Cyber Sentinel Skills Challenge
Information Security Analyst Job 12 miles from Blue Island
Correlation One is hosting the Cyber Sentinel Skills Challenge, a unique, one-day cybersecurity competition sponsored by the U.S. Department of Defense (DoD). Win your share of a $15,000 prize pool, solve fun cybersecurity challenges, and access new job opportunities at the DoD.
This event is designed to help you:
Unlock career opportunities and get on the radar of DoD recruiters
Test your skills and gain experience solving some of the most pressing security threats globally through 20+ Capture the Flag-style simulations
Connect with your peers and build a strong, supportive network of cybersecurity professionals
Competition details:
When: June 14, 2025
Where: Virtual
Duration: 8 hours (11am - 7pm ET)
Cost: Free
Early application deadline: April 8, 2025
Total prize pool: $15,000
Experience required: All levels of cybersecurity are welcome
Challenge categories: Forensics, Malware/ Reverse Engineering, Networking & Reconnaissance, Open-Source Intelligence Gathering (OSINT), Web Security
About you:
You must be a U.S. Citizen or a permanent resident with a valid Green Card.
You must be over the age of 18.
Individuals from all levels of cybersecurity experience, whether you are a seasoned cybersecurity professional or just starting in the field, are welcome to apply.
Senior Security Analyst - IoT, Medical & Industrial Device
Information Security Analyst Job 33 miles from Blue Island
The Senior Security Analyst is the principal advisor in driving upgrades to UL's technical requirements, programs, processes to maintain UL as the highest quality provider for cybersecurity services. Remain up to date on all cybersecurity related topics. Perceived as both the customer's and internal security team's trusted advisor. Conduct advanced penetration tests, hacking to identify issues in embedded products and software.
Responsibilities:
Provides upgrades to UL and industry technical requirements on security requirements along with other standard bodies by collaborating the Software & Security team.
Conducts security tests using automated tools, ad-hoc tools, and manual testing.
Conducts penetration testing against different technological domains including, but not limited to, web products, hardware products, wireless products, software, cloud based software, smart device applications.
Assesses and calculates risk based on vulnerabilities and exposures discovered during testing.
Creates required information security documentation, technical reports, and formal papers on test findings, and complete requests in accordance with requirements.
Handles and completes customer projects to the defined requirements in the timeframe required by customers with the highest quality and integrity of work.
Meets and exceeds customer expectations with projects and other related tests and activities.
Supports security team in building and improving UL's assurance programs and services.
Supports the security team in building the lab for security services.
Provides sales support and the sale of more complex projects.
Qualifications:
• University Degree (Equivalent to a Master's degree) in Computer Science or a related discipline plus generally four years' experience in cybersecurity, software development, or ethical hacking.
• Experience installing and using various OS distributions and application packages.
• Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, nessus, ettercap, static source code analysis tools, fuzzing tools, dynamic binary testing tools
• Understanding of security issues on various operating systems, open source web and database platforms
• Experience scripting in one (1) or more of the following languages: sh, csh, perl, python, awk, ruby and programming experience in C, C++, Java
• Security related certifications a plus: CISSP, CISA, CEH, GIAC
• Strong expertise in testing in two or more of the following domains: Embedded software, embedded security, industrial control systems / SCADA, medical devices, telecom and networking equipment.
Total Rewards: We understand compensation is an important factor as you consider the next step in your career. The estimated salary range for this position is $100,000 to $130,000 and is based on multiple factors, including job-related knowledge/skills, experience, geographical location, as well as other factors. This position is eligible for annual bonus compensation with a target payout of 10% of the base salary. This position also provides health benefits such as medical, dental and vision; wellness benefits such as mental and financial health; and retirement savings (401K) commensurate with the standard rewards offered in each individual location or country. We also provide full-time employees with paid time off including vacation (15 days), holiday including floating holidays (12 days) and sick time off (72 hours).
#LI-SG2
#LI-Hybrid
Security Architect
Information Security Analyst Job 12 miles from Blue Island
Aureon Consulting is currently seeking candidates for the role of Cloud Security Architect. In this role, you will be responsible for shaping and evaluating the security strategy and architecture of the organization. You will work closely with both business and technology departments to translate business objectives and risk management requirements into effective security processes and technologies.
What we are looking for in a candidate:
Minimum of 10 years of overall experience within Information Technology including recent experience as a Security Architect or Security Engineer.
Experience in supporting and securing cloud service providers like Amazon Web Services and Microsoft Azure.
Previous experience with Defender for Cloud, Defender for Cloud Apps, GuardDuty, CloudTrail, Security Hub, Cloud Workload Protection Platform (CWPP), Cloud Security Posture Management (CSPM), and/or SaaS Security Posture Management (SSPM).
Experience with supporting and securing data cloud providers such as Snowflake, Salesforce, Confluent, and Databricks is highly preferred.
Experience supporting technologies such as Azure Data Lake Storage (ADLS), Microsoft Fabric, AWS Data Lake, Informatica, Data Build Tool (DBT), and/or BigEye is highly desired.
Candidates must be within the local area and able to commute onsite when needed. This position is not open for Visa sponsorship currently or in the future. This position is not open to third party support and all candidates must be able to work on W2.
IAM Business/Security Analyst
Information Security Analyst Job 12 miles from Blue Island
As a Sr IAM BA Analyst in Identity Governance and Administration (IGA) and Privileged Access Management (PAM), you will play a crucial role in ensuring the integrity and accuracy of user identity data within our organization. You will collaborate closely with application teams to obtain user extracts, validate them against our identity solution, and identify any discrepancies, ultimately strengthening our identity governance and security practices.
Key Responsibilities:
• Implements and identifies improvements to Access Control system enhancements (IGA and PAM)
• Manages consulting practice with business partners for technology security topics
• Maintains relationships with partners to manage effectiveness of the access security life cycle management process
• Mitigates risk of conversions to partners
• Operates independently; has in-depth knowledge of business unit / function
• As subject area expert, provides comprehensive, in-depth consulting and leadership to team and partners at a high technical level
• Carries out activities that are large in scope, cross-functional and technically difficult
• Role is balanced between high level operational execution and development, and execution of strategic direction of business function activities
• Responsible for direct interaction with different functions and/or management
Qualifications:
• At least 5 years of professional experience with significant experience working as a BA on complicated projects with multiple cross functional teams
• Proven experience in identity governance, administration, or data validation.
• Familiarity with identity management tools and systems.
• Knowledge of data privacy regulations and security best practices.
• Experience using Visio and Microsoft Office Suite
• Experienced enough to handle process improvement and synergies “big picture”
• Comfortable running sql queries and digging into the details of a project. Curiosity is key!
• Experienced in Identity Governance and Administration (IGA); Solid understanding of identity lifecycle (Joiner, mover, leaver) and access certification processes is preferred
• Experienced in implementing Identity governance processes for centralized and de-centralized applications is preferred
• Experienced in creating metrics and dashboard
Preferred Qualifications:
• College or University degree and/or relevant proven work experience in the area of Information Security is required
• Relevant certifications in identity and access management or data governance.
• Experience with identity and access management software such as SailPoint, Okta, or Microsoft Identity Manager
Additional skills:
• Highly motivated, self-directed and possess solid execution skills.
• Strong analytical skills with the ability to identify and resolve data discrepancies.
• Excellent communication and collaboration skills to work effectively with cross-functional teams.
• Demonstrates critical thought and probes beyond the surface of the requested data to get at the valuable (actionable) information.
• Able to understand complex concepts quickly.
• Detail oriented, but understands broader impacts of requests.
• Adjusts quickly to changing priorities as necessary.
• Manages multiple tasks and deliverables simultaneously and in an organized and results-oriented manner.
• Strives to proactively identify and address areas where business process efficiency and effectiveness improvements would make a positive impact on the top and bottom lines.
• Excellent people skills are also necessary since this position interacts with all levels of resources across the entire organization.
W2 Contractors are Eligible for Benefits (Medical, Dental, Vision 401k)
Pay rate: $50-65/hr W2.
IT SAP Production Planning Solutions Analyst
Information Security Analyst Job 12 miles from Blue Island
Role description:
We are seeking a highly skilled and experienced IT Production Planning Solutions Analyst with global IT experience and a strong background in SAP PP/PPDS modules and satellite planning solutions (such as SAP IBP or Blue Yonder) to join our team and provide E2E expert support for integrated business planning and production execution. The ideal candidate will have a deep understanding of SAP PP/PPDS, a strong track record of delivering successful projects, and a passion for driving operational excellence in a global context.
Responsibilities:
Operational Support: Provide timely and effective support for production-related issues, troubleshooting problems, and resolving incidents
Project Involvement: Contribute to planning and production execution related projects as needed, including implementation, upgrades, and enhancements
Planning Solutions: Leverage expertise in planning tools to support planning projects and optimize processes
Global Coordination: Work with global teams to ensure consistent processes and data management across different regions
Business Requirements Analysis: Translate business requirements into functional specifications for IT Application solutions
Best Practices: Identify and implement IT best practices to optimize planning and production execution
Continuous Improvement: Drive continuous improvement initiatives to enhance efficiency and effectiveness
Knowledge Sharing: Share expertise and knowledge with team members to foster a culture of learning and development
Project Management: Capable of efficiently managing concurrent projects, project teams and prioritizing tasks to achieve project goals within specified timelines
Minimum skills / qualifications:
Bachelor's degree in IT or a related field
Seven (7) years of hands-on experience with SAP PP/PPDS
Five (5) years of hands-on experience with IBP applications (SAP IBP, Blue Yonder or comparable solutions)
In-depth knowledge of SAP PP/PPDS modules (e.g., production planning, scheduling, MRP, material master, BOMs, Routing).
In-depth knowledge of Integrated Business Planning applications preferable SAP IBP and Blue Yonder
Good understanding of SAP ECC modules and integration with other planning modules
Familiarity with IT infrastructure and cloud technologies.
Configure SAP PP/PPDS modules to meet specific business needs, including master data setup, planning strategies, and scheduling parameters.
Work with developers to deliver custom solutions and enhancements.
Ensure the quality of SAP ECC and Integrated Business Planning solutions through rigorous testing and validation.
Preferred skills / qualifications:
Deep understanding of application development and lifecycle management.
Ability to analyze project, program, and portfolio needs.
Teamwork, Oral & written Communications, Logical Analysis, Business skills and methods, Business and Strategic Processes
Knowledge of problem analysis, structured analysis, and design techniques.
Experience in a global operations environment.
Strong analytical and conceptual skills; ability to create original concepts/theories for a variety of stakeholders
Ability to facilitate business meetings and influence best practices
About Ardagh Group
Ardagh Glass Packaging is a global leader in glass packaging solutions, producing packaging for the world's leading brands. We trace our roots all the way back to the Irish Glass Bottle Company, founded in 1932. Since then, we have grown rapidly to a team of more than 20,000 people with revenues of over $9 billion.
Today we have a presence across Europe, Africa, and North America.
Did you know that Ardagh produce many of the beverage cans and bottles you drink your favorite beverages from?
Did you know we produce metal and glass packaging which are permanent materials, meaning they can be infinitely recycled without any loss of quality?
Did you know we produce more than 160 million containers per day?
Ardagh is passionate about sustainability and have a reputation for innovation. We push the boundaries of what's possible, pioneering new production methods, new design techniques and new ways to recycle and save energy. Our aim is to reduce any negative environmental impact while remaining economically sustainable and socially responsible. We believe that the success of our business depends on the success of our people. We strive to create working environments where our employees feel valued, can work to their full potential, and where their achievements are celebrated. Here at Ardagh, we offer exciting and rewarding opportunities for talented and creative people. If you have ambition and want to make an impact with your career, come and join our team, you'll enjoy the journey!
Benefits Offered
Medical, prescription, dental and vision plans
Health Savings Account (HSA) and Flexible Spending Accounts (FSA)
Life insurance
401(k) retirement plan with company match and an employer retirement contribution
Paid holidays, floating days and vacation
Short- and Long-Term Disability (STD/LTD)
Employee Assistance Program (EAP)
Tuition reimbursement program
Professional and personal development opportunities through Employee Resource Groups
Benefits available from day 1 of employment
Flexible and hybrid working hours
Ardagh Group is an Equal Employment Opportunity (EEO) Employer and does not discriminate on the basis of age, race, color, religion, gender, sexual orientation, gender identity, gender expression, national origin, protected veteran status, disability or any other basis prohibited by federal, state, and local law.
Ardagh Group complies with federal, state, and local disability laws and makes reasonable accommodations for applicants and employees with disabilities. Contact Clare McHugh (****************************) if a reasonable accommodation is needed.
Senior Cyber Security Analyst
Information Security Analyst Job 18 miles from Blue Island
Employee Type:
Full time
Job Type:
Information Technology
Job Posting Title:
Senior Cyber Security Analyst
About Us:
TreeHouse Foods (NYSE: THS) is a leading manufacturer of private label packaged foods and beverages, operating a network of over 20 production facilities and several corporate offices across the United States and Canada. At TreeHouse Foods, our commitment to excellence extends beyond our products and revolves around our people. We are investing in talent and creating a performance-based culture where employees can do their best work and develop their careers, directly impacting our mission to make high quality, affordable food for our customers, communities, and families. We hope you will consider joining the team and being part of our future.
Named one of America's Best Large Employers by Forbes Magazine, we are proud to live by a strong set of values and strive to "Engage and Delight - One Customer at a Time." Guided by our values-Own It, Commit to Excellence, Be Agile, Speak Up, and Better Together. We are a diverse team driven by integrity, accountability, and a commitment to exceptional results. We embrace change, prioritize continuous learning, and foster collaboration, transparency, and healthy debate. Together, we set each other up for success to achieve enterprise-wide goals.
What You Gain:
Competitive compensation and benefits program with no waiting period - you're eligible from your first day!
401(k) program with 5% employer match and 100% vesting as soon as you enroll.
Comprehensive paid time off opportunities, including immediate access to four weeks of vacation, five sick days, parental leave and 11 company holidays (including two floating holidays).
Leaders who are invested in supporting your accelerated career growth, plus paid training, tuition reimbursement and a robust educational platform - DevelopU - with more than 10,000 free courses to support you along the way.
An inclusive working environment where you can build meaningful work relationships with a diverse group of professionals. Take advantage of opportunities to build on our team-oriented culture, such as joining one of our Employee Resource Groups.
Access to our wellness and employee assistance programs.
Job Description:
About the Role:
As a Senior Cyber Security Analyst, you will play a key role in architecture, engineering, and operations within a cross-functional team at our corporate office based in Oak Brook, IL. Collaborating with peers and service providers, you will drive the continuous advancement, management, and maintenance of TreeHouse Foods' cybersecurity posture and capabilities.
You'll add value to this role by performing various functions including, but not limited to:
Define and maintain hardening standards for infrastructure and systems, aligning with industry best practices.
Monitor, investigate, and respond to cybersecurity notifications, alerts, and incidents on a rotating schedule, following established protocols and industry standards.
Administer, maintain, and monitor security awareness programs and simulation testing processes.
Administer, maintain, and monitor endpoint and server hardening and protection capabilities.
Administer, maintain, and monitor network intrusion detection and prevention systems.
Manage enterprise-wide vulnerability management, including vulnerability scanning, reporting, and remediation workflows across IT and OT environments.
Develop and maintain documentation and diagrams for solutions and capabilities, including design, architecture, processes, standards, and workflows for both existing and new implementations.
Collect, analyze, and report on program metrics across cybersecurity capabilities.
Identify and assist with implementing improvements to enhance the capability, efficiency, and effectiveness of cybersecurity platforms and processes.
Perform additional tasks as needed to support the cybersecurity program and its objectives
Important Details:
This is a full-time, hybrid/on-site role on first shift.
The anticipated compensation for this position ranges from $100,800 to $126,00 annually. Individual pay is determined based on skills, experience, and other relevant factors. Additional compensation opportunities may be available for candidates with specialized skills or extensive experience.
You'll fit right in if you have:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. Industry certifications are preferred but not required.
Minimum of 5 years in cybersecurity architecture, engineering, and/or operations, with expertise in security alert and event log collection, querying, correlation, and monitoring.
Proficient in conducting security investigations, threat hunting, incident response preparation, testing, and execution.
Experience with security awareness and simulation testing, endpoint and server hardening, network intrusion detection and prevention, and vulnerability scanning, prioritization, and remediation management.
Strong understanding of Identity & Access Management, Certificate Management, and Key Lifecycle Management.
Proficient in developing and maintaining solution and capability documentation, including design, architecture, processes, standards, and workflows.
Strong analytical abilities for collecting, analyzing, and reporting cybersecurity metrics, with a focus on identifying and implementing process improvements.
Excellent written and verbal communication skills, with the ability to collaborate effectively across departments, teams, and stakeholders.
Proven ability to work in cross-functional teams and adapt to evolving cybersecurity needs. Willingness to research, advance expertise, and perform related tasks to support the cybersecurity program's goals.
Proficient in Microsoft Office.
Your TreeHouse Foods Career is Just a Click Away!
Click on the “Apply” button or go directly to ****************************** to let us know you're ready to join our team!
At TreeHouse Foods, we embrace diversity and inclusion for innovation and growth. We are committed to building inclusive teams and an equitable workplace for our employees to bring their true selves to work to help us “Engage and Delight - One Customer at a Time”. TreeHouse Foods is an Equal Opportunity Employer that prohibits discrimination or harassment of any type. All qualified applicants are considered for employment without regard to race, color, national origin, age, sex, sexual orientation, gender, gender identity or expression, disability status, protected veteran status, or any other characteristic protected by law. Applicants who require an accommodation to participate in the job application or hiring process should contact disability-accommodations@treehousefoods.com
TreeHouse Use Only: #IND1
Information Security-Data Entry Analyst
Information Security Analyst Job 12 miles from Blue Island
Contract assignment, 3/2025-5/2025
Remote to Chicago, Chicago area- candidate must have own equipment Pay rate $60.00 Top skills needed will be Microsoft Authentication knowledge and Active Directory knowledge.
Data Entry resource responsible for providing technical expertise in developing and supporting all activities, processes, and tools for protecting technology-based information.
Assist in the provisioning of security structures to support the data security needs of access controls requested.
Microsoft MFA Authentication Microsoft Active Directory CA Top Secret. This will be a data entry position
Skills Required:
Hands-on experience in identity management operations.
Conscientious and detail oriented.
Excellent verbal communication skills.
Cyber Security Analyst
Information Security Analyst Job 21 miles from Blue Island
Double Good's mission is to create joy. We create joy with our delectable and award-winning popcorn. We create joy with our easy-to-use fundraising platform that raises a meaningful amount of money for youth sports and activities, empowering kids to pursue their dreams. We create joy through our Kids Foundation which hosts Double Good Days events across the country to bring all-ability fun to children with special needs and their families. As featured on the Today Show, Double Good is not just about the product; we have a strong social mission.
In recent years, Double Good has seen 40% year over year growth, and we're excited about our future! We're excited about the possibility of you joining our mission. We are looking for a Cyber Security Analyst to join our growing IT team.
Location - onsite at our Elmhurst facility.
About the role:
* Guard all company data, particularly sensitive information, from both internal and external threats by designing broad defenses against would-be intruders
* Take the lead in day-to-day monitoring for unusual activities, implement defensive protocols, and report incidents
* Collaborate with other members of the cross-functional steering committee to develop new protocols, layers of protection, and other proactive and defensive systems for remaining ahead of cyber criminals
* Maintain documentation of security guidelines, procedures, standards, and controls
* Maintain knowledge of current cybercrime tactics.
* Collect data on current security measures for risk analysis, and write systems status reports regularly
* Monitor constantly for attacks and run appropriate defensive protocols if a breach occurs
* Conduct testing to identify vulnerabilities, and collaborate with the cybersecurity team to update defensive protocols when necessary
* Help lead security awareness employee training to prevent phishing and other forms of cyberattack
* Configure antivirus systems, firewalls, data centers, and software updates with a security-first mindset.
Grant credentials to authorized users, monitor access-related activities and check for unregistered information changes.
Experience & Skills we value:
* Bachelor's degree (or equivalent) in Cyber Security Engineering or related field.
* Three to five years of experience in cybersecurity at a midsize or large company.
* Deep knowledge of IT, including hardware, software, and network security.
* A meticulous eye for detail and an ability to perform in a fast-paced growing environment.
* Strong abilities in critical thinking, problem-solving, logic, and forensics.
* Excellent verbal and written communication skills.
* Ability to work successfully in both individual and team settings.
* Experience in writing security policies and procedures for the company and publishing and helping with adoption
Nice to have and/or you'll learn:
* Ability to think like a hacker in order to stay ahead of threats
* Certified Information Systems Security Professional (CISSP)
Equal Pay Disclosure(s):
We're on a mission to create more joy in people's lives, and that includes our internal employees. We create a place people love to be a part of, where people can discover and practice their unique skill sets, a place where they can contribute and do their best work. We do this by offering our employees a competitive compensation & benefits plan.
Base Pay range for this position:
* $85,000 - $120,000 annually
* Target Annual Bonus: 15% of base salary
The final discretionary compensation that will be offered for this role depends on a variety of factors, including job-related knowledge, skills, experience, and market location.
Benefits:
* Double Good offers competitive benefits including medical, dental and vision coverage with plans that can fit each teammate's needs. We offer immediate vesting in our 401k plan, paid time off, company-paid leaves and other perks including a Popcorn Allowance (yup, free popcorn!).
* Visit the Careers page on our website for more information at ***********************************
Double Good is an Equal Opportunity and Affirmative Action employer, working in compliance with both federal and state laws. We are committed to the concept of Equal Employment opportunity. Qualified candidates will be considered for employment regardless of race, color, religion, age, sex, national origin, marital status, medical condition, or disability. The EEO is the law and is available here. Right to Work Statement (English and Spanish).
Senior Information Security Specialist - Bureau of Technology
Information Security Analyst Job 12 miles from Blue Island
Job DetailsJob SummaryServe as a senior technical expert to assist in the design and administration of Information Technology (IT) security architecture and privacy services across the network. Monitor and utilize information security technologies for the identification of suspicious and malicious activities and inadequate security practices as they relate to IT security architecture. Oversee analysis and monitor of security violations, alerts and malware detection reports prepared by a third-party vendor. Serve as the senior liaison regarding all security vulnerabilities reported.
Graduation from an accredited college or university with a Bachelor's Degree is required.
Four (4) years as an analyst in Information Technology (IT) Networking or Security or directly related experience is required or
An equivalent combination of education and/or experience is required.
Valid driver's license is required.
This position is considered a safety-sensitive position. Candidates who are selected to fill safety-sensitive positions must pass a required drug test as part of the pre-employment background check process.Candidates who are contacted will be required to produce original required documents (e.g., current driver s license, diploma, school transcript, certifications, etc.) listed on the Notice of Job Opportunity within five (5) days of being extended an offer, in writing, by the Bureau Chief of BHR (or designee). Candidates will be notified of how to submit required documents.*Degrees awarded outside of the United States with the exception of those awarded in one of the United States territories and Canada, must be credentialed by the World Education Services (WES), Educational Credential Evaluators (ECE) or a National Association of Credential Evaluation (NACES) member organization.KNOWLEDGE, SKILLS, ABILITIES AND OTHER CHARACTERISTICS
Knowledge of IT security theory, technologies, policies/best practices, and enterprise architectures and knowledge of network architecture, operations and protocols. Ability to work 24/7 including holidays and weekends.
Knowledge of secure network/systems configuration management as well as an understanding of networking concepts and devices. Knowledge of application development methodologies and regulatory regulations.
Knowledge of active directory environments, virtual and mobile technologies, Information Security functions, and complex enterprise architecture security lockdowns.
Excellent oral and written communication skills including the ability to document requirements, designs, communication plans, project plans, project status reports and other relevant project-related issues.
Ability to independently guide staff in area of specialization to drive business success.
Ability to provide in-depth insight, advice and expertise to other professionals, management, and external contacts in an assigned functional area.
Ability to operate as a senior team member and communicate advanced specialized knowledge to team members, leaders, and external stakeholders.
Knowledge of complex principles and practices for a specialized area of focus.
Physical Requirements:Sedentary Work involves exerting up to 10 pounds of force occasionally or a negligible amount of force frequently to lift, carry, push, pull, or otherwise move objects. Sedentary work involves sitting most of the time but may involve walking or standing for brief periods of time.The duties listed are not set forth for purposes of limiting the assignment of work. They are not to be construed as a complete list of the many duties normally to be performed under a job title or those to be performed temporarily outside an employee s normal line of work.
Benefits Package
Medical, Dental, and Vision Coverage
Basic Term Life Insurance
Pension Plan and Deferred Compensation Program
Employee Assistance Program
Paid Holidays, Vacation, and Sick Time
You May Qualify for the Public Service Loan Forgiveness Program (PSLF)
Security Operations Center (SOC) - Information Security Analyst
Information Security Analyst Job 33 miles from Blue Island
Title: Security Operations Center (SOC) - Information Security Analyst Company: Award-Winning, $50B Publicly Traded Company Type: Full-Time Location: Hybrid - Chicagoland Area (Onsite 3-4 Days/Week) Travel: None Job Overview Join an award-winning, publicly traded company and be part of a fast-paced, cutting-edge security team! This newly developed SOC Analyst role offers an exciting and dynamic environment where no two days are the same. You'll have the opportunity to work with leading security tools like Splunk, CrowdStrike, Digital Shadows, and Proofpoint, while collaborating with a skilled and supportive security engineering team. You'll be part of a tight-knit, communicative team that values collaboration, knowledge-sharing, and professional growth. If you thrive in fast-paced security operations and enjoy hands-on problem-solving, this is an excellent opportunity to make an impact. Key Responsibilities:
Manage the Phish Alert mailbox.
Perform QA on tickets for a service provider.
Handle tier 2 escalated inquiries.
Support security operations through log aggregation and analysis.
Leadership & Team Culture The leadership team is known for holistically supporting its team members, ensuring that growth, learning, and well-being remain top priorities. They provide ongoing career development opportunities, mentorship, and hands-on training to help employees expand their expertise and advance their careers. Beyond technical growth, leadership fosters a culture of inclusivity and collaboration, ensuring that every team member is heard, valued, and supported. Open communication, continuous learning, and a strong sense of community define the workplace, empowering individuals to contribute, innovate, and succeed. Requirements
3+ years of experience in cybersecurity or a related field.
Proficiency with at least some of the following tools: CrowdStrike, Proofpoint, Digital Shadows, or Splunk
Experience working in a Security Operations Center (SOC) environment is a plus, but not required.
Compensation & Benefits
Base Salary: $70,000 - $90,000 (dependent on qualifications, skills, and experience).
Bonus Eligible.
Comprehensive Benefits Package Includes:
Medical, Dental, Vision, and Life Insurance
Traditional and Roth 401(k) with company match
Employee Stock Purchase Plan (ESPP)
And much more!
Apply Today!
Information Security Analyst I
Information Security Analyst Job 12 miles from Blue Island
At the United Center, we believe that people's stories are enhanced by sports, entertainment, and community. Our purpose is to enhance everyone's stories through iconic experiences while at the United Center. In the role as Security Analyst I you will help our team bring the next round of stories to life on the United Center campus.
The Information Security Analyst will play a key role in monitoring, analyzing, and responding to security incidents and threats targeting our environment. The ideal candidate will be a self-starter, have a strong analytical mindset, attention to detail, and a passion for identifying and mitigating cybersecurity risks. This is a hybrid position.
General Responsibilities (including but not limited to):
Responsible for validating security alerts and ensuring appropriate action is taken to mitigate threats
Investigate security incidents, and vulnerabilities to ensure appropriate action is taken to mitigate threats
Technical owner for internal security tools and primary contact for external partners
Maintain security incident response plans, procedures, and documentation
Modify or establish internal controls, process and procedures related to IT Security
Collaborate with cross-functional teams to implement security controls and measures to prevent and mitigate security threats
Provide cybersecurity recommendations on new technologies and/or how to address new risk
Manage assigned projects and tasks, ensuring timely completion and communication
Stay current on the latest cybersecurity threats, trends, and vulnerabilities to proactively address potential risks
Participate in third party security assessments
Other duties may be assigned
Requirements:
At least 2 years of professional experience in cybersecurity
Strong understanding of cybersecurity principles, practices, frameworks, and technologies
Experience with security incident detection, analysis, and response using security tools
Knowledge of common cybersecurity threats, attack vectors, and mitigation strategies
Excellent analytical and problem-solving skills with the ability to prioritize and manage multiple tasks in a dynamic environment
Effective communication skills with the ability to effectively communicate technical information to non-technical stakeholders
Education:
Bachelor's degree in computer science, Information Security, or related field.
Or combination of associate degree and appropriate experience.
Specific Job Knowledge, Skill, and Ability:
Language Skills - Ability to read, analyze and interpret the most complex documents.
Math Skills - Ability to add, subtract, multiply and divide in all units of measure, using whole numbers, percentages and draw and interpret bar graphs.
Reasoning Ability - Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal symbolism.
The pay range for this role is $65,000-85,000 annually. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to skill set, depth of experience, certifications, and specific work location.
The total compensation package for this position may also include annual performance bonus, 401K retirement plan with company match, paid time off and commuter benefits. Additional perks include access to our state-of-the-art gym with free fitness classes, catered meals, fun events and free parking.
We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, sex, sexual orientation, age, disability, gender identity, marital or veteran status, or any other protected class.
Senior Security Analyst, Business Technology
Information Security Analyst Job 12 miles from Blue Island
Get to know Okta Okta is The World's Identity Company. We free everyone to safely use any technology-anywhere, on any device or app. Our Workforce and Customer Identity Clouds enable secure yet flexible access, authentication, and automation that transforms how people move through the digital world, putting Identity at the heart of business security and growth.
At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we're looking for lifelong learners and people who can make us better with their unique experiences.
Join our team! We're building a world where Identity belongs to you.
Business Technology Team
The Business Technology Team plays a vital role in Okta's mission to "Accelerate Okta's Scale and Growth." As a key member of this team, you'll thrive in a dynamic environment where collaboration, accountability, and delivering business outcomes are at the forefront. We're looking for motivated individuals who are energized by solving complex challenges, shaping the future of technology, and making a tangible impact on Okta's success.
Senior Security Analyst, Business Technology
We seek a detail-oriented and motivated Senior Security Analyst, Business Technology focusing on security to join our Engineering Services team. This role is critical in bridging the gap between technical teams and business stakeholders, ensuring security remains a cornerstone of our SaaS, cloud, productivity, and endpoint applications. The Product Analyst will evaluate business needs, define technical and security requirements, and drive improvements in our security programs. The ideal candidate is passionate about technology, skilled in communication, and experienced in implementing security best practices.
What you'll be doing
* Evaluate business processes, anticipate requirements, and identify areas for improvement.
* Define technical, business, and security requirements for projects and systems.
* Translate complex technical requirements into functional specifications and user stories.
* Help teams maintain focus and alignment with project goals, ensuring adherence to agreed deliverables and minimizing deviations from scope.
* Educate teams on security practices and ensure adherence to security policies.
* Identify and track key metrics to measure the success of security programs.
* Help develop and maintain incident response playbooks and ensure alignment with organizational goals
* Develop runbooks, procedure manuals, and other documentation to support cross-training and operational readiness.
What you'll bring to the role
* 3-5 years of experience in a product management or analyst role, ideally with a focus on security.
* Strong understanding of security fundamentals and frameworks (e.g., NIST, ISO 27001, CIS).
* Experience working with IT security tools such as Okta, EDR, DLP, and MDM, as well as SaaS platforms like Salesforce, Microsoft 365, and Google Workspace.
* Proficiency in tools like Jira and Confluence for managing requirements and project tracking.
* Ability to translate technical requirements into actionable business insights and functional documentation.
* Excellent communication skills, with the ability to convey complex security concepts to technical and non-technical stakeholders.
* Familiarity with scripting languages (Python preferred) and REST APIs is a plus.
And extra credit if you have experience in any of the following!
* Educational Foundation: A bachelor's degree (or equivalent experience) is required; an advanced degree is a plus.
#LI-CM1
#LI-Hybrid
Below is the annual base salary range for candidates located in California, Colorado, New York and Washington. Your actual base salary will depend on factors such as your skills, qualifications, experience, and work location. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program please visit: ****************************
The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, New York, and Washington is between:$132,000-$198,000 USD
What you can look forward to as a Full-Time Okta employee!
* Amazing Benefits
* Making Social Impact
* Fostering Diversity, Equity, Inclusion and Belonging at Okta
Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs. Each organization is unique in the degree of flexibility and mobility in which they work so that all employees are enabled to be their most creative and successful versions of themselves, regardless of where they live. Find your place at Okta today! **************************************
Some roles may require travel to one of our office locations for in-person onboarding.
Okta is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, marital status, age, physical or mental disability, or status as a protected veteran. We also consider for employment qualified applicants with arrest and convictions records, consistent with applicable laws.
If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation.
Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Privacy Policy at *************************************
U.S. Equal Opportunity Employment Information
Read more
Individuals seeking employment at this company are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation. When submitting your application above, you are being given the opportunity to provide information about your race/ethnicity, gender, and veteran status. This information helps us support or diversity, inclusion, and belonging efforts, as well as maintain fair and equitable hiring practices.
Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.
If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:
A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.
A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.
An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.
An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.
Pay Transparency
Okta complies with all applicable federal, state, and local pay transparency rules. For additional information about the federal requirements, click here.
Voluntary Self-Identification of Disability
Form CC-305
Page 1 of 1
OMB Control Number 1250-0005
Expires 04/30/2026
Why are you being asked to complete this form?
We are a federal contractor or subcontractor. The law requires us to provide equal employment opportunity to qualified people with disabilities. We have a goal of having at least 7% of our workers as people with disabilities. The law says we must measure our progress towards this goal. To do this, we must ask applicants and employees if they have a disability or have ever had one. People can become disabled, so we need to ask this question at least every five years. Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at ******************
Completing this form is voluntary, and we hope that you will choose to do so. Your answer is confidential. No one who makes hiring decisions will see it. Your decision to complete the form and your answer will not harm you in any way. If you want to learn more about the law or this form, visit the U.S. Department of Labor's Office of Federal Contract Compliance Programs (OFCCP) website at ***************************
How do you know if you have a disability?
A disability is a condition that substantially limits one or more of your "major life activities." If you have or have ever had such a condition, you are a person with a disability. Disabilities include, but are not limited to:
* Alcohol or other substance use disorder (not currently using drugs illegally)
* Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, HIV/AIDS
* Blind or low vision
* Cancer (past or present)
* Cardiovascular or heart disease
* Celiac disease
* Cerebral palsy
* Deaf or serious difficulty hearing
* Diabetes
* Disfigurement, for example, disfigurement caused by burns, wounds, accidents, or congenital disorders
* Epilepsy or other seizure disorder
* Gastrointestinal disorders, for example, Crohn's Disease, irritable bowel syndrome
* Intellectual or developmental disability
* Mental health conditions, for example, depression, bipolar disorder, anxiety disorder, schizophrenia, PTSD
* Missing limbs or partially missing limbs
* Mobility impairment, benefiting from the use of a wheelchair, scooter, walker, leg brace(s) and/or other supports
* Nervous system condition, for example, migraine headaches, Parkinson's disease, multiple sclerosis (MS)
* Neurodivergence, for example, attention-deficit/hyperactivity disorder (ADHD), autism spectrum disorder, dyslexia, dyspraxia, other learning disabilities
* Partial or complete paralysis (any cause)
* Pulmonary or respiratory conditions, for example, tuberculosis, asthma, emphysema
* Short stature (dwarfism)
* Traumatic brain injury
PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.
Okta
The foundation for secure connections between people and technology
Okta is the leading independent provider of identity for the enterprise. The Okta Identity Cloud enables organizations to securely connect the right people to the right technologies at the right time. With over 7,000 pre-built integrations to applications and infrastructure providers, Okta customers can easily and securely use the best technologies for their business. More than 19,300 organizations, including JetBlue, Nordstrom, Slack, T-Mobile, Takeda, Teach for America, and Twilio, trust Okta to help protect the identities of their workforces and customers.
Cyber Security Analyst (Full-time/On-site)
Information Security Analyst Job 12 miles from Blue Island
Manages the overall implementation, tracking, monitoring, auditing and reporting on user system activity, security and usage related to Humboldt Park Health's computerized systems, including the EMR and attached systems and those systems having Personal Health Information (PHI). Remains current with evolving regulations (including HIPAA) related to system and data security, in order to assist Humboldt Park Health management in developing, maintaining, recommending, and operationalizing data security policies and procedures related to system security and data confidentiality. Manages systems, interfaces, and develops reports where needed related to data security and monitoring systems.
Assists Compliance and HIPAA Officers in the creation and implementation of policies and procedures related to record retention, disaster recovery and business continuity. Audits and approves user system profiles and access rights in conjunction with the Information Technology Services team. Assists management in the documentation, education and training of staff. Maintains current knowledge related to local, state, and federal regulatory requirements related to IT data security, financial systems and HIPAA security. Assists management in the gap analysis and execution of the long-term HIPAA security action plans to maintain Meaningful Use, HITECH, DNV, and other compliance agency regulatory
Essential Duties and Responsibilities:
Monitors, audits and recommends changes to overall access to controlled areas and information systems that process or handle highly confidential and sensitive data.
Assists in the creation, ongoing maintenance and implementation of data security and HIPAA security auditing, monitoring, and reporting policies and procedures, including the establishment of corporate user security access profiles.
Assists in the creation and maintenance of disaster recovery and business continuity policies, procedures and action plans.
Assists in the overall approval process of system change management implementations to ensure data and confidential security and accesses are maintained to ensure regulatory compliance.
Monitors, audit reports, and enacts corrective action on data/system usage, including tables/catalogs/dictionaries, for appropriateness and need basis for fulfilling business needs while ensuring the confidentiality of the data and patient information.
Creates and maintains educational materials and performs ongoing education and training related to data compliance and HIPAA security issues for staff and the community.
Implements and maintains systems utilized in the auditing, monitoring, and reporting of data and HIPAA security and confidentiality usage and breaches.
Uses data encryption, firewalls, and other appropriate security tools and applications to conceal and protect transfers of confidential digital information.
Determine frequency to update virus protection systems by monitoring current reports of computer viruses; facilitates or performs needed updates.
Develop a security plan for best standards and practices for the company.
Conduct frequent testing of simulated cyber-attacks to look for vulnerabilities in the computer systems and take care of these before an outside cyber-attack.
Make recommendations on security advancements to best protect the company's systems.
Conduct or coordinate vulnerability scans, and penetration tests on campus systems, document findings, and recommend risk mitigation strategies.
Collaborates with the executive team, leadership and customers to solve problems and improve business operations through process re-engineering, to meet or exceed data security and HIPAA security regulatory requirements.
Provides leadership and direction to Humboldt Park Health management and staff, as it relates to data and HIPAA security measures, controls, and corrective action processes to ensure a caring approach with the utmost confidentiality, integrity, and respect.
Qualifications:
3 5 years of experience
Experience with Proofpoint, Varonis and Nessus is highly desired
Associates degree or related experience. Bachelor's degree is preferred
Preferred certifications in - CompTia Network+, CompTia Security+, CompTia Cybersecurity Analyst, Certified Ethical Hacker (CEH), Certified in Risk and Information Systems Control (CRISC), Certified information Systems Auditor (CISA)
Information Security Specialist
Information Security Analyst Job 12 miles from Blue Island
ABOUT USG AND OUR DIGITAL CUSTOMER EXPERIENCE JOURNEY Capability transformation USG is evolving its digital customer experience and translating the objective of being easiest to do business with into a sustainable technology roadmap. The digital transformation includes upgrading our technology stack and augmenting our teams, developing new digital platforms, and integrating a best-in-class eCommerce operating model to deliver exceptional customer experience from design planning to order delivery. The digital services are based on to be improved data and process models and will be provided for all our customers in the US, Canada, and LATAM.
ROLE SUMMARY
The Information Security Specialist will be a key role in the USG IT information security team, fully supporting USG's digital transformation effort and is responsible for supporting the business transformation roadmap while ensuring USG's IT security standards for safeguarding the environment, data, ensuring compliance with regulations, and protecting against security threats. They must ensure security controls are maintained and respond to cybersecurity risks or incidents.
USG offers a hybrid workplace. The office location is Chicago, IL. Minimal travel may be required.
DEFINITION OF THE TEAM
USG's IT Security team is responsible for safeguarding the company's digital assets and ensuring the confidentiality, integrity, and availability of information. The team's primary responsibility is to develop and implement comprehensive security policies, procedures, and controls that align with the overall enterprise security strategy and standards to protect our assets and operations.
This team fosters a secure digital environment that supports the organization's operations, enhances trust with stakeholders, and drives business continuity through effective risk management and incident response. The IT Security team collaborates closely with various departments to understand their business needs and design security solutions that meet those requirements effectively while protecting USG. The team's work is critical to the success of the organization, as it enables secure business operations and supports the overall business strategy.
This IT security role will be dedicated to supporting our Customer Experience organization and our digital platforms. USG is evolving its digital customer experience and translating the objective of being easiest to do business with into a sustainable technology roadmap. The digital transformation includes upgrading our technology stack and augmenting our teams, developing new digital platforms, and integrating a best-in-class eCommerce operating model to deliver exceptional customer experience from design planning to order delivery. The digital services are based on to be
improved data and process models and will be provided for all our customers in the US, Canada, and LATAM.
KEY ACCOUNTABILITIES AND RESPONSIBILITIES
* Assessing application security: Responsible for reviewing proposed new systems, networks, and software designs for potential security risks, recommending mitigation or countermeasures, and resolving integration issues related to the implementation of new systems within the existing infrastructure
* Support security strategy: Develop and manage an enterprise-wide security strategy, and communicate performance to key stakeholders
* Ensuring compliance and security: Ensure data systems comply with relevant regulations and security standards. Develop measures to protect data privacy and ensure the security of data pipelines and analytics infrastructure
* Risk assessment: Lead cybersecurity risk assessments and mitigation efforts, and oversee incident management and response planning
* Collaboration and communication: Collaborate with cross-functional teams, especially within customer experience teams of USG, including IT, data science, and business units of customer experience teams, to mitigate risk. Guide engineering teams in making informed security decisions on infrastructure, systems, and applications design
* Midpoint may be adjusted based on the skills and qualifications of the selected candidate.
KEY QUALIFICATIONS
Education
Bachelor's degree in Computer Science, Information Technology, Cyber Security, or a related field
Relevant certifications such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM)
Required Skills
* 7+ years experience in information security and risk management
* In-depth knowledge of IT security frameworks and regulations such as ISO 27001, NIST, and GDPR
* Understanding CASB, CSPM and CWPP tools; knowledge of cloud security frameworks, standards and best practices; and working with cloud IAM and IaaS, PaaS and SaaS native security capabilities. Understand how business architecture affects cloud security, and manage relationships with business teams using cloud so that you can plan for upcoming requirements.
* Deep understanding of API security principles, technologies, and best practices. (e.g. OAuth, OpenID, REST, SOAP, GraphQL) Define and execute the product vision and strategy for API security, aligning with our business goals and customer needs. Document and evangelize secure API design patterns.
* Must be proficient in one or more scripting languages such as Python, PowerShell, Bash, etc.
* Proficiency in security tools and products, including firewalls, IDS/IPS, SIEM, and vulnerability scanning
* Ability to translate technical security risks into clear, concise, nontechnical terms
* Excellent problem-solving skills to address security challenges
* Strong collaboration skills with the ability to work effectively with cross-functional teams, including IT, data science, and business units of customer experience teams
* Excellent technical documentation and reporting skills
* Strong ethical standards and integrity
Preferred Skills
* Knowledge of machine learning in anomaly identification and user behavior analytics
* Experience with security standards for cloud applications including in the implementation of digital solutions
* Experience with network security design and implementation, penetration testing, and vulnerability assessment tools
* Experience in overseeing or implementing automation in security engineering
Rate of pay may be adjusted based on the qualifications and experience of the candidate.
USG employees enjoy a number of benefit options for themselves and their families. These include two medical insurance options, as well as vision and dental coverage. The cost of these optional programs varies based on coverage level - employees generally pay 25% of the monthly premium cost, USG pays the rest. These coverage options are offered on the first day of employment with no waiting period.
Additionally, USG employees enjoy both a 401(k) Investment Plan with company match and a pension plan. Beyond these main features, employees may also choose from a number of additional programs like life insurance, accident insurance, legal insurance, even pet insurance, just to name a few. USG also offers Quarterly (hourly) / Annual (salary) bonus potential for all employees based on performance metrics tied to safety, quality, and productivity. USG also provides employees with paid time off and paid holidays.
Since 1902, Chicago-based USG has been a leader in producing innovative, award-winning products and systems to build everything from major commercial developments and residential housing to home improvements. USG's employees are committed to the highest levels of customer satisfaction and quality in everything we do. Our steadfast commitment to the company's core business values - innovation, quality, integrity, service, diversity, efficiency and safety - have helped us become the company we are today.
EOE including disability/veteran
IAM Information Security Controls Specialist
Information Security Analyst Job 12 miles from Blue Island
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank's Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
What you can expect in Identity & Access Management:
In today's highly connected world, managing and securing the identity of users is essential to the safety and success of our workforce. The Identity & Access Management (IAM) team works within Global Information Services (GIS) and in close participation with all other LOB teams as well as second and third line of defense partners. This role is highly visible and requires frequent interaction with senior management and key stakeholders. Are you passionate about the latest IT technologies and thrive in a fast-paced international environment? In a typical day, you may work with other team members on the book of work, operational concerns, or risk items. You will help overcome obstacles and maintain good relationships with key stakeholders across The Bank to ensure timely and effective delivery. We offer you the opportunity to collaborate with passionate competent people, experts in their field. We thrive on being challenged and everything we do is anchored in managing risk for The Bank.
This role is responsible for supporting Identity and Access Management (IAM) break/fix issues impacting end user and service functionality. You will regularly collaborate with experts and the user community in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees and senior leadership. You will utilize in-depth subject matter expertise and business requirements to deliver against risk and performance metrics. Staying current with common and emerging threats related to access, you will have an opportunity to proactively develop, implement, and influence controls and policy advancements. You will partner with key stakeholders from line of business organizations to respond rapidly to security events and escalations that pose risk to the organization.
Responsibilities will include but not limited to:
Actively troubleshoot access issues, verify policy compliance approach to resolving incident tickets
Communicate effectively with end users and business partners.
Build and monitor alerting and dashboards.
Identify areas for further process automation, simplification, and improvement.
Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
Risk management experience and mindset.
Comprehensively document analysis, investigative activities, actions, etc.
Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.
Apply knowledge of the Identity and Access Management industry policies and standards including laws, rules, regulations, and information security concepts related to access provisioning, validate alignment of processes and controls to requirements, and report on gaps related to adherence to policy requirements.
Lead complex technical projects to successful delivery, includes facilitating project meetings, authoring project documentation and driving adoption.
Required Qualifications:
Minimum of 3 years' experience within the operational side of the Information Technology, Security industry and Identity and Access Management
Ability to analyze data and evaluate relevance to a specific issue or incident under investigation.
Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
Ability to exercise independent judgment when responding to alerts.
Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
Familiarity with identity management standards, social engineering TTPs, and the incident response lifecycle.
Knowledgeable of current access based exploits in traditional and cloud environments, for both human and non-human accounts.
Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
Ability to work in a strong team-orientated environment that is geographically dispersed with a sense of urgency and resilience.
Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
A strong working knowledge of security threat vectors, networking, network security and application security.
Advanced problem solving skills.
Demonstrates the capability of working in a team environment and collaborating with overseas partners.
Ability to work independently.
Strong leadership skills and qualities which enable you to work with peers and various levels of management.
Strong analytical skills/problem solving/conceptual thinking.
Desired Qualifications:
Broad technical knowledge of IAM lifecycle, ecosystem and enterprise scale products.
Experience in the deployment of multi-factor authentication, role and attribute-based access control, and other strong authentication methods and solutions.
Hands-on experience with IAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts.
Strong technical knowledge of authentication and authorization protocols: OIDC, SAML, XACML, LDAP, OAuth, OpenID.
3-5 years' experience with cloud platforms (AWS, Azure, GCP etc.)
Shift:
1st shift (United States of America)
Hours Per Week:
40
Pay Transparency details
US - DC - Washington - 1800 K St NW - 1800 K Street NW (DC1842), US - IL - Chicago - 540 W Madison St - Bank Of America Plaza (IL4540) Pay and benefits information Pay range$76,500.00 - $136,400.00 annualized salary, offers to be determined based on experience, education and skill set.Discretionary incentive eligible This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.BenefitsThis role is currently benefits eligible. We provide industry-leading benefits, access to paid time off, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.
Cyber Security Analyst
Information Security Analyst Job 20 miles from Blue Island
Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at *************************
Job Title: Cyber Security Analyst
Duration: 12 Months
Location: Oakbrook Terrace, IL
Job Description:
Responsible for planning, designing, and implementing a process for cyber security monitoring, incident detection, and incident response. 1-3 yrs of experience and a Bachelor's degree in IT systems or a related discipline.
Position Requirements:
- Configuration and administration of logging aggregation and security event monitoring tools (like Industrial Defender, Splunk, etc.)
- Configuration and maintenance of performance monitoring tools (like Solarwinds, Uptime, CA Spectrum, etc.)
o Understands and can configure tools and endpoint systems to use SNMP for monitoring
- General IT Support (application patching, client updates, remote access and administration tools)
- General Networking knowledge (IP Networking, OSI Stack, etc.)
Additional Information
Thanks & Regards'
___________________________________________________________________________
Vikram Bhalla | Team Recruitment | Mindlance, Inc. | W: ************
All your information will be kept confidential according to EEO guidelines.
Information Security Specialist
Information Security Analyst Job 12 miles from Blue Island
Foley & Lardner LLP is a great place to work because of what we do and how we do it. Here, your unique perspectives, experiences, and abilities will be embraced and developed, so you can excel. Being a part of Foley means having the opportunities and resources necessary to gain experience, advance professional goals, and forge meaningful connections. It's a place where you can build your career and enjoy professionally satisfying work. We have over 2,300 people who are #HappyatFoley, and we think you will be too. #LIHybrid
Foley & Lardner is currently seeking an Information Security Specialist to join our team. The Specialist will be responsible for the development, monitoring, implementation, maintenance, and support of the firm's information technology security infrastructure.
Responsibilities
Proactively monitors security tools, systems, and alerts, and remediates / escalates issues as needed
Assists in operation and maintenance of full security technology stack, e.g., EDR, multi-factor authentication, External DNS, Active Directory, Data Loss Prevention, SIEM, Vulnerability Management, Security Orchestration and Automation, etc.
Ensures proper maintenance, patching, configuration, and updating of security tools and technologies
Supports the development and enforcement of Information Security policies, processes, capabilities, and tools
Actively involved in Vulnerability Management, Data Loss Prevention, Data Protection, Security Monitoring, and Incident Response programs
Assists in and supports the resolution of end-user issues relating to security problems and products
Participates in on-call rotations, requiring evaluation, escalation, and resolution of high-priority security events, incidents, and alerts
Works in concert with management and senior members of the Information Security team to recommend, evaluate, and implement new technology solutions as warranted
Works across multiple parallel projects using formal project planning techniques
Creates Data Loss Prevention monitoring and alerting rules to identify data loss risk to firm and client data
Proactively monitors DLP alerts and identifies / escalates issues as needed
Participates in security investigations and analysis of logs, events, incidents, as
Develops tools and scripts to assist in automating manual processes
Participates in risk management and compliance / audit activities
Qualifications
High School Diploma or GED required; Bachelor's Degree in Cybersecurity, Engineering, Information Technology, or Management Information Systems strongly preferred
Minimum of three (3) years of experience in cybersecurity operations or other related technology field required
Security Industry certification(s) and/or specialized experience in cybersecurity/information security (CISSP, OSCP, CEH, GIAC, Azure, etc.) desired
Experience with following technologies: Palo Alto Firewalls, Tenable Security Center, MFA, Cisco Umbrella, VPN, EDR, Email Security, DLP, UEBA, SOAR, NAC, SIEM, CASB, Public Cloud Security preferred
Experience with Microsoft PowerShell, Python, and/or other scripting languages preferred
Experience in performing Digital Forensics and Incident Response preferred
#l
Data and System Security Engineer
Information Security Analyst Job 39 miles from Blue Island
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
Information Security Analyst I
Information Security Analyst Job 12 miles from Blue Island
At the United Center, we believe that people's stories are enhanced by sports, entertainment, and community. Our purpose is to enhance everyone's stories through iconic experiences while at the United Center. In the role as Security Analyst I you will help our team bring the next round of stories to life on the United Center campus.
The Information Security Analyst will play a key role in monitoring, analyzing, and responding to security incidents and threats targeting our environment. The ideal candidate will be a self-starter, have a strong analytical mindset, attention to detail, and a passion for identifying and mitigating cybersecurity risks. This is a hybrid position.
General Responsibilities (including but not limited to):
Responsible for validating security alerts and ensuring appropriate action is taken to mitigate threats
Investigate security incidents, and vulnerabilities to ensure appropriate action is taken to mitigate threats
Technical owner for internal security tools and primary contact for external partners
Maintain security incident response plans, procedures, and documentation
Modify or establish internal controls, process and procedures related to IT Security
Collaborate with cross-functional teams to implement security controls and measures to prevent and mitigate security threats
Provide cybersecurity recommendations on new technologies and/or how to address new risk
Manage assigned projects and tasks, ensuring timely completion and communication
Stay current on the latest cybersecurity threats, trends, and vulnerabilities to proactively address potential risks
Participate in third party security assessments
Other duties may be assigned
Requirements:
At least 2 years of professional experience in cybersecurity
Strong understanding of cybersecurity principles, practices, frameworks, and technologies
Experience with security incident detection, analysis, and response using security tools
Knowledge of common cybersecurity threats, attack vectors, and mitigation strategies
Excellent analytical and problem-solving skills with the ability to prioritize and manage multiple tasks in a dynamic environment
Effective communication skills with the ability to effectively communicate technical information to non-technical stakeholders
Education:
Bachelor's degree in computer science, Information Security, or related field.
Or combination of associate degree and appropriate experience.
Specific Job Knowledge, Skill, and Ability:
Language Skills - Ability to read, analyze and interpret the most complex documents.
Math Skills - Ability to add, subtract, multiply and divide in all units of measure, using whole numbers, percentages and draw and interpret bar graphs.
Reasoning Ability - Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal symbolism.
The pay range for this role is $65,000-85,000 annually. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to skill set, depth of experience, certifications, and specific work location.
The total compensation package for this position may also include annual performance bonus, 401K retirement plan with company match, paid time off and commuter benefits. Additional perks include access to our state-of-the-art gym with free fitness classes, catered meals, fun events and free parking.
IAM Information Security Controls Specialist
Information Security Analyst Job 12 miles from Blue Island
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank's Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
**What you can expect in Identity & Access Management:**
In today's highly connected world, managing and securing the identity of users is essential to the safety and success of our workforce. The Identity & Access Management (IAM) team works within Global Information Services (GIS) and in close participation with all other LOB teams as well as second and third line of defense partners. This role is highly visible and requires frequent interaction with senior management and key stakeholders. Are you passionate about the latest IT technologies and thrive in a fast-paced international environment? In a typical day, you may work with other team members on the book of work, operational concerns, or risk items. You will help overcome obstacles and maintain good relationships with key stakeholders across The Bank to ensure timely and effective delivery. We offer you the opportunity to collaborate with passionate competent people, experts in their field. We thrive on being challenged and everything we do is anchored in managing risk for The Bank.
This role is responsible for supporting Identity and Access Management (IAM) break/fix issues impacting end user and service functionality. You will regularly collaborate with experts and the user community in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees and senior leadership. You will utilize in-depth subject matter expertise and business requirements to deliver against risk and performance metrics. Staying current with common and emerging threats related to access, you will have an opportunity to proactively develop, implement, and influence controls and policy advancements. You will partner with key stakeholders from line of business organizations to respond rapidly to security events and escalations that pose risk to the organization.
**Responsibilities will include but not limited to:**
+ Actively troubleshoot access issues, verify policy compliance approach to resolving incident tickets
+ Communicate effectively with end users and business partners.
+ Build and monitor alerting and dashboards.
+ Identify areas for further process automation, simplification, and improvement.
+ Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
+ Risk management experience and mindset.
+ Comprehensively document analysis, investigative activities, actions, etc.
+ Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.
+ Apply knowledge of the Identity and Access Management industry policies and standards including laws, rules, regulations, and information security concepts related to access provisioning, validate alignment of processes and controls to requirements, and report on gaps related to adherence to policy requirements.
+ Lead complex technical projects to successful delivery, includes facilitating project meetings, authoring project documentation and driving adoption.
**Required Qualifications:**
+ Minimum of 3 years' experience within the operational side of the Information Technology, Security industry and Identity and Access Management
+ Ability to analyze data and evaluate relevance to a specific issue or incident under investigation.
+ Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
+ Ability to exercise independent judgment when responding to alerts.
+ Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
+ Familiarity with identity management standards, social engineering TTPs, and the incident response lifecycle.
+ Knowledgeable of current access based exploits in traditional and cloud environments, for both human and non-human accounts.
+ Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
+ Ability to work in a strong team-orientated environment that is geographically dispersed with a sense of urgency and resilience.
+ Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
+ A strong working knowledge of security threat vectors, networking, network security and application security.
+ Advanced problem solving skills.
+ Demonstrates the capability of working in a team environment and collaborating with overseas partners.
+ Ability to work independently.
+ Strong leadership skills and qualities which enable you to work with peers and various levels of management.
+ Strong analytical skills/problem solving/conceptual thinking.
**Desired Qualifications:**
+ Broad technical knowledge of IAM lifecycle, ecosystem and enterprise scale products.
+ Experience in the deployment of multi-factor authentication, role and attribute-based access control, and other strong authentication methods and solutions.
+ Hands-on experience with IAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts.
+ Strong technical knowledge of authentication and authorization protocols: OIDC, SAML, XACML, LDAP, OAuth, OpenID.
+ 3-5 years' experience withcloud platforms (AWS, Azure, GCP etc.)
**Shift:**
1st shift (United States of America)
**Hours Per Week:**
40
Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity and affirmative action, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.
To view the "Know your Rights" poster, CLICK HERE (******************** .
View the LA County Fair Chance Ordinance (************************************************************************************************** .
Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.
To view Bank of America's Drug-free Workplace and Alcohol Policy, CLICK HERE .
This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.