Cyber Security Engineer
Cyber security analyst job in Milwaukee, WI
We're seeking a senior cybersecurity engineer to design, build, and operationalize enterprise grade data protection capabilities anchored in Microsoft E5. You will lead engineering for Microsoft Purview (Information Protection & DLP, eDiscovery/Audit), Sensitivity Labels, and related guardrails-integrating telemetry and enforcement through Zscaler, CrowdStrike, and Splunk. This role bridges secure-by-default platform engineering with pragmatic automation to protect regulated data (e.g., PHI/PII) at scale. Senior leadership has prioritized accelerating Copilot and E5 controls adoption, creating a high impact opportunity to shape how we protect data across SaaS and AI workloads.
What You'll Do
Engineer secure-by-default E5 data protection
• Design and implement Microsoft Purview DLP policies (endpoint, Exchange, SharePoint, OneDrive, Teams) and Sensitivity Label taxonomy with automated enforcement paths.
• Build policy-as-code pipelines (CI/CD) to version, test, and deploy DLP rules, label configs, and governance artifacts in multiple environments.
Integrate Zscaler, CrowdStrike, and Splunk
• Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics, dashboards, and detections that close visibility and enforcement loops.
• Leverage CrowdStrike telemetry (e.g., Falcon/Shield) to correlate endpoint behaviors with data movement signals for insider risk and exfiltration use cases.
Build automations & guardrails
• Develop services and workflows (e.g., Azure Functions, Logic Apps, Graph API) to auto remediate mislabels, revoke risky shares, and notify data owners.
• Implement secure-by-default configuration baselines and drift detection for E5 security controls (MCAS/Defender for Cloud Apps, Conditional Access, etc.).
Operate and continuously improve
• Own reliability for data protection pipelines: SLIs/SLOs, runbooks, and incident playbooks in partnership with Insider Risk team.
• Create Splunk content (data models, dashboards, correlation searches) aligned to exfiltration, anomalous access, and label violations.
• Partner with Privacy and Compliance for audit ready controls (eDiscovery/Audit), evidence, and exception processes.
Collaborate across security & platform teams
• Work with PSO, IAM, and Insider Risk to align label taxonomy and enforcement with business workflows and least privilege access.
• Provide technical leadership and mentoring for engineers/analysts rolling out new E5 features and operational support.
Required Qualifications
• 5+ years engineering experience in enterprise security or platform engineering; hands-on with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery).
• Proven expertise building policy as code for DLP/labels (GitHub/Azure DevOps), and automating Graph/PowerShell administration.
• Demonstrated ability to design secure-by-default guardrails and support rapid SaaS/AI adoption (including Copilot) without compromising compliance.
Nice to Have
• Strong background in data protection for regulated data (PII/PHI), insider risk detection, and evidence driven investigations.
• Production experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (TA configs, CIM, correlation searches).
• Experience migrating from legacy DLP (e.g., Forcepoint) to Microsoft DLP; building vendor neutral dictionaries and detection logic.
• Familiarity with MCAS/Defender for Cloud Apps, conditional access policies, and SSPM evaluations.
• Background in HIPAA/PHI audit support and exception governance workflows.
Success Metrics (first 6-12 months)
• DLP policy efficacy: reduction in unauthorized shares/exports; mean time to remediate violations.
• Label coverage & accuracy: % of sensitive content labelled; false positive/negative rate trends.
• Telemetry integration: end-to-end event flow (Purview → Zscaler/CrowdStrike → Splunk) with actionable detections.
• Secure-by-default adoption: # of guardrails implemented; drift detected/resolved; Copilot controls baselined.
• Audit readiness: evidence completeness for eDiscovery/Audit; exception closure rates.
Tools & Technologies (primary)
• Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk
• Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES)
• Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
• Data flows: Exchange/SharePoint/OneDrive/Slack, endpoints, web proxies, CASB/SSE
Information Security Engineer - Applications
Cyber security analyst job in Oak Brook, IL
In this role, you will work closely with IT teams to secure our applications throughout the development lifecycle. You'll help build a secure-by-design culture, drive security automation, and protect our systems against evolving threats. This position reports to the Manager of Information Security.
ESSENTIAL JOB FUNCTIONS:
Work with the Information Security Team to improve security for the company by configuring and administering security systems and tools
Monitor and respond to security events using SIEM and SOAR tools
Investigate security incidents to determine root cause and remediation tactics
Help automate security monitoring and remediation processes
Prepare and analyze security incident data and metrics for periodic reporting
Collaborate on vulnerability management, remediation, and penetration testing efforts
Implement and manage SAST, DAST, and Burp Suite across GitHub CI/CD pipelines and development workflows
Champion secure coding practices based on OWASP Top 10 and SSDF guidelines
Help secure cloud environments (Azure, AWS) and container-based deployments
Conduct regular security assessments to ensure alignment with SSDLC standards
After-hours configuration changes and on-call support required
MINIMUM QUALIFICATIONS:
Bachelor's degree in Computer Science, Information Systems (or related degree), or equivalent experience.
3+ years of experience in Application or Information Security
Strong understanding of SSDLC, NIST SSDF, and DevSecOps principles.
Experience with SAST/DAST tools (e.g., GitHub Advanced Security, BURP).
Solid knowledge of OWASP Top 10 and secure coding best practices.
Proficiency in GitHub for code review, pipeline security, and automation.
Hands-on with scripting (Python, PowerShell, Bash) and API security.
Experience in Azure and AWS cloud security, containers, and infrastructure-as-code.
Familiarity with SIEM/SOAR platforms and incident response workflows.
Experience with Windows, MacOS, and Linux operating systems
Proficient in Microsoft Office applications such as Microsoft Outlook, Word, Excel, PowerPoint, and SharePoint
** This is a full-time, W2 position with Hub Group - We are NOT able to provide sponsorship at this time **
Salary:
$95,000-150,000/year
+ bonus eligibility
**
This is an estimated range based on the circumstances at the time of posting, however, may change based on a combination of factors, including but not limited to skills, experience, education, market factors, geographical location, budget, and demand**
Benefits
We offer a comprehensive benefits plan including:
Medical
Dental
Vision
Flexible Spending Account (FSA)
Employee Assistance Program (EAP)
Life & AD&D Insurance
Disability
Paid Time Off
Paid Holidays
BEWARE OF FRAUD!
Hub Group has become aware of online recruiting related scams in which individuals who are not affiliated with or authorized by Hub Group are using Hub Group's name in fraudulent emails, job postings, or social media messages. In light of these scams, please bear the following in mind
Hub Group will never solicit money or credit card information in connection with a Hub Group job application.
Hub Group does not communicate with candidates via online chatrooms such as Signal or Discord using email accounts such as Gmail or Hotmail.
Hub Group job postings are posted on our career site: ********************************
About Us
Hub Group is the premier, customer-centric supply chain company offering comprehensive transportation and logistics management solutions. Keeping our customers' needs in focus, Hub Group designs, continually optimizes and applies industry-leading technology to our customers' supply chains for better service, greater efficiency and total visibility. As an award-winning, publicly traded company (NASDAQ: HUBG) with $4 billion in revenue, our 6,000 employees and drivers across the globe are always in pursuit of "The Way Ahead" - a commitment to service, integrity and innovation. We believe the way you do something is just as important as what you do. For more information, visit ****************
Senior Cyber Security Engineer - 4825
Cyber security analyst job in Milwaukee, WI
About the Role
Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale.
Key Responsibilities
Engineer Secure-by-Default E5 Data Protection
Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams.
Develop and maintain Sensitivity Label taxonomy with automated enforcement paths.
Build Policy-as-Code Pipelines
Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments.
Integrate Security Telemetry
Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection.
Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios.
Develop Automations & Guardrails
Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners.
Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.).
Operate and Continuously Improve
Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks.
Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations.
Collaborate Across Teams
Partner with Privacy and Compliance for audit-ready controls and evidence processes.
Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows.
Provide technical leadership and mentorship for engineers and analysts implementing new E5 features.
Required Qualifications
5+ years of experience in enterprise security or platform engineering.
Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery).
Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell.
Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot.
Preferred Qualifications
Strong background in data protection for regulated data (PII/PHI) and insider-risk detection.
Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches).
Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies.
Knowledge of HIPAA/PHI audit support and exception governance workflows.
Success Metrics (First 6-12 Months)
Improved DLP policy efficacy and reduced unauthorized data movement.
Increased label coverage and accuracy for sensitive content.
End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk.
Secure-by-default adoption and Copilot controls baselined.
Audit readiness with complete evidence and exception closure rates.
Tools & Technologies
Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk
Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES)
Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
Sr. Information Security Engineer - AI
Cyber security analyst job in Rosemont, IL
Job Title: Senior Information Security Engineer - AI
Primary Location: Rosemont, IL - Hybrid, 3 days onsite
Direct Hire
TalentFish is casting a line for a Senior Information Security Engineer - AI/Artificial Intelligence. This is a Direct Hire role based in Rosemont, IL with a hybrid schedule (3 days onsite) with our premier client.
This is a new, exciting position within an awarded top Chicago employer organization where you'll contribute to the organization's Responsible Artificial Intelligence governance by assessing the security, integrity, and risks associated with the use of AI models and technologies. This role is hands-on and works closely with multi-disciplinary teams to evaluate AI use cases and maintain AI security frameworks and standards.
What You Bring to the Role (Ideal Experience)
• Bachelor's degree in Computer Science, Mathematics, or related field
• 5+ years of total professional experience, including security, data security, or control validation experience
• 2-3 years of practical, hands-on experience working with Artificial Intelligence technologies; working directly with AI models or ML systems
• Ability to evaluate AI model risks, including bias, data exposure, data leakage, and model poisoning
• Data processing or analytics skills are a plus
What You'll Do (Skills Used in This Position)
• Lead security assessments for AI models, including Large Language Models (LLMs), Natural Language Models (NLMs), and Small Language Models (SLMs)
• Participate in review committees to assess AI use cases for value, complexity, feasibility, risk, compliance, and strategic alignment
• Review AI architecture and usage within internal and third-party solutions to ensure adherence to AI security frameworks and regulatory requirements
• Support development and maintenance of AI security standards, frameworks, and governance models
• Provide education on AI security best practices, emerging risks, and mitigation strategies
• Perform additional related responsibilities as required
Compensation Information
The expected salary range for this position is $120,000 - $150,000 per year, depending on experience and qualifications. This role also qualifies for comprehensive benefits such as health insurance, 401(k), and paid time off. TalentFish is committed to pay transparency and equal opportunity. The salary range provided is in compliance with applicable state and federal regulations.
This role requires authorization to work in the U.S. without current or future visa sponsorship.
All offers are contingent upon the completion of a background check, which may include but is not limited to reference checks, education verification, employment verification, drug testing, criminal records checks, and any required certifications or compliance requirements based on the end client's background check policies and applicable laws.
TalentFish is an employee-owned company pioneering a new realm in talent acquisition. We are redefining IT staffing by evolving AI, video screening, and our unique platform. TalentFish focuses on providing the best employee, consultant, and client experience possible.
At TalentFish we are an Equal Opportunity Employer; we embrace and encourage diversity!
Security Engineer
Cyber security analyst job in Chicago, IL
About Us
Founded in 2014, we offer the industry's first and only cloud-based, fully-customizable, end-to-end software solution to automate securities-based lending from origination through the life of the loan. By combining thought leadership in suitability and risk management with industry-leading education and the latest technology, Supernova enables advisors to deliver holistic, goals-based advice and to help their clients achieve financial wellness. We partner with the industry's largest banks, most prominent insurance companies and leading online brokerages to democratize access to securities-based lending and better the entire financial ecosystem.
Why Join Supernova?
At Supernova Technology, we believe that the best results come from a team that is passionate, driven, and supported in all aspects of their professional lives. Here, you'll work alongside talented and innovative individuals who are committed to driving the future of securities-based lending technology. We foster a culture of collaboration, continuous learning, and growth, where each person's contributions make a real impact.
Job Overview
We are seeking a highly motivated and detail-oriented Security Engineer to help secure our securities-backed lending SaaS platform. The successful candidate will focus primarily on application security, secure SDLC, and application vulnerability management, while also assisting with the execution and implementation of broader information security initiatives. You'll partner with engineering, SRE/DevOps, and business teams to embed security into our build and delivery processes, support risk reduction across cloud and endpoint surfaces, and drive measurable remediation outcomes in a regulated financial-services environment.
RESPONSIBILITIES:
Perform hands-on web/API penetration tests, validate scanner findings, and provide clear PoCs, impact statements, and prioritized remediation aligned with OWASP.
Integrate and tune SAST, DAST, SCA, container, and secret-detection tools in CI/CD; define pass/fail gates and PR checklists.
Conduct lightweight threat modeling and security design reviews for new features such as authentication, session management, and secrets handling.
Manage the full application vulnerability lifecycle (discover → prioritize → fix → retest → close) with SLAs and metrics.
Assist in hardening AWS and ECS/Docker workloads (IAM roles, network segmentation, image policies, logging/monitoring) and support patch hygiene across cloud, container, and endpoints.
Participate in incident response, including exploit reproduction, log analysis, impact assessment, and lessons learned.
Provide evidence for audits (ISO 27001, SOC 2, NIST SSDF), maintain policies and developer guidance, and support vendor/security evaluations.
Translate findings into developer-ready tickets, publish secure-coding guidance, and partner with engineering to streamline secure delivery.
Prototype automation, explore AI/LLM-assisted workflows to improve triage and code review, and share improvements across teams.
Contribute to organization-wide cybersecurity training and awareness efforts.
QUALIFICATIONS:
Bachelor's degree in security engineering, information assurance, or related field.
2-3 years of experience in security or software engineering (internships, labs, or open-source count), preferably in regulated industries.
Strong knowledge of web/API security issues (auth, session management, injections, SSRF, CSRF, access control) and common cloud/web misconfigurations.
Experience with SDLC security tools (SAST/DAST/SCA/secret detection/container scanning), CI/CD workflows, and Git.
Scripting or coding skills (Python or JavaScript/TypeScript) and ability to read backend code.
Familiarity with AWS security basics (IAM least privilege, KMS, logging/monitoring, security groups) and Docker/ECS runtime considerations.
Clear communication skills with the ability to translate risk into actionable remediation.
Experience using AI/LLM-assisted tools for triage, documentation, or code review preferred.
Exposure to WAF/CDN tuning, API protection, and risk-based remediation SLAs/metrics preferred.
Familiarity with frameworks like OWASP ASVS/SAMM, NIST SSDF, ISO 27001, SOC 2, PCI DSS preferred.
Relevant security certifications preferred.
Our Employee Benefits
At Supernova Technology, we provide a robust benefits package to support the health and well-being of our employees. Our offerings include:
Medical, Dental, and Vision Insurance: Multiple plans with coverage for employees and dependents.
HSA and FSA Accounts: Tax-advantaged accounts for health and dependent care expenses.
Life and Disability Insurance: Employer-paid basic coverage with options for additional voluntary coverage.
Compensation: $95,000 - $130,000
Retirement Savings: 401(k) plan with employer contributions.
Employee Assistance Program (EAP): Confidential support services, including free therapy sessions.
Paid Time Off: Flexible PTO policies.
Additional Perks: Commuter benefits, pet insurance, continuing education assistance, and more.
Note: Actual salary at the time of hire may vary and may be above or below the range based on various factors, including but not limited to, the candidate's relevant qualifications, skills and experience, and the location where this position may be filled.
Our Core Values
Our core values drive everything we do. At Supernova, we...
Form, execute, and communicate new ideas that add value to our employees and customers
Strive through obstacles and failures
Follow-through on promises or commitments to others, accept responsibility, and answer for actions & decisions
Listen to, understand, and support our employees and customers
Act with speed, positive attitude, and flexibility
Exceed expectations and surpass ourselves every day; we embrace a sense of pride and never stop growing
Join us and make an impact while growing your career at Supernova.
Sr. Security Engineer - Red Team
Cyber security analyst job in Chicago, IL
About the Company:
A Leading Financial Service Client is looking to hire a strong Security Engineer who can lead Red team exercises against a hybrid environment using threat intelligence and the MITRE Telecommunication&CK Framework.
Responsibilities:
Approx 8 years' experience with industry standard Red Team testing tools (Cobalt Strike, Mythic C2, Rubeus, Bloodhound, Covenant, etc.) or the ability to demonstrate equivalent knowledge.
Expert understanding of how an Advanced Persistent Threat could compromise a financial institution without using phishing.
Expert understanding of Red Team concepts, tools, and automation strategies.
Expert understanding of MITRE Telecommunication&CK framework tactics, techniques, and procedures.
Expert understanding of measuring and rating vulnerabilities based on principal characteristics of a vulnerability.
Expert understanding of Windows and Linux system hardening concepts and techniques.
PAM/HashiCorp Security Engineer
Cyber security analyst job in Chicago, IL
***Hybrid, 3 days onsite, 2 days remote***
***We are unable to sponsor as this is a permanent full-time role***
Responsibilities:
Provide 24x7 operational support for the suite of privileged management solutions (e.g., CyberArk, Hashi, PKI), including implementing hot fixes, resolving bugs, troubleshooting issues, performing break-fixes, managing secrets lifecycle, and delivering end-user support.
Maintain robust operational integrity of privileged access management infrastructure throughout its lifecycle (e.g., patching, version control, system upgrades, alignment with Security standards, etc.). Provide organizational subject matter expert on secrets management and privileged access management architecture, establishing and enforcing security as code principles throughout the environment.
Develop and implement system enhancements to improve platform user experience and automated integrations, while designing long-term solutions to address operational issues through innovative technologies including artificial intelligence for faster detection and remediation of functional and technical problems.
Qualifications:
Experience in one or more of the following disciplines: security operations, development, engineering, or architecture
Experience supporting privileged access management and access controls programs.
Professional or personal experience using AI coding agents such as OpenAI Codex, Claude Code, or Gemini CLI.
Expertise in providing operational and engineering support for one or more of the following: CyberArk, HashiCorp Vault, Active Directory Certificate Services (ADCS), HSMs, and Public Key Infrastructure (PKI).
Expertise in scripting languages and developing in one or more of the following languages GoLang, Bash, Python, PowerShell, Ansible, and/or Terraform.
Knowledge of privileged access management methodologies and techniques for on-prem and Cloud implementation.
Knowledge of application authentication and authorization systems (i.e., Active Directory, oAuth 2.0, OIDC, AWS IAM, App Role, k8s, LDAPS, Kerberos, Certificate)
Working knowledge of the cloud ecosystem and CI/CD deployments with Terraform, Ansible, and Jenkins pipelines.
Information Security Officer
Cyber security analyst job in Chicago, IL
Job Title:
Business Information Security Officer - Clinical
Employment Type:
Full-Time
Salary Range:
$130,000 - $140,000 + Benefits (Health, Dental, Vision, PTO, 401K)
About the Role:
We're seeking a Business Information Security Officer (BISO) to serve as a trusted advisor and strategic partner to business and clinical leaders. In this highly visible role, you'll embed cybersecurity into everyday operations, influence security adoption, and ensure compliance with frameworks like NIST, HIPAA, and FERPA.
This is an opportunity to shape cybersecurity strategy in healthcare, research, and education while collaborating with executive leadership to advance a security-first culture.
Key Responsibilities:
Act as the frontline cybersecurity liaison for business and clinical leaders
Identify and escalate domain-specific cybersecurity risks
Monitor compliance with security policies and regulatory frameworks (HIPAA, FERPA, NIST CSF)
Lead security awareness and risk engagement programs
Develop and execute a roadmap of security initiatives aligned with business goals
Drive change management for cybersecurity adoption
What We're Looking For:
Bachelor's degree in Computer Science or related field
5-7 years in Information Security, GRC, or cybersecurity education
3+ years managing cross-functional teams and projects
Strong background in risk management, governance, and compliance
Excellent communication and leadership skills
Preferred:
Healthcare or clinical environment experience
Certifications: CISSP, CISM, PMP
Global Cyber Wordings Analyst
Cyber security analyst job in Chicago, IL
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplyDetection & Response Analyst
Cyber security analyst job in Chicago, IL
Ann & Robert H. Lurie Children's Hospital of Chicago provides superior pediatric care in a setting that offers the latest benefits and innovations in medical technology, research and family-friendly design. As the largest pediatric provider in the region with a 140-year legacy of excellence, kids and their families are at the center of all we do. Ann & Robert H. Lurie Children's Hospital of Chicago is ranked in all 10 specialties by the U.S. News & World Report.
Location
680 Lake Shore Drive
Job Description
The Incident Response Analyst helps guide resources to prepare for, coordinate, and respond to incidents, including, but not limited to, computer security vulnerabilities, malware, phishing, and social engineering, as well as associated forensic investigations.
This position utilizes industry-leading security incident response procedures, performing frequent monitoring of incident detection control effectiveness and helping to inform preparedness exercises.
This position effectively collaborates with managed detection and response, incident assistance, and security forensics partners. This position coordinates with internal emergency preparedness teams and contributes to a resilient business continuity posture.
Essential Job Functions:
Area Specific Job Accountabilities:
Receive and triage incoming security alerts to determine their severity, priority, and relevance.
Conduct initial triage and investigation of security incidents, including gathering and analyzing relevant data and logs.
Analyze logs and security event data to identify indicators of compromise (IOCs) and potential security incidents.
Conduct analysis of suspicious files, malware samples, or artifacts to understand their behavior and potential impact.
Assist in the collection and preservation of digital evidence during incident investigation.
Prepare detailed incident reports, documenting the timeline, actions taken, and lessons learned from each incident.
Performs other duties as assigned.
Knowledge, Skills, & Abilities:
Bachelor's degree, preferably in Computer Science or related information security expertise.
2+ years of experience in information security incident response required.
SANS GCIH (GIAC Certified Incident Handler), CISSP (Certified Information Systems Security Professional), CISA (Certified Information Security Auditor) or equivalent certification highly desired.
Strong knowledge of information security forensics, security operations, security monitoring, technology implementation, risk analysis strategy, and NIST incident response life cycle.
Experience and knowledge with information security frameworks, regulatory compliance, and regulatory bodies (e.g., HITRUST, NIST, HIPAA, DHHS).
Goal oriented with the ability to lead team achievements toward desired results utilizing both internal and external resources.
Professional communication, disciplined documentation, and commitment to following and improving processes and procedures.
Familiarity and experience with crisis management, disaster recovery, and business availability programs and procedures
Education
High School Diploma/GED (Required)
Pay Range
$93,600.00-$154,440.00 Salary
At Lurie Children's, we are committed to competitive and fair compensation aligned with market rates and internal equity, reflecting individual contributions, experience, and expertise. The pay range for this job indicates minimum and maximum targets for the position. Ranges are regularly reviewed to stay aligned with market conditions. In addition to base salary, Lurie Children's offer a comprehensive rewards package that may include differentials for some hourly employees, leadership incentives for select roles, health and retirement benefits, and wellbeing programs. For more details on other compensation, consult your recruiter or click the following link to learn more about our benefits.
Benefit Statement
For full time and part time employees who work 20 or more hours per week we offer a generous benefits package that includes:
Medical, dental and vision insurance
Employer paid group term life and disability
Employer contribution toward Health Savings Account
Flexible Spending Accounts
Paid Time Off (PTO), Paid Holidays and Paid Parental Leave
403(b) with a 5% employer match
Various voluntary benefits:
Supplemental Life, AD&D and Disability
Critical Illness, Accident and Hospital Indemnity coverage
Tuition assistance
Student loan servicing and support
Adoption benefits
Backup Childcare and Eldercare
Employee Assistance Program, and other specialized behavioral health services and resources for employees and family members
Discount on services at Lurie Children's facilities
Discount purchasing program
There's a Place for You with Us
At Lurie Children's, we embrace and celebrate building a team with a variety of backgrounds, skills, and viewpoints - recognizing that different life experiences strengthen our workplace and the care we provide to the Chicago community and beyond. We treat everyone fairly, appreciate differences, and make meaningful connections that foster belonging. This is a place where you can be your best, so we can give our best to the patients and families who trust us with their care.
Lurie Children's and its affiliates are equal employment opportunity employers. All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity or expression, religion, national origin, ancestry, age, disability, marital status, pregnancy, protected veteran status, order of protection status, protected genetic information, or any other characteristic protected by law.
Support email: ***********************************
Auto-ApplyStaff Systems Security Engineer
Cyber security analyst job in Rolling Meadows, IL
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SAPTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
We are seeking capable, talented, and motivated team-contributors at our Northrop Grumman Rolling Meadows site. Our products range from advanced sensing technologies to state-of-the-art targeting and tracking systems that are deployed in Electro-Optical Infrared (EOIR) and Radio Frequency Electronic Warfare (RFEW) systems. These systems are designed, developed, built, integrated, and tested by the capable folks at our company to protect the lives of US and Allied warfighters in present and future conflicts. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today. If you are interested in consideration to be included as a part of this team, we would invite you to apply.
Northrop Grumman Mission Systems Sector (NGMS) is seeking a Staff Systems Security Engineer to join our Systems Security Engineering team. The Security Engineering team is cross-disciplinary across the security domain; encompassing embedded Systems Engineering, Cybersecurity, Software Security and Anti-Tamper Engineering.
Roles & Responsibilities:
· Design/develop system architectures and generate system designs to be implemented in a cost-effective manner.
Implement and ensure compliance with government policies (e.g., JSIG, DAAPM, NIST 800-53, CNSSI 1253, DODI 5200.39, etc.) by reviewing process tailoring needs and approving documented procedures.
Guide and monitor technical documentation/publication to document trades studies, system designs, analysis, and results related to a systems security posture such as identifying Critical Program Information (CPI) and creation of Anti-Tamper Plans
Develop an understanding of system interfaces and how to protect them.
Assist with the definition of key capabilities and performance requirements.
Adapt production and development products to meet unique customer needs and support the development of system security functions.
Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off.
Support technical work products developed by the larger engineering team in support of major milestone deliveries (e.g.: SRR, SVR, PDR, CDR, TRR, PRR).
Authoring technical documentation such as white papers, proposal technical volumes, and program milestone briefings.
Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off.
Other duties may include technical leadership, business capture activities, interfacing with industry partners and the USG.
This position will be full-time, on-site at our Rolling Meadows, IL location.
This position is contingent upon Funding/Contract award, special access program and acquiring and maintaining the necessary US Government security clearance per customers' requirements prior to start.
Basic Qualifications for a Staff Systems Security Engineer:
Bachelor's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 12+years of related experience, a Master's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 10+ years of related experience or a PhD in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 7+ years of related experience.
3 years of cumulative experience on DoD based platforms and/or systems regarding the application of Cybersecurity RMF or Anti-Tamper with competencies in security threat analysis, systems architecture, engineering design, requirements derivation, validation, and verification.
Must have demonstrated experience in leading teams to solve technical problems, including decomposition, root cause analysis, solution development, implementation and monitoring
Experience contributing to and/or making technical presentations to internal and external customers.
Ability to obtain and maintain a minimum of a Secret Clearance with additional customer specified clearance prior to start.
Preferred Qualifications for a Staff Systems Security Engineer:
Advanced degrees in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields.
Experience with design verification testing, reverse engineering, embedded software development, Cybersecurity, or Anti-Tamper Possess a DoD 8140 certification, e.g. CompTIA Security+, CISSP, or similar. Experience with proposals and creating basis of estimates (BOEs)
Primary Level Salary Range: $163,200.00 - $244,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplySenior Cyber Security Engineer -Threat Simulation
Cyber security analyst job in Chicago, IL
Join the Global Information Security (GIS) department at CME Group as a Sr. Cyber Security Engineer - Threat Simulation. You will be an integral part of our Offensive Security organization, directly contributing to improving CME Group's security posture. This high-impact role is responsible for the execution of Red Team adversary emulations against our complex hybrid environment, proactively testing and strengthening our internal and internet-facing systems.
You'll also be a key participant in Purple Team activities to continuously improve the organization's cyber detection and response capabilities. This is a perfect opportunity for a sharp, action-oriented engineer to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure.
What You'll Get
* Elevate your expertise in a supportive environment fostering continuous learning, rapid career progression, and an inclusive, global team culture.
* Gain broad exposure to CME Group's diverse products, asset classes, and cross-functional teams, expanding your impact across critical financial infrastructure.
* Receive a competitive salary and comprehensive benefits package.
What You'll Do
As a key member of our offensive security team, you will:
* Execute high-impact Red Team exercises against our complex hybrid cloud environments, driven by real-world threat intelligence and the MITRE ATT&CK Framework.
* Engineer and maintain robust Red and Purple Team infrastructure, continuously automating processes for efficiency and scale.
* Co-design and lead joint Purple Team exercises, directly partnering with cyber defense to improve detection and response capabilities.
* Innovate through continuous research into new offensive security TTPs (Tactics, Techniques, and Procedures) and drive knowledge transfer across the security organization.
* Conduct specialized, ad-hoc offensive security tests utilizing industry-leading and internally developed tooling to uncover subtle security gaps.
* Author comprehensive post-exercise reports, including detailed technical findings, compromise narratives, and strategic, risk-rated recommendations for remediation.
* Mentor cyber defense teams during incident investigations, providing critical subject matter expertise on attacker tradecraft and mindset.
* Champion security awareness and technical knowledge-sharing by collaborating with information security, technology, and business stakeholders.
What You'll Bring
We're looking for an engineer with a robust offensive mindset and a proven track record of breaking and building in complex enterprise environments.
Technical Mastery
* 5+ years' experience wielding industry-standard penetration testing and adversary emulation tools (e.g., Cobalt Strike, Sliver, Mythic, Bloodhound, Burp Suite).
* Expert understanding of the MITRE ATT&CK Framework and advanced evasion techniques used to bypass modern security controls.
* Strong comprehension of the cyber kill chain and the full lifecycle of an Advanced Persistent Threat (APT) targeting financial institutions.
* Proficiency in at least one scripting language (e.g., Python, PowerShell) and experience with a compiled language (e.g., Go, C#) for tool development.
* Deep experience attacking and securing complex cloud, on-prem, and hybrid environments, from initial access through actions on objective.
* Solid knowledge of Windows and Linux system hardening concepts, Purple Team automation strategies, and vulnerability rating methodologies.
* Proven experience with security within at least one major cloud provider (e.g., AWS, Azure, GCP).
Nice to Haves:
* Previous hands-on experience performing sophisticated adversary emulations/simulations specifically within the financial services sector.
* A recognized offensive security industry certification (e.g., OSCP, GPEN, GXPN, OSWE, eCPTX) demonstrating specialized, high-impact skills.
* Familiarity with modern enterprise security standards and frameworks (e.g., TIBER-EU, CBEST, NIST CSF).
* Experience conducting offensive security exercises against emerging technologies, such as AI/ML systems or mac OS.
#LI-DD1
#LI-Hybrid
CME Group is committed to offering a competitive total rewards package for our employees that recognizes their contributions to the business and reflects our long-term investment in their future. The pay range for this role is $116,600-$194,300. Actual salary offered will be dependent on a wide array of factors including but not limited to: relevant experience, skills, education and comparison to internal employees (where relevant). Our compensation program also includes an annual target bonus opportunity for all employees, as well as the opportunity to become an owner in the company through our broad-based equity program. Through our benefits program, we strive to offer flexibility, value and choice. From comprehensive health coverage, to a retirement package that includes both a 401(k) and an active pension plan, to highly competitive education reimbursement provisions, paid time off and a mental health benefit, CME Group offers a holistic benefits package for our team and their dependents.
CME Group: Where Futures are Made
CME Group is the world's leading derivatives marketplace. But who we are goes deeper than that. Here, you can impact markets worldwide. Transform industries. And build a career by shaping tomorrow. We invest in your success and you own it - all while working alongside a team of leading experts who inspire you in ways big and small. Problem solvers, difference makers, trailblazers. Those are our people. And we're looking for more.
At CME Group, we embrace our employees' unique experiences and skills to ensure that everyone's perspectives are acknowledged and valued. As an equal-opportunity employer, we consider all potential employees without regard to any protected characteristic.
Important Notice: Recruitment fraud is on the rise, with scammers using misleading promises of job offers and interviews to solicit money and personal information from job seekers. CME Group adheres to established procedures designed to maintain trust, confidence and security throughout our recruitment process. Learn more here.
Malware Defense Malware Analyst
Cyber security analyst job in Chicago, IL
Washington, District of Columbia;Chicago, Illinois; Denver, Colorado **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a friend **To proceed with your application, you must be at least 18 years of age.** Acknowledge (******************************************************************************************************
**Job Description:**
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world.
Responsibilities include, but are not limited to:
- In-depth analysis of malware, including authoring analysis reports.
- Tracking malware campaigns, malicious actors, and related infrastructure.
- Creation of tools and scripts to assist in the analysis of malware analysis.
- Field escalations of potentially malicious files and websites from teams within Malware Defense.
Required Qualifications:
- Strong direct experience of analyzing malware.
- Intermediate to advanced malware analysis skills.
- Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors.
- Experience creating tools and scripts to accelerate malware and threat analysis.
- Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc.
- Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc.
- Experience authoring YARA, Suricata, and EKFiddle detection rules.
- Experience with penetration testing and/or adversary emulation is a plus.
- Able to work independently on tasks, but also work well within a team environment
Desired Qualifications:
- Experience analyzing malware targeting Linux, Android, and IOT platforms.
Skills:
+ Cyber Security
+ Data Privacy and Protection
+ Problem Solving
+ Process Management
+ Threat Analysis
+ Business Acumen
+ Data and Trend Analysis
+ Interpret Relevant Laws, Rules, and Regulations
+ Risk Analytics
+ Stakeholder Management
+ Access and Identity Management
+ Data Governance
+ Encryption
+ Information Systems Management
+ Technology System Assessment
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
View your **"Know your Rights (************************************************************************************** "** poster.
**View the LA County Fair Chance Ordinance (************************************************************************************************** .**
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work.
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
Information Security Engineering & Operations Analyst
Cyber security analyst job in Racine, WI
The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role.
This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.)
KEY RESPONSIBILITIES:
* Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment.
* Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies.
* Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities.
* Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting.
* Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting).
* Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access.
* Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards.
* Assist with maintaining the Cybersecurity Incident Response Plan.
* Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks).
* Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress.
JOB REQUIREMENTS:
* Associates degree in Information Security, Cybersecurity preferred
* 0-2 years' experience
* Types of certification preferred: Security+, CEH, SSCP
* Experience with Python and PowerShell scripting languages for automation preferred
* Good report writing and communication skills
* Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments
Come as you are.
Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
Auto-ApplyInformation System Epic Security Analyst
Cyber security analyst job in Milwaukee, WI
At Children's Wisconsin, we believe kids deserve the best.
Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country.
We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today.
Please follow this link for a closer look at what it's like to work at Children's Wisconsin:
***********************************
Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team!
Location: Remote but must be local to Milwaukee
What you will do:
The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required.
Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations.
ESSENTIAL FUNCTIONS:
Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers.
Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric.
Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required.
Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization.
Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions.
Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary.
Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate.
Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security.
Recommends policies and procedures for controlling remote access by employees, non-employees and vendors.
Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration.
Keeps current on security issues through seminars, publications and self-education on an on-going basis.
MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
Requires bachelor's degree in computer science or related technology field. Master's degree preferred.
Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management.
Epic Security certification is a requirement.
Professional certification (e.g. CISA, CISM or CISSP) preferred.
Thorough understanding of risk analysis, disaster recovery and audit tracking.
Familiarity with current common paradigms for violating system integrity.
Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel.
Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts.
Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law.
Certifications/Licenses:
Auto-ApplyInformation Security Engineer
Cyber security analyst job in Chicago, IL
The Role
We are seeking a hands-on, outcome-driven Information Security Engineer who thrives at the intersection of technical execution and security operations mentorship. You will design, deploy, and maintain security technologies, lead incident response alongside our analysts, and serve as a force multiplier for the security program. This role requires a builder mindset-you won't just keep the lights on, you'll create repeatable processes, automation, and measurable improvements. You'll also be expected to mentor our analysts, helping them grow while raising the overall maturity of our SOC. This role will be reporting to the Information Security Operations Manager.
This role is based in Chicago. The role is primarily remote but you must live within the Chicagoland area to come into the office as needed.
Responsibilities
Operational Excellence
Lead incident response cases, ensuring timely containment, eradication, and recovery.
Oversee daily system operations, tuning, and health of security tools (SIEM, EDR, email security, vulnerability management, DLP, DNS protection).
Own the vulnerability management cycle: identification, prioritization, and remediation tracking against defined SLAs.
Provide Tier 3 escalation support and guidance for SOC and analyst team.
Engineering & Architecture
Design and implement security controls across network, endpoint, application, and cloud environments.
Drive automation and SOAR integrations to reduce analyst fatigue and increase response speed.
Build and maintain playbooks, standard operating procedures, and evidence packs for compliance frameworks (NIST 2.0, SOC 2, HIPAA).
Conduct penetration testing and application security assessments, validating remediation.
Mentorship & Enablement
Act as point of contact for incident escalations, providing calm, clear direction.
Mentor security analysts and guide them in investigative techniques, root cause analysis, and threat hunting.
Represent InfoSec in change advisory board (CAB) and project management meetings, ensuring security-by-design.
Translate technical risks into business impact for stakeholders across retail, cultivation, and HQ operations.
Qualifications
Bachelor's degree or higher in Information Security, or at least 6 years' experience in Information Technology, or 4 years in Information Security.
ISC(2) CISSP, ISC(2) CCSP, CCNA-S, or similar certifications can help you stand out, but not required.
Experience in executing security solutions from concept through deployment.
Experience in Incident Response.
Strong understanding of Information Security technologies, design, and architecture.
Proven track record of training or mentoring fellow colleagues.
Demonstrated ability to self-direct tasks with minimal supervision to achieve goals.
Strong written and oral communication skills.
Deep knowledge of network, endpoint, application, and cloud security.
Foundational knowledge of CIS, COBIT, NIST, MITRE, OWASP, or other common security frameworks or control schemes.
Foundational knowledge of risk management and disaster recovery planning / management.
Foundational knowledge of compliance standards like SOX, SOC2 and ISO 27001 or regulations like GDPR, PCI, CCPA, HIPAA.
Strong problem-solving skills with well-organized and structured work habits.
Ability to keep calm in high-stress or emergency situations.
Ability to think abstractly and critically to consider potential concerns and determine their validity.
Ability to discuss highly technical situations in terms that non-technical stakeholders can effectively understand.
An insatiable intellectual curiosity and the ability to learn quickly in a complex space.
Additional Requirements
Must pass any and all required background checks
Must be and remain compliant with all legal or company regulations for working in the industry
Must be a minimum of 21 years of age
#LI-HYBRID
The pay range is competitive and based on experience, qualifications, and/or location of the role. Positions may be eligible for a discretionary annual incentive program driven by organization and individual performance.
Green Thumb Pay Range$110,000-$140,000 USD
Auto-ApplyInformation Security Compliance Analyst
Cyber security analyst job in Chicago, IL
Job Description
Support the Information security governance, risk management and compliance program, focusing on compliance and assurance. Facilitate the compliance and assurance program, by performing assurance assessments to ensure Alliant Credit Union (ACU) is compliant with regulatory and legal obligations. Help maintain the technical control library ensure assessments align securing ACU. Facilitate IT issue management by working with employees on scheduling calls and going over the issue and resolution.
Essential Responsibilities
Responsible to facilitate the compliance and assurance assessments and issue management via a GRC tool
Conduct assurance assessment, including control test of design (ToD) and test of operating effectiveness (TOE) activities
Provide recommendations on improving compliance-related processes and/or procedures and identify opportunities for ITGC/security compliance control automation
Facilitate group and individual meetings, ensure that each meeting is organized and aligned and schedule walkthrough agenda addressing any issue that arise and and guiding towards actionable outcomes
Assist internal and external audit teams to address inquiries
Participate in InfoSec projects as assigned by management such as the review of documents
Education
Minimum- 4 Year Bachelors Degree in Computer Science, Information Security or Related
Years of Experience
Minimum - 2 Years Governance, Risk Management, Compliance within a financial institution or Security Compliance or Related
In Lieu of Education
5 Years Governance, Risk Management, Compliance within a financial institution
License/Certifications/Training
Preferred: Compliance, Risk Management, or Governance certifications: CRISC, CISM or CISA
Compensation & Benefits:
Typical hiring range: $57,500 - $89,500 Annually. Actual compensation will be determined using factors such as experience, skills & knowledge.
Additional Compensation: Annual performance bonus
Benefits: Alliant provides a benefits package including health care, vision, dental, and 401k with employer match.
Additional Benefits:
Work from home up to 3 days a week
Paid parental leave
Employee discount programs
Time off including paid personal and sick days
11 paid holidays
Education reimbursement
*Note that eligibility and cost of benefits can vary depending on the number of regularly scheduled hours, and job status such as regular full-time, regular part-time, or temporary employment.
Adhere to and ensure compliance of all business transactions with policy and process of the Bank Secrecy Act. Ensures compliance with all applicable state and federal laws, company procedures and policies. Maintains integrity and ethics in all actions and conversations with or regarding credit union members and their accounts; complies with Privacy Act directives.
The responsibilities listed do not contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this position. Duties, responsibilities and activities may change at any time with or without notice.
Security Operations Center (SOC) - Information Security Analyst
Cyber security analyst job in Schaumburg, IL
Title: Security Operations Center (SOC) - Information Security Analyst Company: Award-Winning, $50B Publicly Traded Company Type: Full-Time Location: Hybrid - Chicagoland Area (Onsite 3-4 Days/Week) Travel: None Job Overview Join an award-winning, publicly traded company and be part of a fast-paced, cutting-edge security team! This newly developed SOC Analyst role offers an exciting and dynamic environment where no two days are the same. You'll have the opportunity to work with leading security tools like Splunk, CrowdStrike, Digital Shadows, and Proofpoint, while collaborating with a skilled and supportive security engineering team. You'll be part of a tight-knit, communicative team that values collaboration, knowledge-sharing, and professional growth. If you thrive in fast-paced security operations and enjoy hands-on problem-solving, this is an excellent opportunity to make an impact. Key Responsibilities:
Manage the Phish Alert mailbox.
Perform QA on tickets for a service provider.
Handle tier 2 escalated inquiries.
Support security operations through log aggregation and analysis.
Leadership & Team Culture The leadership team is known for holistically supporting its team members, ensuring that growth, learning, and well-being remain top priorities. They provide ongoing career development opportunities, mentorship, and hands-on training to help employees expand their expertise and advance their careers. Beyond technical growth, leadership fosters a culture of inclusivity and collaboration, ensuring that every team member is heard, valued, and supported. Open communication, continuous learning, and a strong sense of community define the workplace, empowering individuals to contribute, innovate, and succeed. Requirements
3+ years of experience in cybersecurity or a related field.
Proficiency with at least some of the following tools: CrowdStrike, Proofpoint, Digital Shadows, or Splunk
Experience working in a Security Operations Center (SOC) environment is a plus, but not required.
Compensation & Benefits
Base Salary: $70,000 - $90,000 (dependent on qualifications, skills, and experience).
Bonus Eligible.
Comprehensive Benefits Package Includes:
Medical, Dental, Vision, and Life Insurance
Traditional and Roth 401(k) with company match
Employee Stock Purchase Plan (ESPP)
And much more!
Apply Today!
Security Systems Engineer - Research & Testing
Cyber security analyst job in Chicago, IL
Full-time Description
WHO WE ARE:
At ZBeta we endeavor to be the most sought-after Security Partner in the world. This drives every decision we make, and the most effective way to realize this goal is through garnering a reputation for excellence and innovation in everything we do. The ZBeta Innovation Lab (LabZ) initiative is a specialized team and program with the mission of inventing, developing, testing, and analyzing better ways, both big and small, to do physical security - for us, for our clients, and for the industry. LabZ seeks to optimize the value of physical security to the client's business mission, to optimize the value of the solutions we recommend, design, deliver, and manage, and to continuously identify opportunities to perform at a higher level. The LabZ program helps ensure that ZBeta and its approach are always data-driven, technology-led, and human-centered.
Find out more about us here.
WHO YOU ARE:
You are a forward-thinking strategic partner with a passion for the physical security mission and for building programs, optimizing operations, and delivering integrated solutions. You excel in fast-paced settings where your leadership abilities can catalyze meaningful action and tangible progress towards objectives. You thrive in a workplace culture that is:
Innovative
Excellence Focused
Reliable
Detail Oriented
Adaptable
Highly Organized
Client Obsessed
Curious
Resilient
Does this sound like you? If so, join us in our mission to redefine security standards and make a lasting difference in our community.
WHAT YOU'LL DO:
The Physical Security Research Engineer (PSRE) is a critical resource of the ZBeta LabZ team and will conduct research and proof of concept (PoC) testing at the LabZ facility for clients and internal teams. The PSRE assists in requirements gathering, testing, and report production in the ZBeta LabZ program and leads, develops, manages, and completes key LabZ efforts for the testing and analysis of stand-alone and integrated physical security technology solutions. The PSRE is familiar with security software applications, integrations, and network-connected devices and engages both internally and externally, working collaboratively with other LabZ engineering resources and with project and production team members.
The PSRE will help grow, mature, and optimize the LabZ program by contributing to the tools and processes LabZ uses to effectively evaluate physical security products against real-world design requirements and generate research reports.
This is an in-office position at the ZBeta LabZ location in Schiller Park, IL. Relocation assistance provided.
Core Competencies
Growth Minded: High self-awareness of strengths and areas for development with a curiosity and appetite for change and innovation
Data-Driven: Strong analytical skills, with the ability to work effectively with data and think critically
Collaborative: Ability to solicit and understand multiple perspectives and maximize the application of team talent and experience
Evaluative: Ability to evaluate outputs rigorously to ensure consistent excellence in delivery
Tactical: Ability to recognize current priorities, manage changes and risks, and efficiently clear roadblocks and resolve issues
Position Responsibilities
The essential duties and responsibilities include, but are not limited to the following:
ZBeta Lab Environment
In partnership with ZBeta LabZ team, maintain a ZBeta test/dev environment of technology solutions that represent both client and industry standards.
Work with ZBeta IT to build appropriate server environments and remote access abilities for LabZ platforms.
Load, configure, and update Lab environment software applications, and wire, connect, and configure test hardware, devices, and technologies.
Design and build (or manage the production of) custom testing apparatus, devices, and mechanisms.
Maintain current knowledge of and training in key applications and products.
Solution Testing
Work with ZBeta LabZ team and client resources to plan, implement, and conduct hands-on testing of physical security products, applications and functions, and integrated solutions.
Lead the development of testing concepts to address client and industry needs, challenges, & opportunities.
Manage and execute testing scope related to server, application, and IoT elements.
Create test plans and testing requirement documentation, record and analyze testing results, and document outcomes and conclusions in testing reports.
Research & Requirements Gathering
Conduct studies and analysis of technology categories, trends, solution proposals, and industry approaches.
Research, collect, and analyze relevant documentation and data to reach meaningful conclusions, form opinions of value propositions, generate ideas for solutions and approach improvement, and categorize study topics in terms of potential application and impact to client and industry needs and expectations.
Work with consultants to gather requirements for client proof of concept tests and internal teams for quarterly research projects.
Research Program Development
Assist in the development and ongoing management of process, approach, and standards for the research performed in the ZBeta LabZ program.
Identify opportunities and initiatives for improvements in the efficiency and thoroughness of ZBeta LabZ research deliverables.
Hold regular research update meetings to review, improve, and manage the status of ongoing projects and deliverables.
Requirements
WHAT YOU'LL NEED:
Experience:
5+ years of physical security industry and technology experience. 3+ years of experience in a software or hardware engineering role.
Education:
Bachelor's degree in engineering, computer science, or related technical field, or equivalent work experience
Knowledge:
Knowledge of and working familiarity with server and network storage solutions, operating systems architecture and key considerations, and network architecture models and principles.
Professional knowledge of and training in the principles of electrical systems, components, and circuits.
Skills:
Highly proficient in the use of Microsoft Office applications including Word, Excel, PowerPoint, Teams, OneNote and Visio
Proficiency in project management tools, such as MS Project, SharePoint and QuickBase
Training and manufacturer certification in multiple industry-leading platforms and equipment components, with particular emphasis on software applications and network-connected security devices. Genetec and LenelS2 experience a plus.
Abilities:
Demonstrated excellence in communication and interpersonal skills, with proven ability to communicate and present complex information to technical and non-technical stakeholders, both verbally and in written form
Strong technical documentation, technical writing, and data analysis and interpretation skills
Exceptional attention to detail and highly organized, with the ability to prioritize and balance workloads
Team player with the ability to establish collaborative working relationships across all levels of the organization
Self-directed problem solver who takes the initiative to start projects, work unsupervised, complete tasks independently, solve roadblocks, and address issues before they become problems
Physical Demands:
Lifting and Carrying: Ability to lift and carry equipment weighing up to 50 lbs or more, including cameras, control panels, and tools.
Climbing and Crawling: Must be able to climb ladders, scaffolding, and operate a high lift to install and maintain equipment
Manual Dexterity: Requires good hand-eye coordination and fine motor skills for handling tools, wiring components, and making precise adjustments to security systems
Kneeling, Squatting, and Crawling: Must be comfortable kneeling, squatting, or crawling to install or troubleshoot security equipment.
WHAT WE OFFER:
Competitive salary based on job-related skills, experience, and qualifications
Our excellent benefits package includes 100% paid premiums on health, dental, vision, and life insurance, a 401(k) retirement plan, and significant work schedule and workplace flexibility.
Diverse and supportive culture
WHAT'S IMPORTANT TO KNOW:
Full-time, in-office role at our Schiller Park, IL LabZ facility (relocation assistance provided). While ZBeta is a remote-first company, this role requires hands-on, on-site lab work.
This position is not eligible for visa sponsorship
Candidates must be able to meet client and/or government security screening requirements for the role
This position requires verification of U.S. citizenship due to citizenship-based legal restrictions. As a condition of employment, the successful candidate will be required to provide proof of citizenship.
The successful completion of a background check is required upon hire and every two years thereafter
We look forward to connecting with individuals who are passionate about our mission and can bring diverse contributions to our team - not just those who check all the boxes.
We are committed to creating a supportive, encouraging environment where everyone can fully express their diverse perspectives, showcase their talents, and grow their knowledge, skills, and abilities.
The base pay offered will depend on factors, including but not limited to job-related knowledge, skills, experience, and internal equity. At ZBeta, new hires are rarely placed at the top of the pay range; compensation is determined by the specific circumstances of each position and candidate.
A note to third-party recruiters - we do not accept unsolicited agency resumes, and we are not responsible for any fees related to unsolicited resumes.
Salary Description $110,000 - $130,000
Data and System Security Engineer
Cyber security analyst job in Lincolnshire, IL
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************