Post job

Information security analyst jobs in Evansville, IN - 497 jobs

All
Information Security Analyst
Cyber Security Analyst
Senior Security Consultant
Network Security Analyst
Network Security Specialist
Senior Security Analyst
Information Technology Analyst
Securities Analyst
Data Security Analyst
Information Assurance Analyst
  • Senior Security Consultant

    Medium 4.0company rating

    Information security analyst job in Chicago, IL

    AHEAD builds platforms for digital business. By weaving together advances in cloud infrastructure, automation and analytics, and software delivery, we help enterprises deliver on the promise of digital transformation. AtAHEAD, we prioritize creating a culture of belonging, where all perspectives and voices are represented, valued, respected, and heard. We create spaces to empower everyone to speak up, make change, and drive the culture at AHEAD. We are an equal opportunity employer, and do not discriminate based on an individual's race, national origin, color, gender, gender identity, gender expression, sexual orientation, religion, age, disability, marital status, or any other protected characteristic under applicable law, whether actual or perceived. We embraceall candidatesthatwillcontribute to the diversification and enrichment of ideas andperspectives at AHEAD. Senior consultants are experienced experts in information security and/or information security governance or compliance. Successful candidates support the Security Practice in delivery, business development, and practice development. This senior consultant will specifically support the cyber advisory program which seeks to advise clients at various points of maturity and help design and improve their cyber security programs. While each client has a different starting point, most start with common infrastructure hardening and hygiene challenges. This senior consultant will be expected to confidently advise on remediation of discovered vulnerabilities. These vulnerabilities may range from common software vulnerabilities to general architecture concerns. The consultant must leverage previous experience to convey potential impacts and criticality of remediation. The senior consultant is not expected to have knowledge or experience with every vulnerability but must be able to use their knowledge and experience to research potential solutions. Communicating the impact and criticality of vulnerabilities and remediation is a critical part of this role. This requires the consultant to understand the client's environment, concerns, business drivers, and potential impact of remediation efforts. Finally, the consultant must be comfortable in acting as authority on recommendations. The senior consultant is often asked to review and sometimes create common security program documentation such as policies, risk registers, and other assessment documents. The ability to manage small teams is a requirement for success in this role. This program requires frequent evolution as the program must keep pace with changes in technology, techniques, and vulnerabilities. Because of this, this senior security consultant must be flexible, self-motivated, and willing to take on dynamic challenges. Responsibilities Client Delivery Facilitate sessions of strategy, roadmap, design, and planning workshops for service engagements Effectively communicate risk to stakeholders and work to drive security program success Ensure that customer expectations are appropriately set and managed Lead project engagement teams through the delivery of consulting service offerings Understand vulnerabilities and create remediation plans Break down risks or issues into manageable segments, identify the factors that contribute to risk and determine how best to approach the risk Creation and finalization of project deliverables, may perform peer review for collateral developed by others on a delivery team Presentation of deliverables to client executive management Act as the Engagement Lead on customer facing projects, when assigned Business Development Support business development pursuits through client discovery meetings Support sales opportunities throughout the sales cycle, including project scoping, proposal development, and presenting proposals to clients. Familiarity with AHEAD's enterprise service portfolio to identify opportunities for cross-practice collaboration Practice Development & Thought Leadership Maintain subject matter expertise in security domains and security solutions Participate in the development, enhancement, and standardization of AHEAD in-practice service offerings Own and/or enable more than one service capability Maintain a broad knowledge and understanding of current and future state IT trends, technologies, and standards Lend support and mentorship to others Requirements Undergraduate degree in Computer Sciences or Business Management is preferred, but not required Minimum of 2 years of information security leadership experience 7+ years technical work experience 2 professional and/or technical certifications, including industry-recognized certifications which align to AHEAD's Security service portfolio, or commensurate work experience (CISSP, CISM, SANS certs, etc.) Cybersecurity background (vulnerability management, various security controls such as EDR, firewalls, content filtering, etc.) Active directory experience (group policy and Intune experience) Securing windows servers and desktops (system hardening such as Microsoft Baseline/STIGS/CIS) Office 365 experience Common written policy understanding Excellent verbal and written communication skills Comfort in addressing groups of people in virtual or in-person settings Ability to solve complex, abstract problems Excellent interpersonal skills, good listener, ability to connect with different personalities Exhibit Executive presence with leadership characteristics Demonstrated experience as a technology change agent $165,000 - $195,000 a year Why AHEAD Through our daily work and internal groups like Moving Women AHEAD and RISE AHEAD, we value and benefit from diversity of people, ideas, experience, and everything in between. We fuel growth by stacking our office with top-notch technologies in a multi-million-dollar lab, by encouraging cross department training and development, sponsoring certifications and credentials for continued learning. USA Employment Benefits include Medical, Dental, and Vision Insurance 401(k) Paid company holidays Paid time off Paid parental and caregiver leave Plus more! See benefits for additional details. The compensation range indicated in this posting reflects the On-Target Earnings (“OTE”) for this role, which includes a base salary and any applicable target bonus amount. This OTE range may vary based on the candidate's relevant experience, qualifications, and geographic location. #J-18808-Ljbffr
    $165k-195k yearly 3d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Senior Physical Security Consultant at WEC Energy Group (WEC) Chicago, IL

    Itlearn360

    Information security analyst job in Chicago, IL

    Senior Physical Security Consultant Chicago, IL. WEC Energy Group is one of the nation's largest electric generation and distribution and natural gas delivery holding companies serving 4.7 million customers across the Midwest. We are committed to providing clean, reliable, and affordable energy in an environmentally sustainable manner. Customers are the heart of our business, and we work every day to help grow and support communities where we provide vital energy services. As a Fortune 500 company, we value and develop our employees who are making a difference in a mission that matters. We don't just offer a job; we provide fulfilling careers where safety and well-being are paramount. Join our team and experience first‑hand our commitment to your success. We offer competitive pay and benefits to recognize your hard work and dedication. If you're talented, energetic and ready for a career with a future, we want you on our team. We are powered by a diverse and inclusive workforce fueled by the pride in what we do. If you're driven by the passion to change lives, this is the place for you. WBS, a subsidiary of WEC Energy Group, is seeking a Senior Physical Security Consultant in our Chicago, Illinois location. Job Summary The Physical Security Consultant (Senior) is responsible for identifying security gaps, concerns, threats, and/or risks and follow internal procedures and protocol to elevate or resolve issues as appropriate, such as conducting investigations or sharing threat intelligence with appropriate members of the organization. Specific functional areas include, but are not limited to, enterprise protection, operational integration, intelligence, investigations, situational awareness and security projection. This position is the primary interface for the business and operations to share information and coordinate security‑related activities and requirements. Physical Security Consultants are expected to develop and maintain relationships with key internal and external stakeholders such as contract security personnel, local law enforcement, and internal business areas who work closely with security. Job Responsibilities Provides security protection services, consulting services and advisory support to the business and operations to reduce risks, maximize workforce safety, and protect property Leads investigations in close support and coordination with cybersecurity, HR, ethics, and/or external law enforcement as appropriate Follows policy and procedures to elevate security matters, file reports, collect evidence, and maintain relevant databases or information in security systems Executes company policies and procedures for the physical security program aligned with the overarching enterprise security model and best practice standards and ensure compliance with applicable industry standards and regulations (e.g. NERC CIP, TSA) Provides work direction, site training, policy and process training, and maintains relationships with contract security personnel Maintains an understanding of the application of security technology to the company's processes to mitigate risk Develops and maintains relationships and represents the company with local law enforcement, other security‑related external agency stakeholders and the broader intelligence community Responds to crises or urgent situations to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property and operational assets Participates in internal and external emergency response and business continuity planning exercises Analyzes intelligence to identify trends and determine risks Foster a culture that promotes security as an integral part of safety. Maintains key performance and process metrics to evaluate the efficiency and effectiveness of processes, procedures, and systems The Senior Physical Security Consultant performs all duties of a Physical Security Consultant, usually in a lead role Minimum Qualifications Physical Security Consultant - Minimum 2- 4 years of physical security work experience in law enforcement, investigations or intelligence in a civilian or military organization required. Senior Physical Security Consultant - Minimum 4 -7 years of physical security work experience in law enforcement, investigations or intelligence in a civilian or military organization required. Preferred experience with or understanding of nation state threats to critical infrastructure. It requires some out-of-state travel and is subject to 24 hour call out. Preferred Qualifications A Bachelor's degree in Criminal Justice, Police Science, Security Management or Business Administration is preferred. A combination of associate degree, military, law enforcement or professional physical security experience and physical security certification (CPP, PSP) or certificates (enterprise security risk management, security risk assessment, workplace violence prevention, executive protection, etc) will be considered Preferred experience with or understanding of nation state threats to critical infrastructure Project and Contract Management experience (Threat Assessments, CCTV System Installation, etc.) Familiarity with the City of Chicago Neighborhoods and Streets, in addition to the Urban areas #J-18808-Ljbffr
    $91k-124k yearly est. 2d ago
  • Prin Security Analyst

    Compeer Financial 4.1company rating

    Information security analyst job in Bloomington, IL

    Empowered to live. Inspired to work. Compeer Financial is a member-owned cooperative located in Illinois, Minnesota and Wisconsin. We bring together team members with a variety of backgrounds and experiences to help provide financial services to support agriculture and rural communities. Join us in a culture that not only promotes meaningful work and professional development, but provides a flexible, hybrid work environment and excellent benefits, which empower you to thrive both personally and professionally. How we support you: Hybrid model - up to 50% work from home Flexible schedules including ample flexibility in the summer months Up to 9% towards 401k (3% fixed Compeer contribution plus up to 6% match) Benefits: medical, dental, vision, HSA/FSA, life & AD&D insurance, short-term and long-term disability, wellness program & EAP Vacation, sick leave, holidays/floating holidays, parental leave, and volunteer paid time off Learning and development programs Mentorship programs Cross-functional committee opportunities (i.e. Inclusion Council, emerging professional groups, etc.) Professional membership/certification reimbursement and more! Casual/seasonal & intern team members are not eligible for benefits except for state-mandated programs. To learn more about Compeer Financial visit************************ Where you will work: This position offers a hybrid work option up to 50% remote and is based out of any of Compeer's office locations. The contributions you will make: This position creates, implements and maintains corporate-wide security programs that assist in improving overall security posture of the organization. Provides guidance, assurance and information protection to maintain the confidentiality, integrity, and availability of Compeer critical resources. Contributes knowledge and expertise to ensure that information assets are protected and secure. In this position, you will guide solutions to promote secure business-to-business initiatives, third-part relationships, outsourced solutions and vendors. Provides mentorship and guidance to less experienced team members. A typical day: Remains current with new security threats and assess systems and solutions to ensure they can defend the business. Researches capabilities of current and new disruptive solutions on the market and makes recommendations to security group on a consistent basis. Develops security team standards, policies, procedures and processes. Support and provide direction for use of technical systems, monitors for unusual and suspicious activity across a wide range of products, data centers, and cloud systems. Partners with Business Technology on security configuration standards for systems and business applications. Participates in technical and non-technical projects requiring information security oversight and to ensure policies and procedures are met. Provides cybersecurity guidance to leadership. Ensures that cybersecurity-enabled products or other compensating security control technologies or processes reduce identified risk to an acceptable level. Performs security reviews, identifies gaps in security architecture, and develops a security risk management plan. Implements security measures to resolve vulnerabilities, mitigate risks, and recommend security changes to system or system components as needed. Analyzes and reports system security posture trends. Analyzes cyber defense policies and configurations and evaluates compliance with regulations and organizational directives. Prepares audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions. Leads the Incident Response Team during activations for security or operational events. Coordinates, leads and conducts adversary simulation, hunt teaming, assumed breaches and whitebox penetration tests. Develops and executes attack plans, scripts, tools and methodologies to strengthen the offensive operations. Plans and coordinates the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, and multimedia presentations) for the most effective learning environment. The skills and experience we prefer you have: Bachelor's degree in security management, cybersecurity, computer science, management information systems, or business with technical training in networking, technical support or security or an equivalent combination of education and experience sufficient to perform the essential functions of the job. Expert-level experience in physical asset security, information technology, risk management, security services, or infrastructure technology. CISSP certification preferred. Ability to adapt and stay a step ahead of cyber attackers and stay up to date on the latest attack methods. Expert experience driving measurable improvement in monitoring and response capabilities at scale. Expert ability to identify and resolve problems, utilizing strong analytical skills. Advanced experience in cloud computing technologies, including software, infrastructure and platform-as-a-service, as well as public, private and hybrid environments. Expert knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to endpoint detection and response (EDR), threat intelligence platforms, data loss prevention (DLP), security automation and orchestration, deception technologies, application controls, and other network and system monitoring tools. Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively. Advanced experience with Amazon Web Services (AWS) or Microsoft Azure. Expert experience conducting risk analysis to protect the business and adhere with compliance requirements and privacy laws. Expert experience with vulnerability and penetration testing engagements. Advanced knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). Expert knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain. Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media. Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects. How we will take care of you: Our job titles may span more than one career level (associate, senior, principal, etc.). The actual title and base pay offered is dependent upon many factors, such as: training, transferable skills, work experience, business needs and market demands. The base pay range is subject to change and may be modified in the future. This role is eligible for variable compensation and other benefits. Base Pay$103,100-$156,400 USD Compeer Financial is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law. Must be authorized to work for any employer in the United States. Compeer is unable to sponsor or take over sponsorship of an employment visa at this time. Click here to view federal employment laws applicable for applicants.
    $103.1k-156.4k yearly 5d ago
  • Network Security Specialist

    Teksystems 4.4company rating

    Information security analyst job in Evansville, IN

    Seeking a Network Engineer with strong background with Zscaler Internet Access and Private Access. *Prefers candidates within 50 miles of Evansville, IN but would be open to candidates that sit within 50 miles of Baltimore MD, Charlotte NC, Wilmington DE, or Irving TX. * *Top Skills:* Network Access Control specialization ZIA - Zscaler Internet Access ZPA - Zscaler Private Access Schedule: Hybrid (Tuesday -Thursday onsite) Duration: Likely 6 month C2H with potential to convert or extension *Skills* access control, Network security, Network engineering, Security, Firewall, Paloalto *Job Type & Location*This is a Contract to Hire position based out of Evansville, IN. *Pay and Benefits*The pay range for this position is $60.71 - $78.57/hr. Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to specific elections, plan, or program terms. If eligible, the benefits available for this temporary role may include the following: * Medical, dental & vision * Critical Illness, Accident, and Hospital * 401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available * Life Insurance (Voluntary Life & AD&D for the employee and dependents) * Short and long-term disability * Health Spending Account (HSA) * Transportation benefits * Employee Assistance Program * Time Off/Leave (PTO, Vacation or Sick Leave) *Workplace Type*This is a hybrid position in Evansville,IN. *Application Deadline*This position is anticipated to close on Jan 24, 2026. h4>About TEKsystems: We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company. The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law. About TEKsystems and TEKsystems Global Services We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com. The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
    $60.7-78.6 hourly 2d ago
  • Business Analyst/ Information Security Governance Analyst

    Govserviceshub

    Information security analyst job in Chicago, IL

    Role -Business Analyst/ Information Security Governance Analyst Project Overview: We are seeking an analyst with experience in governance of security products, authentication, authorization, and access management with business analysis background. These resources will support the SaaS initiatives Contractor's Role: As a member of Governance team you will play a vital role in ensuring the secure implementation of various solutions (Hybrid and Cloud) developed in technologies like Java, .Net etc. Experience level: Level 3 Qualifications - Bachelor's degree in computer science, audit or a related discipline and experience in information security, or an equivalent combination of education and work experience. - Excellent consultative and communication skills, and the ability to work effectively with client, partner, and IT management and staff. - 5 -6 years of experience in the Information Security or Audit role. - Strong collaboration skills and a analytical ability - Knowledge of SOX methodology implementation for applications & Internal & External Audit executions Requirements Nice to Haves: - Knowledge on Obsidian Remediation Tasks & Responsibilities - Drive governance and risk framework around applications using authentication and authorization - Define and respond to risks surrounding the business functions and the security capabilities - Define and respond to audits from internal and external parties - Knowledge of control execution and design - Collect and maintain evidence of control testing - Collect and maintain evidence of application attestation to standards
    $76k-107k yearly est. 9d ago
  • Information Security Analyst

    Vedder Price Careers 4.4company rating

    Information security analyst job in Chicago, IL

    Vedder Price's Chicago office is seeking an Information Security Analyst. The Information Security Analyst is primarily responsible for maintaining technologies to ensure the security of the firm's systems. Thorough understanding on both product based solutions and fundamental security best practices are vital to this role. The Information Security Analyst will collaborate with other Engineers and SMEs, to apply and support best practices for information and cyber security, system building, change management, account management, documentation, and user experience management. As the Information Security Analyst, your job duties will include but not be limited to: Serve as a technical resource at the firm for information security issues. Collaborate with other staff in the Technology Department to ensure that security standards are developed and enforced in the course of implementing or upgrading firm technology, educating others on security best practices. Administration, troubleshooting and resolving issues with security infrastructure on Vedder Price's network, including the following: SASE (Secure Access Service Edge) firewalls Intrusion detection and prevention Vulnerability management Identity Management Microsoft Windows systems, Including Defender, Azure and M365 Review of business processes, recommendation and implementation of supportable security changes including any relevant tools to better secure those processes Evaluation of security practices around identity management, remote solutions, including AVD and privileged remote access Participation in incident response plan for vulnerabilities or other security events Investigation of actual and suspected security breaches Ensure consistent security policies are being applied to any hosted or cloud-based services being utilized by the firm Log review and reporting on security devices and identified Windows systems Generating evidence for compliance/audit Working with vendors as necessary to supplement our security capabilities, and recommend their use when appropriate Backup assistance for other Network Operations team members as necessary Assistance with all projects and tasks related to the firm as directed by the Senior Manager Infrastructure & Security and the Information Security Architect Assists the Information System Architect in developing and documenting security standards as needed Skills & Competencies: Expert-level proficiency with key technologies to be supported, including demonstrated willingness and ability to develop expertise in new technologies as needed Demonstrated competence in detecting and eliminating technical issues in complex systems, utilizing monitoring and other analysis tools to ensure optimal system performance Investment in understanding technologies outside of those directly supported by the Analyst, including demonstrated basic awareness of key functionality of systems that interact with or depend upon the systems directly managed by the Analyst Ability to participate in assessing business purpose of managed systems and to recommend operational or efficiency-related improvements Ability to act independently to meet goals and objectives identified by senior management, including the ability to assist in the creation of project plans and manage time effectively High-level involvement in providing optimal performance and responsive support. Works to ensure optimal performance and reliability of systems while also providing mentoring and knowledge transfer to other Engineers and Technical Support Specialists. Acknowledges key role in responding to alerts and assisting Technical Support in analysis and resolution of issues Accepts responsibility for understanding firm Information Security Standards and applying those standards to ensure security of managed systems Effective communication skills, both written and oral. Strong interpersonal skills required to communicate with all other technology team members, members of the firm (users of systems), and clients. Must have customer service attitude and ability to work well with other groups. Superior understanding of the firm's goals and objectives, with demonstrated ability to apply technology in solving business problems Strong organizational skills, capability to schedule and coordinate multiple activities in results-oriented environment. Initiative and ability to enforce policies and procedures through influence Qualifications & Required Experience: Bachelor's Degree in computer related field or equivalent work experience Minimum five (5) years' experience in Information Technology required Experience in the legal industry a plus Must subscribe to being highly available and responsive to occasional after-hours issues, as the firm operates on a 24x7 basis Position also requires the ability to work under pressure to meet strict deadlines Computer Skills: To perform this job successfully, an individual must be proficient in the following software and/or their equivalent: Experience with Microsoft and Azure security tools, Cato Networks, BeyondTrust, Tenable Nessus and Sumo Logic preferred Compensation Range: $95,000/yr. to $110,000/yr At Vedder Price, we believe in recognizing and rewarding our employees' contributions. Our comprehensive Total Rewards Package includes: Competitive Salary: We offer a competitive base salary commensurate with skills and experience. Bonus Program: Discretionary annual bonus program. Retirement Planning: Discretionary profit sharing and 401(k) matching to help you plan for your future. Health and Wellness: Comprehensive health, dental, and vision plans, along with optional health savings and flexible spending accounts, firm-paid Life and Disability benefits, and wellness programs to support your overall well-being. Paid Time Off: Competitive time off package including vacation days, paid holidays, sick time and personal days. Professional Development: Opportunities for continuous learning and career growth through firm provided training programs. Employee Recognition: Anniversary and Vedder Praise Programs to celebrate your achievements and milestones. Work-Life Balance: Hybrid work model and family-friendly policies. Additional Perks: Employee discount program, pre-tax commuter benefits, back up child & elder care, Employee Assistance Program (EAP), fitness center discounts and more. Join Vedder Price and be part of a team that values hard work and dedication! Equal Employment Opportunity Vedder Price P.C. is an equal opportunity employer. We value and encourage diversity and solicit applications from all qualified applicants without regard to race, color, gender, sex, age, religion, creed, national origin, ancestry, citizenship, marital status, sexual orientation, physical or mental disability (where applicant is qualified to perform the essential functions of the job with or without reasonable accommodations), medical condition, protected veteran status, gender identity, genetic information, or any other characteristic protected by federal, state, or local law. We participate in E-verify. Applicants who are interested in applying for a position and require special assistance or an accommodation during the process due to a disability should contact the Vedder Price Recruiting Team at vprecruiting@vedderprice.com.
    $95k-110k yearly 4d ago
  • Global Cyber Wordings Analyst

    Liberty Mutual 4.5company rating

    Information security analyst job in Chicago, IL

    Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience. Key responsibilities: Wording library and drafting support Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes. Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards. Track version control, change logs, approvals, and archiving; Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance. Commercial enablement Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently. Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives. Triage wording queries from regions; track SLAs and referral approvals per the global governance framework. Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards. Regulatory and legal stewardship Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions. Maintain audit-ready documentation; assist with regulatory filings or attestations where required. Claims partnership and feedback loop Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty. Support coverage position letters and documentation packs with research, citations, and clause histories. Innovation and product development support Help draft prototype wordings for new propositions Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses. Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics. Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders. Qualifications Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience. 2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred. Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail. Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous. Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates. Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools. Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs. Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting. About Us Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role. At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve. We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: *********************** Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law. Fair Chance Notices California Los Angeles Incorporated Los Angeles Unincorporated Philadelphia San Francisco We can recommend jobs specifically for you! Click here to get started.
    $77k-98k yearly est. Auto-Apply 13d ago
  • Analyst, IT Security Compliance

    3M Companies 4.6company rating

    Information security analyst job in Indiana

    3M has a long-standing reputation as a company committed to innovation. We provide the freedom to explore and encourage curiosity and creativity. We gain new insight from diverse thinking, and take risks on new ideas. Here, you can apply your talent in bold ways that matter. : JOB DESCRIPTION: What You'll Do As a key member of the IT Security Compliance team, reporting to the Team Lead - Security Compliance, you will: * Execute day-to-day cybersecurity risk, compliance, and assurance activities. * Support global cybersecurity certifications including ISO 27001 and ISO 27017, evaluating control effectiveness and reviewing evidence of controls. * Assist in achieving ISO 27001 certification by identifying risks and implementing controls. * Maintain and continuously improve 3M's Information Security Management System (ISMS). * Create, update, and manage ISMS documentation, reports, and audit records. * Act as Subject Matter Expert (SME) for PCI DSS, advising stakeholders, conducting internal assessments, and driving PCI DSS v4.0.1 reviews, gap assessments, and control evaluations. * Provide high-level knowledge support on other frameworks and standards including NIST, SOX, SWIFT, and TISAX. * Deliver timely written reports, metrics, and updates to cybersecurity management. * Collaborate and communicate effectively across teams and with stakeholders. What We're Looking For * Education: Bachelor's degree with a minimum of 4 years of experience in Information Security, GRC, or related roles. * Certifications (preferred): ISO 27001 Lead Auditor/Implementer, PCI ISA, CISA, CISM, CRISC, or equivalent. * Skills & Knowledge: * Strong knowledge of information security risk standards, frameworks, and methodologies. * Experience working with GRC tools such as OneTrust, Archer (or similar). * Excellent written and verbal communication skills. * Ability to manage multiple priorities and adapt to evolving business needs. Learn more about 3M's creative solutions to the world's problems at ********** or on Instagram, Facebook, and LinkedIn @3M. Safety is a core value at 3M. All employees are expected to contribute to a strong Environmental Health and Safety (EHS) culture by following safety policies, identifying hazards, and engaging in continuous improvement. Please note: your application may not be considered if you do not provide your education and work history, either by: 1) uploading a resume, or 2) entering the information into the application fields directly. 3M Global Terms of Use and Privacy Statement Carefully read these Terms of Use before using this website. Your access to and use of this website and application for a job at 3M are conditioned on your acceptance and compliance with these terms. Please access the linked document by clicking here, select the country where you are applying for employment, and review. Before submitting your application, you will be asked to confirm your agreement with the terms.
    $70k-99k yearly est. Auto-Apply 60d+ ago
  • Information Assurance Principal Analyst (Program Lead) - JOEPS

    Technology, Automation, and Management 3.6company rating

    Information security analyst job in Scott Air Force Base, IL

    The Information Assurance Principal Analyst/Program Lead will provide leadership, oversight, and operational management for the Joint Operation Planning and Execution System (JOPES) and the Transportation Visualizer (TransViz) Functional Management Support contract. This individual will act as the primary liaison between TeAM, government officials, and all contract stakeholders, ensuring the coordination, integration, and execution of all program activities in accordance with DoD and USTRANSCOM expectations. The Information Assurance Principal Analyst/Program Lead will be responsible for meeting all performance, schedule, and quality objectives as outlined in the contract's scope. Mission Objectives - The primary objective of this project is to support the operational effectiveness and mission readiness of the JOPES and TransViz platforms at Scott Air Force Base. As a critical contract team member, the Information Assurance Principal Analyst/Program Lead ensures seamless functional management, stakeholder coordination, and compliance with all contractual and security requirements while facilitating process improvements and the timely delivery of program services. This position supports USTRANSCOM and associated DoD agencies by optimizing system capabilities and user experience in support of national defense objectives. Position Responsibility Summary Serve as the principal point of contact (POC) for all programmatic, technical, and contractual matters, representing TeAM in communications with government officials and stakeholders. Serve as a Liaison for all meetings & events, coordinating & scheduling all course training for teams, and attending reviews of the program. Lead, supervise, and coordinate activities of the project team-overseeing System Administrators and the Database Administrator-to fulfill contract objectives. Ensure timely and accurate reporting of program performance, deliverables, metrics, and compliance with DoD security, safety, and operational requirements. Manage risks, mitigate issues, and implement corrective actions to maintain project schedule and instill quality control. Oversee and ensure workforce compliance with all mandatory security, safety, and DoD-mandated annual training, including but not limited to OPSEC, Antiterrorism Level I, CUI, and Emergency Operations. Develop and implement process improvements, leveraging industry best practices (e.g., ITIL) to enhance JOPES/TransViz functionality and user satisfaction. Foster a culture of open communication and collaboration across stakeholders, promoting continuous improvement in program delivery. Ensure all support activities are conducted on-site in compliance with established guidelines and within the designated geographic radius.
    $63k-92k yearly est. 60d+ ago
  • Information Security Analyst

    Vergence 3.3company rating

    Information security analyst job in Indianapolis, IN

    Job Description . Must live in the Indianapolis area. Pay: $42.70/hour In this role you will: • Monitor and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement • Interface with user customers to understand their security needs and implement procedures to accommodate them including training and assessment • Assist with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assist with creating and submitting reports relevant to security audits • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800-53) • Develop Standard Operating Procedures (SOP) for implementing security polices • Recommend appropriate security safeguards to be included during development of new information technology systems and legacy systems • Ensure maximum utilization of computer hardware and software features to secure automated systems and associated data • Develop and implement procedures for use of information security management software • Propose information security software enhancements • Perform periodic audits to assure security policies and standards are being followed and are effective • Develop recommendations for enhancements and generates reports where necessary • Keep abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security
    $42.7 hourly 19d ago
  • Information Security Analyst

    Novalink Solutions 3.1company rating

    Information security analyst job in Indianapolis, IN

    Resource will work as an Information Security Analyst responsible for auditing and monitoring systems containing confidential information. This position is also responsible for helping the organization manage its risks by monitoring the organization's IT systems for inefficiencies, inaccuracies, mismanagement, etc. Tasks will include assisting with the configuration of data, application, network, and IAAM logs; assisting with log reporting tools; and monitoring systems for security problems. The position participates in all aspects of the technology audit and monitoring including the planning, control analysis, testing, issue development, and reporting phases. This position will also participate in all federal and state audits against DCS technology systems. Employee works in an Information Technology Division of a State Agency, the Department of Child Services (DCS -IT) under the guidance of the Security Manager. The essential functions of this role are as follows: • Monitors and keep supervisor informed of status of information security and confidentiality conditions, including problem areas and recommended enhancement; • Interfaces with user customers to understand their security needs and implement procedures to accommodate them including training and assessment. • Assists with preparing for security audits (e.g. IRS, SSA, OCSE, FBI, SBOA) and remediating any findings; assists with creating and submitting reports relevant to security audits. • Develop information security policies and standards for protection of information systems in compliance with state and federal requirements (e.g. IRS, SSA, OCSE, FBI, IOT) and guidelines (e.g. NIST SP 800 -53). • Develops Standard Operating Procedures (SOP) for implementing security polices; • Recommends appropriate security safeguards to be included during development of new information technology systems and legacy systems; • Ensures maximum utilization of computer hardware and software features to secure automated systems and associated data; • Develops and implements procedures for use of information security management software; • Proposes information security software enhancements; • Performs periodic audits to assure security policies and standards are being followed and are effective. • Develops recommendations for enhancements and generates reports where necessary; • Keeps abreast of new laws and changes affecting privacy standards, network security, cloud security, remote access, and physical security; • Mentors and provides guidance to new or other staff as needed; • Performs related duties as assigned. • Assist on other task as assigned. Thorough knowledge of information security management tools, policies, and standards of information security procedures; • Thorough knowledge of state and federal legislation and regulatory laws pertaining to information system security and privacy; • Thorough knowledge of software vulnerabilities, vulnerabilities scanning tools, and vulnerabilities remediation; • Familiarity with domain structures, user authentication, and digital signatures; • Ability to develop and maintain information security standards; • Ability to understand and apply complex computer logic to work; • Ability to work effectively with a wide range of information technologists, including systems administrators, technical support, application development, end users and management; • Experience in assessing security needs of teams and assist in their security training. • Ability to communicate effectively both orally and in writing; • Ability to be a team member as well as a team leader depending on the situation; • Degree in information security or technology preferred; • Security certification preferred (e.g. CISSP). • Network Admin experience preferred. Supervisory Responsibilities/Direct Reports: This role does not provide direct supervision to direct reports. Required / Desired Skills Skill Required / Desired Amount of Experience To be effectively with wide range of information technologists, including systems administrators, technical support, application development, end users Required 3 Years Network Admin experience Required 3 Years Security certification (e.g. CISSP, CRISC) Required 3 Years Ability to develop and maintain information security standards; Required 1 Years Ability to understand and apply complex computer logic to work Required 1 Years Degree in information security or technology Required 1 Years Familiar with cybersecurity security framework (e.g. NIST, ISO, SOC 2, CIS, Cobit, etc.) Required Computer security compliance and auditing experience Required IRS, SSA computer security compliance and audit experience Required HIPAA experience Required
    $68k-98k yearly est. 46d ago
  • Information Security Specialist

    Starplus Energy

    Information security analyst job in Kokomo, IN

    The Information Security Specialist supports the planning, implementation, and operation of StarPlus Energy's global and local security management systems. This position ensures compliance with international and Korean security regulations, establishes physical and IT infrastructure security systems, and coordinates with both corporate headquarters and Korean government authorities to prevent information leaks and respond to potential security threats. This position reports to the Information Security Manager. Roles & Responsibilities: Plan, develop, and operate corporate information security systems for facility and IT infrastructure protection Establish incident response procedures and maintain readiness against internal and external security threats Develop and operate the site's physical security management system, including access control, CCTV, and intrusion detection system Manage and oversee external security service providers (e.g., physical security guards, monitoring services, and system maintenance vendors) to sure proper performance and contract compliance Support vendor performance evaluations, documentation, and corrective actions when service issues arise Define and enforce information protection policies and procedures to ensure consistent implementation across the organization Establish and operate a security management framework for Korean National Core Technology (KNCT) compliance Assign protection grades, define and manage secure communication systems, and safeguard all data and documentation related to KNCT Coordinate and conduct security education and training for employees Develop and maintain incident response systems to address potential data or technology leakage Support internal and external security audits and inspections from Korean government and SDI Headquarters Perform security infrastructure vulnerability assessments and implement corrective actions as needed Prepare technical report, standard operating procedures (SOPs), and other documentation required for compliance and audit response Perform other position related duties as assigned
    $65k-92k yearly est. 2d ago
  • Sr. Security Analyst

    Maximus 4.3company rating

    Information security analyst job in Evansville, IN

    Description & Requirements Maximus is seeking a qualified Sr. Technical/Security Analyst for multiple projects, current and upcoming. The qualified candidate will be involved in technical/security planning and assessment projects with potentially multiple state agencies. The position requires the candidate to produce/review security relevant documentation, such as system security plans, POA&Ms, assessment plans, etc., produce technical/security analyses, develop estimates, review and contribute to requirements for large systems-planning efforts in the Child Support, Child Welfare and/or Integrated Eligibility public-sector domains. The individual will report directly to a Senior Manager. Maximus is a matrix-managed organization, which means the individual will have secondary reporting relationships to one or more Project Managers, depending on which projects they are assigned. *This role is remote but requires working standard business hours in the US time zone of the client. This position is contingent upon award. * Essential Duties and Responsibilities: - Collaborate with project managers on various initiatives and projects to track progress and provide support as necessary. - Support leadership in ensuring that the project is delivered to specifications, is on time, and within budget. - Work closely with management and work groups to create and maintain work plan documents. - Track the status and due dates of projects. - Manage relationships with project staff responsible for projects. - Produce regular weekly and monthly status reports that could include; work plan status, target dates, budget, resource capacity, and other reports as needed. - Facilitate regular meetings and reviews. - Adhere to contract requirements and comply with all corporate policies and procedures. Job Specific Duties and Responsibilities: -Perform duties independently under the direction of their direct manager and/or Project Managers on specific projects. -Review project documentation and client materials and provide analysis of technical and security related topics. -Participate in client meetings and offer observations and insight on technical and security related topics. -Identify risk areas and potential problems that require proactive attention. -Review and author artifacts and other project documents and identify potential gaps, inconsistencies, or other issues that may put the project at risk. Such artifacts and documents may include but are not limited to: *System Security Plan *Plan of Action and Milestones (POA&M) *Security Assessment Plan *Risk Assessment reports *CMS ARC-AMPE forms and documentation *Data Conversion and Migration Management Plan *Deployment and/or roll-out plans -Perform security assessments, lead security audit and assessment activities, and provide direct security oversight support to assigned clients and projects. -Identify and escalate to the Senior Manager / Project Manager risks, alternatives, and potential quality issues. -Attend interviews, focus groups, or other meetings necessary to gather information for project deliverables in accordance with the project scope of work. -Attend project meetings with the client, subcontractors, project stakeholders, or other Maximus Team members, as requested by the Senior Manager / Project Manager. -Complete project work in compliance with Maximus standards and procedures. -Support team to complete assigned responsibilities as outlined in the Project schedule. -Support all other tasks assigned by Senior Manager / Project Manager. Minimum Requirements - Bachelor's degree in related field. - 7-10 years of relevant professional experience required. - Equivalent combination of education and experience considered in lieu of degree. Job Specific Requirements: -Be available to work during standard client business hours. Projects may involve clients from any US time zone, so it is possible that work outside of the individual's local business hours will be required. -Bachelor's degree from an accredited college or university, or equivalent work experience. -7+ years of experience in information security, with at least 3 years of security-compliance work in a regulated industry. -5+ years of experience working with HIPAA, NIST 800-53 and/or CMS MARS-E or ARC-AMPE security frameworks. -Familiar with operating systems: Windows, Linux/UNIX, OS/X. -Familiar with AI tools, capabilities. -Strong command of cloud computing topics. -Strong command of agile software development practices as well as waterfall development practices. -Strong desktop software skills: proficient in MS Office, Excel, Word, Project. -Ability to explain and communicate technical subjects to non-technical audiences. -Ability to develop advanced concepts, techniques, and standards requiring a high level of interpersonal and technical skills. -Ability to work independently. -Good organizational skills and the ability to manage multiple tasks and deadlines simultaneously. -Strong interpersonal and team building skills, as well as an understanding of client relationship building are essential. -Excellent verbal and writing skills and be comfortable working with customers. -Ability to multi-task with supervision. -Self-motivated fast learner. Preferred Skills: -Prefer a candidate with experience in the Health & Human Services industry, which may include working with programs such as Child Support, Child Welfare, or Integrated Eligibility (SNAP, TANF, and Medicaid). -Preference for security related certifications, such as the CISSP (Certified Information Systems Security Professional). EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************. Minimum Salary $ 120,000.00 Maximum Salary $ 140,000.00
    $76k-103k yearly est. Easy Apply 6d ago
  • Information Security Governance, Risk and Compliance Analyst

    Green Thumb Industries 4.4company rating

    Information security analyst job in Chicago, IL

    The Role We're looking for an Information Security Governance, Risk & Compliance Analyst to join our growing Information Security team. This role will be reporting to the Manager of Information Security Governance, Risk & Compliance. Our security team works to create a strong Information Security function within GTI that enables the business to continue its tremendous growth. The Information Security Governance, Risk & Compliance Analyst is responsible for maintaining continuous compliance with security policies, industry laws, and regulations (HIPAA, SOX, NIST, etc.). The candidate must communicate effectively with business partners and team members to help raise the level of security awareness, security compliance, and security risk. The candidate will perform environment-specific risk assessments factoring in both qualitative and quantitative risks and assist with the deployment of various controls based on those assessments. This role will also involve ongoing monitoring and improvement of security governance, ensuring a proactive approach to risk management. The role is based out of our Chicago, office. While the role is primarily remote, you need to live in the Chicagoland area and commute to the office on an as needed basis. Responsibilities Own the relationship working with IT and business stakeholders to perform ongoing internal and vendor risk assessments, providing reporting to stakeholders, and ensuring appropriate action is taken. Update and track KPIs from the Information Security risk register and work with stakeholders on developing Corrective Action Plans to address risks. Provide guidance to newer staff working with internal IT stakeholders for vulnerability management, ensuring vulnerabilities are remediated in accordance with policy and SLAs. Own the process for working with IT and business stakeholders to perform ongoing compliance reviews in line with security policies, information security regulations (HIPAA, SOX/ITGC), and security frameworks (NIST, MITRE, etc.). Assist with ongoing internal operations and tasks, including ITGC security reviews. Spearhead the ongoing internal and external SOX and HIPAA audits and other security audits that are relevant to GTI's business. Provide updates and insight during the development and maintenance of Information Security policies, standards and procedures, aligning with NIST. Lead the identification of security training and awareness initiatives for the organization. Participate in incident response tabletops, business continuity tests, and other compliance activities and exercises. Maintain KPIs and KRIs for Information Security risk & compliance activities. Execute tasks as a member of the Information Security team as assigned by management. Provide mentorship and guidance to Associate Information Security GRC Analysts. Stay up to date on relevant laws and regulations to ensure continuous compliance and audit readiness. Collaborate with the IT and security teams in response to security incidents, ensuring proper documentation and reporting. Qualifications 3+ years of experience with responsibilities relating to security and compliance. Bachelor's degree or higher in Information Security or Information Technology may help you stand out but is not required. Demonstrated work experience can be substituted. Strong written and oral communication skills. Strong conceptual understanding of Information Security theories. Knowledge of network, application, and cloud security controls. Knowledge of regulatory frameworks and compliance standards such as NIST, MITRE, OWASP, HIPAA, PCI-DSS and SOX. Strong analytical and problem-solving skills with well-organized and structured work habits, and the ability to identify and mitigate risks. Security certifications, such as CRISC, CISA are preferred, but not required. We're doing some big things, and we'll find some roadblocks along the way, big and small. A big part of this role is keeping an even keel and finding the route through or around the obstacles. This role requires lots of communication with customers and everyone at GTI. Your colleagues will rely on your ability to translate security requirements into digestible bits of information for them. Customers will expect you to quickly articulate components of the GTI security program to help them assess risk, including as part of the business development process. An insatiable intellectual curiosity and the ability to learn quickly in a complex space. Additional Requirements Must pass any and all required background checks Must be and remain compliant with all legal or company regulations for working in the industry Must be a minimum of 21 years of age #LI-HYBRID The pay range is competitive and based on experience, qualifications, and/or location of the role. Positions may be eligible for a discretionary annual incentive program driven by organization and individual performance. Green Thumb Pay Range$80,000-$100,000 USD
    $80k-100k yearly Auto-Apply 4d ago
  • Data Security Analyst

    Exeter Government Servi 4.1company rating

    Information security analyst job in Fort Knox, KY

    Provide support to the lead security Analyst in the planning and protection of employee computers and data networks. Monitor and track all security training and education. Assist with the scanning for and identification of security configuration management on computers and servers. Assist in the scanning for security breaches and the reporting of anomalies. Required Qualifications: Experience in administrative support & MS Office proficiency Bachelor's degree or 5 years of experience U.S. citizen and MUST possess a current active DoD Secret clearance Possess an understanding of cyber security principles and be able to obtain a security+ certification within 6 months Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability or protected veteran status. #clearancejobs
    $64k-88k yearly est. Auto-Apply 60d+ ago
  • Network Security Analyst / Network Engineer/ System Admin

    Collabera 4.5company rating

    Information security analyst job in Illinois

    Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs. Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence. Job Description Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064 Duration: 6+ months (could go beyond) Roles: • Network Directory and Infrastructure Services Administration. • Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required. Responsibilities: • Provide technical Level III problem isolation and resolution for a Global Active Directory Network. • Configures and performs advanced diagnostics on infrastructure components and cloud based applications. • Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync. • Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers. • Repair and recover from hardware or software failures. • Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment. • Initiate major outage communication technical bridges as requested. • Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies. Competencies: • Superior knowledge of Active Directory overall and its administrative components. • Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support. • Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions. • Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments. • Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services. • Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync. • Candidate must be able to correctly configure servers and clients for all services. • Can isolate and repair most DNS and IP service problems. • Understands and uses the appropriate tools in all instances during problem isolation and repair. • Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues. Qualifications • Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor • Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience. Additional Information To know more about this position, please contact: Himanshu Prajapat ************ **********************************
    $83k-112k yearly est. Easy Apply 60d+ ago
  • Cyber Security Analyst

    Eli Lilly and Company 4.6company rating

    Information security analyst job in Gas City, IN

    At Lilly, we unite caring with discovery to make life better for people around the world. We are a global healthcare leader headquartered in Indianapolis, Indiana. Our employees around the world work to discover and bring life-changing medicines to those who need them, improve the understanding and management of disease, and give back to our communities through philanthropy and volunteerism. We give our best effort to our work, and we put people first. We're looking for people who are determined to make life better for people around the world. Join our Security Operations team in Indianapolis, IN where you will get to work on cutting edge cybersecurity technologies while driving exceptional customer experience and improving our enterprise security platform services. What You'll Be Doing Respond to support cases from customers experiencing issues with security tools Provide timely and effective technical troubleshooting and resolution Document case studies, playbooks, and solutions for future reference by team Develop and maintain knowledge base articles and operational procedures Communicate updates and status clearly and professionally to customers Collaborate with cross-functional teams (engineering, product, IT architects) to escalate and resolve complex issues Identify trends in customer issues and recommend product or process improvements Participate in training sessions, conferences, and workshops to expand skills and share learnings with the team Support & Troubleshooting Manage inbound security tool incidents across SIEM, IDS/IPS, EDR, Zscaler (ZIA/ZPA), Cloudflare WAF, Identity & Access Management, and/or other cloud security platforms Adaptability and willingness to learn new technologies and processes Develop proactive means of identifying security platform issues before business impact is realized Assist with developing automation scripts and workflows to increase operational efficiency Identify opportunities and drive initiatives to automate routine tasks and processes Documentation & Knowledge Sharing Create and update detailed playbooks, runbooks, and troubleshooting guides Contribute to an evolving knowledge base to empower peers and customers Document health metrics to measure security tool effectiveness and coverage Collaboration & Communication Foster strong teamwork by mentoring and coaching junior engineers Work closely with product managers and senior engineers to translate feedback into platform enhancements Liaise with enterprise IT, architects, Technical leads and stakeholders to align solutions with business needs Advocate innovative security solutions that balance user experience and protection Continuous Improvement Stay current on security threats, regulatory changes, and emerging technologies Drive adoption of creative, scalable solutions for complex global security platform challenges Analyze recurring issues, support tickets and operational data to identify improvement areas Propose and implement process optimizations and preventive measures Assist with testing and enablement of new tools, technologies and operational capabilities Evaluate new tools and/or feature sets for existing tools (e.g., Splunk, CrowdStrike, Zscaler (ZIA/ZPA), Cloudflare WAF) and recommend integrations Your Minimum Requirements: Bachelor's degree in Cybersecurity, Computer Science, IT, or similar degree and at least 1 year experience in technical support, security operations, or platform engineering OR Associate degree in Cybersecurity, Computer Science, IT or similar degree and at least 5 years experience in technical support, security operations, or platform engineering Hands-on with SIEM, IDS/IPS, EDR, web application firewalls, identity/access management, and cloud security Basic networking knowledge (TCP/IP, DNS, DHCP) Qualified candidates must be legally authorized to be employed in the United States. Lilly does not anticipate providing sponsorship for employment visa status (e.g., H-1B or TN status) What You Should Bring: Strong problem-solving skills and a methodical troubleshooting approach Excellent written and verbal communication; customer-focused mindset Scripting proficiency (Python, PowerShell) for automation and data processing Basic coding abilities for scripts, automation, and custom integration Experience with cloud platforms (AWS, Azure, GCP) and containerized environments Familiarity with IT Service Management (ITIL) practices Certifications such as CompTIA Security+, CISSP, CCSP, or GIAC Lilly is dedicated to helping individuals with disabilities to actively engage in the workforce, ensuring equal opportunities when vying for positions. If you require accommodation to submit a resume for a position at Lilly, please complete the accommodation request form (******************************************************** for further assistance. Please note this is for individuals to request an accommodation as part of the application process and any other correspondence will not receive a response. Lilly is proud to be an EEO Employer and does not discriminate on the basis of age, race, color, religion, gender identity, sex, gender expression, sexual orientation, genetic information, ancestry, national origin, protected veteran status, disability, or any other legally protected status. Our employee resource groups (ERGs) offer strong support networks for their members and are open to all employees. Our current groups include: Africa, Middle East, Central Asia Network, Black Employees at Lilly, Chinese Culture Network, Japanese International Leadership Network (JILN), Lilly India Network, Organization of Latinx at Lilly (OLA), PRIDE (LGBTQ+ Allies), Veterans Leadership Network (VLN), Women's Initiative for Leading at Lilly (WILL), en Able (for people with disabilities). Learn more about all of our groups. Actual compensation will depend on a candidate's education, experience, skills, and geographic location. The anticipated wage for this position is $64,500 - $158,400 Full-time equivalent employees also will be eligible for a company bonus (depending, in part, on company and individual performance). In addition, Lilly offers a comprehensive benefit program to eligible employees, including eligibility to participate in a company-sponsored 401(k); pension; vacation benefits; eligibility for medical, dental, vision and prescription drug benefits; flexible benefits (e.g., healthcare and/or dependent day care flexible spending accounts); life insurance and death benefits; certain time off and leave of absence benefits; and well-being benefits (e.g., employee assistance program, fitness benefits, and employee clubs and activities).Lilly reserves the right to amend, modify, or terminate its compensation and benefit programs in its sole discretion and Lilly's compensation practices and guidelines will apply regarding the details of any promotion or transfer of Lilly employees. #WeAreLilly
    $64.5k-158.4k yearly Auto-Apply 10d ago
  • Cyber Security Analyst

    OSC Global

    Information security analyst job in Radcliff, KY

    OSC EdgeTech, LLC is seeking a talented Cyber Security Analyst to join the team. OSC EdgeTech is a wholly owned subsidiary of Cook Inlet Region, Inc. (CIRI), an Alaska Native Corporation proudly owned by over 9,400 Shareholders. OSC EdgeTech was created to deliver agile, responsive IT solutions to meet the evolving needs of federal and defense customers. As an SBA-certified 8(a) entity with a Facility Clearance (FCL), OSC EdgeTech streamlines the acquisition process while maintaining the trusted quality, security, and innovation that define OSC Edge. Cook Inlet Region, Inc., also known as CIRI, is one of 12 land-based Alaska Native regional corporations created pursuant to the Alaska Native Claims Settlement Act (ANCSA). CIRI's regional boundaries roughly follow the traditional Dena'ina territory of Southcentral Alaska. CIRI was incorporated on June 8, 1972, and is owned today by a diverse group of more than 9,500 Shareholders who live in Alaska and throughout the world. OSC EdgeTech offers excellent benefits for eligible employees. Benefits include paid holidays, paid time off, 401K with employer match, dental, vision, health insurance plans, as well as life and disability benefits. Position Overview The Cyber Security Analyst will contribute to the Cyber mission by conducting vulnerability scans, reviewing security alerts and incidents, and assessing technical compliance in accordance with DoD and Federal requirements. This position will utilize Cyber security tools, including ACAS, eMASS, HBSS, and Microsoft 365 Defender, to support vulnerability management, POA&M management, threat detection, and other Cyber tasks as required. Additionally, this position will collaborate with other Cyber analysts to develop programmatic actions and minimize security risks. Major Activities Conduct vulnerability scans of IT assets as requested from tickets or as directed by Cybersecurity Manager. Apply knowledge of monitoring, analyzing, detecting, and responding to Cyber events and incidents within information systems and networks. Advise on an integrated, dynamic Cyber defense and leverage Cybersecurity solutions to deliver Cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, and data spillage, and incident response actions. Assess IT assets for cybersecurity compliance in accordance with DISA STIGs requirements. Develop POA&Ms to track any Overdue vulnerabilities or STIG deviations Review and investigate security alerts and incidents from Microsoft 365 Defender Utilize eMASS to maintain and update POA&M status Review device compliance status from HBSS Work with other NEC Operations team members to remediate and mitigate security vulnerabilities. Review the latest Cybersecurity intelligence information and provide recommendations to improve the Cybersecurity posture. Perform other duties as appropriate and as assigned. Knowledge/Skills/Abilities Experience analyzing log files, firewall logs, and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents. If not 8570 certified at contract start must be within six months. Experience in Host Based Security Systems (HBSS), ACAS vulnerability scanning software, knowledge of and experience with Security Information and Events Manager (SIEM) analysis and administration, as well as Information Assurance Vulnerability Alert (IAVA) management. Excellent verbal, written and interpersonal communication skills, excellent organizational and multi-tasking skills. Great analytical, critical thinking and problem-solving abilities. Superior presentation and negotiation skills. Strong management and organizational skills. Adaptable and capable of working in fast-paced environments. Proficient in Microsoft Word, Excel, PowerPoint, and SharePoint Required Qualifications Bachelor's degree in IT, Cyber Security or related field or seven years of IT work experience Demonstrated work experience as Cyber Security Analyst in DoD or Federal government environments Two or more years' experience performing vulnerability scans using Tenable SecurityCenter (Tenable.sc) or ACAS Must possess appropriate DISA ESS certifications and experience. Must be DoD 8570 certified at IAT Level 3 or higher (e.g., CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP) Must be US citizen Must possess active secret security clearance or higher Must be able to pass pre-employment background check Preferred Qualifications Bachelor's degree in IT, IM, or Cyber Security ACAS certification obtained within the last three (3) years, preferred HBSS Administrator certification obtained within the last three (3) years, preferred E-Verify: OSC EdgeTech participates in E-Verify. We will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization. Reasonable Accommodation: OSC EdgeTech, LLC will provide reasonable accommodations, according to applicable state and federal laws, to all qualified individuals with physical or mental disabilities. In compliance with the ADA Amendments Act (ADAAA), if you have a disability and would like to request an accommodation in order to apply for a position with OSC EdgeTech, LLC or any of its subsidiaries, please email *******************.
    $64k-88k yearly est. 41d ago
  • Cyber Security Analyst

    Mindlance 4.6company rating

    Information security analyst job in Oakbrook Terrace, IL

    Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at ************************* Job Title: Cyber Security Analyst Duration: 12 Months Location: Oakbrook Terrace, IL Job Description: Responsible for planning, designing, and implementing a process for cyber security monitoring, incident detection, and incident response. 1-3 yrs of experience and a Bachelor's degree in IT systems or a related discipline. Position Requirements: - Configuration and administration of logging aggregation and security event monitoring tools (like Industrial Defender, Splunk, etc.) - Configuration and maintenance of performance monitoring tools (like Solarwinds, Uptime, CA Spectrum, etc.) o Understands and can configure tools and endpoint systems to use SNMP for monitoring - General IT Support (application patching, client updates, remote access and administration tools) - General Networking knowledge (IP Networking, OSI Stack, etc.) Additional Information Thanks & Regards' ___________________________________________________________________________ Vikram Bhalla | Team Recruitment | Mindlance, Inc. | W: ************ All your information will be kept confidential according to EEO guidelines.
    $70k-90k yearly est. 60d+ ago
  • Cyber Security Analyst 3

    Cdo Technologies Inc. 4.5company rating

    Information security analyst job in Scott Air Force Base, IL

    Are you ready to apply cutting-edge technologies to solve real world problems? Do you thrive in an environment where people leverage technology and processes to build innovative and sustainable solutions? You might just be a perfect fit for the CDO team. Since 1995, CDO Technologies has delivered the best solutions for unique business problems in the commercial and federal sectors ranging from Asset Management to IT Services. CDO employees demonstrate integrity, embrace teamwork, and embody a Can Do attitude in the delivery of superior customer service. Position Summary Demonstrated knowledge of system security. Possesses familiarity with cyber threats, malicious cyber threat actor motivations, and working knowledge of threat analysis and enterprise level cyber threat mitigation strategies. Must have networking experience in addition to cyber security. Work is delivered on-site at Scott AFB, IL. Minimum Requirements 8+ Years of experience is required. Experience should include: Network experience with controlled interfaces, routers, switches, firewalls, and access or transfer cross domain solutions Experience with Risk Management and preparing approval documentation for authorization/approval Cybersecurity and Information Assurance documentation and analysis Experience with different domains, security, integration, and interoperability Experience with reviewing engineering data for Joint, DoD, and AF Networks Must possess a DoD 8570.01 Level II Certification (Such as Security+, CAP, or GSLC) Must possess a BA or BS in Computer Science, Electronics Engineering, or other Engineering or Technical Discipline Secret Security Clearance is required. What can a CDO employee expect? At CDO Technologies, we believe in taking care of our employees with a comprehensive benefits package. Our health and welfare benefits include two medical plan options along with a LiveHealth program to see a doctor online anytime day or night. CDO offers dental, vision, and a Flexible Spending Account for medical or childcare. Employees may also enroll in a 401(k) plan with their first paycheck. Full-time employees also receive company paid short and long-term disability and life insurance. We also provide tuition reimbursement, professional development, and certification reimbursements. Finally, CDO also offers employees a generous leave program including paid holidays, vacation, and sick leave. CDO is an equal opportunities employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender identity, sexual orientation, national origin, disability, or veteran status.
    $70k-90k yearly est. Auto-Apply 2d ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Evansville, IN?

The average information security analyst in Evansville, IN earns between $54,000 and $104,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Evansville, IN

$75,000
Job type you want
Full Time
Part Time
Internship
Temporary