×
Register Here to Apply for Jobs or Post Jobs. X

Engineer, Information Security and Risk

Job in Dublin, Franklin County, Ohio, 43016, USA
Listing for: AAAI Press
Full Time position
Listed on 2026-01-01
Job specializations:
  • IT/Tech
    Cybersecurity, IT Consultant
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Company Overview

Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities;

and a provider of performance and data solutions. Working to be healthcare’s most trusted partner, our customer‑centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500.

Department Overview

Information Technology oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value.

Information Security and Risk develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back‑up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments.

Responsibilities
  • Application Integration Leadership: Lead the integration of various enterprise applications (SaaS, on‑premise, custom‑built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de‑provisioning.
  • M&A Integration Strategy & Execution: Lead the planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions.
  • Identity System Merging & Consolidation: Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure.
  • User Lifecycle Management: Streamline and automate user provisioning, de‑provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions.
  • Solution Design & Implementation: Design, implement, and maintain IAM solutions including Single Sign‑On (SSO), Multi‑Factor Authentication (MFA), Privileged Access Management (PAM), and Role‑Based Access Control (RBAC) frameworks.
  • Security & Compliance: Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information.
  • Technical Troubleshooting & Support: Troubleshoot, identify, and resolve technical identity and access management‑related issues, providing expert support to internal teams and end‑users during and after integration.
  • Collaboration & Communication: Coordinate cross‑functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non‑technical stakeholders.
  • Documentation & Best Practices: Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up‑to‑date with IAM best practices, regulatory requirements, and security trends.
Qualifications
  • Education: Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience.
  • Experience: 5+ years of progressive experience as an IAM Engineer,…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary