ARKANSAS CHILDREN'S IS A TOBACCO FREE WORKPLACE. FLU VACCINES ARE REQUIRED. ARKANSAS CHILDREN'S IS AN EQUAL OPPORTUNITY EMPLOYER. ALL QUALIFIED APPLICANTS WILL RECEIVE CONSIDERATION FOR EMPLOYMENT WITHOUT REGARD TO RACE, COLOR, RELIGION, SEX, SEXUAL ORIENTATION, GENDER IDENTITY OR EXPRESSION, NATIONAL ORIGIN, AGE, DISABILITY, PROTECTED VETERAN STATUS OR ANY OTHER CHARACTERISTIC PROTECTED BY FEDERAL, STATE, OR LOCAL LAWS.CURRENT EMPLOYEES: Please apply via the internal career site by logging into your Workday Account ( search the "Find Jobs" report.
Work Shift: Day Shift
Time Type: Full time
Department: CC017129 Information Technology Security and Support
Summary:Monday to Friday, full-time - Remote **Must reside in Arkansas**
Additional Information:Analyzes and resolves security issues, concerns, questions, incidents and events. Evaluates and identifies risks and threats; addresses unexpected problems. Provides security monitoring, vulnerability assessment, and analysis into potential security related events and incidents. Ensures appropriate access to systems for authorized associates while protecting against unauthorized access. Operates IT security systems. Evaluates new information security threats and their potential threat to the company.
The ideal candidate has at least two (2) years of experience with:- Palo Alto firewalls
- Microsoft Purview (data protection, compliance, and governance)
- Microsoft 365 security (Defender for Office 365) and cloud security (Defender for Cloud)
Expected start date - July 6, 2026Required Education:High school diploma or GED or equivalent
Recommended Education:Bachelor's degree in a related field of study.
Required Work Experience:High School Diploma/GED and 2 years of relevant experience, or 4 years of experience in lieu of a diploma/GED.
Recommended Work Experience:Required Certifications:Recommended Certifications:Description1. Monitors and advises on information security issues related to the systems and workflow.
2. Monitors security logs and related security events through a SIEM tool.
3. Performs vulnerability scans and penetration tests; assists in developing and maintaining scripts, routines and software to perform vulnerability threat assessments.
4. Participates as a member of the security incident response team; evaluates security incidents, assist in developing solutions. Assists in a computer crime or incident scene.
5. Monitors security controls effectiveness (e.g. user add/remove, systems patching, firewall changes) and the company's security subsystems.
6. Participates IT security projects.
7. Reviews vulnerabilities and assist in making recommendations to IT management.
8. Assists in evaluating security aspects of systems changes (e.g. wireless, mobile, cloud solutions,).
9. Maintains user security awareness training.
10. Performs other duties as assigned.