Post job

Information security analyst jobs in Franklin, WI

- 39 jobs
All
Information Security Analyst
Information Technology Analyst
Cyber Security Engineer
Security System Engineer
Senior Security Architect
Information Technology Security Manager
Securities Analyst
Cyber Security Specialist
Information Security Director
  • Cyber Security Engineer

    Mars Solutions Group 4.7company rating

    Information security analyst job in Milwaukee, WI

    We're seeking a senior cybersecurity engineer to design, build, and operationalize enterprise grade data protection capabilities anchored in Microsoft E5. You will lead engineering for Microsoft Purview (Information Protection & DLP, eDiscovery/Audit), Sensitivity Labels, and related guardrails-integrating telemetry and enforcement through Zscaler, CrowdStrike, and Splunk. This role bridges secure-by-default platform engineering with pragmatic automation to protect regulated data (e.g., PHI/PII) at scale. Senior leadership has prioritized accelerating Copilot and E5 controls adoption, creating a high impact opportunity to shape how we protect data across SaaS and AI workloads. What You'll Do Engineer secure-by-default E5 data protection • Design and implement Microsoft Purview DLP policies (endpoint, Exchange, SharePoint, OneDrive, Teams) and Sensitivity Label taxonomy with automated enforcement paths. • Build policy-as-code pipelines (CI/CD) to version, test, and deploy DLP rules, label configs, and governance artifacts in multiple environments. Integrate Zscaler, CrowdStrike, and Splunk • Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics, dashboards, and detections that close visibility and enforcement loops. • Leverage CrowdStrike telemetry (e.g., Falcon/Shield) to correlate endpoint behaviors with data movement signals for insider risk and exfiltration use cases. Build automations & guardrails • Develop services and workflows (e.g., Azure Functions, Logic Apps, Graph API) to auto remediate mislabels, revoke risky shares, and notify data owners. • Implement secure-by-default configuration baselines and drift detection for E5 security controls (MCAS/Defender for Cloud Apps, Conditional Access, etc.). Operate and continuously improve • Own reliability for data protection pipelines: SLIs/SLOs, runbooks, and incident playbooks in partnership with Insider Risk team. • Create Splunk content (data models, dashboards, correlation searches) aligned to exfiltration, anomalous access, and label violations. • Partner with Privacy and Compliance for audit ready controls (eDiscovery/Audit), evidence, and exception processes. Collaborate across security & platform teams • Work with PSO, IAM, and Insider Risk to align label taxonomy and enforcement with business workflows and least privilege access. • Provide technical leadership and mentoring for engineers/analysts rolling out new E5 features and operational support. Required Qualifications • 5+ years engineering experience in enterprise security or platform engineering; hands-on with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). • Proven expertise building policy as code for DLP/labels (GitHub/Azure DevOps), and automating Graph/PowerShell administration. • Demonstrated ability to design secure-by-default guardrails and support rapid SaaS/AI adoption (including Copilot) without compromising compliance. Nice to Have • Strong background in data protection for regulated data (PII/PHI), insider risk detection, and evidence driven investigations. • Production experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (TA configs, CIM, correlation searches). • Experience migrating from legacy DLP (e.g., Forcepoint) to Microsoft DLP; building vendor neutral dictionaries and detection logic. • Familiarity with MCAS/Defender for Cloud Apps, conditional access policies, and SSPM evaluations. • Background in HIPAA/PHI audit support and exception governance workflows. Success Metrics (first 6-12 months) • DLP policy efficacy: reduction in unauthorized shares/exports; mean time to remediate violations. • Label coverage & accuracy: % of sensitive content labelled; false positive/negative rate trends. • Telemetry integration: end-to-end event flow (Purview → Zscaler/CrowdStrike → Splunk) with actionable detections. • Secure-by-default adoption: # of guardrails implemented; drift detected/resolved; Copilot controls baselined. • Audit readiness: evidence completeness for eDiscovery/Audit; exception closure rates. Tools & Technologies (primary) • Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk • Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) • Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps • Data flows: Exchange/SharePoint/OneDrive/Slack, endpoints, web proxies, CASB/SSE
    $96k-116k yearly est. 3d ago
  • Senior Cyber Security Engineer - 4825

    Tier4 Group

    Information security analyst job in Milwaukee, WI

    About the Role Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale. Key Responsibilities Engineer Secure-by-Default E5 Data Protection Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams. Develop and maintain Sensitivity Label taxonomy with automated enforcement paths. Build Policy-as-Code Pipelines Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments. Integrate Security Telemetry Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection. Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios. Develop Automations & Guardrails Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners. Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.). Operate and Continuously Improve Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks. Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations. Collaborate Across Teams Partner with Privacy and Compliance for audit-ready controls and evidence processes. Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows. Provide technical leadership and mentorship for engineers and analysts implementing new E5 features. Required Qualifications 5+ years of experience in enterprise security or platform engineering. Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell. Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot. Preferred Qualifications Strong background in data protection for regulated data (PII/PHI) and insider-risk detection. Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches). Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies. Knowledge of HIPAA/PHI audit support and exception governance workflows. Success Metrics (First 6-12 Months) Improved DLP policy efficacy and reduced unauthorized data movement. Increased label coverage and accuracy for sensitive content. End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk. Secure-by-default adoption and Copilot controls baselined. Audit readiness with complete evidence and exception closure rates. Tools & Technologies Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
    $81k-110k yearly est. 1d ago
  • Information Security Engineering & Operations Analyst

    Johnson Financial Group 3.9company rating

    Information security analyst job in Racine, WI

    The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role. This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.) KEY RESPONSIBILITIES: * Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment. * Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies. * Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities. * Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting. * Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting). * Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access. * Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards. * Assist with maintaining the Cybersecurity Incident Response Plan. * Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks). * Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress. JOB REQUIREMENTS: * Associates degree in Information Security, Cybersecurity preferred * 0-2 years' experience * Types of certification preferred: Security+, CEH, SSCP * Experience with Python and PowerShell scripting languages for automation preferred * Good report writing and communication skills * Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments Come as you are. Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
    $71k-87k yearly est. Auto-Apply 29d ago
  • Cybersecurity GRC Analyst, Training & Awareness, FCH - IT - SECURITY

    Froedtert Memorial Lutheran Hospital 4.6company rating

    Information security analyst job in Menomonee Falls, WI

    Discover. Achieve. Succeed. #BeHere This job is REMOTE. FTE: 1.000000 Standard Hours: 40.00 Shift: 1st shift flexible 7 am to 5pm Shift Details: Holidays: Weekends: Froedtert ThedaCare Health, Inc., a leading healthcare system located in Eastern Wisconsin, is seeking a Cybersecurity GRC Analyst, Training & Awareness professional to join the Cybersecurity Governance, Risk Management, and Compliance (GRC) team. This role is critical in promoting a robust security culture across the organization by designing, managing, and improving cybersecurity training and awareness programs. The successful candidate will focus on cybersecurity awareness, phishing program operations, cybersecurity training, and GRC concepts while fostering cultural engagement and workforce behavioral change through creative and innovative initiatives. You will partner with cross-functional teams to address cybersecurity risks in clinical and non-clinical environments, ensure regulatory compliance, and contribute to the harmonization of cybersecurity programs across the Froedtert ThedaCare ecosystem. Position Responsibilities: Training and Awareness Program Management: * Develop, implement, enhance, and manage a comprehensive Cybersecurity Training and Awareness framework tailored to healthcare's unique risks and regulatory landscape (e.g., HIPAA, PCI DSS, and Joint Commission requirements). * Design role-based training for diverse audiences, including clinicians, administrative staff, IT teams, and executives. * Continuously refine training materials to incorporate emerging threats, organizational changes, and stakeholder feedback. Phishing Program Operations: * Build, enhance, and execute a dynamic, reality-based phishing simulation program, addressing sector-specific threats such as ransomware and patient data phishing schemes. * Analyze simulation metrics and provide actionable insights to improve employee awareness and reduce risks. * Develop and maintain educational material to support cybersecurity initiatives and training activities. * Deliver targeted follow-up training for individuals or teams with repeated simulation failures. Creative Engagement and Communications: * Develop multimedia content, including videos, infographics, and gamified training, to drive engagement and retention. * Design and execute large-scale security awareness campaigns, ensuring alignment with cultural transformation goals. * Partner with leadership to create impactful security messaging and content tailored to high-risk roles. Regulatory and Compliance Integration: * Ensure training programs align with healthcare-specific regulations and standards, including HIPAA, PCI DSS, and Joint Commission requirements. * Collaborate with Compliance and Legal teams to embed security awareness into broader compliance initiatives. * Provide support for audits and regulatory reviews by showcasing training program effectiveness. Metrics, Reporting, and Continuous Improvement: * Develop and maintain KPIs and dashboards to measure the success of training programs and awareness initiatives. * Conduct quarterly and annual program reviews to identify opportunities for innovation and enhancement. * Prepare reports and presentations for leadership to highlight program impact and align with organizational goals. Collaboration and Change Management: * Partner with IT, Risk Management, and Clinical Operations teams to ensure training initiatives integrate seamlessly across the organization. * Lead security awareness efforts during organizational transitions, such as the Froedtert-ThedaCare merger, ensuring program consistency and harmonization. * Act as a trusted advisor to business units, translating complex cybersecurity topics into actionable guidance. Risk and Compliance Integration: * Assist with routine GRC activities, such as monitoring risk registers, supporting audit preparation, and reviewing policy exception requests. * Collaborate with the Risk Management team to align training efforts with identified risk scenarios, ensuring targeted mitigation strategies. Policy and Procedure Maintenance: * Support the documentation and dissemination of cybersecurity policies, standards, and procedures. * Assist in the lifecycle management of GRC documentation, ensuring alignment with training content and awareness initiatives. EXPERIENCE DESCRIPTION: 1 - 3 years of experience in a related field. 3 or more years of experience in a related field is preferred. At least three years of experience in Cybersecurity training, GRC, or a related role within healthcare or similarly regulated industries preferred Proven track record managing phishing simulation programs and security training platforms (e.g., KnowBe4, LMS). Experience creating and executing large-scale awareness campaigns using multimedia tools EDUCATION DESCRIPTION: BA in Computer Science or related field is required or equivalent acquired through combination of education and experience. Bachelor's degree in Information Security, Computer Science, Communications, or a related field is preferred. Relevant certifications (e.g., CISSP, CISM, CISA, or GIAC) are a plus. SPECIAL SKILLS DESCRIPTION: Technical Expertise: * In-depth knowledge of healthcare regulations and cybersecurity frameworks, including HIPAA, HITECH, NIST CSF, and HITRUST. * Proficiency with phishing simulation platforms (e.g., KnowBe4) and LMS tools. * Familiarity with behavioral analytics and metrics for tracking training effectiveness. Creative and Communication Skills * Exceptional written and verbal communication skills, with the ability to craft messaging for technical and non-technical audiences. * Experience creating multimedia content (e.g., video editing, graphic design) for awareness campaigns. * Public speaking skills and confidence in presenting to diverse audiences. Analytical and Strategic Thinking * Strong problem-solving and critical-thinking skills for addressing complex training needs. * Experience developing data-driven strategies to improve training program impact and employee behavior. Collaboration and Leadership: * Demonstrated ability to collaborate across diverse teams and levels of leadership. * Self-starter with the ability to work independently and drive initiatives in a matrixed organization. * Proven ability to manage multiple projects with competing priorities. Preferred Qualifications * Experience in large healthcare systems or regulated industries. * Familiarity with change management and integration strategies during mergers or acquisitions. * Experience with gamified training methods or VR/AR-based security awareness tools Compensation, Benefits & Perks at Froedtert Health Pay is expected to be between: (expressed as hourly) $37.95 - $64.92. Final compensation is based on experience and will be discussed with you by the recruiter during the interview process. Froedtert Health Offers a variety of perks & benefits to staff, depending on your role you may be eligible for the following: * Paid time off * Growth opportunity- Career Pathways & Career Tuition Assistance, CEU opportunities * Academic Partnership with the Medical College of Wisconsin * Referral bonuses * Retirement plan - 403b * Medical, Dental, Vision, Life Insurance, Short & Long Term Disability, Free Workplace Clinics * Employee Assistance Programs, Adoption Assistance, Healthy Contributions, Care@Work, Moving Assistance, Discounts on gym memberships, travel and other work life benefits available The Froedtert & the Medical College of Wisconsin regional health network is a partnership between Froedtert Health and the Medical College of Wisconsin supporting a shared mission of patient care, innovation, medical research and education. Our health network operates eastern Wisconsin's only academic medical center and adult Level I Trauma center engaged in thousands of clinical trials and studies. The Froedtert & MCW health network, which includes ten hospitals, nearly 2,000 physicians and more than 45 health centers and clinics draw patients from throughout the Midwest and the nation. We are proud to be an Equal Opportunity Employer who values and maintains an environment that attracts, recruits, engages and retains a diverse workforce. We welcome protected veterans to share their priority consideration status with us at ************. We maintain a drug-free workplace and perform pre-employment substance abuse testing. During your application and interview process, if you have a need that requires an accommodation, please contact us at ************. We will attempt to fulfill all reasonable accommodation requests.
    $63k-86k yearly est. 60d+ ago
  • Information System Epic Security Analyst

    CWI Landholdings 3.0company rating

    Information security analyst job in Milwaukee, WI

    At Children's Wisconsin, we believe kids deserve the best. Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country. We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today. Please follow this link for a closer look at what it's like to work at Children's Wisconsin: *********************************** Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team! Location: Remote but must be local to Milwaukee What you will do: The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required. Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations. ESSENTIAL FUNCTIONS: Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers. Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric. Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required. Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization. Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions. Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary. Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate. Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security. Recommends policies and procedures for controlling remote access by employees, non-employees and vendors. Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration. Keeps current on security issues through seminars, publications and self-education on an on-going basis. MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED: Requires bachelor's degree in computer science or related technology field. Master's degree preferred. Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management. Epic Security certification is a requirement. Professional certification (e.g. CISA, CISM or CISSP) preferred. Thorough understanding of risk analysis, disaster recovery and audit tracking. Familiarity with current common paradigms for violating system integrity. Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel. Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts. Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law. Certifications/Licenses:
    $74k-107k yearly est. Auto-Apply 60d+ ago
  • Information Security Analyst/Administrator II

    Snap-On 4.5company rating

    Information security analyst job in Kenosha, WI

    is onsite at the Corporate Headquarters located in Kenosha, WI. Who We Are: People know Snap-on for the quality of our products, but we know that it is the passion and character of our people that make our company a global leader. With our diverse talents and deep pride in the Snap-on family of brands, we drive innovation and create value. We work hard together. We grow together. We are one Snap-on team. Company-paid benefits include: Basic dental, Basic life, Basic accidental death and dismemberment coverage Short term and long-term disability, Employee Assistance Program Business travel accident insurance Other health education programs including smoking cessation, annual wellness screening and seasonal flu shot Market competitive compensation with Rewards for high performance and special skills Bonus, incentives, or sales commissions depending on position and level Base pay progression through lateral & promotional development on both managerial and technical career paths Paid time off, vacation and paid holidays Tuition Assistance Plan Employee Stock Purchase Plan - annual optional enrollment period Retirement programs including 401(k) Plan with matching employer contributions Job Opportunity: The Information Security Administrator will be responsible for providing advanced-level configuration, maintenance and support of network and security related systems. Role includes implementing and monitoring security protocols to maintain the integrity of corporate networks, assets, data and security related equipment. Responsibilities Configure, maintain and provide technical support for Security platforms and technologies (Firewalls, Proxy services, Data security, Intrusion detection systems, syslog's, NAC, SIEM solutions, End point protection, Web application firewalls, SOC, Vulnerability program management, Ethical hacking services and compliance requirements) Devise and execute strategies to improve the reliability and maturity levels of internal and external Security architectures and applications Partner with internal and external IT teams to conduct vulnerability assessments, audits, forensic investigations and execute remediations Responsible for security reviews and hardening of enterprise architecture - which includes network, business applications, integrations, data security and cloud deployments. Responsible for security related incident response, post-analysis and mitigation efforts Maintain security application portfolio and establish rules of engagement with infrastructure, application teams and external sites Create and maintain process and procedure documentation for Security Applications Collaboration and knowledge sharing with internal and external IT external teams, establish and cultivate associations with vital customers and vendor contacts Devise and develop a security dashboard incorporating relevant security and operational metrics Qualifications Several years (5+) of hands-on experience related to Information security In-depth knowledge on Security architecture, Security and network protocols, standards and compliance requirements Experience with deploying and managing cyber security solutions (detection, remediation, and prevention) and developing and administering an IT security program Knowledge of different type of attacks, techniques, threat vectors, attack paths, and how to formulate risk-based decision making in assessing vulnerabilities and remediation priorities Network security architecture concepts including topology, components, and principles Bachelor's degree in Computer Science, Information Systems/Technology, Computer Engineering, or applicable Professional work experience Excellent decision making, analytical, problem-solving, and organizational skills. Excellent communication and customer service skills Industry IT security certifications are desirable - CISSP, CISM, GIAC
    $69k-93k yearly est. Auto-Apply 60d+ ago
  • Cyber Security Training

    Agap Technologies

    Information security analyst job in Milwaukee, WI

    We at Agap Technologies Inc. help our clients build successful businesses by enabling them to synergize state-of-the-art technology with exceptional talent. We offer a full suite of IT solutions and services, from custom software development to staffing. Our multidisciplinary team of experts in areas like data analysis, automation, personnel development and management, and project management helps us offer a unique set of tech-driven solutions and services that allow our clients to achieve their business objectives in the most efficient way possible. Our technical competence is further built upon by our high standards of professionalism, diligence, and ethics, which has enabled us to deliver top-notch services to our clients and exceed expectations every time. Job Description Our Training Features: · You will receive top quality instruction that is famous for Online IT training. · Trainees will receive immediate response to any training related queries, either technical or otherwise. We advise our trainees not to wait till the next class to seek answers to any technical issue. · Training sessions are conducted by real-time instructor with real-time examples. · Every training session is recorded and posted to the batch after each weekend class. · We are offering online training on Cyber Security. . Provide OPT Stem Ext.: Guidance and support for applying for the 24-month OPT STEM extension Help with OPT Employment letter: Help with drafting and obtaining OPT employment letters that meet USCIS requirements. · We provide training in technology of your choice. · Good online training virtual class room environment. · Highly qualified and experienced trainers. · Professional environment. · Special interview training · Training for skill enhancement. · Study material and Lab material provided. · E-Verified company. If you are interested or if you know anyone looking for a change, please feel free to call or email me for details or questions. I look forward to seeing resumes from you or your known and highly recommended candidates. Thanks Additional Information All your information will be kept confidential according to EEO guidelines.
    $79k-112k yearly est. 1d ago
  • HPC System Security Engineer

    University of Chicago 4.7company rating

    Information security analyst job in Park City, IL

    Department Provost Research Computing Center About the Department The University of Chicago Research Computing Center (RCC), a unit in the Office of Research, provides high-end research computing resources to researchers at the University of Chicago. It is dedicated to enabling research by providing access to centrally managed High-Performance Computing (HPC), storage, and visualization resources. These resources include hardware, software, high-level scientific and technical user support, and the education and training required to help researchers make full use of modern HPC technology and local and national supercomputing resources. The Office of Research oversees the conduct of sponsored research, research program development, and contract management functions. Job Summary The job participates in the design of automated, scalable, and rapidly deployable solutions to systems infrastructure and server configuration. Installs, configures, and maintains operating systems, monitoring and alerting systems, utility software, and firewalls. Plans and executes hands-on maintenance for production servers as well as Windows and Linux servers. The University of Chicago is seeking a highly qualified HPC Systems Security Engineer to join the HPC Systems and Operations team that builds and manages RCC's HPC infrastructure. The individual in this position will be involved in the operation, maintenance, security, and compliance of large-scale complex HPC systems primarily used for research. Responsibilities Design, deploy, configure, and administer HPC clusters, including management and compute nodes, storage infrastructure, interconnects (e.g., InfiniBand), and related systems. Develop, maintain, and enforce security procedures and system documentation for operational and compliance purposes. Implement infrastructure and security monitoring and detection systems to identify failures, unusual activity and respond to automated alerts. Tune, secure, and maintain the HPC job scheduling environment, including fair-sharing, accounting, and policy enforcement. Troubleshoot and resolve operational, performance, and security-related issues across HPC hardware and software stacks. Coordinate with hardware and software vendors to address defects, vulnerabilities, and performance issues. Assist Computational Scientists team with user support and helpdesk tickets, including elevated support for security-protected environments. Implement and maintain secure and reliable backup, archival, disaster-recovery, and restore capabilities for systems and research data. Perform vulnerability scanning, patch management, system and firmware updates across the infrastructure. Maintain complex system and network administration functions. Works with moderated guidance to administer simple systems and assists in the administration of larger systems. Maintains all supporting documentation for comprehensive operating system, hardware and software configuration. Monitors primary responses for information technology related security incidents and violations. Keeps current with new security and network monitoring technologies, applicable laws and regulations. Performs other related work as needed. Minimum Qualifications Education: Minimum requirements include a college or university degree in related field. Work Experience: Minimum requirements include knowledge and skills developed through 2-5 years of work experience in a related job discipline. Certifications: --- Preferred Qualifications Experience: Linux system administration experience in a large, distributed computing environment. Demonstrated experience and knowledge of system security and best practices. Technical Skills or Knowledge: Knowledge of Linux administration required, RHEL. Experience and advanced skills in scripting with Python or Bash. Experience installing, configuring, and managing job schedulers (e.g., Slurm, Torque, PBS, LSF). Experience with automation tools such as Ansible, Puppet, Chef, Salt. Experience with provisioning tools (e.g., xCAT, Confluent, Warewulf). Experience implementing monitoring tools (e.g., CheckMK, Zabbix, Nagios). Knowledge of frameworks and federal regulations to protect regulated systems and data (e.g., HIPAA, FISMA, NIST CSF). Experience working, documenting and enforcing controls required to protect controlled unclassified information (e.g., NIST 800-53, NIST 800-171, NIST SP 800-223, FIPS). Knowledge of at least one distributed storage system (e.g., Storage Scale, Lustre, Gluster, BeeGFS, Ceph) and practical experience. Experience with InfiniBand (must at least be able to demonstrate a working knowledge of concepts) Experience in writing precise and concise documentation, standard operating procedures. Preferred Competencies Understand and translate researchers' scientific goals into computational requirements. Work well with faculty and researchers. Identify and gain expertise in appropriate new technologies and/or software tools. Function as part of an interactive team while demonstrating self-initiative to achieve project's goals and Research Computing Center's mission. Strong analytical skills and problem-solving ability. Application Documents Resume or C/V (required) Cover letter (preferred) When applying, the document(s) MUST be uploaded via the My Experience page, in the section titled Application Documents of the application. Job Family Information Technology Role Impact Individual Contributor Scheduled Weekly Hours 37.5 Drug Test Required No Health Screen Required No Motor Vehicle Record Inquiry Required No Pay Rate Type Salary FLSA Status Exempt Pay Range $91,800.00 - $116,000.00 The included pay rate or range represents the University's good faith estimate of the possible compensation offer for this role at the time of posting. Benefits Eligible Yes The University of Chicago offers a wide range of benefits programs and resources for eligible employees, including health, retirement, and paid time off. Information about the benefit offerings can be found in the Benefits Guidebook. Posting Statement The University of Chicago is an equal opportunity employer and does not discriminate on the basis of race, color, religion, sex, sexual orientation, gender, gender identity, or expression, national or ethnic origin, shared ancestry, age, status as an individual with a disability, military or veteran status, genetic information, or other protected classes under the law. For additional information please see the University's Notice of Nondiscrimination. Job seekers in need of a reasonable accommodation to complete the application process should call ************ or submit a request via Applicant Inquiry Form. All offers of employment are contingent upon a background check that includes a review of conviction history. A conviction does not automatically preclude University employment. Rather, the University considers conviction information on a case-by-case basis and assesses the nature of the offense, the circumstances surrounding it, the proximity in time of the conviction, and its relevance to the position. The University of Chicago's Annual Security & Fire Safety Report (Report) provides information about University offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: *********************************** Paper copies of the Report are available, upon request, from the University of Chicago Police Department, 850 E. 61st Street, Chicago, IL 60637.
    $91.8k-116k yearly Auto-Apply 19d ago
  • Information Security Operations Director

    Brunswick 4.5company rating

    Information security analyst job in Mettawa, IL

    **_Are you ready for what's next?_** _Come explore opportunities within Brunswick, a global marine leader (******************************* Q6B2j\_mA) committed to challenging conventions and innovating next-generation technologies that transform experiences on the water and beyond. Brunswick believes "Next Never Rests," and we offer a variety of exciting careers and growth opportunities within united teams defining the future of marine recreation._ We are seeking a strategic and hands-on **Information S** **ecurity Operations Director** to lead and mature our global cybersecurity operations capabilities. This role will lead the Security Operations Center (SOC), Threat and Vulnerability Management, Cyber Incident Response, and Offensive Security functions. The Director will report directly to the Chief Information Security Officer (CISO) and serve as a key member of the Security Organization's Leadership Team, helping shape the future of cybersecurity across a complex manufacturing enterprise with over $6 billion in annual revenue. **Key Responsibilities:** Leadership & Strategy + Lead and develop a high-performing cybersecurity operations team across multiple domains. + Define and execute the strategic roadmap for SOC, threat detection, incident response, and offensive security. + Collaborate with IT, OT, and business stakeholders to align cybersecurity operations with enterprise risk management. Security Operations Center (SOC) + Oversee 24/7 monitoring, detection, and response operations. + Drive continuous improvement in threat detection capabilities, including SIEM tuning, use case development, and automation. + Ensure SOC KPIs and metrics are tracked and reported to leadership. Threat and Vulnerability Management + Manage enterprise-wide vulnerability scanning, assessment, and remediation programs. + Partner with infrastructure teams to prioritize and mitigate risks. + Monitor threat intelligence feeds and integrate actionable insights into operations. Cyber Incident Response + Lead the development and execution of the Brunswick Cyber Incident Response Program. + Act as Incident Commander and coordinate cross-functional response efforts during security incidents. + Conduct post-incident reviews and drive lessons learned into operational improvements. Offensive Security + Oversee penetration testing, red/purple team exercises, and adversary emulation activities. + Identify and exploit weaknesses in systems, applications, and processes to proactively improve defenses. + Collaborate with Security, Infrastructure, and Engineering teams to remediate findings. **Qualifications:** + Bachelor's degree; Master's preferred. + 10+ years of experience in cybersecurity, with 5+ years in leadership roles. + Proven experience managing Security Operations to include SOC, incident response, and vulnerability management programs. + Strong understanding of MITRE ATT&CK, NIST, and other cybersecurity frameworks. + Experience in manufacturing or industrial environments (IT/OT convergence) is highly desirable. **Preferred Certifications:** + **CISSP** - Certified Information Systems Security Professional + **CISM** - Certified Information Security Manager + **GIAC** - Global Information Assurance Certifications (e.g., GCIA, GCIH, GPEN) + **OSCP** - Offensive Security Certified Professional + **CEH** - Certified Ethical Hacker **Key Competencies:** + Strategic thinking with operational execution. + Strong communication and stakeholder engagement skills. + Ability to lead under pressure and make critical decisions during incidents. + Passion for innovation and continuous improvement in cybersecurity practices. The anticipated pay range for this position is $129,500 - $219,000 annually. The actual base pay offered will vary depending on multiple factors including job- related knowledge/skills, relevant experience, business needs, and geographic location. In addition to base pay, this position is eligible for an annual discretionary bonus. At Brunswick, it is not typical for an individual to be hired at or near the top end of the salary range for their role. Compensation decisions are dependent upon the specifics of the candidate's qualifications and the business context. This position is eligible to participate in Brunswick's comprehensive and high-quality benefits offerings, including medical, dental, vision, paid vacation, 401k (up to 4% match), Health Savings Account (with company contribution), well-being program, product purchase discounts and much more. Details about our benefits can be found here (************************************************************ . **Why Brunswick:** Whatever tomorrow brings, we'll be at the leading edge. As the clear leader in the marine industry, we're committed to our values and supporting our exceptional people. We offer and encourage growth opportunities within and across our many brands. In addition, we're proud of being recognized for making a splash with numerous awards (********************************** ! **About Brunswick:** Brunswick Corporation is a leader in the marine industry, and we're looking for people just like you to take part in the movement towards better boating for all. We rely on the thoughtful input of people from all backgrounds to create compelling, innovative products for our customers around the globe. As such, diversity, equity, and inclusion are priorities in the enduring culture of our company. As a world leader in emerging recreational products and technologies, when you join our team, you become part of some of the most innovative, forward-looking brands in the marine industry today. _Next is Now!_ _We value growth and development, recognizing that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please still consider applying._ Brunswick is an Equal Opportunity Employer and considers all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status or any other characteristic protected by federal, state, or local law. Diversity of experience and skills combined with passion is key to innovation and inspiration and we encourage individuals from all backgrounds to apply. If you require accommodation during the application or interview process, please contact ****************************** for support. For more information about EEO laws, - click here (********************************************** Brunswick and Workday (**************************************************************************************** Privacy Policies Brunswick does not accept applications, inquiries or solicitations from unapproved staffing agencies or vendors. For help, please contact our support team at: ****************************** or ************. All job offers will come to you via the candidate portal you create when applying through a posted position through https:///************************* . If you are ever unsure about what is being required of you during the application process or its source, please contact HR Shared Services at ************ or ****************************** . \#Brunswick Corporation
    $129.5k-219k yearly 39d ago
  • Cyber Security Engineer

    Robert Half 4.5company rating

    Information security analyst job in Milwaukee, WI

    We are looking for a skilled and motivated Cyber Security Engineer to join our team in Milwaukee, Wisconsin. In this role, you will play a pivotal part in safeguarding our organization's IT infrastructure and ensuring compliance with cybersecurity standards. The ideal candidate will possess strong technical expertise, excellent communication skills, and a collaborative mindset to effectively contribute to our innovative and supportive work environment. The role is hybrid to Milwaukee and applicants must be eligible to work in the U.S., no third-party candidates will be considered. Responsibilities: - Develop, implement, and maintain cybersecurity policies and procedures to protect digital assets. - Conduct regular cybersecurity audits and address findings to enhance security and ensure compliance with industry standards. - Collaborate with cross-functional teams to support IT initiatives and foster a cohesive working environment. - Communicate effectively with stakeholders, team members, and vendors to ensure alignment on project goals. - Identify and resolve cybersecurity and infrastructure issues using analytical and problem-solving skills. - Manage cybersecurity projects from planning to execution, ensuring deadlines and budgets are met. - Build and maintain strong relationships with vendors to guarantee high-quality service delivery. - Provide expertise in managing IT infrastructure, including networks, servers, and cloud services. - Monitor and configure firewall technologies, including Checkpoint and Cisco ASA, to enhance network security. - Administer Office 365 and Azure platforms while ensuring their security and functionality. Requirements - Proven experience in IT infrastructure management, including networks, servers, and cloud services. - Strong knowledge of cybersecurity strategies, best practices, and vulnerability assessments. - Proficiency in Windows Server and Client operating systems. - Expertise in networking concepts and terminology, as well as hardware management. - Hands-on experience with Office 365 and Azure administration. - Ability to lead long-term projects with guidance from senior IT staff. - Excellent verbal and written communication skills to convey technical concepts to non-technical stakeholders. - Strong collaboration and problem-solving abilities with a proactive approach to addressing challenges. Technology Doesn't Change the World, People Do. Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles. Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information. © 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
    $85k-117k yearly est. 21d ago
  • IT Operations Analyst

    Eaton Corporation 4.7company rating

    Information security analyst job in Menomonee Falls, WI

    Eaton's Corporate Sector division is currently seeking a IT Operations Analyst. The expected annual salary range for this role is $109000 - $159000 a year. Please note the salary information shown above is a general guideline only. Salaries are based upon candidate skills, experience, and qualifications, as well as market and business considerations. Job Summary: The IT Operations Analyst serves as the primary liaison between stakeholders (business and IT both) and the IT function, leveraging expertise in business analysis to recommend and implement solutions that enable the organization to achieve its goals. This role in particular will focus on championing IT operational excellence by leveraging process improvements and advanced analytics (ServiceNow, Jira) to identify trends, optimize production support, and implement KPI-driven improvements that enhance IT processes, productivity, and customer service outcomes. The IT Operations Analyst with expertise in business analysis tools and techniques and extensive experience in enterprise-wide process and technology transformations and implementation. The ideal candidate has experience with master data management programs, data hubs, or ERP implementations. The candidate will provide thought-leadership in driving organizational objectives forward. The IT Operations Analyst is responsible for business analysis planning and monitoring; requirements elicitation; requirements management and communication; enterprise analysis; requirements analysis and solution assessment and validation on large projects in alignment with the Eaton project management process standards. What you'll do: * Business Analysis Planning: Plan the business analysis approach for projects, determine the deliverables, estimate business analysis effort, and determine metrics to be used to monitor the success of analysis work. * Requirements Elicitation: Conduct requirements gathering activities (brainstorming, focus groups, interviews, observation, prototyping, workshops), document the results, and validate that the documented requirements meet the stakeholders' needs. * Requirements Management & Communication: Assess requirements to ensure they fall within the solution scope, ensure requirements are aligned with and traceable to business objectives and solution design, and ensure requirements are communicated and presented in a format that are understandable to stakeholders, including solutions designers and developers. * Enterprise Analysis: Evaluate the business need, problem or opportunity to justify the investment necessary to deliver the solution, assess the capability of the enterprise to leverage in developing a solution, and determine the most feasible solution. * Requirements Analysis: Analyze, prioritize and organize requirements to ensure efforts focus on the most critical needs, model requirements to demonstrate process and or solution function, and validate that the requirements support the delivery of value. * Solution Assessment: Review and evaluate IT solution designs to ensure the proposed solution meets the business requirements. * Validation: Coordinate the approach and development of use cases and test scenarios with the customer to ensure integration and/or user acceptance testing is complete and validates that project requirements have been achieved. * Optimize IT Operations: Develop and maintain KPI-driven dashboards and reporting frameworks to monitor operational health, productivity, and customer service performance. Reduce ticket transfers and improve resolution times through process redesign, automation, and proactive monitoring. * Define and Manage KPIs: Establish forward-looking performance indicators and dashboards to track productivity, customer service metrics, and operational health. * Lead IT Internal Productivity Projects: Manage cross-functional initiatives that enhance IT efficiency, reduce manual effort, and improve overall service delivery. * Leverage Analytics for Insights: Use ServiceNow and Jira data to identify bottlenecks, forecast trends, and recommend actionable improvements. * Champion Continuous Improvement: Benchmark against industry standards and implement innovative solutions for ITSM and Agile process optimization. * Drive automation and process optimization initiatives using AI/ML, RPA, and advanced analytics to reduce manual effort and accelerate IT service delivery. Qualifications: Required (Basic) Qualifications: * Bachelor's degree from an accredited institution. * Minimum of 5 years of IT work experience. * No relocation benefit is being offered for this position. Only candidates within a 50-mile radius of Beachwood OH, Galesburg MI, Houston TX, Menomonee Falls WI, Moon Township PA, Raleigh NC will be considered. Active-Duty Military Service member candidates are exempt from the geographical area limitation. * Must be able to work in the United States without corporate sponsorship now and within the future. Preferred qualifications: * 5 years working in a customer facing or production support role. * Expertise in ServiceNow and/or Jira, including configuration, administration, integration, and workflow automation for IT operations and project management. * Strong understanding of Agile methodologies (Scrum, Kanban) with practical experience managing boards, sprints, and backlogs in Jira to drive delivery efficiency. * Strong understanding of IT Service Management Processes. * Strong understanding of Agile methodologies. Skills: Position Criteria: * Excellent communication skills, both written and verbal. This position will often work with other business analysts, project managers and business teams on a regular basis. * Good team-oriented interpersonal skills. Assists with facilitation sessions, lead and influence others to effectively interface and work with a wide variety of people. * Good team player, self-motivated and committed with an ability to work under pressure and to tight deadlines. * Up to 10% travel required. We are committed to ensuring equal employment opportunities for all job applicants and employees. Employment decisions are based upon job-related reasons regardless of an applicant's race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability, marital status, genetic information, protected veteran status, or any other status protected by law. Eaton believes in second chance employment. Qualified applicants with arrest or conviction history will be considered regardless of their arrest or conviction history, consistent with the Los Angeles County Fair Chance Ordinance, the California Fair Chance Act and other local laws. You do not need to disclose your conviction history or participate in a background check until a conditional job offer is made to you. After making a conditional offer and running a background check, if Eaton is concerned about conviction that is directly related to the job, you will be given the chance to explain the circumstances surrounding the conviction, provide mitigating evidence, or challenge the accuracy of the background report. To request a disability-related reasonable accommodation to assist you in your job search, application, or interview process, please call us at ************** to discuss your specific need. Only accommodation requests will be accepted by this phone number. We know that good benefit programs are important to employees and their families. Eaton provides various Health and Welfare benefits as well as Retirement benefits, and several programs that provide for paid and unpaid time away from work. Click here for more detail: Eaton Benefits Overview. Please note that specific programs and options available to an employee may depend on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
    $109k-159k yearly 4d ago
  • Security Analyst- Pen Testing

    Syslogic Inc. 3.5company rating

    Information security analyst job in Brookfield, WI

    The Security Analyst- Pen Testing plays a critical role in facilitating continued growth and execution within our security practice. This highly skilled and detail-oriented Consultant will have deep knowledge in Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), and Hardware Penetration Testing. The ideal candidate will be responsible for identifying vulnerabilities across software and hardware systems, advising on remediation strategies, and communicating findings clearly to both technical and non-technical stakeholders. Primary Responsibilities: * Conduct in-depth SAST, DAST, and SCA assessments across a variety of application types (web, mobile, desktop, APIs). * Perform hardware penetration testing on embedded systems, IoT devices, and industrial control systems (ICS), including debug interface discovery, firmware extraction and analysis, and secure boot review. * Develop and maintain threat models, attack trees, and risk assessments for both software and hardware systems. * Identify and exploit vulnerabilities using both manual techniques and automated tools, simulating real-world attack scenarios. * Provide detailed technical reports and executive summaries tailored to different audiences, including developers, engineers, and leadership. * Collaborate with product and engineering teams to prioritize and remediate vulnerabilities, offering secure design and coding recommendations. * Participate in security architecture reviews and code reviews to identify potential weaknesses early in the development lifecycle. * Assist in the development and implementation of security testing methodologies, checklists, and standard operating procedures. * Conduct security tool evaluations and help integrate them into CI/CD pipelines for continuous security testing. * Lead or support red team/blue team exercises, tabletop simulations, and incident response drills. * Stay abreast of the latest security trends, vulnerabilities, and threat actor tactics, techniques, and procedures (TTPs). * Contribute to internal knowledge bases, training sessions, and technical workshops to upskill team members and clients. * Engage with clients to understand their security needs, define testing scopes, and deliver high-quality consulting services. * Ensure all testing activities comply with legal, ethical, and organizational guidelines, including responsible disclosure practices. * Develop and present organized report findings to technical audiences.
    $69k-86k yearly est. 39d ago
  • Senior Security Architect - SAP

    Blue Star Partners 4.5company rating

    Information security analyst job in Waukegan, IL

    Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting Scope of Services: The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy. This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape. Role, Responsibilities, and Deliverables: Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs. Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements. Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks. GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations. Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements. Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy. Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions. Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs. Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time. Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner. Experience & Skills: SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations. GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred. Security Tools: Proficiency in SAP Security, GRC, and SOD management. Leadership: Previous experience managing cross-functional teams and leading security projects. Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations. Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions. Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms. Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals. Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills. Education & Certifications: Degree: A degree in IT, Computer Science, Business, or a complementary field is required. Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.
    $85-100 hourly 60d+ ago
  • IT Analyst - Supply Chain Planning Systems

    Clarios

    Information security analyst job in Milwaukee, WI

    **What you will do:** A Supply Chain Planning IT Analyst supports the planning and optimization of supply chain operations & processes using IT systems and tools. This role involves data analysis, system maintenance, and collaboration with various departments to ensure efficient and effective supply chain planning. Deep knowledge & experience of Demand Planning & Supply Planning are the key requirements. **Key Responsibilities:** + **Data Analysis:** Collect and analyze data related to supply chain planning (DP / SP) to identify trends and areas for improvement. + **System Support:** Assist in maintaining and troubleshooting supply chain planning IT systems, ensuring they function correctly and efficiently. Experience related to O9 Solutions, Anaplan and Logility is required. + **Reporting:** Generate regular reports on supply chain planning metrics and present findings to management. Also to manage the build and support related KPIs. + **Supply Chain Planning:** Support demand planning and components (stat forecast, collaborative / consensus forecasting and advance forecasting), supply planning (network optimization, master scheduling, operational planning, inventory optimization etc.), development and implementation of requirements from supply chain planning team. Understanding of SIOP, SO&P, and IBP processes is required. + **Process Improvement:** Collaborate with supply chain and IT teams to develop and implement process improvement initiatives. Work with Supply Chain team and cross functional IT team (ERP / Analytics etc.) to provide required support. + **Project Support:** Assist in the execution of supply chain planning projects, including system upgrades, integrations and process improvements. + **Training:** Provide training and support to supply chain staff on planning IT systems and tools. **How you will do it:** + Drive a strategic and tactical roadmap for the alignment of business operations and supply chain planning tool's functionalities, across different region. + Work with vendors, consultants, and internal teams to understand and analyze the functional and technical needs of the business and develop solutions compliant with IT General Controls and SOX regulations to meet those needs, as well as standards of the tool used for supply chain planning. + Responsible and accountable for the functional architecture of supply planning chain tools and all associated interfaces including business processes, process re-engineering, and process improvement, across different region + Provide direction to the supply chain build / support teams on the design, definition, and execution of related business process, workflows that accompany solutions. + Drive the functional "vision" and functional design specifications of assigned projects + Review and provide feedback on SoW's submitted by vendors for supply chain associated systems and related projects. + Review and approve assigned projects' SIT/UAT plans, and results, to ensure solution footprint is consistent with the overall functional architecture + Develop deep subject matter knowledge about the supply chain planning associate systems, environment, and company culture, and use that knowledge to identify and deliver solutions across platform operations, maintenance, upgrades and optimization + Identify opportunities to replace home-grown systems with standard COTS solutions; maximize use of standard functionality before exploring customizations + Provide work effort and cost estimates of projects related to supply planning associated system as requested.Stay current with supply chain associated system's solution offerings, and automotive industry's business requirements + Interface effectively with Senior Leaders, briefing solution architecture concepts and details in a clear manner. **What we look for** : **Required:** + Bachelor's degree in supply chain management, Information Technology, Business Administration in supply chain with IT / Analytics, or a related field. + Experience working on O9 Solutions / Anaplan, understanding of integration between ERP and supply chain planning IT systems + 5 - 8 Years of experience in supply chain planning tool like O9 Solutions (configuration) + Ability to work collaboratively in a team environment and building consensus among stakeholders. + Ability to think "Big" and challenge the conventional practice / wisdom. + Detail-oriented with a focus on accuracy and efficiency. + Familiarity with data analysis tools and techniques. **Preferred:** + Certification for SCP / APICS is an added advantage. + Anaplan is highly preferred and added advantage. \#LI-CS1 **What you get:** + Medical, dental and vision care coverage and a 401(k) savings plan with company matching - all starting on date of hire + Tuition reimbursement, perks, and discounts + Parental and caregiver leave programs + All the usual benefits such as paid time off, flexible spending, short-and long-term disability, basic life insurance, business travel insurance, Employee Assistance Program, and domestic partner benefits + Global market strength and worldwide market share leadership + HQ location earns LEED certification for sustainability plus a full-service cafeteria and workout facility + Clarios has been recognized as one of 2025's Most Ethical Companies by Ethisphere. This prestigious recognition marks the third consecutive year Clarios has received this distinction. **Who we are:** Clarios is the force behind the world's most recognizable car battery brands, powering vehicles from leading automakers like Ford, General Motors, Toyota, Honda, and Nissan. With 18,000 employees worldwide, we develop, manufacture, and distribute energy storage solutions while recovering, recycling, and reusing up to 99% of battery materials-setting the standard for sustainability in our industry. At Clarios, we're not just making batteries; we're shaping the future of sustainable transportation. Join our mission to innovate, push boundaries, and make a real impact. Discover your potential at Clarios-where your power meets endless possibilities. **Veterans/Military Spouses:** We value the leadership, adaptability, and technical expertise developed through military service. At Clarios, those capabilities thrive in an environment built on grit, ingenuity, and passion-where you can grow your career while helping to power progress worldwide. All qualified applicants will be considered without regard to protected characteristics. We recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please apply. Diversity of experience and skills combined with passion is key to challenging the status quo. Therefore, we encourage people from all backgrounds to apply to our positions. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, age, status as a protected veteran or other protected characteristics protected by law. As a federal contractor, we are committed to not discriminating against any applicant or employee based on these protected statuses. We will also take affirmative action to ensure equal employment opportunities. Please let us know if you require accommodations during the interview process by emailing Special.Accommodations@Clarios.com . We are an Equal Opportunity Employer and value diversity in our teams in terms of work experience, area of expertise, and all characteristics protected by laws in the countries where we operate. For more information on our commitment to sustainability, diversity, and equal opportunity, please read our latest report (********************************************** . We want you to know your rights (*********************************************************************************************** because EEO is the law. **A Note to Job Applicants:** please be aware of scams being perpetrated through the Internet and social media platforms. Clarios will never require a job applicant to pay money as part of the application or hiring process. **To all recruitment agencies** : Clarios does not accept unsolicited agency resumes/CVs. Please do not forward resumes/CVs to our careers email addresses, Clarios employees or any other company location. Clarios is not responsible for any fees related to unsolicited resumes/CVs. Clarios is the creator behind the world's most recognizable car battery brands. We are the car battery found in most new vehicles including leading brands such as Ford, General Motors, Toyota, Honda, and Nissan. Our 16,000 employees develop, manufacture, and distribute batteries for virtually every type of vehicle. We recover, recycle, and reuse up to 99% of our battery materials, leading sustainability practices in our industry. **A Note to Job Applicants** : Please be aware of scams being perpetrated through the Internet and social media platforms. Clarios will never require a job applicant to pay money as part of the application or hiring process.
    $68k-94k yearly est. 60d+ ago
  • Data and System Security Engineer

    Ayr Global It Solutions 3.4company rating

    Information security analyst job in Lincolnshire, IL

    AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing model and industry experience make us a top choice of Global System Integrators and enterprise customers with federal and commercial projects supported nationwide. Job Role: Data and System Security Engineer Location: Lincolnshire, IL Duration: 6+ Months Qualifications Job Description: Data and System Security engineer Experience with data encryption management solutions, such as Vormteric and CloudLink Experience with PKI management solutions, such as ADCS and External providers Investigative and analytical problem solving skills Customer service/support experience Additional Skills:PKI Knowledge of encryption management technologies, such as Vormetric, CloudLink. Additional Information If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
    $74k-102k yearly est. 1d ago
  • IT Security Project Manager with GIS (Geographic information system) expertise

    Sa Technologies Inc. 4.6company rating

    Information security analyst job in Racine, WI

    SA Technologies Inc. (****************** is a market leader and one of the fastest growing IT consulting firms with operations in US, Canada, Mexico & India. SAT is an Oracle Gold Partner, SAP Services Partner & IBM Certified enterprise. All SA Technologies requirements are Direct Client Requirements from IT Hiring Managers. We guarantee you the best rate for your skills and performance. Job: IT Security Project Manager with GIS (Geographic information system) expertise Location: Racine, WI Employment Type: Contract Rate: TBD Job Description : • Act as the main liaison between GIS and the Project Team • Using the GIS intake form ensure that all GIS activities are accounted for and propose any changes to the Project Manager incorporating them in the overall project plan • Identify all GIS resources in the Project Plan and ensure that sufficient lead time is provided to GIS tower leads to onboard resources. • Aid the Project Manager in identifying and scheduling GIS activities across all GIS towers • Raise Project Change Requests where necessary to ensure that original scope is adhered to • Ensure that all GIS activities are completed prior to entering a stage gate and steward project deliverables through GIS and Project stage gates • Periodically report project milestones, progress, issues and risk to Project Manager and GIS • Provide feedback and improvements to the GIS Operating Model including process and deliverables Qualifications include: • Experience in Information Security Risk Advisory, Risk Management, Architecture and Operations • Familiarity with the GIS Operating Model and Deliverables • Working knowledge of project planning, scope management and resource forecasting • Proven ability to work on many priorities at any given time • Ability to work in a matrixed team environment and influence and guide key decision makers Additional Information Shibu Thomas ************
    $79k-104k yearly est. a minute ago
  • Senior Cyber Security Engineer

    Tier4 Group

    Information security analyst job in Milwaukee, WI

    Title: Senior Cyber Security Engineer (Data Protection & Insider Risk) Type: Hybrid (3 days onsite per week) Duration: ASAP - 12/31/2026 Perks: Competitive Rates, Benefits, free daily lunch when onsite Job Description: About the Role Join a specialized team of analysts and engineers dedicated to detecting and responding to insider risk events. This senior-level role focuses on engineering Microsoft E5 tools to strengthen enterprise data protection and insider threat detection capabilities. You will lead the design, build, and operationalization of secure-by-default solutions anchored in Microsoft Purview and related technologies, ensuring compliance and resilience at scale. Key Responsibilities Engineer Secure-by-Default E5 Data Protection Design and implement Microsoft Purview DLP policies across endpoints, Exchange, SharePoint, OneDrive, and Teams. Develop and maintain Sensitivity Label taxonomy with automated enforcement paths. Build Policy-as-Code Pipelines Create CI/CD workflows to version, test, and deploy DLP rules, label configurations, and governance artifacts across multiple environments. Integrate Security Telemetry Connect Zscaler SSE inspection with Purview controls; route events to Splunk for analytics and detection. Leverage CrowdStrike telemetry to correlate endpoint behaviors with data movement signals for insider-risk and exfiltration scenarios. Develop Automations & Guardrails Build services and workflows (Azure Functions, Logic Apps, Graph API) for auto-remediation, revoking risky shares, and notifying data owners. Implement configuration baselines and drift detection for E5 security controls (MCAS, Conditional Access, etc.). Operate and Continuously Improve Maintain reliability for data protection pipelines, including SLIs/SLOs, runbooks, and incident playbooks. Create Splunk dashboards and correlation searches aligned to exfiltration, anomalous access, and label violations. Collaborate Across Teams Partner with Privacy and Compliance for audit-ready controls and evidence processes. Work with IAM, Insider Risk, and platform teams to align label taxonomy and enforcement with business workflows. Provide technical leadership and mentorship for engineers and analysts implementing new E5 features. Required Qualifications 5+ years of experience in enterprise security or platform engineering. Hands-on expertise with Microsoft E5 security stack (Purview DLP, Information Protection, eDiscovery). Proven ability to build policy-as-code for DLP/labels and automate administration using Graph API and PowerShell. Experience designing secure-by-default guardrails for SaaS/AI adoption, including Copilot. Preferred Qualifications Strong background in data protection for regulated data (PII/PHI) and insider-risk detection. Experience with Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon APIs/telemetry), and Splunk (CIM, correlation searches). Familiarity with MCAS, Defender for Cloud Apps, and conditional access policies. Knowledge of HIPAA/PHI audit support and exception governance workflows. Success Metrics (First 6-12 Months) Improved DLP policy efficacy and reduced unauthorized data movement. Increased label coverage and accuracy for sensitive content. End-to-end telemetry integration across Purview, Zscaler, CrowdStrike, and Splunk. Secure-by-default adoption and Copilot controls baselined. Audit readiness with complete evidence and exception closure rates. Tools & Technologies Microsoft E5 / Purview: Information Protection, DLP, eDiscovery/Audit, Insider Risk Zscaler (SSE/ZIA/ZPA), CrowdStrike (Falcon/Shield), Splunk (CIM, ES) Automation: GitHub, Graph API, PowerShell, Azure Functions/Logic Apps
    $81k-110k yearly est. 7d ago
  • Senior Security Architect - SAP

    Blue Star Partners LLC 4.5company rating

    Information security analyst job in Waukegan, IL

    Job Description Job Title: Senior Security Architect - SAP Period: 03/31/2025 to 03/31/2026 Hours/Week: 40 hours - Hours over 40 will be paid at time and a half Rate: $85 - $100/hour Contract Type: W-2 only, no visa sponsorships or subcontracting Scope of Services: The Senior Architect - SAP will serve as the primary liaison between functional teams and process owners. The role requires a deep understanding of global security requirements, including local privacy laws, and the ability to work closely with functional teams to understand business cases and solve technology-related problems. The Senior Architect will collaborate with cross-functional teams, guide the security team, and deliver global solutions, ensuring that the security architecture aligns with the overall SAP strategy. This role demands in-depth knowledge of security authorizations, cross-functional impacts, and expertise in Segregation of Duties (SOD) and Governance, Risk, and Compliance (GRC) Rule Set updates. The Senior Architect will assist in the proof of concepts with process teams to meet business requirements, taking into account the overall security architecture of the system. The position will also support defined SAP projects and provide technical advice on the adoption and integration of new technologies and alternative approaches within the SAP landscape. Role, Responsibilities, and Deliverables: Liaison with Functional Teams and Process Owners: Act as the primary point of contact between functional teams and process owners to align security and technology solutions with business needs. Security Architecture: Understand the global security architecture and provide expert guidance on securing SAP landscapes, ensuring compliance with privacy laws and regulatory requirements. Segregation of Duties (SOD): Oversee and provide expertise in SOD, ensuring that security access is configured to maintain compliance and mitigate risks. GRC Rule Set Management: Lead updates to the GRC rule set and evaluate their impact on existing roles and users, ensuring that SAP security aligns with business operations. Proof of Concepts: Collaborate with process teams to conduct proof of concepts and assess the feasibility of security solutions in meeting business requirements. Security Risk Assessment and Mitigation: Conduct security assessments to identify risks in SAP landscapes, propose mitigations, and ensure solutions comply with Abbott's overall SAP strategy. Technical Leadership: Provide technical leadership on SAP security projects, guiding the team in configuring, testing, and implementing new security solutions. Evaluation and Recommendations: Evaluate new security software, tools, and utilities, making recommendations for adoption based on their impact on SAP functionality and business needs. Documentation Delivery: Ensure all required project documentation (Change Requests, testing results, system validation) is completed and delivered on time. Stakeholder Communication: Communicate complex technical security issues and solutions to senior leaders in a clear, understandable manner. Experience & Skills: SAP Security Expertise: At least 5 years of experience in SAP Security, with a strong understanding of SAP security architecture, roles, and authorizations. GxP-Regulated Environment: Experience in healthcare or a GxP-regulated environment is preferred. Security Tools: Proficiency in SAP Security, GRC, and SOD management. Leadership: Previous experience managing cross-functional teams and leading security projects. Problem-Solving: Strong problem determination and root cause analysis skills, with a focus on security issues and system configurations. Collaboration: Excellent collaboration and partnering skills, with the ability to work across different business and IT functions. Communication: Strong verbal and written communication skills, with the ability to articulate complex security solutions in business-friendly terms. Process Management: Strong understanding of process costs, ensuring service providers meet agreed-upon service levels and operational goals. Results-Oriented: Ability to deliver results through collaboration and strong relationship-building skills. Education & Certifications: Degree: A degree in IT, Computer Science, Business, or a complementary field is required. Certifications: Relevant SAP certifications (e.g., SAP Certified Application Associate) are a plus. Certifications in project management, ITIL, or other relevant areas are desirable.
    $85-100 hourly 24d ago
  • IT Manufacturing Analyst

    Clarios

    Information security analyst job in Milwaukee, WI

    **What you will do** **-** Join us as an IT Analyst - Manufacturing Operations, where you will work hands-on with our US Manufacturing Assembly Plants to support daily operations and drive continuous improvement. This entry-level position is ideal for candidates passionate about technology, shop floor experience management, and connecting business needs with innovative solutions. This will be high travel (around 50%). **How you will do it** **-** + Partner closely with shop floor teams and supervisors to understand manufacturing processes, challenges, and opportunities for technology-driven improvement. + Apply design thinking principles to identify pain points on the shop floor and help brainstorm creative solutions that enhance workflow, productivity, and user experience. + Support business requirement gathering by interviewing line workers, supervisors, and plant managers; document needs and translate them into clear IT requirements for technology teams. + Assist in the implementation and monitoring of IT solutions within the plant, ensuring changes are communicated effectively and adopted smoothly by shop floor teams. + Participate in process analysis and documentation efforts related to manufacturing operations, focusing on how technology can drive efficiency and solve real-world problems. + Contribute to small-scale IT projects, especially those impacting day-to-day plant operations or improving shop floor data quality and visibility. + Communicate project updates and shop floor feedback to senior IT and business leaders, helping bridge the gap between technology and operations. + Support shop floor staff by troubleshooting basic IT issues and escalating more complex problems to the appropriate technical teams. + Engage in ongoing learning about plant operations, ERP systems, and modern manufacturing technologies to grow your expertise and support future project work. **What we look for** - **Required** + Bachelor's degree in Business, Information Technology, Engineering, or a related field. + 0-2 years of experience in an IT, business analyst, or process improvement role-manufacturing or shop floor exposure strongly preferred. + Interest in design thinking, human-centered problem solving, and digital transformation in manufacturing settings. **Preferred** + Manufacturing This is a unique opportunity to build your career at the intersection of IT and manufacturing, focusing on real-world experience management, creative problem solving, and business requirement gathering. If you are excited about supporting modern factories and driving change from the ground up, we encourage you to apply! \#LI-AL \#LI-Hybrid **What you get:** + Medical, dental and vision care coverage and a 401(k) savings plan with company matching - all starting on date of hire + Tuition reimbursement, perks, and discounts + Parental and caregiver leave programs + All the usual benefits such as paid time off, flexible spending, short-and long-term disability, basic life insurance, business travel insurance, Employee Assistance Program, and domestic partner benefits + Global market strength and worldwide market share leadership + HQ location earns LEED certification for sustainability plus a full-service cafeteria and workout facility + Clarios has been recogizned as one of 2024's Most Ethical Companies by Ethisphere. This prestigious recognition marks the second consecutive year Clarios has received this distinction. **Who we are:** Clarios is the force behind the world's most recognizable car battery brands, powering vehicles from leading automakers like Ford, General Motors, Toyota, Honda, and Nissan. With 18,000 employees worldwide, we develop, manufacture, and distribute energy storage solutions while recovering, recycling, and reusing up to 99% of battery materials-setting the standard for sustainability in our industry. At Clarios, we're not just making batteries; we're shaping the future of sustainable transportation. Join our mission to innovate, push boundaries, and make a real impact. Discover your potential at Clarios-where your power meets endless possibilities. We recognize that people come with a wealth of experience and talent beyond just the technical requirements of a job. If your experience is close to what you see listed here, please apply. Diversity of experience and skills combined with passion is key to challenging the status quo. Therefore, we encourage people from all backgrounds to apply to our positions. Please let us know if you require accommodations during the interview process by emailing Special.Accommodations@Clarios.com . We are an Equal Opportunity Employer and value diversity in our teams in terms of work experience, area of expertise, gender, ethnicity, and all other characteristics protected by laws in the countries where we operate. For more information on our commitment to sustainability, diversity, and equal opportunity, please read our latest report (********************************************** . We want you to know your rights (*********************************************************************************************** because EEO is the law. **A Note to Job Applicants:** please be aware of scams being perpetrated through the Internet and social media platforms. Clarios will never require a job applicant to pay money as part of the application or hiring process. **To all recruitment agencies** : Clarios does not accept unsolicited agency resumes/CVs. Please do not forward resumes/CVs to our careers email addresses, Clarios employees or any other company location. Clarios is not responsible for any fees related to unsolicited resumes/CVs. Clarios is the creator behind the world's most recognizable car battery brands. We are the car battery found in most new vehicles including leading brands such as Ford, General Motors, Toyota, Honda, and Nissan. Our 16,000 employees develop, manufacture, and distribute batteries for virtually every type of vehicle. We recover, recycle, and reuse up to 99% of our battery materials, leading sustainability practices in our industry. **A Note to Job Applicants** : Please be aware of scams being perpetrated through the Internet and social media platforms. Clarios will never require a job applicant to pay money as part of the application or hiring process.
    $68k-94k yearly est. 60d+ ago
  • Data and System Security Engineer

    Ayr Global It Solutions 3.4company rating

    Information security analyst job in Lincolnshire, IL

    AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing model and industry experience make us a top choice of Global System Integrators and enterprise customers with federal and commercial projects supported nationwide. Job Role: Data and System Security Engineer Location: Lincolnshire, IL Duration: 6+ Months Qualifications Job Description: Data and System Security engineer Experience with data encryption management solutions, such as Vormteric and CloudLink Experience with PKI management solutions, such as ADCS and External providers Investigative and analytical problem solving skills Customer service/support experience Additional Skills:PKI Knowledge of encryption management technologies, such as Vormetric, CloudLink. Additional Information If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
    $74k-102k yearly est. 60d+ ago

Learn more about information security analyst jobs

How much does an information security analyst earn in Franklin, WI?

The average information security analyst in Franklin, WI earns between $59,000 and $116,000 annually. This compares to the national average information security analyst range of $71,000 to $135,000.

Average information security analyst salary in Franklin, WI

$83,000
Job type you want
Full Time
Part Time
Internship
Temporary