job applications at Regions are accepted electronically through our career site for a minimum of five business days from the date of posting. Job postings for higher volume positions may remain active for longer than the minimum period due to business need and may be closed at any time thereafter at the discretion of the company.
You are strategic, visionary, and thrive in dynamic environments. You are an engaging leader, a natural self-starter, and passionate about driving growth in cybersecurity services. You combine deep technical acumen with commercial savvy, and you are already ahead of the curve on AI and its impact on the security landscape. You excel at building relationships with senior stakeholders, acting as a trusted advisor and client partner, and leading high performing teams. If this sounds like you, this could be the perfect opportunity to join EPAM as Head of Cyber Security Practice, Go-to-Market . Scroll down to learn more about the position's responsibilities and requirements. Req. Responsibilities Define, develop, and continuously evolve EPAM's cybersecurity service offerings and go-to-market strategy for the US and global markets Ensure offerings are rooted in technical excellence, innovation, and relevance to client needs, with a strong focus on AI-driven security solutions Stay ahead of industry trends, especially in AI, and translate them into actionable business strategies and client solutions Act as a strategic advisor and client partner to CISOs and technical leaders, building and maintaining senior stakeholder relationships Initiate and lead high-level conversations with C-level executives (CISO, CIO, CEO, board members), understanding their business drivers and security challenges Represent EPAM at industry events, analyst briefings, and in marketing, serving as an outward-facing ambassador for the practice Scope and price engagements, establish optimal operating models, and lead the transition from sales to delivery Drive growth in direct revenue by identifying opportunities, influencing and selling-in EPAM services, and supporting the full sales cycle (RFPs, proposals, presentations, deal closure) Own and manage P&L for the cybersecurity practice, with accountability for revenue, profitability, and utilization targets Collaborate with Sales, Account Management, and Delivery teams to develop and execute account development plans aligned with the Security Practice Manage, mentor, and develop a direct team of cybersecurity professionals, fostering a scalable and high performing organization Build a culture of continuous improvement, technical excellence, and innovation within the team Lead team development initiatives to ensure the organization can take new market offerings to clients effectively Integrate acquired teams and drive practice expansion Establish and cultivate strong relationships with clients at senior levels, as well as with internal partners (executives, BU heads, Account Managers, Solution SMEs, Sales and Delivery Leaders) Act as a credible counterpart and trusted advisor to client CISOs and technical leaders Requirements More than 10 years of cybersecurity experience, with a proven track record in developing and growing client relationships and leading teams delivering security solutions Demonstrated success in executive leadership roles, with hands on P&L responsibility (ideally $60 $100M) Deep technical expertise in cybersecurity, including managed security services (MSSP), and both tactical and strategic security domains Advanced understanding of AI trends and their application in cybersecurity; proactive in adopting and championing AI driven solutions Experience managing direct reports (ideally 35+ professionals), not just matrixed teams, and building scalable organizations Exceptional leadership and management skills, with superb oral and written communication and seasoned presentation skills Strong executive selling skills, negotiation skills, and the ability to build relationships with C level stakeholders Sound business acumen, strategic skills, and common sense Practitioner background preferred over influencer/advisor backgrounds International experience and acquisition integration experience are highly valued Bachelor's degree or higher We offer Medical, Dental and Vision Insurance (Subsidized) Health Savings Account Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) Short-Term and Long-Term Disability (Company Provided) Life and AD&D Insurance (Company Provided) Employee Assistance Program Unlimited access to LinkedIn learning solutions Matched 401(k) Retirement Savings Plan Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time) Paid Holidays - nine (9) total per year Legal Plan and Identity Theft Protection Accident Insurance Employee Discounts Pet Insurance Employee Stock Purchase Program If otherwise eligible, participation in the discretionary annual bonus program If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program This Remote Position Cannot be Performed in New York City. In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 (lacounty.gov) EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone. At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
04/02/2026
Full time
You are strategic, visionary, and thrive in dynamic environments. You are an engaging leader, a natural self-starter, and passionate about driving growth in cybersecurity services. You combine deep technical acumen with commercial savvy, and you are already ahead of the curve on AI and its impact on the security landscape. You excel at building relationships with senior stakeholders, acting as a trusted advisor and client partner, and leading high performing teams. If this sounds like you, this could be the perfect opportunity to join EPAM as Head of Cyber Security Practice, Go-to-Market . Scroll down to learn more about the position's responsibilities and requirements. Req. Responsibilities Define, develop, and continuously evolve EPAM's cybersecurity service offerings and go-to-market strategy for the US and global markets Ensure offerings are rooted in technical excellence, innovation, and relevance to client needs, with a strong focus on AI-driven security solutions Stay ahead of industry trends, especially in AI, and translate them into actionable business strategies and client solutions Act as a strategic advisor and client partner to CISOs and technical leaders, building and maintaining senior stakeholder relationships Initiate and lead high-level conversations with C-level executives (CISO, CIO, CEO, board members), understanding their business drivers and security challenges Represent EPAM at industry events, analyst briefings, and in marketing, serving as an outward-facing ambassador for the practice Scope and price engagements, establish optimal operating models, and lead the transition from sales to delivery Drive growth in direct revenue by identifying opportunities, influencing and selling-in EPAM services, and supporting the full sales cycle (RFPs, proposals, presentations, deal closure) Own and manage P&L for the cybersecurity practice, with accountability for revenue, profitability, and utilization targets Collaborate with Sales, Account Management, and Delivery teams to develop and execute account development plans aligned with the Security Practice Manage, mentor, and develop a direct team of cybersecurity professionals, fostering a scalable and high performing organization Build a culture of continuous improvement, technical excellence, and innovation within the team Lead team development initiatives to ensure the organization can take new market offerings to clients effectively Integrate acquired teams and drive practice expansion Establish and cultivate strong relationships with clients at senior levels, as well as with internal partners (executives, BU heads, Account Managers, Solution SMEs, Sales and Delivery Leaders) Act as a credible counterpart and trusted advisor to client CISOs and technical leaders Requirements More than 10 years of cybersecurity experience, with a proven track record in developing and growing client relationships and leading teams delivering security solutions Demonstrated success in executive leadership roles, with hands on P&L responsibility (ideally $60 $100M) Deep technical expertise in cybersecurity, including managed security services (MSSP), and both tactical and strategic security domains Advanced understanding of AI trends and their application in cybersecurity; proactive in adopting and championing AI driven solutions Experience managing direct reports (ideally 35+ professionals), not just matrixed teams, and building scalable organizations Exceptional leadership and management skills, with superb oral and written communication and seasoned presentation skills Strong executive selling skills, negotiation skills, and the ability to build relationships with C level stakeholders Sound business acumen, strategic skills, and common sense Practitioner background preferred over influencer/advisor backgrounds International experience and acquisition integration experience are highly valued Bachelor's degree or higher We offer Medical, Dental and Vision Insurance (Subsidized) Health Savings Account Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) Short-Term and Long-Term Disability (Company Provided) Life and AD&D Insurance (Company Provided) Employee Assistance Program Unlimited access to LinkedIn learning solutions Matched 401(k) Retirement Savings Plan Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time) Paid Holidays - nine (9) total per year Legal Plan and Identity Theft Protection Accident Insurance Employee Discounts Pet Insurance Employee Stock Purchase Program If otherwise eligible, participation in the discretionary annual bonus program If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program This Remote Position Cannot be Performed in New York City. In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 (lacounty.gov) EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone. At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
Job Description Company Description McDonald's growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3Ds (Delivery, Digital and Drive Thru). McDonald's will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive Thrus, through McDelivery, dine in or takeaway. McDonald's Global Technology is here to power tomorrow's feel good moments. That's why you'll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae dipped fry at a time. Using AI, robotics and emerging tech, we're digitizing the Golden Arches. Combine that with our unparalleled global scale, and we're reshaping all areas of the business, industry and every community that is home to a McDonald's restaurant. We face complex tech challenges every day. But that's where our diverse and talented teams come in. They're made up of the best and brightest from all over the globe, and they thrive in the space where feel good meets fast paced. Check out the McDonald's Global Technology Technical Blog () to learn how technology and our global team are directly enabling the Accelerating the Arches strategy. Role Overview This opportunity is part of the Global Technology Enterprise Products & Platforms (EPP) Team, focused on Enterprise Performance Management (EPM) solutions including Financial Planning and Analysis (FP&A), Financial Consolidation and Close, and Account Reconciliation product areas, where our vision is to "Always be a people led, product centric, forward thinking & trusted technology partner". The Solutions Architect role is responsible for designing and maintaining solutions blueprints for products and working with product engineering teams to implement solution design. This includes designing, configuring, and supporting implementation of innovative solutions that align with business objectives and technology strategy. This role will report to the Sr. Manager, Technical Product Management. Responsibilities & Accountabilities Solution Design and Architecture Work closely with stakeholders to understand their business objectives, challenges, and requirements Develop comprehensive architectural designs for technology solutions across multiple products that meet business requirements and integrate seamlessly with existing McDonald's systems and platforms Ensure solutions are scalable, secure, and resilient, in line with industry best practices and McDonald's standards, aiming to strike a balance between innovation and stability Create and maintain architectural documentation, including high level design and configuration documents, architecture diagrams and technical specifications Defines enterprise technical standards & ensures adherence Communicate these effectively to stakeholders, ensuring everyone understands the rationale behind architectural choices and their implications Plays pivotal role in design, development, testing and deployment of the overall solution. Experience working collaboratively in a predominantly supplier enabled, outsource technology delivery environment Provides guidance and necessary clarifications to the boundary and integration systems and works with boundary and integration systems to troubleshoot and mitigate any source/destination issues and requirements. Perform root cause analysis with team. Analyze patches and plan patch deployment activities Technology Strategy and Roadmap Collaborate with product leadership teams to define and evolve the technology strategy and roadmap for the technology suite Identify emerging technologies and trends towards enhancing McDonald's technology stack in the respective business area towards improving outcomes Provide guidance during evaluation and selection of new technologies, platforms and vendors Collaborate with Cross functional Teams Foster collaboration with product managers, development teams, operations, security, and business units towards ensuring alignment between architectural vision and product development efforts Engage in regular communication and alignment meetings to ensure everyone is on the same page and working towards common goals Implementation and Support Oversee the implementation of architectural solutions and provide hands on technical support and troubleshooting for complex issues, ensuring timeline resolution and minimal disruption to operations Governance and Compliance Establish and enforce frameworks, policies and standards to ensure compliance with regulatory requirements and McDonald's policies Identify potential risks and vulnerabilities in IT systems and propose mitigation strategies Work with cybersecurity experts to ensure that systems are resilient against cyber threats and comply with relevant regulations and standards Qualifications 8+ years of experience in solution architecture, with focus on large scale, global technology environments Bachelor's or Master's degree in Computer Science, Information Technology, or a related field Deep understanding of Oracle cloud EPM platforms and experience with cloud native architecture Knowledge of professional software engineering practices & best practices for the full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations Experience applying Product and Agile ways of working that includes best practices and lessons learned to standardize and refine ways of working Highly experienced working collaboratively with business partners and product teams to drive outcomes and solve complex technical challenges, across a complex, global matrixed organization setup Possess effective communication and interpersonal skills, with the ability to articulate complex technical concepts to non technical stakeholders Strong problem solving and innovation skills to identify, develop, and make improvements to techniques, procedures, services, or products Deep knowledge of Oracle Cloud EPM modules, including Planning, Budgeting, Consolidation, and Reporting Experience with EDM and/or ARCS applications Proficiency in SQL, data integration tools, and scripting languages Experience with Oracle Cloud infrastructure and integration capabilities Ability to provide thought leadership around EPM Best practices and industry trends to drive optimization and improve end user experience Evaluate project constraints to identify risks/gaps to the proposed technical solution Proficiency with ITIL and Agile frameworks and tools (e.g. JIRA and Confluence) Experience in creating and maintaining detailed technical documentation, including architecture diagrams, configuration guides, and user manuals Preferred Qualifications Certification in one or more Oracle EPM Cloud Products preferred Experienced implementing and managing IT General Controls (ITGC) to ensure SOX compliance Knowledge of Finance business processes and a clear understanding of finance best practices Foundational understanding/experience in security: security standards, SSO, SAML, OAUTH, etc. Understanding of Cloud architecture and EPM cloud security Experience in DevOps, Security and Systems Performance Experience with Workiva Experience with cybersecurity experts to ensure that systems are resilient against cyber threats and comply with relevant regulations and standards is desirable Compensation Bonus Eligible: YES Long Term Incentive: YES Benefits Eligible: YES Salary Range The expected salary range for this role is $127,332.00 - $159,165.00 per year. The above represents the expected salary range for this job requisition. Ultimately, in determining your pay, we may also consider your experience, and other job related factors. Additional Information Benefits eligible: This position offers health and welfare benefits, a 401(k) plan, adoption assistance program, educational assistance program, flexible ways of working, and time off policies (including sick leave, parental leave, and vacation/PTO). Eligibility requirements apply to some benefits and may depend on job classification and length of employment. Bonus eligible: This position is eligible for a bonus, based on individual and company performance. Long term Incentive eligible: This position is eligible for stock or other equity grants pursuant to McDonald's long term incentive plan. McDonald's is an equal opportunity employer committed to the diversity of our workforce. We promote an inclusive work environment that creates feel good moments for everyone. McDonald's provides reasonable accommodations to qualified individuals with disabilities as part of the application or hiring process or to perform the essential functions of their job. If you need assistance accessing or reading this job posting or otherwise feel you need an accommodation during the application or hiring process, please contact . Reasonable accommodations will be determined on a case by case basis. . click apply for full job details
04/02/2026
Full time
Job Description Company Description McDonald's growth strategy, Accelerating the Arches, encompasses all aspects of our business as the leading global omni channel restaurant brand. As the consumer landscape shifts we are using our competitive advantages to further strengthen our brand. One of our core growth strategies is to Double Down on the 3Ds (Delivery, Digital and Drive Thru). McDonald's will accelerate technology innovation so 65M+ customers a day will experience a fast, easy experience, whether at one of our 25,000 and growing Drive Thrus, through McDelivery, dine in or takeaway. McDonald's Global Technology is here to power tomorrow's feel good moments. That's why you'll find us at the forefront of transformative technology, exploring new and innovative ways to serve our millions of customers and spread happiness one delicious Hot Fudge Sundae dipped fry at a time. Using AI, robotics and emerging tech, we're digitizing the Golden Arches. Combine that with our unparalleled global scale, and we're reshaping all areas of the business, industry and every community that is home to a McDonald's restaurant. We face complex tech challenges every day. But that's where our diverse and talented teams come in. They're made up of the best and brightest from all over the globe, and they thrive in the space where feel good meets fast paced. Check out the McDonald's Global Technology Technical Blog () to learn how technology and our global team are directly enabling the Accelerating the Arches strategy. Role Overview This opportunity is part of the Global Technology Enterprise Products & Platforms (EPP) Team, focused on Enterprise Performance Management (EPM) solutions including Financial Planning and Analysis (FP&A), Financial Consolidation and Close, and Account Reconciliation product areas, where our vision is to "Always be a people led, product centric, forward thinking & trusted technology partner". The Solutions Architect role is responsible for designing and maintaining solutions blueprints for products and working with product engineering teams to implement solution design. This includes designing, configuring, and supporting implementation of innovative solutions that align with business objectives and technology strategy. This role will report to the Sr. Manager, Technical Product Management. Responsibilities & Accountabilities Solution Design and Architecture Work closely with stakeholders to understand their business objectives, challenges, and requirements Develop comprehensive architectural designs for technology solutions across multiple products that meet business requirements and integrate seamlessly with existing McDonald's systems and platforms Ensure solutions are scalable, secure, and resilient, in line with industry best practices and McDonald's standards, aiming to strike a balance between innovation and stability Create and maintain architectural documentation, including high level design and configuration documents, architecture diagrams and technical specifications Defines enterprise technical standards & ensures adherence Communicate these effectively to stakeholders, ensuring everyone understands the rationale behind architectural choices and their implications Plays pivotal role in design, development, testing and deployment of the overall solution. Experience working collaboratively in a predominantly supplier enabled, outsource technology delivery environment Provides guidance and necessary clarifications to the boundary and integration systems and works with boundary and integration systems to troubleshoot and mitigate any source/destination issues and requirements. Perform root cause analysis with team. Analyze patches and plan patch deployment activities Technology Strategy and Roadmap Collaborate with product leadership teams to define and evolve the technology strategy and roadmap for the technology suite Identify emerging technologies and trends towards enhancing McDonald's technology stack in the respective business area towards improving outcomes Provide guidance during evaluation and selection of new technologies, platforms and vendors Collaborate with Cross functional Teams Foster collaboration with product managers, development teams, operations, security, and business units towards ensuring alignment between architectural vision and product development efforts Engage in regular communication and alignment meetings to ensure everyone is on the same page and working towards common goals Implementation and Support Oversee the implementation of architectural solutions and provide hands on technical support and troubleshooting for complex issues, ensuring timeline resolution and minimal disruption to operations Governance and Compliance Establish and enforce frameworks, policies and standards to ensure compliance with regulatory requirements and McDonald's policies Identify potential risks and vulnerabilities in IT systems and propose mitigation strategies Work with cybersecurity experts to ensure that systems are resilient against cyber threats and comply with relevant regulations and standards Qualifications 8+ years of experience in solution architecture, with focus on large scale, global technology environments Bachelor's or Master's degree in Computer Science, Information Technology, or a related field Deep understanding of Oracle cloud EPM platforms and experience with cloud native architecture Knowledge of professional software engineering practices & best practices for the full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations Experience applying Product and Agile ways of working that includes best practices and lessons learned to standardize and refine ways of working Highly experienced working collaboratively with business partners and product teams to drive outcomes and solve complex technical challenges, across a complex, global matrixed organization setup Possess effective communication and interpersonal skills, with the ability to articulate complex technical concepts to non technical stakeholders Strong problem solving and innovation skills to identify, develop, and make improvements to techniques, procedures, services, or products Deep knowledge of Oracle Cloud EPM modules, including Planning, Budgeting, Consolidation, and Reporting Experience with EDM and/or ARCS applications Proficiency in SQL, data integration tools, and scripting languages Experience with Oracle Cloud infrastructure and integration capabilities Ability to provide thought leadership around EPM Best practices and industry trends to drive optimization and improve end user experience Evaluate project constraints to identify risks/gaps to the proposed technical solution Proficiency with ITIL and Agile frameworks and tools (e.g. JIRA and Confluence) Experience in creating and maintaining detailed technical documentation, including architecture diagrams, configuration guides, and user manuals Preferred Qualifications Certification in one or more Oracle EPM Cloud Products preferred Experienced implementing and managing IT General Controls (ITGC) to ensure SOX compliance Knowledge of Finance business processes and a clear understanding of finance best practices Foundational understanding/experience in security: security standards, SSO, SAML, OAUTH, etc. Understanding of Cloud architecture and EPM cloud security Experience in DevOps, Security and Systems Performance Experience with Workiva Experience with cybersecurity experts to ensure that systems are resilient against cyber threats and comply with relevant regulations and standards is desirable Compensation Bonus Eligible: YES Long Term Incentive: YES Benefits Eligible: YES Salary Range The expected salary range for this role is $127,332.00 - $159,165.00 per year. The above represents the expected salary range for this job requisition. Ultimately, in determining your pay, we may also consider your experience, and other job related factors. Additional Information Benefits eligible: This position offers health and welfare benefits, a 401(k) plan, adoption assistance program, educational assistance program, flexible ways of working, and time off policies (including sick leave, parental leave, and vacation/PTO). Eligibility requirements apply to some benefits and may depend on job classification and length of employment. Bonus eligible: This position is eligible for a bonus, based on individual and company performance. Long term Incentive eligible: This position is eligible for stock or other equity grants pursuant to McDonald's long term incentive plan. McDonald's is an equal opportunity employer committed to the diversity of our workforce. We promote an inclusive work environment that creates feel good moments for everyone. McDonald's provides reasonable accommodations to qualified individuals with disabilities as part of the application or hiring process or to perform the essential functions of their job. If you need assistance accessing or reading this job posting or otherwise feel you need an accommodation during the application or hiring process, please contact . Reasonable accommodations will be determined on a case by case basis. . click apply for full job details
You are strategic, visionary, and thrive in dynamic environments. You are an engaging leader, a natural self-starter, and passionate about driving growth in cybersecurity services. You combine deep technical acumen with commercial savvy, and you are already ahead of the curve on AI and its impact on the security landscape. You excel at building relationships with senior stakeholders, acting as a trusted advisor and client partner, and leading high performing teams. If this sounds like you, this could be the perfect opportunity to join EPAM as Head of Cyber Security Practice, Go-to-Market . Scroll down to learn more about the position's responsibilities and requirements. Req. Responsibilities Define, develop, and continuously evolve EPAM's cybersecurity service offerings and go-to-market strategy for the US and global markets Ensure offerings are rooted in technical excellence, innovation, and relevance to client needs, with a strong focus on AI-driven security solutions Stay ahead of industry trends, especially in AI, and translate them into actionable business strategies and client solutions Act as a strategic advisor and client partner to CISOs and technical leaders, building and maintaining senior stakeholder relationships Initiate and lead high-level conversations with C-level executives (CISO, CIO, CEO, board members), understanding their business drivers and security challenges Represent EPAM at industry events, analyst briefings, and in marketing, serving as an outward-facing ambassador for the practice Scope and price engagements, establish optimal operating models, and lead the transition from sales to delivery Drive growth in direct revenue by identifying opportunities, influencing and selling-in EPAM services, and supporting the full sales cycle (RFPs, proposals, presentations, deal closure) Own and manage P&L for the cybersecurity practice, with accountability for revenue, profitability, and utilization targets Collaborate with Sales, Account Management, and Delivery teams to develop and execute account development plans aligned with the Security Practice Manage, mentor, and develop a direct team of cybersecurity professionals, fostering a scalable and high performing organization Build a culture of continuous improvement, technical excellence, and innovation within the team Lead team development initiatives to ensure the organization can take new market offerings to clients effectively Integrate acquired teams and drive practice expansion Establish and cultivate strong relationships with clients at senior levels, as well as with internal partners (executives, BU heads, Account Managers, Solution SMEs, Sales and Delivery Leaders) Act as a credible counterpart and trusted advisor to client CISOs and technical leaders Requirements More than 10 years of cybersecurity experience, with a proven track record in developing and growing client relationships and leading teams delivering security solutions Demonstrated success in executive leadership roles, with hands on P&L responsibility (ideally $60 $100M) Deep technical expertise in cybersecurity, including managed security services (MSSP), and both tactical and strategic security domains Advanced understanding of AI trends and their application in cybersecurity; proactive in adopting and championing AI driven solutions Experience managing direct reports (ideally 35+ professionals), not just matrixed teams, and building scalable organizations Exceptional leadership and management skills, with superb oral and written communication and seasoned presentation skills Strong executive selling skills, negotiation skills, and the ability to build relationships with C level stakeholders Sound business acumen, strategic skills, and common sense Practitioner background preferred over influencer/advisor backgrounds International experience and acquisition integration experience are highly valued Bachelor's degree or higher We offer Medical, Dental and Vision Insurance (Subsidized) Health Savings Account Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) Short-Term and Long-Term Disability (Company Provided) Life and AD&D Insurance (Company Provided) Employee Assistance Program Unlimited access to LinkedIn learning solutions Matched 401(k) Retirement Savings Plan Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time) Paid Holidays - nine (9) total per year Legal Plan and Identity Theft Protection Accident Insurance Employee Discounts Pet Insurance Employee Stock Purchase Program If otherwise eligible, participation in the discretionary annual bonus program If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program This Remote Position Cannot be Performed in New York City. In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 (lacounty.gov) EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone. At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
04/02/2026
Full time
You are strategic, visionary, and thrive in dynamic environments. You are an engaging leader, a natural self-starter, and passionate about driving growth in cybersecurity services. You combine deep technical acumen with commercial savvy, and you are already ahead of the curve on AI and its impact on the security landscape. You excel at building relationships with senior stakeholders, acting as a trusted advisor and client partner, and leading high performing teams. If this sounds like you, this could be the perfect opportunity to join EPAM as Head of Cyber Security Practice, Go-to-Market . Scroll down to learn more about the position's responsibilities and requirements. Req. Responsibilities Define, develop, and continuously evolve EPAM's cybersecurity service offerings and go-to-market strategy for the US and global markets Ensure offerings are rooted in technical excellence, innovation, and relevance to client needs, with a strong focus on AI-driven security solutions Stay ahead of industry trends, especially in AI, and translate them into actionable business strategies and client solutions Act as a strategic advisor and client partner to CISOs and technical leaders, building and maintaining senior stakeholder relationships Initiate and lead high-level conversations with C-level executives (CISO, CIO, CEO, board members), understanding their business drivers and security challenges Represent EPAM at industry events, analyst briefings, and in marketing, serving as an outward-facing ambassador for the practice Scope and price engagements, establish optimal operating models, and lead the transition from sales to delivery Drive growth in direct revenue by identifying opportunities, influencing and selling-in EPAM services, and supporting the full sales cycle (RFPs, proposals, presentations, deal closure) Own and manage P&L for the cybersecurity practice, with accountability for revenue, profitability, and utilization targets Collaborate with Sales, Account Management, and Delivery teams to develop and execute account development plans aligned with the Security Practice Manage, mentor, and develop a direct team of cybersecurity professionals, fostering a scalable and high performing organization Build a culture of continuous improvement, technical excellence, and innovation within the team Lead team development initiatives to ensure the organization can take new market offerings to clients effectively Integrate acquired teams and drive practice expansion Establish and cultivate strong relationships with clients at senior levels, as well as with internal partners (executives, BU heads, Account Managers, Solution SMEs, Sales and Delivery Leaders) Act as a credible counterpart and trusted advisor to client CISOs and technical leaders Requirements More than 10 years of cybersecurity experience, with a proven track record in developing and growing client relationships and leading teams delivering security solutions Demonstrated success in executive leadership roles, with hands on P&L responsibility (ideally $60 $100M) Deep technical expertise in cybersecurity, including managed security services (MSSP), and both tactical and strategic security domains Advanced understanding of AI trends and their application in cybersecurity; proactive in adopting and championing AI driven solutions Experience managing direct reports (ideally 35+ professionals), not just matrixed teams, and building scalable organizations Exceptional leadership and management skills, with superb oral and written communication and seasoned presentation skills Strong executive selling skills, negotiation skills, and the ability to build relationships with C level stakeholders Sound business acumen, strategic skills, and common sense Practitioner background preferred over influencer/advisor backgrounds International experience and acquisition integration experience are highly valued Bachelor's degree or higher We offer Medical, Dental and Vision Insurance (Subsidized) Health Savings Account Flexible Spending Accounts (Healthcare, Dependent Care, Commuter) Short-Term and Long-Term Disability (Company Provided) Life and AD&D Insurance (Company Provided) Employee Assistance Program Unlimited access to LinkedIn learning solutions Matched 401(k) Retirement Savings Plan Paid Time Off - the employee will be eligible to accrue 15-25 paid days, depending on specific level and tenure with EPAM (accrual eligibility may change over time) Paid Holidays - nine (9) total per year Legal Plan and Identity Theft Protection Accident Insurance Employee Discounts Pet Insurance Employee Stock Purchase Program If otherwise eligible, participation in the discretionary annual bonus program If otherwise eligible and hired into a qualifying level, participation in the discretionary Long-Term Incentive (LTI) Program This Remote Position Cannot be Performed in New York City. In accordance with the LA County Fair Chance Ordinance, you may find a copy of the Notice containing a summary of the Ordinance's key provisions here: Concept FCO Posting 8 (lacounty.gov) EPAM Systems, Inc. is an equal opportunity employer. We recognize the value of diversity and inclusion in creating success for our customers, business partners, shareholders, employees and communities. We are committed to recruiting, hiring, developing and promoting employees without discrimination. As a global employer, this commitment includes complying with all laws in the countries in which we operate. Nevertheless, we believe equal employment practices should not be limited to what the law requires. Equal opportunity and inclusion are essential to motivate, empower and recognize the best in everyone. At EPAM, employment actions are based on individual qualifications, without regard to race, color, religion, creed, gender, pregnancy status, sexual orientation, gender identity, gender expression, marital or familial status, national origin, ancestry, genetics, age, disability status, veteran status, citizenship status when otherwise legally able to work, or any other characteristic protected by law.
Location: Anywhere in Country At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client's unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity. The Opportunity We currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting edge tools and techniques to address some of the most relevant and pressing security challenges in the world. At our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions. Your Key Responsibilities Support the development of privilege and secret access management controls (CyberArk, BeyondTrust, HashiCorp, and Delinea solutions). Assist in the design and implementation of privileged access and secret management solutions. Participate in requirement gathering and definition of use cases at the enterprise level for privilege and secret management. Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (CyberArk, HashiCorp, Delinea, BeyondTrust), including auto detection and auto onboarding. Support onboarding target systems such as Windows, Linux, and Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of DevOps solutions (Ansible, Puppet, Jenkins, Kubernetes, OpenShift, GitHub, GitLab, Docker). Demonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault. Assist in defining and implementing vaulting, rotation, and heartbeat policies for human and non human identities; enable SSH key and password rotation, check out/check in, dual control, and break glass. Participate in the self service design and implementation of privilege or secrets lifecycle management using enterprise identity governance solutions (creation, management, certification, deletion). Contribute to the development and establishment of governance processes for non human identity management. Support the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers. Skills and Attributes for Success Proven experience in integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on CyberArk (vault, privilege cloud, secure, infrastructure, Endpoint Access Management, and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra. In depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications. Practical expertise in developing CyberArk technology tech stack, HashiCorp Vault, BeyondTrust, and Delinea experience. Proficiency in implementing, managing, and maintaining enterprise level privilege access management and secret management tools. Solid understanding of enterprise directory services such as Active Directory, Azure AD, and LDAP, as well as experience in implementing MFA and SSO solutions. Strong problem solving and analytical skills, with the ability to translate business requirements into technical specifications and execute technical deliveries effectively. A track record of delivering high quality client services and work products within expected timeframes. Excellent documentation skills, including the creation of procedures, process documentation, and user documentation related to IAM applications. To Qualify for the Role, You Must Have A bachelor's degree in a related field and approximately 4-6 years of related work experience; or a graduate degree and approximately 2-4 years of related work experience. Experience with PAM architecture and development within CyberArk, HashiCorp, or other PAM solutions. Hands on experience with CyberArk Conjur and HashiCorp Vault usage and functionality. A valid driver's license in the US and/or a valid passport; willingness and ability to travel. Ideally, You'd Also Have Professional certifications in Identity & Access Management, such as CISSP, CISM, or specific vendor certifications like CyberArk CDE, Hashi Vault Certified Implementation Engineer. Familiarity with additional IAM technologies and tools, including SailPoint, ForgeRock, Ping Identity, RSA, etc. Knowledge of cloud based IAM solutions and experience working with cloud platforms like AWS, Azure, or Google Cloud. Understanding of regulatory compliance frameworks and industry standards related to IAM, such as GDPR, HIPAA, NIST, or ISO 27001. Prior experience in providing PAM services to clients from various industries, demonstrating versatility and adaptability in addressing diverse IAM challenges. Strong interpersonal and communication skills, with the ability to collaborate effectively with clients and cross functional teams to present solution designs, options, and innovations. What We Look For We're interested in intellectually curious people with a genuine passion for cybersecurity. With your broad exposure across IAM, we'll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry at large. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you. What we offer you At EY, we'll develop you with future focused skills and equip you with world class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more. We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $106,800 to $194,800. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $128,000 to $221,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team led and leader enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person % of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well being. Are you ready to shape your future with confidence? Apply today. EY accepts applications for this position on an on going basis. For those living in California, please click here for additional information. EY focuses on high ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. EY Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis . click apply for full job details
04/02/2026
Full time
Location: Anywhere in Country At EY, we're all in to shape your future with confidence. We'll help you succeed in a globally connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. In an ever-evolving IT landscape, EY stands as a beacon of trust for clients across diverse industries seeking reliable solutions to address their intricate risks and vulnerabilities. As a vital member of our Identity and Access Management (IAM) team, you will play a central role in achieving this objective by empowering clients to comprehend and navigate their complex Enterprise Identity environments. Your expertise will be instrumental in evaluating, enhancing, and devising innovative solutions, processes, and policies to cater to each client's unique IAM requirements. This is an opportunity to leverage both your technical prowess and business acumen to drive our mission and make a significant impact on global cybersecurity. The Opportunity We currently offer an exciting career opportunity for a Senior Consultant responsible for supporting the design, engineering, maintenance, and troubleshooting of a diverse range of privilege and secret management solutions across the IAM spectrum. Collaborating with esteemed and innovative professionals in the cybersecurity industry, you will have the opportunity to learn and apply cutting edge tools and techniques to address some of the most relevant and pressing security challenges in the world. At our core, our IAM services play a pivotal role in assisting our clients to align security management strategy with business goals. This involves managing access to resources and services, as well as enforcing business, privacy, and security policies. With the support of strategic alliances with third party vendors, our experienced professionals offer a comprehensive suite of services, including strategy, assessment, testing, and implementation of IAM solutions. Your Key Responsibilities Support the development of privilege and secret access management controls (CyberArk, BeyondTrust, HashiCorp, and Delinea solutions). Assist in the design and implementation of privileged access and secret management solutions. Participate in requirement gathering and definition of use cases at the enterprise level for privilege and secret management. Configure and optimize discovery tools for privilege accounts, services, SSH keys, and tasks (CyberArk, HashiCorp, Delinea, BeyondTrust), including auto detection and auto onboarding. Support onboarding target systems such as Windows, Linux, and Unix accounts, databases (Oracle, MS SQL, Redis cache), and integration of DevOps solutions (Ansible, Puppet, Jenkins, Kubernetes, OpenShift, GitHub, GitLab, Docker). Demonstrate knowledge of modern cloud vaults such as AWS Secret Manager and Azure Key Vault. Assist in defining and implementing vaulting, rotation, and heartbeat policies for human and non human identities; enable SSH key and password rotation, check out/check in, dual control, and break glass. Participate in the self service design and implementation of privilege or secrets lifecycle management using enterprise identity governance solutions (creation, management, certification, deletion). Contribute to the development and establishment of governance processes for non human identity management. Support the development of policies for endpoint management solutions including Windows workstations, Mac OS, Linux, and Unix servers. Skills and Attributes for Success Proven experience in integrating, deploying, and configuring PAM and Secret Management technologies, with a strong focus on CyberArk (vault, privilege cloud, secure, infrastructure, Endpoint Access Management, and Conjur) and familiarity with other IAM solutions like Saviynt, SailPoint, Entra. In depth knowledge of privilege access management frameworks, and the ability to offer guidance on their integration into existing applications. Practical expertise in developing CyberArk technology tech stack, HashiCorp Vault, BeyondTrust, and Delinea experience. Proficiency in implementing, managing, and maintaining enterprise level privilege access management and secret management tools. Solid understanding of enterprise directory services such as Active Directory, Azure AD, and LDAP, as well as experience in implementing MFA and SSO solutions. Strong problem solving and analytical skills, with the ability to translate business requirements into technical specifications and execute technical deliveries effectively. A track record of delivering high quality client services and work products within expected timeframes. Excellent documentation skills, including the creation of procedures, process documentation, and user documentation related to IAM applications. To Qualify for the Role, You Must Have A bachelor's degree in a related field and approximately 4-6 years of related work experience; or a graduate degree and approximately 2-4 years of related work experience. Experience with PAM architecture and development within CyberArk, HashiCorp, or other PAM solutions. Hands on experience with CyberArk Conjur and HashiCorp Vault usage and functionality. A valid driver's license in the US and/or a valid passport; willingness and ability to travel. Ideally, You'd Also Have Professional certifications in Identity & Access Management, such as CISSP, CISM, or specific vendor certifications like CyberArk CDE, Hashi Vault Certified Implementation Engineer. Familiarity with additional IAM technologies and tools, including SailPoint, ForgeRock, Ping Identity, RSA, etc. Knowledge of cloud based IAM solutions and experience working with cloud platforms like AWS, Azure, or Google Cloud. Understanding of regulatory compliance frameworks and industry standards related to IAM, such as GDPR, HIPAA, NIST, or ISO 27001. Prior experience in providing PAM services to clients from various industries, demonstrating versatility and adaptability in addressing diverse IAM challenges. Strong interpersonal and communication skills, with the ability to collaborate effectively with clients and cross functional teams to present solution designs, options, and innovations. What We Look For We're interested in intellectually curious people with a genuine passion for cybersecurity. With your broad exposure across IAM, we'll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry at large. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you. What we offer you At EY, we'll develop you with future focused skills and equip you with world class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more. We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $106,800 to $194,800. The base salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $128,000 to $221,500. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team led and leader enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person % of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well being. Are you ready to shape your future with confidence? Apply today. EY accepts applications for this position on an on going basis. For those living in California, please click here for additional information. EY focuses on high ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. EY Building a better working world EY is building a better working world by creating new value for clients, people, society and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy and transactions. Fueled by sector insights, a globally connected, multi disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis . click apply for full job details
A cybersecurity firm is seeking a senior product marketing manager to drive their go-to-market strategy and execution. The role involves developing marketing content, coordinating plans, and engaging with stakeholders in the cybersecurity landscape. Candidates should have 5-10 years of PMM experience and a strong background in cybersecurity. The position offers a competitive salary ranging from $109,000 to $191,000 and can be remote with West Coast hours.
04/02/2026
Full time
A cybersecurity firm is seeking a senior product marketing manager to drive their go-to-market strategy and execution. The role involves developing marketing content, coordinating plans, and engaging with stakeholders in the cybersecurity landscape. Candidates should have 5-10 years of PMM experience and a strong background in cybersecurity. The position offers a competitive salary ranging from $109,000 to $191,000 and can be remote with West Coast hours.
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details
04/02/2026
Full time
Cloudforce One REACT Principal Consultant Apply for the Cloudforce One REACT Principal Consultant role at Cloudflare. About Us At Cloudflare, we are on a mission to help build a better Internet. Today the company runs one of the world's largest networks that powers millions of websites and other Internet properties for customers ranging from individual bloggers to SMBs to Fortune 500 companies. Cloudflare protects and accelerates any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare all have web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was named to Entrepreneur Magazine's Top Company Cultures list and ranked among the World's Most Innovative Companies by Fast Company. About The Team Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation state advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of using a vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to efficiently analyze these unique data points at scale, and synthesize findings into actionable threat intelligence to protect our customers. About The Role Cloudflare is a system spanning the globe, on a mission to make the internet safer and more powerful everyday. To help fulfill this mission, we are seeking a talented Senior Manager, Incident Response to join us in growing our Cloudforce One organization, where you will be instrumental in building a proactive and threat intelligence driven approach to protecting Cloudflare and its customers from sophisticated and evolving threat actors. This position requires an innovative, self starting, and detail oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by cyber threat actors. As a REACT Consultant, you will respond to customer security incidents in on premises and cloud environments. You will detect and disrupt cyber threat activity across customer networks and cloud environments. You will engage with customers at all levels including Executive, VP, Director, and managerial levels. You will serve an integral role in the discovery and analysis of cyber threat intrusions, working alongside forensic analysts, threat researchers, detection engineers, and malware analysts to detect and mitigate malicious activity. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing threat activity to protect your customer and the greater Cloudflare customer base. Our ideal candidate will have 1-2 years of previous experience in cybersecurity with at least 1+ years in Digital Forensics or Incident Response. Candidates will have experience with hands on forensic analysis in a Windows, Mac, and Linux environment. Ideally, this candidate will have experience triaging malware using static or dynamic analysis on Windows, macOS, or UNIX based platforms. You will be responsible correlating threat actor activity across the customer's environment. Outstanding candidates will possess excellent verbal and written communication skills. You will also have experience with incident response reports and reliably be able to write simple scripts in Python or Golang. Examples Of Desirable Skills, Knowledge And Experience Bachelor's degree in Computer Science, Information Systems, Cybersecurity, related technical field, or equivalent training/practical experience 3+ years of previous experience in cyber security 2+ years of Incident Response experience 1+ years of customer facing role Incident Response: experience conducting or managing incident response investigations for organizations, investigating targeted threats such as the Advanced Persistent Threat, Organized Crime, and Hacktivists Computer Forensic Analysis: a background using a variety of forensic analysis tools in incident response investigations to determine the extent and scope of compromise Network Forensic Analysis: strong knowledge of network protocols, network analysis tools like Bro/Zeek or Suricata, and ability to perform analysis of associated network logs Reverse Engineering: ability to understand the capabilities of static and dynamic malware analysis Incident Remediation: strong understanding of targeted attacks and able to create customized tactical and strategic remediation plans for compromised organizations Network Operations and Architecture/Engineering: strong understanding of secure network architecture and strong background in performing network operations Cloud Incident Response: knowledge in any of the following areas: AWS, Azure, GCP incident response methodologies Communications: strong ability to communicate executive and/or detailed level findings to clients; ability to effectively communicate tasks, guidance, and methodology with internal teams Strong written and verbal communication skills, with the ability to establish and maintain strong working relationships with business groups Technical knowledge of common network protocols and design patterns including TCP/IP, HTTPS, FTP, SFTP, SSH, RDP, CIFS/SMB, NFS Familiarity with various cloud environments (AWS, Azure, O365, Google, Cloudflare) Understanding of MITRE ATT&CK and NIST Cyber Security Frameworks standards and requirements In depth understanding of Windows operating systems and general knowledge of Unix, Linux, and Mac operating systems Bonus Points Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Proficient with Yara and writing rules to detect similar malware samples Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs Practical malware analysis experience with static, dynamic, and automated malware analysis techniques Possess mid level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples Reverse engineering experience with APT malware with an understanding of common infection vectors Knowledgeable of current malware techniques to evade detection and obstruct analysis Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Experience with tracking and identifying threats through Indicator of Compromise (IOCs) pivoting and infrastructure enumeration Familiarity with bash command line executables to conduct static analysis and investigate IOCs Travel Requirements Ability to travel up to 20% of the time Position may require foreign and domestic travel, passport will be required What Makes Cloudflare Special? We're not just a highly ambitious, large scale technology company. We're a highly ambitious, large scale technology company with a soul. Fundamental to our mission to help build a better Internet is protecting the free and open Internet. Project Galileo Since 2014, we've equipped more than 2,400 journalism and civil society organizations in 111 countries with powerful tools to defend themselves against attacks that would otherwise censor their work, technology already used by Cloudflare's enterprise customers-at no cost. Athenian Project In 2017, we created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 We released 1.1.1.1 to help fix the foundation of the Internet by building a faster, more secure and privacy centric public DNS resolver. This is available publicly for everyone to use- it's the first consumer focused service Cloudflare has ever released. Here's the deal- we don't store client IP addresses ever, ever. We will continue to abide by our privacy commitment and ensure that no user data is sold to advertisers or used to target consumers. Benefits Sound like something you'd like to be a part We'd love to hear from you! This position may require access to information protected under U.S. export control laws, including the U.S. Export Administration Regulations. Please note that any offer of employment may be conditioned on your authorization to receive software or technology controlled under these U.S. export laws without sponsorship for an export license. Equal Opportunity Cloudflare is proud to be an equal opportunity employer. We are committed to providing equal employment opportunity for all people and place great value in both diversity and inclusiveness. All qualified applicants will be considered for employment without regard to their, or any other person's, perceived or actual race, color, religion, sex, gender, gender identity, gender expression, sexual orientation, national origin, ancestry, citizenship, age, physical or mental disability, medical condition, family care status . click apply for full job details