Post job

Cyber security analyst jobs in Bloomington, IL

- 222 jobs
All
Cyber Security Analyst
Securities Analyst
Information Security Analyst
Security System Engineer
Information Security Officer
Security Engineer
Senior Security Engineer
Network Security Analyst
Defense Analyst
Information Security Engineer
Senior Information Security Engineer
Intrusion Detection Analyst
Information Assurance Analyst
Cyber Security Engineer
  • Information Security Engineer - Applications

    Hub Group 4.8company rating

    Cyber security analyst job in Oak Brook, IL

    In this role, you will work closely with IT teams to secure our applications throughout the development lifecycle. You'll help build a secure-by-design culture, drive security automation, and protect our systems against evolving threats. This position reports to the Manager of Information Security. ESSENTIAL JOB FUNCTIONS: Work with the Information Security Team to improve security for the company by configuring and administering security systems and tools Monitor and respond to security events using SIEM and SOAR tools Investigate security incidents to determine root cause and remediation tactics Help automate security monitoring and remediation processes Prepare and analyze security incident data and metrics for periodic reporting Collaborate on vulnerability management, remediation, and penetration testing efforts Implement and manage SAST, DAST, and Burp Suite across GitHub CI/CD pipelines and development workflows Champion secure coding practices based on OWASP Top 10 and SSDF guidelines Help secure cloud environments (Azure, AWS) and container-based deployments Conduct regular security assessments to ensure alignment with SSDLC standards After-hours configuration changes and on-call support required MINIMUM QUALIFICATIONS: Bachelor's degree in Computer Science, Information Systems (or related degree), or equivalent experience. 3+ years of experience in Application or Information Security Strong understanding of SSDLC, NIST SSDF, and DevSecOps principles. Experience with SAST/DAST tools (e.g., GitHub Advanced Security, BURP). Solid knowledge of OWASP Top 10 and secure coding best practices. Proficiency in GitHub for code review, pipeline security, and automation. Hands-on with scripting (Python, PowerShell, Bash) and API security. Experience in Azure and AWS cloud security, containers, and infrastructure-as-code. Familiarity with SIEM/SOAR platforms and incident response workflows. Experience with Windows, MacOS, and Linux operating systems Proficient in Microsoft Office applications such as Microsoft Outlook, Word, Excel, PowerPoint, and SharePoint ** This is a full-time, W2 position with Hub Group - We are NOT able to provide sponsorship at this time ** Salary: $95,000-150,000/year + bonus eligibility ** This is an estimated range based on the circumstances at the time of posting, however, may change based on a combination of factors, including but not limited to skills, experience, education, market factors, geographical location, budget, and demand** Benefits We offer a comprehensive benefits plan including: Medical Dental Vision Flexible Spending Account (FSA) Employee Assistance Program (EAP) Life & AD&D Insurance Disability Paid Time Off Paid Holidays BEWARE OF FRAUD! Hub Group has become aware of online recruiting related scams in which individuals who are not affiliated with or authorized by Hub Group are using Hub Group's name in fraudulent emails, job postings, or social media messages. In light of these scams, please bear the following in mind Hub Group will never solicit money or credit card information in connection with a Hub Group job application. Hub Group does not communicate with candidates via online chatrooms such as Signal or Discord using email accounts such as Gmail or Hotmail. Hub Group job postings are posted on our career site: ******************************** About Us Hub Group is the premier, customer-centric supply chain company offering comprehensive transportation and logistics management solutions. Keeping our customers' needs in focus, Hub Group designs, continually optimizes and applies industry-leading technology to our customers' supply chains for better service, greater efficiency and total visibility. As an award-winning, publicly traded company (NASDAQ: HUBG) with $4 billion in revenue, our 6,000 employees and drivers across the globe are always in pursuit of "The Way Ahead" - a commitment to service, integrity and innovation. We believe the way you do something is just as important as what you do. For more information, visit ****************
    $95k-150k yearly 1d ago
  • Security Analyst

    Hub International 4.8company rating

    Cyber security analyst job in Chicago, IL

    ABOUT US At HUB International, we are a team of entrepreneurs. We believe in protecting and supporting the aspirations of individuals, families, and businesses. We help our clients evaluate their risks and develop solutions tailored to their needs. We believe in empowering our employees to learn, grow, and make a difference. Our structure enables our teams to maintain their own unique, regional culture while leveraging support and resources from our corporate centers of excellence. HUB is a global insurance and employee benefits broker, providing a boundaryless array of business insurance, employee benefits, risk services, personal insurance, retirement, and private wealth management products and services. With over $5 billion in revenue and almost 20,000 employees in 600 offices throughout North America, HUB has grown substantially, in part due to our industry leading success in mergers and acquisitions. ABOUT THE ROLE The Information Security Analyst functions as a member of the Security Operations and Engineering team and interacts with technical and business units to plan and implement information security solutions and support information security incidents. This role requires strong teamwork skills and leadership qualities and must be able ability to foster and maintain business relationships with both technical and business units, must be a great communicator. Objectives of this Role Protect the integrity and confidentiality of HUB data and infrastructure while enabling business functionality in all systems and environments by supporting applicable security solutions. Lead incident response activities and provide timely response to security incidents and alerts generated by security tools or the SOC Assist in improving processes, identify efficiencies, and recommend solution enhancements to improve service level delivery Contribute to “Continuous Improvement and Posture Management” efforts, in respect to HUB's information security tooling and systems. Support the HUB Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews Champion vulnerability remediation efforts and act as a liaison to IT and application owners for patch management Gather and report on key organizational information security metrics Other duties as assigned Daily and Monthly Responsibilities Provide Level II Support for incident and request tickets escalated from other technical teams Communicate with stakeholders to assist remediation efforts. Lead / Assist in root-cause analysis for security incidents events leading to resolution. Contribute to weekly and monthly posture and response operations reporting. Be responsible for analysis and recommendation of upgrades, changes, implementation specific to the support and scaling of HUB's security operations. Support the HUB Information Security Governance & Compliance team as needed during risk assessments, internal and external Information Security Audits, and Vendor reviews Skills and Qualifications Bachelor's degree in discipline appropriate to assignment or an equivalent combination of education and experience Related certifications (e.g., GSEC, CISSP, AWS) preferred At least 2 years' experience in an Information Security role or 3 years' experience in an IT engineering capacity with progressively difficult responsibilities 2+ years of experience with cloud infrastructure and O365 services and technology Experience working with and managing Active Directory / MS Entra ID Experience with SOAR (Security Orchestration, Automation, and response) Experience with vulnerability assessment and patch management practices Experience with KQL and SPL or other Query Languages Knowledge of industry security standards, guidelines, and regulatory/compliance requirements related to information security such as ISO 27001, NIST 800-53, SOC2, PCI, SOX, etc. Knowledge of Windows Event and network device logging Knowledge of networking protocols and concepts including TCP, DNS, DHCP, Firewalls, VPN, and Web proxies Understanding of email transmission, routing, and authentication concepts including, SMTP, SPF, DKIM and DMARC Demonstrated incident response experience including dealing with malware and endpoint anti-virus and detection and response solutions Excellent Prioritization, decision making, critical thinking, communication skills Ability to coordinate and perform multiple tasks/projects simultaneously, balancing priorities and deliverables High flexibility, including willingness to travel up to 10% of working time JOIN OUR TEAM Do you believe in the power of innovation, collaboration, and transformation? Do you thrive in a supportive and client focused work environment? Are you looking for an opportunity to help build and drive change in a rapidly growing and evolving organization? When you join HUB International, you will be part of a community of learners and doers focused on our Core Values: entrepreneurship, teamwork, integrity, accountability, and service. Disclosure required under applicable law in California, Colorado, Illinois, Maryland, Minnesota, New York, New Jersey, and Washington states: The expected salary range for this position is $90-100K and will be impacted by factors such as the successful candidate's skills, experience and working location, as well as the specific position's business line, scope and level. If you believe that your qualifications and experience surpass the minimum requirements for this role, we encourage you to submit your application. By doing so, we will be able to keep your application on file for consideration for potential future positions within our organization. HUB International is proud to offer comprehensive benefit and total compensation packages which could include health/dental/vision/life/disability insurance, FSA, HSA and 401(k) accounts, paid-time-off benefits such as vacation, sick, and personal days, and eligible bonuses, equity and commissions for some positions.
    $90k-100k yearly 21h ago
  • Sr. Information Security Engineer - AI

    Talentfish

    Cyber security analyst job in Rosemont, IL

    Job Title: Senior Information Security Engineer - AI Primary Location: Rosemont, IL - Hybrid, 3 days onsite Direct Hire TalentFish is casting a line for a Senior Information Security Engineer - AI/Artificial Intelligence. This is a Direct Hire role based in Rosemont, IL with a hybrid schedule (3 days onsite) with our premier client. This is a new, exciting position within an awarded top Chicago employer organization where you'll contribute to the organization's Responsible Artificial Intelligence governance by assessing the security, integrity, and risks associated with the use of AI models and technologies. This role is hands-on and works closely with multi-disciplinary teams to evaluate AI use cases and maintain AI security frameworks and standards. What You Bring to the Role (Ideal Experience) • Bachelor's degree in Computer Science, Mathematics, or related field • 5+ years of total professional experience, including security, data security, or control validation experience • 2-3 years of practical, hands-on experience working with Artificial Intelligence technologies; working directly with AI models or ML systems • Ability to evaluate AI model risks, including bias, data exposure, data leakage, and model poisoning • Data processing or analytics skills are a plus What You'll Do (Skills Used in This Position) • Lead security assessments for AI models, including Large Language Models (LLMs), Natural Language Models (NLMs), and Small Language Models (SLMs) • Participate in review committees to assess AI use cases for value, complexity, feasibility, risk, compliance, and strategic alignment • Review AI architecture and usage within internal and third-party solutions to ensure adherence to AI security frameworks and regulatory requirements • Support development and maintenance of AI security standards, frameworks, and governance models • Provide education on AI security best practices, emerging risks, and mitigation strategies • Perform additional related responsibilities as required Compensation Information The expected salary range for this position is $120,000 - $150,000 per year, depending on experience and qualifications. This role also qualifies for comprehensive benefits such as health insurance, 401(k), and paid time off. TalentFish is committed to pay transparency and equal opportunity. The salary range provided is in compliance with applicable state and federal regulations. This role requires authorization to work in the U.S. without current or future visa sponsorship. All offers are contingent upon the completion of a background check, which may include but is not limited to reference checks, education verification, employment verification, drug testing, criminal records checks, and any required certifications or compliance requirements based on the end client's background check policies and applicable laws. TalentFish is an employee-owned company pioneering a new realm in talent acquisition. We are redefining IT staffing by evolving AI, video screening, and our unique platform. TalentFish focuses on providing the best employee, consultant, and client experience possible. At TalentFish we are an Equal Opportunity Employer; we embrace and encourage diversity!
    $120k-150k yearly 1d ago
  • Security Engineer

    Supernova Technology™

    Cyber security analyst job in Chicago, IL

    About Us Founded in 2014, we offer the industry's first and only cloud-based, fully-customizable, end-to-end software solution to automate securities-based lending from origination through the life of the loan. By combining thought leadership in suitability and risk management with industry-leading education and the latest technology, Supernova enables advisors to deliver holistic, goals-based advice and to help their clients achieve financial wellness. We partner with the industry's largest banks, most prominent insurance companies and leading online brokerages to democratize access to securities-based lending and better the entire financial ecosystem. Why Join Supernova? At Supernova Technology, we believe that the best results come from a team that is passionate, driven, and supported in all aspects of their professional lives. Here, you'll work alongside talented and innovative individuals who are committed to driving the future of securities-based lending technology. We foster a culture of collaboration, continuous learning, and growth, where each person's contributions make a real impact. Job Overview We are seeking a highly motivated and detail-oriented Security Engineer to help secure our securities-backed lending SaaS platform. The successful candidate will focus primarily on application security, secure SDLC, and application vulnerability management, while also assisting with the execution and implementation of broader information security initiatives. You'll partner with engineering, SRE/DevOps, and business teams to embed security into our build and delivery processes, support risk reduction across cloud and endpoint surfaces, and drive measurable remediation outcomes in a regulated financial-services environment. RESPONSIBILITIES: Perform hands-on web/API penetration tests, validate scanner findings, and provide clear PoCs, impact statements, and prioritized remediation aligned with OWASP. Integrate and tune SAST, DAST, SCA, container, and secret-detection tools in CI/CD; define pass/fail gates and PR checklists. Conduct lightweight threat modeling and security design reviews for new features such as authentication, session management, and secrets handling. Manage the full application vulnerability lifecycle (discover → prioritize → fix → retest → close) with SLAs and metrics. Assist in hardening AWS and ECS/Docker workloads (IAM roles, network segmentation, image policies, logging/monitoring) and support patch hygiene across cloud, container, and endpoints. Participate in incident response, including exploit reproduction, log analysis, impact assessment, and lessons learned. Provide evidence for audits (ISO 27001, SOC 2, NIST SSDF), maintain policies and developer guidance, and support vendor/security evaluations. Translate findings into developer-ready tickets, publish secure-coding guidance, and partner with engineering to streamline secure delivery. Prototype automation, explore AI/LLM-assisted workflows to improve triage and code review, and share improvements across teams. Contribute to organization-wide cybersecurity training and awareness efforts. QUALIFICATIONS: Bachelor's degree in security engineering, information assurance, or related field. 2-3 years of experience in security or software engineering (internships, labs, or open-source count), preferably in regulated industries. Strong knowledge of web/API security issues (auth, session management, injections, SSRF, CSRF, access control) and common cloud/web misconfigurations. Experience with SDLC security tools (SAST/DAST/SCA/secret detection/container scanning), CI/CD workflows, and Git. Scripting or coding skills (Python or JavaScript/TypeScript) and ability to read backend code. Familiarity with AWS security basics (IAM least privilege, KMS, logging/monitoring, security groups) and Docker/ECS runtime considerations. Clear communication skills with the ability to translate risk into actionable remediation. Experience using AI/LLM-assisted tools for triage, documentation, or code review preferred. Exposure to WAF/CDN tuning, API protection, and risk-based remediation SLAs/metrics preferred. Familiarity with frameworks like OWASP ASVS/SAMM, NIST SSDF, ISO 27001, SOC 2, PCI DSS preferred. Relevant security certifications preferred. Our Employee Benefits At Supernova Technology, we provide a robust benefits package to support the health and well-being of our employees. Our offerings include: Medical, Dental, and Vision Insurance: Multiple plans with coverage for employees and dependents. HSA and FSA Accounts: Tax-advantaged accounts for health and dependent care expenses. Life and Disability Insurance: Employer-paid basic coverage with options for additional voluntary coverage. Compensation: $95,000 - $130,000 Retirement Savings: 401(k) plan with employer contributions. Employee Assistance Program (EAP): Confidential support services, including free therapy sessions. Paid Time Off: Flexible PTO policies. Additional Perks: Commuter benefits, pet insurance, continuing education assistance, and more. Note: Actual salary at the time of hire may vary and may be above or below the range based on various factors, including but not limited to, the candidate's relevant qualifications, skills and experience, and the location where this position may be filled. Our Core Values Our core values drive everything we do. At Supernova, we... Form, execute, and communicate new ideas that add value to our employees and customers Strive through obstacles and failures Follow-through on promises or commitments to others, accept responsibility, and answer for actions & decisions Listen to, understand, and support our employees and customers Act with speed, positive attitude, and flexibility Exceed expectations and surpass ourselves every day; we embrace a sense of pride and never stop growing Join us and make an impact while growing your career at Supernova.
    $95k-130k yearly 2d ago
  • Sr. Security Engineer - Red Team

    Informatic Technologies, Inc. 3.7company rating

    Cyber security analyst job in Chicago, IL

    About the Company: A Leading Financial Service Client is looking to hire a strong Security Engineer who can lead Red team exercises against a hybrid environment using threat intelligence and the MITRE Telecommunication&CK Framework. Responsibilities: Approx 8 years' experience with industry standard Red Team testing tools (Cobalt Strike, Mythic C2, Rubeus, Bloodhound, Covenant, etc.) or the ability to demonstrate equivalent knowledge. Expert understanding of how an Advanced Persistent Threat could compromise a financial institution without using phishing. Expert understanding of Red Team concepts, tools, and automation strategies. Expert understanding of MITRE Telecommunication&CK framework tactics, techniques, and procedures. Expert understanding of measuring and rating vulnerabilities based on principal characteristics of a vulnerability. Expert understanding of Windows and Linux system hardening concepts and techniques.
    $90k-121k yearly est. 21h ago
  • PAM/HashiCorp Security Engineer

    Request Technology, LLC

    Cyber security analyst job in Chicago, IL

    ***Hybrid, 3 days onsite, 2 days remote*** ***We are unable to sponsor as this is a permanent full-time role*** Responsibilities: Provide 24x7 operational support for the suite of privileged management solutions (e.g., CyberArk, Hashi, PKI), including implementing hot fixes, resolving bugs, troubleshooting issues, performing break-fixes, managing secrets lifecycle, and delivering end-user support. Maintain robust operational integrity of privileged access management infrastructure throughout its lifecycle (e.g., patching, version control, system upgrades, alignment with Security standards, etc.). Provide organizational subject matter expert on secrets management and privileged access management architecture, establishing and enforcing security as code principles throughout the environment. Develop and implement system enhancements to improve platform user experience and automated integrations, while designing long-term solutions to address operational issues through innovative technologies including artificial intelligence for faster detection and remediation of functional and technical problems. Qualifications: Experience in one or more of the following disciplines: security operations, development, engineering, or architecture Experience supporting privileged access management and access controls programs. Professional or personal experience using AI coding agents such as OpenAI Codex, Claude Code, or Gemini CLI. Expertise in providing operational and engineering support for one or more of the following: CyberArk, HashiCorp Vault, Active Directory Certificate Services (ADCS), HSMs, and Public Key Infrastructure (PKI). Expertise in scripting languages and developing in one or more of the following languages GoLang, Bash, Python, PowerShell, Ansible, and/or Terraform. Knowledge of privileged access management methodologies and techniques for on-prem and Cloud implementation. Knowledge of application authentication and authorization systems (i.e., Active Directory, oAuth 2.0, OIDC, AWS IAM, App Role, k8s, LDAPS, Kerberos, Certificate) Working knowledge of the cloud ecosystem and CI/CD deployments with Terraform, Ansible, and Jenkins pipelines.
    $78k-106k yearly est. 3d ago
  • Information Security Officer

    Hays 4.8company rating

    Cyber security analyst job in Chicago, IL

    Job Title: Business Information Security Officer - Clinical Employment Type: Full-Time Salary Range: $130,000 - $140,000 + Benefits (Health, Dental, Vision, PTO, 401K) About the Role: We're seeking a Business Information Security Officer (BISO) to serve as a trusted advisor and strategic partner to business and clinical leaders. In this highly visible role, you'll embed cybersecurity into everyday operations, influence security adoption, and ensure compliance with frameworks like NIST, HIPAA, and FERPA. This is an opportunity to shape cybersecurity strategy in healthcare, research, and education while collaborating with executive leadership to advance a security-first culture. Key Responsibilities: Act as the frontline cybersecurity liaison for business and clinical leaders Identify and escalate domain-specific cybersecurity risks Monitor compliance with security policies and regulatory frameworks (HIPAA, FERPA, NIST CSF) Lead security awareness and risk engagement programs Develop and execute a roadmap of security initiatives aligned with business goals Drive change management for cybersecurity adoption What We're Looking For: Bachelor's degree in Computer Science or related field 5-7 years in Information Security, GRC, or cybersecurity education 3+ years managing cross-functional teams and projects Strong background in risk management, governance, and compliance Excellent communication and leadership skills Preferred: Healthcare or clinical environment experience Certifications: CISSP, CISM, PMP
    $130k-140k yearly 4d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Cyber security analyst job in Chicago, IL

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $77k-98k yearly est. Auto-Apply 36d ago
  • Cyber Security Analyst

    Mindlance 4.6company rating

    Cyber security analyst job in Oakbrook Terrace, IL

    Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at ************************* Job Title: Cyber Security Analyst Duration: 12 Months Location: Oakbrook Terrace, IL Job Description: Responsible for planning, designing, and implementing a process for cyber security monitoring, incident detection, and incident response. 1-3 yrs of experience and a Bachelor's degree in IT systems or a related discipline. Position Requirements: - Configuration and administration of logging aggregation and security event monitoring tools (like Industrial Defender, Splunk, etc.) - Configuration and maintenance of performance monitoring tools (like Solarwinds, Uptime, CA Spectrum, etc.) o Understands and can configure tools and endpoint systems to use SNMP for monitoring - General IT Support (application patching, client updates, remote access and administration tools) - General Networking knowledge (IP Networking, OSI Stack, etc.) Additional Information Thanks & Regards' ___________________________________________________________________________ Vikram Bhalla | Team Recruitment | Mindlance, Inc. | W: ************ All your information will be kept confidential according to EEO guidelines.
    $70k-90k yearly est. 60d+ ago
  • Detection & Response Analyst

    Ann & Robert H. Lurie Children's Hospital of Chicago 4.3company rating

    Cyber security analyst job in Chicago, IL

    Ann & Robert H. Lurie Children's Hospital of Chicago provides superior pediatric care in a setting that offers the latest benefits and innovations in medical technology, research and family-friendly design. As the largest pediatric provider in the region with a 140-year legacy of excellence, kids and their families are at the center of all we do. Ann & Robert H. Lurie Children's Hospital of Chicago is ranked in all 10 specialties by the U.S. News & World Report. Location 680 Lake Shore Drive Job Description The Incident Response Analyst helps guide resources to prepare for, coordinate, and respond to incidents, including, but not limited to, computer security vulnerabilities, malware, phishing, and social engineering, as well as associated forensic investigations. This position utilizes industry-leading security incident response procedures, performing frequent monitoring of incident detection control effectiveness and helping to inform preparedness exercises. This position effectively collaborates with managed detection and response, incident assistance, and security forensics partners. This position coordinates with internal emergency preparedness teams and contributes to a resilient business continuity posture. Essential Job Functions: Area Specific Job Accountabilities: Receive and triage incoming security alerts to determine their severity, priority, and relevance. Conduct initial triage and investigation of security incidents, including gathering and analyzing relevant data and logs. Analyze logs and security event data to identify indicators of compromise (IOCs) and potential security incidents. Conduct analysis of suspicious files, malware samples, or artifacts to understand their behavior and potential impact. Assist in the collection and preservation of digital evidence during incident investigation. Prepare detailed incident reports, documenting the timeline, actions taken, and lessons learned from each incident. Performs other duties as assigned. Knowledge, Skills, & Abilities: Bachelor's degree, preferably in Computer Science or related information security expertise. 2+ years of experience in information security incident response required. SANS GCIH (GIAC Certified Incident Handler), CISSP (Certified Information Systems Security Professional), CISA (Certified Information Security Auditor) or equivalent certification highly desired. Strong knowledge of information security forensics, security operations, security monitoring, technology implementation, risk analysis strategy, and NIST incident response life cycle. Experience and knowledge with information security frameworks, regulatory compliance, and regulatory bodies (e.g., HITRUST, NIST, HIPAA, DHHS). Goal oriented with the ability to lead team achievements toward desired results utilizing both internal and external resources. Professional communication, disciplined documentation, and commitment to following and improving processes and procedures. Familiarity and experience with crisis management, disaster recovery, and business availability programs and procedures Education High School Diploma/GED (Required) Pay Range $93,600.00-$154,440.00 Salary At Lurie Children's, we are committed to competitive and fair compensation aligned with market rates and internal equity, reflecting individual contributions, experience, and expertise. The pay range for this job indicates minimum and maximum targets for the position. Ranges are regularly reviewed to stay aligned with market conditions. In addition to base salary, Lurie Children's offer a comprehensive rewards package that may include differentials for some hourly employees, leadership incentives for select roles, health and retirement benefits, and wellbeing programs. For more details on other compensation, consult your recruiter or click the following link to learn more about our benefits. Benefit Statement For full time and part time employees who work 20 or more hours per week we offer a generous benefits package that includes: Medical, dental and vision insurance Employer paid group term life and disability Employer contribution toward Health Savings Account Flexible Spending Accounts Paid Time Off (PTO), Paid Holidays and Paid Parental Leave 403(b) with a 5% employer match Various voluntary benefits: Supplemental Life, AD&D and Disability Critical Illness, Accident and Hospital Indemnity coverage Tuition assistance Student loan servicing and support Adoption benefits Backup Childcare and Eldercare Employee Assistance Program, and other specialized behavioral health services and resources for employees and family members Discount on services at Lurie Children's facilities Discount purchasing program There's a Place for You with Us At Lurie Children's, we embrace and celebrate building a team with a variety of backgrounds, skills, and viewpoints - recognizing that different life experiences strengthen our workplace and the care we provide to the Chicago community and beyond. We treat everyone fairly, appreciate differences, and make meaningful connections that foster belonging. This is a place where you can be your best, so we can give our best to the patients and families who trust us with their care. Lurie Children's and its affiliates are equal employment opportunity employers. All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity or expression, religion, national origin, ancestry, age, disability, marital status, pregnancy, protected veteran status, order of protection status, protected genetic information, or any other characteristic protected by law. Support email: ***********************************
    $93.6k-154.4k yearly Auto-Apply 49d ago
  • Senior Cyber Security Engineer -Threat Simulation

    CME Group 4.4company rating

    Cyber security analyst job in Chicago, IL

    Join the Global Information Security (GIS) department at CME Group as a Sr. Cyber Security Engineer - Threat Simulation. You will be an integral part of our Offensive Security organization, directly contributing to improving CME Group's security posture. This high-impact role is responsible for the execution of Red Team adversary emulations against our complex hybrid environment, proactively testing and strengthening our internal and internet-facing systems. You'll also be a key participant in Purple Team activities to continuously improve the organization's cyber detection and response capabilities. This is a perfect opportunity for a sharp, action-oriented engineer to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure. What You'll Get * Elevate your expertise in a supportive environment fostering continuous learning, rapid career progression, and an inclusive, global team culture. * Gain broad exposure to CME Group's diverse products, asset classes, and cross-functional teams, expanding your impact across critical financial infrastructure. * Receive a competitive salary and comprehensive benefits package. What You'll Do As a key member of our offensive security team, you will: * Execute high-impact Red Team exercises against our complex hybrid cloud environments, driven by real-world threat intelligence and the MITRE ATT&CK Framework. * Engineer and maintain robust Red and Purple Team infrastructure, continuously automating processes for efficiency and scale. * Co-design and lead joint Purple Team exercises, directly partnering with cyber defense to improve detection and response capabilities. * Innovate through continuous research into new offensive security TTPs (Tactics, Techniques, and Procedures) and drive knowledge transfer across the security organization. * Conduct specialized, ad-hoc offensive security tests utilizing industry-leading and internally developed tooling to uncover subtle security gaps. * Author comprehensive post-exercise reports, including detailed technical findings, compromise narratives, and strategic, risk-rated recommendations for remediation. * Mentor cyber defense teams during incident investigations, providing critical subject matter expertise on attacker tradecraft and mindset. * Champion security awareness and technical knowledge-sharing by collaborating with information security, technology, and business stakeholders. What You'll Bring We're looking for an engineer with a robust offensive mindset and a proven track record of breaking and building in complex enterprise environments. Technical Mastery * 5+ years' experience wielding industry-standard penetration testing and adversary emulation tools (e.g., Cobalt Strike, Sliver, Mythic, Bloodhound, Burp Suite). * Expert understanding of the MITRE ATT&CK Framework and advanced evasion techniques used to bypass modern security controls. * Strong comprehension of the cyber kill chain and the full lifecycle of an Advanced Persistent Threat (APT) targeting financial institutions. * Proficiency in at least one scripting language (e.g., Python, PowerShell) and experience with a compiled language (e.g., Go, C#) for tool development. * Deep experience attacking and securing complex cloud, on-prem, and hybrid environments, from initial access through actions on objective. * Solid knowledge of Windows and Linux system hardening concepts, Purple Team automation strategies, and vulnerability rating methodologies. * Proven experience with security within at least one major cloud provider (e.g., AWS, Azure, GCP). Nice to Haves: * Previous hands-on experience performing sophisticated adversary emulations/simulations specifically within the financial services sector. * A recognized offensive security industry certification (e.g., OSCP, GPEN, GXPN, OSWE, eCPTX) demonstrating specialized, high-impact skills. * Familiarity with modern enterprise security standards and frameworks (e.g., TIBER-EU, CBEST, NIST CSF). * Experience conducting offensive security exercises against emerging technologies, such as AI/ML systems or mac OS. #LI-DD1 #LI-Hybrid CME Group is committed to offering a competitive total rewards package for our employees that recognizes their contributions to the business and reflects our long-term investment in their future. The pay range for this role is $116,600-$194,300. Actual salary offered will be dependent on a wide array of factors including but not limited to: relevant experience, skills, education and comparison to internal employees (where relevant). Our compensation program also includes an annual target bonus opportunity for all employees, as well as the opportunity to become an owner in the company through our broad-based equity program. Through our benefits program, we strive to offer flexibility, value and choice. From comprehensive health coverage, to a retirement package that includes both a 401(k) and an active pension plan, to highly competitive education reimbursement provisions, paid time off and a mental health benefit, CME Group offers a holistic benefits package for our team and their dependents. CME Group: Where Futures are Made CME Group is the world's leading derivatives marketplace. But who we are goes deeper than that. Here, you can impact markets worldwide. Transform industries. And build a career by shaping tomorrow. We invest in your success and you own it - all while working alongside a team of leading experts who inspire you in ways big and small. Problem solvers, difference makers, trailblazers. Those are our people. And we're looking for more. At CME Group, we embrace our employees' unique experiences and skills to ensure that everyone's perspectives are acknowledged and valued. As an equal-opportunity employer, we consider all potential employees without regard to any protected characteristic. Important Notice: Recruitment fraud is on the rise, with scammers using misleading promises of job offers and interviews to solicit money and personal information from job seekers. CME Group adheres to established procedures designed to maintain trust, confidence and security throughout our recruitment process. Learn more here.
    $116.6k-194.3k yearly 60d+ ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Cyber security analyst job in Illinois

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 60d+ ago
  • Information Assurance Principal Analyst (Program Lead) - JOEPS

    Technology, Automation, and Management 3.6company rating

    Cyber security analyst job in Scott Air Force Base, IL

    The Information Assurance Principal Analyst/Program Lead will provide leadership, oversight, and operational management for the Joint Operation Planning and Execution System (JOPES) and the Transportation Visualizer (TransViz) Functional Management Support contract. This individual will act as the primary liaison between TeAM, government officials, and all contract stakeholders, ensuring the coordination, integration, and execution of all program activities in accordance with DoD and USTRANSCOM expectations. The Information Assurance Principal Analyst/Program Lead will be responsible for meeting all performance, schedule, and quality objectives as outlined in the contract's scope. Mission Objectives - The primary objective of this project is to support the operational effectiveness and mission readiness of the JOPES and TransViz platforms at Scott Air Force Base. As a critical contract team member, the Information Assurance Principal Analyst/Program Lead ensures seamless functional management, stakeholder coordination, and compliance with all contractual and security requirements while facilitating process improvements and the timely delivery of program services. This position supports USTRANSCOM and associated DoD agencies by optimizing system capabilities and user experience in support of national defense objectives. Position Responsibility Summary Serve as the principal point of contact (POC) for all programmatic, technical, and contractual matters, representing TeAM in communications with government officials and stakeholders. Serve as a Liaison for all meetings & events, coordinating & scheduling all course training for teams, and attending reviews of the program. Lead, supervise, and coordinate activities of the project team-overseeing System Administrators and the Database Administrator-to fulfill contract objectives. Ensure timely and accurate reporting of program performance, deliverables, metrics, and compliance with DoD security, safety, and operational requirements. Manage risks, mitigate issues, and implement corrective actions to maintain project schedule and instill quality control. Oversee and ensure workforce compliance with all mandatory security, safety, and DoD-mandated annual training, including but not limited to OPSEC, Antiterrorism Level I, CUI, and Emergency Operations. Develop and implement process improvements, leveraging industry best practices (e.g., ITIL) to enhance JOPES/TransViz functionality and user satisfaction. Foster a culture of open communication and collaboration across stakeholders, promoting continuous improvement in program delivery. Ensure all support activities are conducted on-site in compliance with established guidelines and within the designated geographic radius.
    $63k-92k yearly est. 60d+ ago
  • Staff Systems Security Engineer

    Northrop Grumman 4.7company rating

    Cyber security analyst job in Rolling Meadows, IL

    RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SAPTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. We are seeking capable, talented, and motivated team-contributors at our Northrop Grumman Rolling Meadows site. Our products range from advanced sensing technologies to state-of-the-art targeting and tracking systems that are deployed in Electro-Optical Infrared (EOIR) and Radio Frequency Electronic Warfare (RFEW) systems. These systems are designed, developed, built, integrated, and tested by the capable folks at our company to protect the lives of US and Allied warfighters in present and future conflicts. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today. If you are interested in consideration to be included as a part of this team, we would invite you to apply. Northrop Grumman Mission Systems Sector (NGMS) is seeking a Staff Systems Security Engineer to join our Systems Security Engineering team. The Security Engineering team is cross-disciplinary across the security domain; encompassing embedded Systems Engineering, Cybersecurity, Software Security and Anti-Tamper Engineering. Roles & Responsibilities: · Design/develop system architectures and generate system designs to be implemented in a cost-effective manner. Implement and ensure compliance with government policies (e.g., JSIG, DAAPM, NIST 800-53, CNSSI 1253, DODI 5200.39, etc.) by reviewing process tailoring needs and approving documented procedures. Guide and monitor technical documentation/publication to document trades studies, system designs, analysis, and results related to a systems security posture such as identifying Critical Program Information (CPI) and creation of Anti-Tamper Plans Develop an understanding of system interfaces and how to protect them. Assist with the definition of key capabilities and performance requirements. Adapt production and development products to meet unique customer needs and support the development of system security functions. Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off. Support technical work products developed by the larger engineering team in support of major milestone deliveries (e.g.: SRR, SVR, PDR, CDR, TRR, PRR). Authoring technical documentation such as white papers, proposal technical volumes, and program milestone briefings. Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off. Other duties may include technical leadership, business capture activities, interfacing with industry partners and the USG. This position will be full-time, on-site at our Rolling Meadows, IL location. This position is contingent upon Funding/Contract award, special access program and acquiring and maintaining the necessary US Government security clearance per customers' requirements prior to start. Basic Qualifications for a Staff Systems Security Engineer: Bachelor's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 12+years of related experience, a Master's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 10+ years of related experience or a PhD in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 7+ years of related experience. 3 years of cumulative experience on DoD based platforms and/or systems regarding the application of Cybersecurity RMF or Anti-Tamper with competencies in security threat analysis, systems architecture, engineering design, requirements derivation, validation, and verification. Must have demonstrated experience in leading teams to solve technical problems, including decomposition, root cause analysis, solution development, implementation and monitoring Experience contributing to and/or making technical presentations to internal and external customers. Ability to obtain and maintain a minimum of a Secret Clearance with additional customer specified clearance prior to start. Preferred Qualifications for a Staff Systems Security Engineer: Advanced degrees in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields. Experience with design verification testing, reverse engineering, embedded software development, Cybersecurity, or Anti-Tamper Possess a DoD 8140 certification, e.g. CompTIA Security+, CISSP, or similar. Experience with proposals and creating basis of estimates (BOEs) Primary Level Salary Range: $163,200.00 - $244,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $63k-80k yearly est. Auto-Apply 58d ago
  • Malware Defense Malware Analyst

    Bank of America Corporation 4.7company rating

    Cyber security analyst job in Chicago, IL

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world. Responsibilities include, but are not limited to: * In-depth analysis of malware, including authoring analysis reports. * Tracking malware campaigns, malicious actors, and related infrastructure. * Creation of tools and scripts to assist in the analysis of malware analysis. * Field escalations of potentially malicious files and websites from teams within Malware Defense. Required Qualifications: * Strong direct experience of analyzing malware. * Intermediate to advanced malware analysis skills. * Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors. * Experience creating tools and scripts to accelerate malware and threat analysis. * Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc. * Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc. * Experience authoring YARA, Suricata, and EKFiddle detection rules. * Experience with penetration testing and/or adversary emulation is a plus. * Able to work independently on tasks, but also work well within a team environment Desired Qualifications: * Experience analyzing malware targeting Linux, Android, and IOT platforms. Skills: * Cyber Security * Data Privacy and Protection * Problem Solving * Process Management * Threat Analysis * Business Acumen * Data and Trend Analysis * Interpret Relevant Laws, Rules, and Regulations * Risk Analytics * Stakeholder Management * Access and Identity Management * Data Governance * Encryption * Information Systems Management * Technology System Assessment Shift: 1st shift (United States of America) Hours Per Week: 40
    $76k-102k yearly est. 9d ago
  • Information Security Analyst

    Jjc

    Cyber security analyst job in Joliet, IL

    Information Security Analyst STATUS: Full time DEPARTMENT: Information Security Office DIVISION: Information Technology CLASSIFICATION: Exempt UNION: Non-Union REPORTS TO: Senior Director Information Security PLACEMENT: Professional staff, S11 HIRING RANGE: $70,689 - 79,526 Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The student population at the college is diverse in ethnicity, gender, language, age and background. Joliet Junior College is an AA/EO employer and strongly encourages applications from candidates who would enhance the diversity of its staff. POSITION SUMMARY The Information Security Analyst is responsible for protecting the college's information systems and data by monitoring, analyzing, and responding to security incidents and threats. This role supports compliance with regulatory requirements (e.g., CIRCIA, HIPAA, GLBA), enhances operational efficiency, and contributes to the continual improvement of security processes and documentation. The analyst will also detect opportunities to develop and maintain security documentation, including knowledgebase articles, and manage security-related tickets from stakeholders. ESSENTIAL JOB DUTIES AND KEY RESPONSIBILITIES 1. Incident Management: Monitor, triage, and respond to cybersecurity threats and incidents across network, application, identity, and cloud layers. 2. Vulnerability Management: Participate in vulnerability assessments and penetration testing to identify and remediate security weaknesses. 3. Security Operations: Manage and maintain security tools (e.g., SIEM, IDS/IPS, vulnerability scanners), ensuring daily monitoring and compliance. 4. Facilitate the integration of SOC/Managed Security Services activities with the broader Information Security team, ensuring consistent application of ITIL processes such as Incident Management, Problem Management, and Event Management. 5. Identity Management: Support Office 365 email account management tasks, including user permissions, credential hand-offs, mailbox access provisioning, and coordination with identity and access management processes." 6. Compliance & Risk Management: Assist in legal and regulatory compliance efforts; conduct risk assessments and support audit activities. 7. Service Request Management: Handle, triage, and manage tier 2 level and up security-related tickets and requests from stakeholders, ensuring timely resolution and escalation as needed. 8. Knowledge Management: Detect opportunities to develop, improve, and maintain security documentation, including knowledgebase articles and process guides. 9. Process Improvement: Assist with the development and continual improvement of security-related processes, automation initiatives, and reporting tools. 10. Cloud Support: Support secure cloud infrastructure through systems auditing and account lifecycle management. 11. Collaboration & Training: Collaborate with IT and academic departments to ensure secure deployment of new technologies; provide security awareness training to staff and students. 12. Reporting: Prepare and present reports on security incidents, vulnerabilities, compliance status, and process improvements to leadership. 13. Professional Development: Stay current with emerging security threats, trends, best practices, and ITIL service management principles. 14. Perform related duties as assigned. MINIMUM QUALIFICATIONS 1. Bachelor's degree in Computer Science or a closely related field, OR an Associate's degree combined with 2-4 years of experience in information security or IT operations. 2. Ability to establish and maintain cooperative and effective working relationships with other members of the college and community, displaying cultural competence as well as emotional intelligence. 3. Demonstrated commitment to the college's core values of respect and inclusion, sustainability, integrity, collaboration, humor and well-being, innovation and quality. Bachelor's degree in information technology, Cybersecurity, Computer Science, or related field.. 4. Understanding of cybersecurity principles, tools, and compliance frameworks. 5. Experience with Microsoft Azure, Active Directory, and security monitoring tools. 6. Experience in information security and/or IT risk management with a focus on security performance and reliability 7. Familiarity multiple risk management concepts, frameworks, and standards (CSC, NIST, ISO, COBIT) 8. Excellent analytical, communication, documentation, and collaboration skills. 9. Possesses relevant industry certifications such as CEH, CISA, CCET, Network+, Security+, CySa+, or Microsoft SC-900, demonstrating foundational and specialized knowledge in cybersecurity. 10. Demonstrated understanding of the NIST Cybersecurity framework and auditing security controls identified in NIST800-171 and NIST SP800-53A. 11. Knowledgeable on ITIL process management. PREFERRED QUALIFICATIONS 1. Experience in higher education or public sector environments. 2. English and Spanish verbal and written communication proficiency. 3. Demonstrated multicultural competence. PHYSICAL DEMANDS 1. Normal office physical demands. 2. Ability to travel between campus locations and to and from community events. 3. Ability to travel in state and nationally. WORKING CONDITIONS 1. Duties are performed indoors in the usual office and/or outdoor environment. BENEFITS Click on the link for information about JJC's Benefits: Non-Union Support Staff, Professional, Administrative Full Time/Part Time: Full time Union (If Applicable): Scheduled Hours: 40
    $70.7k-79.5k yearly Auto-Apply 7d ago
  • Information Security Analyst

    Taylorville Memorial Hospital

    Cyber security analyst job in Springfield, IL

    Min USD $31.51/Hr. Max USD $48.83/Hr. Under the direction of the Manager, Security Operations, the Security Operations Analyst protects organizational assets by ensuring an effective information security control environment for Memorial Health System. This role is a combination of project management and incident response through identification, analysis, prioritization, communication and mitigation of incidents as they occur. Please note this is a hybrid position and is required to be onsite in Springfield, IL several days per week. On call rotation is for 1 week approximately every 5 weeks. Qualifications Minimum Qualifications:Education:• Bachelor's degree in health information management, Computer Science, Business, Cybersecurity, Health Care, or related discipline required. Four or more years of relevant prior work experience may be considered in lieu of degree.Licensure/Certification/Registry:• Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or similar security related certification preferred.Experience:• Minimum 2 years of security experience required.• Minimum 2 years of compliance experience preferred.• Minimum 2 years of project management experience preferred. • Demonstrated experience with healthcare clinical and financial applications required.• Experience with audit methodologies and control frameworks (such as ISO27001 or NIST) required.• Experience with MS365 Office suite and collaboration tools required. Other Knowledge/Skills/Abilities:• Demonstrated strong communication skills and diplomacy to work between technical and administrative teams at all organizational levels, as well as to write and update concise and accurate documentation.• Demonstrated knowledge of Microsoft Windows systems, administrator and client/server communications protocol, UNIX, Oracle, LDAP, XML and directory administration. Demonstrated knowledge of computer systems, architecture and process flow. • Evidence of leadership, creativity, integrity, and initiative. Evidence of ability to achieve results and inspire others to do the same, personal accountability, and dedication to continue learning and investigating relevant technology required.• Demonstrated planning, problem-solving, decision-making, analytical and change management skills. • Demonstrated ability to maintain confidentiality, professionalism, and trustworthiness.• Demonstrated ability to drive projects forward and achieve objectives aligned with strategic direction, even in the face of stakeholder resistance or ambiguity.• Must be personally motivated to achieve results alone and through others particularly related to providing exceptional customer service. Must be results oriented and be able to manage time appropriately in order to meet assigned goals. Responsibilities Principle Duties & Responsibilities:1. Performs various daily operational tasks as assigned by Security Operations Manager to ensure the continued security and protection of MH data. 2. Provides ongoing consulting on industry best practices regarding the securing of information assets.3. Analyzes department processes and identifies security gaps between teams.4. Documents control gaps; proactively develop plans to address identified gaps with subject matter expert and stakeholder input. 5. Investigate security incidents and breaches6. Responds to computer security incidents according to the incident response policy and procedures.7. Coordinate containment, eradication, and recovery efforts8. Works with business areas to develop, document, and update policies, plans, processes, procedures, and guidance to ensure a safe, effective control environment. 9. Maintains the organizational security control baseline for security-related compliance. 10. Collaborate with vulnerability management teams to assess and remediate risks11. Embodies the Memorial Health System Performance Excellence Standards of Safety, Courtesy, Quality, and Efficiency that support our mission, vision and values:• SAFETY: We put safety first. We speak up and take action to create an environment of zero harm. We build an inclusive culture where everyone can fully engage.• INTEGRITY: We are accountable for our attitude, actions and health. We honor diverse abilities, beliefs and identities. We respect others by being honest and showing compassion.• QUALITY: We listen to learn and partner for success. We seek continuous improvement while advancing our knowledge. We deliver evidence-based care to achieve excellent outcomes.• STEWARDSHIP: We use resources wisely. We are responsible for delivering equitable care. We work together to coordinate care.12. Develops, maintains, and tests incident response plans to ensure organizational compliance with required laws and regulations. 13. Supports the Security Operations Manager in continued development and refinement of Disaster Recovery plans14. Supports security awareness training, working to expose all departments to new and improved processes.15. Perform triage on incoming alerts to determine severity and relevance, working with system, application, and network owners to explain, remediate, and document as needed The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job. Incumbents may be requested to perform tasks other than those specifically presented in this description.
    $31.5-48.8 hourly Auto-Apply 41d ago
  • Information Security Compliance Analyst

    Alliant Credit Union 4.8company rating

    Cyber security analyst job in Chicago, IL

    Job Description Support the Information security governance, risk management and compliance program, focusing on compliance and assurance. Facilitate the compliance and assurance program, by performing assurance assessments to ensure Alliant Credit Union (ACU) is compliant with regulatory and legal obligations. Help maintain the technical control library ensure assessments align securing ACU. Facilitate IT issue management by working with employees on scheduling calls and going over the issue and resolution. Essential Responsibilities Responsible to facilitate the compliance and assurance assessments and issue management via a GRC tool Conduct assurance assessment, including control test of design (ToD) and test of operating effectiveness (TOE) activities Provide recommendations on improving compliance-related processes and/or procedures and identify opportunities for ITGC/security compliance control automation Facilitate group and individual meetings, ensure that each meeting is organized and aligned and schedule walkthrough agenda addressing any issue that arise and and guiding towards actionable outcomes Assist internal and external audit teams to address inquiries Participate in InfoSec projects as assigned by management such as the review of documents Education Minimum- 4 Year Bachelors Degree in Computer Science, Information Security or Related Years of Experience Minimum - 2 Years Governance, Risk Management, Compliance within a financial institution or Security Compliance or Related In Lieu of Education 5 Years Governance, Risk Management, Compliance within a financial institution License/Certifications/Training Preferred: Compliance, Risk Management, or Governance certifications: CRISC, CISM or CISA Compensation & Benefits: Typical hiring range: $57,500 - $89,500 Annually. Actual compensation will be determined using factors such as experience, skills & knowledge. Additional Compensation: Annual performance bonus Benefits: Alliant provides a benefits package including health care, vision, dental, and 401k with employer match. Additional Benefits: Work from home up to 3 days a week Paid parental leave Employee discount programs Time off including paid personal and sick days 11 paid holidays Education reimbursement *Note that eligibility and cost of benefits can vary depending on the number of regularly scheduled hours, and job status such as regular full-time, regular part-time, or temporary employment. Adhere to and ensure compliance of all business transactions with policy and process of the Bank Secrecy Act. Ensures compliance with all applicable state and federal laws, company procedures and policies. Maintains integrity and ethics in all actions and conversations with or regarding credit union members and their accounts; complies with Privacy Act directives. The responsibilities listed do not contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this position. Duties, responsibilities and activities may change at any time with or without notice.
    $57.5k-89.5k yearly 6d ago
  • Information Security Analyst

    Joliet Junior College, Il 3.5company rating

    Cyber security analyst job in Joliet, IL

    Information Security Analyst STATUS: Full time DEPARTMENT: Information Security Office DIVISION: Information Technology CLASSIFICATION: Exempt UNION: Non-Union REPORTS TO: Senior Director Information Security PLACEMENT: Professional staff, S11 HIRING RANGE: $70,689 - 79,526 Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The student population at the college is diverse in ethnicity, gender, language, age and background. Joliet Junior College is an AA/EO employer and strongly encourages applications from candidates who would enhance the diversity of its staff. POSITION SUMMARY The Information Security Analyst is responsible for protecting the college's information systems and data by monitoring, analyzing, and responding to security incidents and threats. This role supports compliance with regulatory requirements (e.g., CIRCIA, HIPAA, GLBA), enhances operational efficiency, and contributes to the continual improvement of security processes and documentation. The analyst will also detect opportunities to develop and maintain security documentation, including knowledgebase articles, and manage security-related tickets from stakeholders. ESSENTIAL JOB DUTIES AND KEY RESPONSIBILITIES 1. Incident Management: Monitor, triage, and respond to cybersecurity threats and incidents across network, application, identity, and cloud layers. 2. Vulnerability Management: Participate in vulnerability assessments and penetration testing to identify and remediate security weaknesses. 3. Security Operations: Manage and maintain security tools (e.g., SIEM, IDS/IPS, vulnerability scanners), ensuring daily monitoring and compliance. 4. Facilitate the integration of SOC/Managed Security Services activities with the broader Information Security team, ensuring consistent application of ITIL processes such as Incident Management, Problem Management, and Event Management. 5. Identity Management: Support Office 365 email account management tasks, including user permissions, credential hand-offs, mailbox access provisioning, and coordination with identity and access management processes." 6. Compliance & Risk Management: Assist in legal and regulatory compliance efforts; conduct risk assessments and support audit activities. 7. Service Request Management: Handle, triage, and manage tier 2 level and up security-related tickets and requests from stakeholders, ensuring timely resolution and escalation as needed. 8. Knowledge Management: Detect opportunities to develop, improve, and maintain security documentation, including knowledgebase articles and process guides. 9. Process Improvement: Assist with the development and continual improvement of security-related processes, automation initiatives, and reporting tools. 10. Cloud Support: Support secure cloud infrastructure through systems auditing and account lifecycle management. 11. Collaboration & Training: Collaborate with IT and academic departments to ensure secure deployment of new technologies; provide security awareness training to staff and students. 12. Reporting: Prepare and present reports on security incidents, vulnerabilities, compliance status, and process improvements to leadership. 13. Professional Development: Stay current with emerging security threats, trends, best practices, and ITIL service management principles. 14. Perform related duties as assigned. MINIMUM QUALIFICATIONS 1. Bachelor's degree in Computer Science or a closely related field, OR an Associate's degree combined with 2 or more years of experience in information security or IT operations. 2. Understanding of cybersecurity principles, tools, and compliance frameworks. 3. Experience with Microsoft Azure, Active Directory, and security monitoring tools. 4. Experience in information security and/or IT risk management with a focus on security performance and reliability. 5. Familiarity multiple risk management concepts, frameworks, and standards (CSC, NIST, ISO, COBIT). 6. Excellent analytical, communication, documentation, and collaboration skills. 7. Possesses relevant industry certifications such as CEH, CISA, CCET, Network+, Security+, CySa+, or Microsoft SC-900, demonstrating foundational and specialized knowledge in cybersecurity. 8. Demonstrated understanding of the NIST Cybersecurity framework and auditing security controls identified in NIST800-171 and NIST SP800-53A. 9. Knowledgeable on ITIL process management. 10. Ability to establish and maintain cooperative and effective working relationships with other members of the college and community, displaying cultural competence as well as emotional intelligence. 11. Demonstrated commitment to the college's core values of respect and inclusion, sustainability, integrity, collaboration, humor and well-being, innovation and quality. PREFERRED QUALIFICATIONS 1. Experience in higher education or public sector environments. 2. English and Spanish verbal and written communication proficiency. 3. Demonstrated multicultural competence. PHYSICAL DEMANDS 1. Normal office physical demands. 2. Ability to travel between campus locations and to and from community events. 3. Ability to travel in state and nationally. WORKING CONDITIONS 1. Duties are performed indoors in the usual office and/or outdoor environment. BENEFITS Click on the link for information about JJC's Benefits: Non-Union Support Staff, Professional, Administrative Full Time/Part Time: Full time Union (If Applicable): Scheduled Hours: 40
    $70.7k-79.5k yearly Auto-Apply 2d ago
  • Data and System Security Engineer

    Ayr Global It Solutions 3.4company rating

    Cyber security analyst job in Lincolnshire, IL

    AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing model and industry experience make us a top choice of Global System Integrators and enterprise customers with federal and commercial projects supported nationwide. Job Role: Data and System Security Engineer Location: Lincolnshire, IL Duration: 6+ Months Qualifications Job Description: Data and System Security engineer Experience with data encryption management solutions, such as Vormteric and CloudLink Experience with PKI management solutions, such as ADCS and External providers Investigative and analytical problem solving skills Customer service/support experience Additional Skills:PKI Knowledge of encryption management technologies, such as Vormetric, CloudLink. Additional Information If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
    $74k-102k yearly est. 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Bloomington, IL?

The average cyber security analyst in Bloomington, IL earns between $61,000 and $110,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Bloomington, IL

$82,000
Job type you want
Full Time
Part Time
Internship
Temporary