Security Engineer
Information security analyst job in Chicago, IL
Our client is seeking a Security Engineer to join their team! This position is located in Chicago, Illinois.
Evaluate proposed systems, networks, and software designs for security risks
Recommend mitigations and resolve integration issues to ensure secure implementation within existing infrastructure
Develop, manage, and communicate a comprehensive enterprise-wide security strategy, aligning with organizational goals and stakeholder expectations
Lead cybersecurity risk assessments, drive mitigation efforts, manage incident response planning, and collaborate with cross-functional teams to support secure design decisions across the organization
Desired Skills/Experience:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field
7+ years of experience in information and cloud security, with a focus on designing and implementing secure cloud computing solutions
Deep expertise in Azure cloud security, including hands-on experience with tools like Azure Security Center and Microsoft Defender for Cloud
In-depth knowledge of API security such as: OAuth, OpenID, REST, SOAP, GraphQL with the ability to define secure API design patterns and advocate for best practices
Proficiency in at least one scripting language such as Python, PowerShell, or Bash
Benefits:
Medical, Dental, & Vision Insurance Plans
Employee-Owned Profit Sharing (ESOP)
401K offered
The approximate pay range for this position starting at $160,000 - 180,000+. Please note that the pay range provided is a good faith estimate. Final compensation may vary based on factors including but not limited to background, knowledge, skills, and location. We comply with local wage minimums.
Sr Analyst, Cloud Security Assurance
Information security analyst job in Chicago, IL
The Company PayPal has been revolutionizing commerce globally for more than 25 years. Creating innovative experiences that make moving money, selling, and shopping simple, personalized, and secure, PayPal empowers consumers and businesses in approximately 200 markets to join and thrive in the global economy.
We operate a global, two-sided network at scale that connects hundreds of millions of merchants and consumers. We help merchants and consumers connect, transact, and complete payments, whether they are online or in person. PayPal is more than a connection to third-party payment networks. We provide proprietary payment solutions accepted by merchants that enable the completion of payments on our platform on behalf of our customers.
We offer our customers the flexibility to use their accounts to purchase and receive payments for goods and services, as well as the ability to transfer and withdraw funds. We enable consumers to exchange funds more safely with merchants using a variety of funding sources, which may include a bank account, a PayPal or Venmo account balance, PayPal and Venmo branded credit products, a credit card, a debit card, certain cryptocurrencies, or other stored value products such as gift cards, and eligible credit card rewards. Our PayPal, Venmo, and Xoom products also make it safer and simpler for friends and family to transfer funds to each other. We offer merchants an end-to-end payments solution that provides authorization and settlement capabilities, as well as instant access to funds and payouts. We also help merchants connect with their customers, process exchanges and returns, and manage risk. We enable consumers to engage in cross-border shopping and merchants to extend their global reach while reducing the complexity and friction involved in enabling cross-border trade.
Our beliefs are the foundation for how we conduct business every day. We live each day guided by our core values of Inclusion, Innovation, Collaboration, and Wellness. Together, our values ensure that we work together as one global team with our customers at the center of everything we do - and they push us to ensure we take care of ourselves, each other, and our communities.
Job Summary:
Sr. Analyst, Cybersecurity Operations focused on cloud security. As a key player in our Cloud Assurance team, you will help provide comprehensive visibility into cloud infrastructures, monitor for misconfigurations, and proactively detect threats.
Job Description:
Essential Responsibilities:
* Independently apply security best practices to enhance and optimize cyber threat management, ensuring robust protection and efficiency, while beginning to understand and align security measures with business objectives.
* Partner with peers and internal teams to drive security initiatives, contribute to cross-functional projects, and at times co-lead efforts to strengthen security posture and cyber threat management.
* Analyze and resolve security challenges by adapting standard cyber threat management processes and exploring alternative approaches to address complex threats.
* Influence the quality, efficiency, and effectiveness of the team through informed decision-making, with a potential impact on other teams.
* Collaborate with key partners to gather and incorporate feedback, driving continuous improvements in cyber threat management.
Minimum Qualifications:
* Minimum of 5 years of relevant work experience and a Bachelor's degree or equivalent experience.
Preferred Qualification:
Your day to day:
This role will be focused primarily on the security in AWS and GCP cloud environments at PayPal. This will include the security aspects of infrastructure, build pipelines, application design, cloud native service and tool design patterns, stakeholder communications, consulting and advisement of peer security teams, and solution review and approval. Daily tasks will include but not limited to:
* Onboarding Cloud accounts (such as Azure, AWS & GCP) - this includes access grant, enabling policies, configuring baselines, configuring agents (if applicable), verifying health status
* Administer CSPM solution - this includes managing user roles, audit logs, manage API access
* Discover cloud assets - this includes gaining visibility and manage cloud assets
* Manage Security policies and Benchmarks - this includes configuring CSPs specific security policies, industry specific compliance policies (such as PCI), benchmarks standards (such as CIS, NIST, etc.)
* Respond to alerts - this includes monitor, investigate and triage incidents based on actionable alerts
* Manage OS hardening - this includes administer operating system baseline and hardening
* Integration with 3rd party systems - this includes manage changes, requests on integration with other systems (such as ITSM and CI/CD Tools)
* Remediation guidance - this includes providing recommendations to the stakeholders to fix the potential threats, applying configurations on the systems to maintain IT security regulatory compliance and standards
* Manage reports - this includes providing reports to the business and IT stakeholders
What do you need to bring:
* 5+ years' experience in Cloud Security, CSPM
* Collaborate with the team to design and deliver scalable back-end services that enhance our leading CSPM platform
* Develop user-friendly command-line utilities that interact with our web services
* Excellent communication and documentation skills
* Provide integration support and documentation for various teams, including UX/UI and Sensors
* Configure and monitor uptime alerts related to the services you manage
* Continuously improve architecture, models, user experience, performance, and stability through rapid prototyping and agile decision-making
* Innovate and refine methods to utilize data for automating global-scale cyber threat intelligence
* Contribute to building a platform that secures the entire lifecycle of cloud workloads for our customers
* Proficiency in at least one object-oriented programming language with strong typing
* Experience in developing and using RESTful API web services
* Familiarity with cloud provider APIs and CLI tools for AWS, Azure, and GCP
* Experience with infrastructure-as-code tools like CloudFormation, Terraform, and Azure Templates
* Hands-on experience with Docker containers in Kubernetes environments
* Experience with message queues including defining messages, estimating sizes and rates, and monitoring lag
* Experience with RDBMS databases and SQL, such as Postgres
Preferred certifications:
* Cloud Security related certifications (AWS, GCP)
* Bachelors / Master's Degree in Computer Science / Cybersecurity or related field
Bonus Points:
* Industry experience or certifications related to CNAPP, CSPM, or Cloud Security
* Experience with application observability tools such as Splunk and PagerDuty
* Experience managing production environments with Postgres, Kubernetes etc.
* Familiarity with graph structures, data, and graph databases
* Compliance knowledge/experience
* Automation
Subsidiary:
PayPal
Travel Percent:
0
* PayPal is committed to fair and equitable compensation practices.
Actual Compensation is based on various factors including but not limited to work location, and relevant skills and experience.
The total compensation for this practice may include an annual performance bonus (or other incentive compensation, as applicable), equity, and medical, dental, vision, and other benefits. For more information, visit *******************************
The US national annual pay range for this role is $111,500 to $191,950
PayPal does not charge candidates any fees for courses, applications, resume reviews, interviews, background checks, or onboarding. Any such request is a red flag and likely part of a scam. To learn more about how to identify and avoid recruitment fraud please visit ************************************
For the majority of employees, PayPal's balanced hybrid work model offers 3 days in the office for effective in-person collaboration and 2 days at your choice of either the PayPal office or your home workspace, ensuring that you equally have the benefits and conveniences of both locations.
Our Benefits:
At PayPal, we're committed to building an equitable and inclusive global economy. And we can't do this without our most important asset-you. That's why we offer benefits to help you thrive in every stage of life. We champion your financial, physical, and mental health by offering valuable benefits and resources to help you care for the whole you.
We have great benefits including a flexible work environment, employee shares options, health and life insurance and more. To learn more about our benefits please visit *******************************
Who We Are:
Click Here to learn more about our culture and community.
Commitment to Diversity and Inclusion
PayPal provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, pregnancy, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state, or local law. In addition, PayPal will provide reasonable accommodations for qualified individuals with disabilities. If you are unable to submit an application because of incompatible assistive technology or a disability, please contact us at ****************************************.
Belonging at PayPal:
Our employees are central to advancing our mission, and we strive to create an environment where everyone can do their best work with a sense of purpose and belonging. Belonging at PayPal means creating a workplace with a sense of acceptance and security where all employees feel included and valued. We are proud to have a diverse workforce reflective of the merchants, consumers, and communities that we serve, and we continue to take tangible actions to cultivate inclusivity and belonging at PayPal.
Any general requests for consideration of your skills, please Join our Talent Community.
We know the confidence gap and imposter syndrome can get in the way of meeting spectacular candidates. Please don't hesitate to apply.
Detection & Response Analyst
Information security analyst job in Chicago, IL
Ann & Robert H. Lurie Children's Hospital of Chicago provides superior pediatric care in a setting that offers the latest benefits and innovations in medical technology, research and family-friendly design. As the largest pediatric provider in the region with a 140-year legacy of excellence, kids and their families are at the center of all we do. Ann & Robert H. Lurie Children's Hospital of Chicago is ranked in all 10 specialties by the U.S. News & World Report.
Location
680 Lake Shore Drive
Job Description
The Incident Response Analyst helps guide resources to prepare for, coordinate, and respond to incidents, including, but not limited to, computer security vulnerabilities, malware, phishing, and social engineering, as well as associated forensic investigations.
This position utilizes industry-leading security incident response procedures, performing frequent monitoring of incident detection control effectiveness and helping to inform preparedness exercises.
This position effectively collaborates with managed detection and response, incident assistance, and security forensics partners. This position coordinates with internal emergency preparedness teams and contributes to a resilient business continuity posture.
Essential Job Functions:
Area Specific Job Accountabilities:
Receive and triage incoming security alerts to determine their severity, priority, and relevance.
Conduct initial triage and investigation of security incidents, including gathering and analyzing relevant data and logs.
Analyze logs and security event data to identify indicators of compromise (IOCs) and potential security incidents.
Conduct analysis of suspicious files, malware samples, or artifacts to understand their behavior and potential impact.
Assist in the collection and preservation of digital evidence during incident investigation.
Prepare detailed incident reports, documenting the timeline, actions taken, and lessons learned from each incident.
Performs other duties as assigned.
Knowledge, Skills, & Abilities:
Bachelor's degree, preferably in Computer Science or related information security expertise.
2+ years of experience in information security incident response required.
SANS GCIH (GIAC Certified Incident Handler), CISSP (Certified Information Systems Security Professional), CISA (Certified Information Security Auditor) or equivalent certification highly desired.
Strong knowledge of information security forensics, security operations, security monitoring, technology implementation, risk analysis strategy, and NIST incident response life cycle.
Experience and knowledge with information security frameworks, regulatory compliance, and regulatory bodies (e.g., HITRUST, NIST, HIPAA, DHHS).
Goal oriented with the ability to lead team achievements toward desired results utilizing both internal and external resources.
Professional communication, disciplined documentation, and commitment to following and improving processes and procedures.
Familiarity and experience with crisis management, disaster recovery, and business availability programs and procedures
Education
High School Diploma/GED (Required)
Pay Range
$93,600.00-$154,440.00 Salary
At Lurie Children's, we are committed to competitive and fair compensation aligned with market rates and internal equity, reflecting individual contributions, experience, and expertise. The pay range for this job indicates minimum and maximum targets for the position. Ranges are regularly reviewed to stay aligned with market conditions. In addition to base salary, Lurie Children's offer a comprehensive rewards package that may include differentials for some hourly employees, leadership incentives for select roles, health and retirement benefits, and wellbeing programs. For more details on other compensation, consult your recruiter or click the following link to learn more about our benefits.
Benefit Statement
For full time and part time employees who work 20 or more hours per week we offer a generous benefits package that includes:
Medical, dental and vision insurance
Employer paid group term life and disability
Employer contribution toward Health Savings Account
Flexible Spending Accounts
Paid Time Off (PTO), Paid Holidays and Paid Parental Leave
403(b) with a 5% employer match
Various voluntary benefits:
Supplemental Life, AD&D and Disability
Critical Illness, Accident and Hospital Indemnity coverage
Tuition assistance
Student loan servicing and support
Adoption benefits
Backup Childcare and Eldercare
Employee Assistance Program, and other specialized behavioral health services and resources for employees and family members
Discount on services at Lurie Children's facilities
Discount purchasing program
There's a Place for You with Us
At Lurie Children's, we embrace and celebrate building a team with a variety of backgrounds, skills, and viewpoints - recognizing that different life experiences strengthen our workplace and the care we provide to the Chicago community and beyond. We treat everyone fairly, appreciate differences, and make meaningful connections that foster belonging. This is a place where you can be your best, so we can give our best to the patients and families who trust us with their care.
Lurie Children's and its affiliates are equal employment opportunity employers. All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity or expression, religion, national origin, ancestry, age, disability, marital status, pregnancy, protected veteran status, order of protection status, protected genetic information, or any other characteristic protected by law.
Support email: ***********************************
Auto-ApplyCyber Security Analyst - IT - Cordova, IL
Information security analyst job in Cordova, IL
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps.
Unless specifically stated otherwise, this role is "On-Site" at the location detailed in the job post.
As the nation's largest producer of clean, carbon-free energy, Constellation is focused on our purpose: accelerating the transition to a carbon-free future. We have been the leader in clean energy production for more than a decade, and we are cultivating a workplace where our employees can grow, thrive, and contribute.
Our culture and employee experience make it clear: We are powered by passion and purpose. Together, we're creating healthier communities and a cleaner planet, and our people are the driving force behind our success. At Constellation, you can build a fulfilling career with opportunities to learn, grow and make an impact. By doing our best work and meeting new challenges, we can accomplish great things and help fight climate change. Join us to lead the clean energy future.
TOTAL REWARDS
Constellation offers a wide range of benefits and rewards to help our employees thrive professionally and personally. We provide competitive compensation and benefits that support both employees and their families, helping them prepare for the future. In addition to highly competitive salaries, we offer a bonus program, 401(k) with company match, employee stock purchase program; comprehensive medical, dental and vision benefits, including a robust wellness program; paid time off for vacation, holidays, and sick days; and much more.
Expected salary range of $91,800 to $102,000, varies based on experience, along with comprehensive benefits package that includes bonus and 401(k).
PRIMARY PURPOSE OF POSITION
Provide technical knowledge and expertise to support delivery and maintenance of IT Cyber Security and Network solutions under the guidance of a Sr Cyber Security Analyst and Manager. Perform activities related to testing, implementing, and maintaining solutions for products and processes. Uses pre-defined procedures and guidelines to maintain and resolve issues related to cyber security and network solutions.
PRIMARY DUTIES AND ACCOUNTABILITIES
Perform, document and assist in planning work activities relating to small projects, sub-projects, or process improvements. For daily operations: enhance, maintain or support existing IT products and processes to the defined service level agreement For projects and sub-projects: analyze requirements, design, build, and test IT software solutions
Maintain engagement with business and IT partners.
Assist less experienced personnel.
Maintain technical knowledge and business acumen within own discipline or function and continue to manage their professional development
Drive innovation across the organization by identifying and providing analysis of trends and issues with the goal to drive new business opportunities and solve complex business problems.
Ability to provide on-call support after normal business hours
Additional Qualifications/Responsibilities
MINIMUM QUALIFICATIONS
Bachelor's degree in Computer Science or related discipline and typically 2 to 5 years related experience or 6 to 9 years equivalent combination of education and work experience.
Ability to solve problems using pre-defined procedures and guidelines.
Communication skills: Able to effectively communicate highly technical information in non-technical terminology (written and verbal)
Flexible and adaptable to changing priorities, based on business needs
Working knowledge of Server and Workstation Operating Systems (Windows / Linux), along with command prompt knowledge
Working knowledgeable in IP based switching, routing, and network environments (ex. Cisco)
Working knowledge of computer networking concepts and protocols, and network security methodologies.
Working knowledge of cyber security practices for an enterprise environment
Working knowledge of firewall operations (ex. Cisco & Checkpoint)
Working knowledge of cyber security practices for an enterprise environment
PREFERRED QUALIFICATIONS
Working knowledge of cyber security program elements such as Policy Development, Application Security, Information Security, Network Security, Disaster Recovery Planning, Operational Security, Incident Response, and End User Education
Working knowledge of Security Information Event Management (SIEM) solutions (ex. Splunk, Nitro)
Cisco Certified Network Associate (CCNA) certification acceptable with other network credentials. Security Plus training
Information Security Analyst
Information security analyst job in Springfield, IL
Min USD $31.51/Hr. Max USD $48.83/Hr. Under the direction of the Manager, Security Operations, the Security Operations Analyst protects organizational assets by ensuring an effective information security control environment for Memorial Health System. This role is a combination of project management and incident response through identification, analysis, prioritization, communication and mitigation of incidents as they occur.
Please note this is a hybrid position and is required to be onsite in Springfield, IL several days per week.
On call rotation is for 1 week approximately every 5 weeks.
Qualifications
Minimum Qualifications:Education:• Bachelor's degree in health information management, Computer Science, Business, Cybersecurity, Health Care, or related discipline required. Four or more years of relevant prior work experience may be considered in lieu of degree.Licensure/Certification/Registry:• Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or similar security related certification preferred.Experience:• Minimum 2 years of security experience required.• Minimum 2 years of compliance experience preferred.• Minimum 2 years of project management experience preferred. • Demonstrated experience with healthcare clinical and financial applications required.• Experience with audit methodologies and control frameworks (such as ISO27001 or NIST) required.• Experience with MS365 Office suite and collaboration tools required. Other Knowledge/Skills/Abilities:• Demonstrated strong communication skills and diplomacy to work between technical and administrative teams at all organizational levels, as well as to write and update concise and accurate documentation.• Demonstrated knowledge of Microsoft Windows systems, administrator and client/server communications protocol, UNIX, Oracle, LDAP, XML and directory administration. Demonstrated knowledge of computer systems, architecture and process flow. • Evidence of leadership, creativity, integrity, and initiative. Evidence of ability to achieve results and inspire others to do the same, personal accountability, and dedication to continue learning and investigating relevant technology required.• Demonstrated planning, problem-solving, decision-making, analytical and change management skills. • Demonstrated ability to maintain confidentiality, professionalism, and trustworthiness.• Demonstrated ability to drive projects forward and achieve objectives aligned with strategic direction, even in the face of stakeholder resistance or ambiguity.• Must be personally motivated to achieve results alone and through others particularly related to providing exceptional customer service. Must be results oriented and be able to manage time appropriately in order to meet assigned goals.
Responsibilities
Principle Duties & Responsibilities:1. Performs various daily operational tasks as assigned by Security Operations Manager to ensure the continued security and protection of MH data. 2. Provides ongoing consulting on industry best practices regarding the securing of information assets.3. Analyzes department processes and identifies security gaps between teams.4. Documents control gaps; proactively develop plans to address identified gaps with subject matter expert and stakeholder input. 5. Investigate security incidents and breaches6. Responds to computer security incidents according to the incident response policy and procedures.7. Coordinate containment, eradication, and recovery efforts8. Works with business areas to develop, document, and update policies, plans, processes, procedures, and guidance to ensure a safe, effective control environment. 9. Maintains the organizational security control baseline for security-related compliance. 10. Collaborate with vulnerability management teams to assess and remediate risks11. Embodies the Memorial Health System Performance Excellence Standards of Safety, Courtesy, Quality, and Efficiency that support our mission, vision and values:• SAFETY: We put safety first. We speak up and take action to create an environment of zero harm. We build an inclusive culture where everyone can fully engage.• INTEGRITY: We are accountable for our attitude, actions and health. We honor diverse abilities, beliefs and identities. We respect others by being honest and showing compassion.• QUALITY: We listen to learn and partner for success. We seek continuous improvement while advancing our knowledge. We deliver evidence-based care to achieve excellent outcomes.• STEWARDSHIP: We use resources wisely. We are responsible for delivering equitable care. We work together to coordinate care.12. Develops, maintains, and tests incident response plans to ensure organizational compliance with required laws and regulations. 13. Supports the Security Operations Manager in continued development and refinement of Disaster Recovery plans14. Supports security awareness training, working to expose all departments to new and improved processes.15. Perform triage on incoming alerts to determine severity and relevance, working with system, application, and network owners to explain, remediate, and document as needed
The intent of this job description is to provide a representative summary of the major duties and responsibilities performed by incumbents of this job. Incumbents may be requested to perform tasks other than those specifically presented in this description.
Auto-ApplyGlobal Cyber Wordings Analyst
Information security analyst job in Chicago, IL
Join our global Cyber team as a Wordings Analyst supporting the Global Cyber Wordings Manager in the strategic development and governance of our Cyber and Tech policy suite, including Liberty Cyber Resolution and Liberty Tech Resolution. This role is a hands-on business enabler: you will help translate complex legal and regulatory requirements into clear, market-ready wordings, maintain our global clause library, support manuscript negotiations, and produce practical tools that empower underwriters and strengthen broker confidence. It's an excellent opportunity for an early-career insurance wordings or legal professional to build expertise in a fast-moving, global specialty line and make a visible impact on growth, innovation, and client experience.
Key responsibilities:
Wording library and drafting support
Maintain and expand the global wording library centered on Liberty Cyber Resolution and Liberty Tech Resolution, including endorsements, exclusions, and guidance notes.
Redline and prepare first drafts of standard clauses and endorsements; ensure consistency with definitions, coverage intent, and plain-language standards.
Track version control, change logs, approvals, and archiving;
Assist with localization for different jurisdictions, coordinating translations and filing documentation with Legal/Compliance.
Commercial enablement
Build practical tools (playbooks, FAQs, objection-handling guides, coverage summaries) to help regional teams position our products and close deals efficiently.
Prepare broker/client comparison decks and battlecards; support pitches, RFP/RFI responses, and manuscript negotiations with clause comparisons and recommended alternatives.
Triage wording queries from regions; track SLAs and referral approvals per the global governance framework.
Partner closely with Underwriting, Product, Global Cyber Engagement, Claims, Legal/Compliance, and regional leaders to deliver accurate, timely support and uphold governance standards.
Regulatory and legal stewardship
Monitor and synthesize global regulatory and market developments (e.g., Lloyd's cyber war/systemic guidance, GDPR, DORA, NIS2, sanctions) into succinct briefs and recommended wording actions.
Maintain audit-ready documentation; assist with regulatory filings or attestations where required.
Claims partnership and feedback loop
Collaborate with Claims to capture lessons from disputes and litigation trends; draft guidance notes and propose clarifications to improve coverage certainty.
Support coverage position letters and documentation packs with research, citations, and clause histories.
Innovation and product development support
Help draft prototype wordings for new propositions
Check alignment between underlying policy wordings and reinsurance treaty/facultative clauses.
Administer wording management tools, ensuring robust version control, approval workflows, and usage analytics.
Build dashboards and trackers for adoption of standard forms, deviation rates, SLA performance, disputes, and audit findings; provide monthly reporting to stakeholders.
Qualifications
Bachelor's degree in business, economics, or other quantitative field. Minimum 3 years, typically 4 years or more of relevant work experience.
2 - 5 years of experience in insurance wordings, legal/paralegal support, underwriting support, or product documentation; cyber specialty experience preferred.
Strong drafting, redlining, and proofreading skills with a plain-language mindset and exceptional attention to detail.
Working knowledge of insurance policy structures, endorsements, exclusions, and coverage interpretation; familiarity with cyber war/systemic language, sanctions, and privacy regulations is advantageous.
Research and synthesis skills to translate complex regulatory/legal topics into practical guidance and actionable updates.
Proficiency with MS Word (advanced track changes/redlining), Excel (trackers and dashboards), PowerPoint (training/pitch materials), and document/enablement tools.
Collaborative, service-oriented approach; comfortable operating in a global matrix and meeting defined SLAs.
Curiosity about cybersecurity risks and the incident response ecosystem; willingness to learn common threat scenarios to inform practical drafting.
About Us
Pay Philosophy: The typical starting salary range for this role is determined by a number of factors including skills, experience, education, certifications and location. The full salary range for this role reflects the competitive labor market value for all employees in these positions across the national market and provides an opportunity to progress as employees grow and develop within the role. Some roles at Liberty Mutual have a corresponding compensation plan which may include commission and/or bonus earnings at rates that vary based on multiple factors set forth in the compensation plan for the role.
At Liberty Mutual, our goal is to create a workplace where everyone feels valued, supported, and can thrive. We build an environment that welcomes a wide range of perspectives and experiences, with inclusion embedded in every aspect of our culture and reflected in everyday interactions. This comes to life through comprehensive benefits, workplace flexibility, professional development opportunities, and a host of opportunities provided through our Employee Resource Groups. Each employee plays a role in creating our inclusive culture, which supports every individual to do their best work. Together, we cultivate a community where everyone can make a meaningful impact for our business, our customers, and the communities we serve.
We value your hard work, integrity and commitment to make things better, and we put people first by offering you benefits that support your life and well-being. To learn more about our benefit offerings please visit: ***********************
Liberty Mutual is an equal opportunity employer. We will not tolerate discrimination on the basis of race, color, national origin, sex, sexual orientation, gender identity, religion, age, disability, veteran's status, pregnancy, genetic information or on any basis prohibited by federal, state or local law.
Fair Chance Notices
California
Los Angeles Incorporated
Los Angeles Unincorporated
Philadelphia
San Francisco
We can recommend jobs specifically for you! Click here to get started.
Auto-ApplyInformation System Epic Security Analyst
Information security analyst job in Milwaukee, WI
At Children's Wisconsin, we believe kids deserve the best.
Children's Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country.
We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today.
Please follow this link for a closer look at what it's like to work at Children's Wisconsin:
***********************************
Children's Wisconsin is seeking a Senior Information Epic Security Analyst- to join our team!
Location: Remote but must be local to Milwaukee
What you will do:
The IS Security Analyst-Epic will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required.
Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations.
ESSENTIAL FUNCTIONS:
Demonstrates behaviors outlined in the Core Competencies the Blue Kids Way to provide service excellence as a committed partner to children, families and co-workers.
Recommends and maintains policies and procedures related to information security. Monitors the organization's overall security fabric.
Assesses security needs and capabilities of the organization. Makes regular reports to management concerning security measures. Makes recommendations for improvement as required.
Identifies and provides information security awareness training as appropriate. Identifies appropriate courses to enhance security capabilities and competencies of the organization.
Works with management to perform and maintain risk assessments. Ensures organization compliance with the security sections of Federal and State statutes, including HIPAA, as well as regulatory requirements. Coordinates investigations into potential security infractions.
Determines and designs appropriate tests for all aspects of information security. Activities may include attempted “cracking” of system security, review of audit trails and attempted theft of devices. Evaluates system effectiveness and makes change recommendations as necessary.
Coordinates periodic reviews of system security by outside consultants, including vulnerability assessments, penetration tests, HIPAA reviews and PCI compliance. Works with IS teams to implement recommendations as appropriate.
Monitors, evaluates and makes recommendations regarding perimeter security including prevention against attack, viruses, and other forms of malicious software. Monitors, evaluates and makes recommendations regarding email and Internet content filtering. Evaluates and makes recommendations regarding requested changes to perimeter security.
Recommends policies and procedures for controlling remote access by employees, non-employees and vendors.
Reviews and makes recommendations regarding security oriented software applications and workstation security, including patch management, user rights management, and operating system configuration.
Keeps current on security issues through seminars, publications and self-education on an on-going basis.
MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
Requires bachelor's degree in computer science or related technology field. Master's degree preferred.
Requires 7 years of relevant computer systems experience, preferably in a hospital or healthcare setting. Significant experience in IS security administration including compliance, audit, and information security management.
Epic Security certification is a requirement.
Professional certification (e.g. CISA, CISM or CISSP) preferred.
Thorough understanding of risk analysis, disaster recovery and audit tracking.
Familiarity with current common paradigms for violating system integrity.
Must have excellent interpersonal skills to effectively communicate with all levels of hospital personnel, vendors and IS personnel.
Must possess the ability to deliver clear, concise communications and presentations. Must be able to train others on key IS security concepts.
Children's Wisconsin is an equal opportunity / affirmative action employer. We are committed to creating a diverse and inclusive environment for all employees. We treat everyone with dignity, respect, and fairness. We do not discriminate against any person on the basis of race, color, religion, sex, gender, gender identity and/or expression, sexual orientation, national origin, age, disability, veteran status, or any other status or condition protected by the law.
Certifications/Licenses:
Auto-ApplyInformation Security Compliance Analyst
Information security analyst job in Chicago, IL
Job Description
Support the Information security governance, risk management and compliance program, focusing on compliance and assurance. Facilitate the compliance and assurance program, by performing assurance assessments to ensure Alliant Credit Union (ACU) is compliant with regulatory and legal obligations. Help maintain the technical control library ensure assessments align securing ACU. Facilitate IT issue management by working with employees on scheduling calls and going over the issue and resolution.
Essential Responsibilities
Responsible to facilitate the compliance and assurance assessments and issue management via a GRC tool
Conduct assurance assessment, including control test of design (ToD) and test of operating effectiveness (TOE) activities
Provide recommendations on improving compliance-related processes and/or procedures and identify opportunities for ITGC/security compliance control automation
Facilitate group and individual meetings, ensure that each meeting is organized and aligned and schedule walkthrough agenda addressing any issue that arise and and guiding towards actionable outcomes
Assist internal and external audit teams to address inquiries
Participate in InfoSec projects as assigned by management such as the review of documents
Education
Minimum- 4 Year Bachelors Degree in Computer Science, Information Security or Related
Years of Experience
Minimum - 2 Years Governance, Risk Management, Compliance within a financial institution or Security Compliance or Related
In Lieu of Education
5 Years Governance, Risk Management, Compliance within a financial institution
License/Certifications/Training
Preferred: Compliance, Risk Management, or Governance certifications: CRISC, CISM or CISA
Compensation & Benefits:
Typical hiring range: $57,500 - $89,500 Annually. Actual compensation will be determined using factors such as experience, skills & knowledge.
Additional Compensation: Annual performance bonus
Benefits: Alliant provides a benefits package including health care, vision, dental, and 401k with employer match.
Additional Benefits:
Work from home up to 3 days a week
Paid parental leave
Employee discount programs
Time off including paid personal and sick days
11 paid holidays
Education reimbursement
*Note that eligibility and cost of benefits can vary depending on the number of regularly scheduled hours, and job status such as regular full-time, regular part-time, or temporary employment.
Adhere to and ensure compliance of all business transactions with policy and process of the Bank Secrecy Act. Ensures compliance with all applicable state and federal laws, company procedures and policies. Maintains integrity and ethics in all actions and conversations with or regarding credit union members and their accounts; complies with Privacy Act directives.
The responsibilities listed do not contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this position. Duties, responsibilities and activities may change at any time with or without notice.
Security Operations Center (SOC) - Information Security Analyst
Information security analyst job in Schaumburg, IL
Title: Security Operations Center (SOC) - Information Security Analyst Company: Award-Winning, $50B Publicly Traded Company Type: Full-Time Location: Hybrid - Chicagoland Area (Onsite 3-4 Days/Week) Travel: None Job Overview Join an award-winning, publicly traded company and be part of a fast-paced, cutting-edge security team! This newly developed SOC Analyst role offers an exciting and dynamic environment where no two days are the same. You'll have the opportunity to work with leading security tools like Splunk, CrowdStrike, Digital Shadows, and Proofpoint, while collaborating with a skilled and supportive security engineering team. You'll be part of a tight-knit, communicative team that values collaboration, knowledge-sharing, and professional growth. If you thrive in fast-paced security operations and enjoy hands-on problem-solving, this is an excellent opportunity to make an impact. Key Responsibilities:
Manage the Phish Alert mailbox.
Perform QA on tickets for a service provider.
Handle tier 2 escalated inquiries.
Support security operations through log aggregation and analysis.
Leadership & Team Culture The leadership team is known for holistically supporting its team members, ensuring that growth, learning, and well-being remain top priorities. They provide ongoing career development opportunities, mentorship, and hands-on training to help employees expand their expertise and advance their careers. Beyond technical growth, leadership fosters a culture of inclusivity and collaboration, ensuring that every team member is heard, valued, and supported. Open communication, continuous learning, and a strong sense of community define the workplace, empowering individuals to contribute, innovate, and succeed. Requirements
3+ years of experience in cybersecurity or a related field.
Proficiency with at least some of the following tools: CrowdStrike, Proofpoint, Digital Shadows, or Splunk
Experience working in a Security Operations Center (SOC) environment is a plus, but not required.
Compensation & Benefits
Base Salary: $70,000 - $90,000 (dependent on qualifications, skills, and experience).
Bonus Eligible.
Comprehensive Benefits Package Includes:
Medical, Dental, Vision, and Life Insurance
Traditional and Roth 401(k) with company match
Employee Stock Purchase Plan (ESPP)
And much more!
Apply Today!
Staff Systems Security Engineer
Information security analyst job in Rolling Meadows, IL
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: SAPTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
We are seeking capable, talented, and motivated team-contributors at our Northrop Grumman Rolling Meadows site. Our products range from advanced sensing technologies to state-of-the-art targeting and tracking systems that are deployed in Electro-Optical Infrared (EOIR) and Radio Frequency Electronic Warfare (RFEW) systems. These systems are designed, developed, built, integrated, and tested by the capable folks at our company to protect the lives of US and Allied warfighters in present and future conflicts. Enjoy a culture where your voice is valued and start contributing to our team of passionate professionals providing real-life solutions to our world's biggest challenges. We take pride in creating purposeful work and allowing our employees to grow and achieve their goals every day by Defining Possible. With our competitive pay and comprehensive benefits, we have the right opportunities to fit your life and launch your career today. If you are interested in consideration to be included as a part of this team, we would invite you to apply.
Northrop Grumman Mission Systems Sector (NGMS) is seeking a Staff Systems Security Engineer to join our Systems Security Engineering team. The Security Engineering team is cross-disciplinary across the security domain; encompassing embedded Systems Engineering, Cybersecurity, Software Security and Anti-Tamper Engineering.
Roles & Responsibilities:
· Design/develop system architectures and generate system designs to be implemented in a cost-effective manner.
Implement and ensure compliance with government policies (e.g., JSIG, DAAPM, NIST 800-53, CNSSI 1253, DODI 5200.39, etc.) by reviewing process tailoring needs and approving documented procedures.
Guide and monitor technical documentation/publication to document trades studies, system designs, analysis, and results related to a systems security posture such as identifying Critical Program Information (CPI) and creation of Anti-Tamper Plans
Develop an understanding of system interfaces and how to protect them.
Assist with the definition of key capabilities and performance requirements.
Adapt production and development products to meet unique customer needs and support the development of system security functions.
Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off.
Support technical work products developed by the larger engineering team in support of major milestone deliveries (e.g.: SRR, SVR, PDR, CDR, TRR, PRR).
Authoring technical documentation such as white papers, proposal technical volumes, and program milestone briefings.
Collaborate with security engineering team(s), across a portfolio of programs, through the duration of program execution to solve issues and to prepare for requirements sell off.
Other duties may include technical leadership, business capture activities, interfacing with industry partners and the USG.
This position will be full-time, on-site at our Rolling Meadows, IL location.
This position is contingent upon Funding/Contract award, special access program and acquiring and maintaining the necessary US Government security clearance per customers' requirements prior to start.
Basic Qualifications for a Staff Systems Security Engineer:
Bachelor's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 12+years of related experience, a Master's degree in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 10+ years of related experience or a PhD in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields with 7+ years of related experience.
3 years of cumulative experience on DoD based platforms and/or systems regarding the application of Cybersecurity RMF or Anti-Tamper with competencies in security threat analysis, systems architecture, engineering design, requirements derivation, validation, and verification.
Must have demonstrated experience in leading teams to solve technical problems, including decomposition, root cause analysis, solution development, implementation and monitoring
Experience contributing to and/or making technical presentations to internal and external customers.
Ability to obtain and maintain a minimum of a Secret Clearance with additional customer specified clearance prior to start.
Preferred Qualifications for a Staff Systems Security Engineer:
Advanced degrees in Electrical Engineering, Software Engineering, Computer Engineering, Computer Science, Cybersecurity, or related technical fields.
Experience with design verification testing, reverse engineering, embedded software development, Cybersecurity, or Anti-Tamper Possess a DoD 8140 certification, e.g. CompTIA Security+, CISSP, or similar. Experience with proposals and creating basis of estimates (BOEs)
Primary Level Salary Range: $163,200.00 - $244,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyInformation Security Engineering & Operations Analyst
Information security analyst job in Racine, WI
The JFG Information Security Engineering & Operations Analyst plays a key role in supporting JFG's Identity & Access Management (IAM), Cyber Threat Management, and Vulnerability Management services. This role helps support IAM services to provision, deprovision, and certify access to JFG systems. It also helps detect, analyze, hunt for, and report on cybersecurity events related to malware, network intrusion, and data loss protection and insider threat incidents. This role is also responsible for finding and reporting on internal and external vulnerabilities on JFG systems. This role will be supported by a Managed Detection & Response (MDR) services and Identity & Access Management Managed services. Occasional off-hour and weekend work will be expected. Very little (less than 5%) business travel is expected in this role.
This role will be located in Racine, Wisconsin. Ability to come in-office would be required (working a hybrid schedule.)
KEY RESPONSIBILITIES:
* Detect, analyze, contain, and remediate threats and vulnerabilities across the JFG environment.
* Operate and support vulnerability management, data loss protection, cybersecurity monitoring, cybersecurity incident response, intrusion analysis, root-cause-analysis (digital forensics), cyber-threat intelligence, and malware analysis technologies.
* Lead and report on incidents involving malware, network intrusion, insider-threat, internal investigations and litigation support activities.
* Incorporate Cyber Threat Intelligence into operational signal intelligence and reporting.
* Proactively investigate JFG environment for threats based on Cyber Threat Intelligence and known threat methods and patterns (aka Threat Hunting).
* Operate and support Identity Governance and Administration technologies to support timely on/off-boarding of people and regular access governance reviews to ensure appropriate access.
* Support weekly/monthly/quarterly/annual operational metrics, reports and dashboards.
* Assist with maintaining the Cybersecurity Incident Response Plan.
* Collaborate on the continuous improvement of Information Security Operations processes, workflows, and procedures (e.g. RunBooks).
* Automate repetitive tasks and drive efficiencies with measurable benchmarks to show progress.
JOB REQUIREMENTS:
* Associates degree in Information Security, Cybersecurity preferred
* 0-2 years' experience
* Types of certification preferred: Security+, CEH, SSCP
* Experience with Python and PowerShell scripting languages for automation preferred
* Good report writing and communication skills
* Has a basic understanding of the Information Security platforms at JFG, common Information Security controls and frameworks, networking concepts and technologies, as well as Windows and Linux environments
Come as you are.
Johnson Financial Group supports and is committed to the principle of equal employment opportunity. We make all employment-related decisions without regard for an individual's race, color, religion, sex, sexual orientation, age, national origin, citizenship, disability, veteran status, or any other protected status as required by law.
Auto-ApplyInformation Security Analyst
Information security analyst job in Middleton, WI
Job Description
This is a hybrid position requiring 3 days in office at our Middleton, WI office location. #LI-Hybrid
At CapSpecialty, we are a specialty underwriting company being driven by well-informed, entrepreneurial and proactive employees. Come join our exciting company where you can really make an impact, and each individual's unique skills and talents are recognized and valued. You will find an accessible leadership team that welcomes opinions and ideas. We owe much of our success to our collaborative environment and set of three guiding principles rooted in customer-centricity, employee excellence and corporate culture.
We offer competitive compensation and benefits packages - including an innovative open vacation plan, generous paid sick and parental leave, fully vested matching 401k, company-paid group term life insurance and short- & long-term disability plans, professional and educational growth opportunities, flexible and casual work environment, and recognition for exceptional performance. Please see our full list of Total Rewards here.
CapSpecialty is seeking an Information Security Analyst who will support our organization's cybersecurity operations. The analyst will assist in monitoring systems, investigating alerts, managing access controls, and supporting compliance efforts. This role includes exposure to Identity & Access Management (“IAM”) and other key areas of information security.
Duties/Responsibilities:
Conduct investigations into and properly document security incidents, including evaluating incident impact and recommending corrective actions to management.
Collate security metrics and generate reports from the security systems as needed.
Support managing accounts and permissions in IAM systems, including recommending improvements to identity governance where appropriate.
Perform tasks as assigned to meet any audit requests. Help maintain IAM documentation and workflows.
Help maintain and promote security policies, procedures, and training materials.
Oversee assigned components of the security awareness programs, and track employee participation including following up on training completion. This may include reporting compliance metrics to leadership.
Manage the physical security program, providing recommendations for updates as needed.
Keep up to date and current on security trends.
Other related duties and initiatives, as assigned.
Supervisory Responsibilities:
None.
Core Competencies:
Proven ability to deal well with ambiguity, prioritize tasks, resolve issues and deliver measurable results in an agile, fast-paced environment.
Excellent oral and written communication skills. Ability to manage difficult customer situations, elicit customer feedback, analyze and resolve customer issues.
Excellent analytical, problem solving, collaboration and time-management skills.
A high level of integrity and commitment to confidentiality.
Must be highly self-motivated requiring minimal direction.
Have a passion for Information Security and a desire to advance personal growth through continuing professional education, self-study, and pursuit of technical certifications.
Education and Experience:
Associate's degree in computer science or equivalent.
1+ years of relevant experience in IT with exposure to cybersecurity practices, technologies, and methodologies is preferred.
Basic understanding of security principles, threats, and controls is desirable.
Familiarity with IAM concepts and tools (i.e. Active Directory, Okta, Azure AD) is a plus but not required.
Familiarity with security controls and technologies desired (i.e. firewall, SIEM, DLP, WAF, and IPS.).
Physical Demands
Prolonged periods of sitting at a desk and working on a computer.
May be required to lift up to 15 pounds at times.
CapSpecialty is a leading provider of specialty insurance and bonds for small- to mid-sized businesses in the U.S., offering casualty, professional liability, surety and fidelity products in all 50 states and the District of Columbia. By working with select partners through a limited distribution model, CapSpecialty's creative, hard-working team provides personalized service and cultivates mutually successful partnerships to deliver positive results. CapSpecialty is an operating subsidiary of Berkshire Hathaway, and its carriers have an A ("Excellent") rating from A.M. Best, writing both admitted and non-admitted policies. For more information, please visit CapSpecialty.com.
Apply today!
Equal Employment Opportunity Employer
Powered by ExactHire:184950
Senior IT Security Analyst
Information security analyst job in Champaign, IL
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplyNetwork Security Analyst / Network Engineer/ System Admin
Information security analyst job in Illinois
Established in 1991, Collabera has been a leader in IT staffing for over 22 years and is one of the largest diversity IT staffing firms in the industry. As a half a billion dollar IT company, with more than 9,000 professionals across 30+ offices, Collabera offers comprehensive, cost-effective IT staffing & IT Services. We provide services to Fortune 500 and mid-size companies to meet their talent needs with high quality IT resources through Staff Augmentation, Global Talent Management, Value Added Services through CLASS (Competency Leveraged Advanced Staffing & Solutions) Permanent Placement Services and Vendor Management Programs.
Collabera recognizes true potential of human capital and provides people the right opportunities for growth and professional excellence.
Job Description
Location: 100 Abbott Park Road, Lake County, Abbott Park, IL 60064
Duration: 6+ months (could go beyond)
Roles:
• Network Directory and Infrastructure Services Administration.
• Knowledge of domain administration and troubleshooting, Active Directory, MS FIM, Exchange, MS Office365 and supporting technologies, MS Azure, NPS, Federation and SQL Server administration required.
Responsibilities:
• Provide technical Level III problem isolation and resolution for a Global Active Directory Network.
• Configures and performs advanced diagnostics on infrastructure components and cloud based applications.
• Understands and repairs Domain infrastructure including DNS, DHCP, ADLDS, ADFS and FIM Sync.
• Understands and can configure/install Win Server 2008r2/2012r2 technologies for domain controllers and Radius Authentication servers.
• Repair and recover from hardware or software failures.
• Rotate on-call and must be available to work a varied shift schedule in a 7x24 hour operations center environment.
• Initiate major outage communication technical bridges as requested.
• Apply fix procedures as instructed for repetitive events as instructed and coordinate with impacted constituencies.
Competencies:
• Superior knowledge of Active Directory overall and its administrative components.
• Perform domain administration for 61,000+ workstations including domain controllers, NPS, Win 2003/2008R2/2012 server hardware, dynamic host configuration protocol (DHCP), domain name servers (DNS) configuration integrated with active directory, desktop configuration and end user support.
• Candidate will have worked in an AD environment that has done acquisition and divestiture work, Candidate will have worked with products such as ADMT, and ADLDS and the roles they play in M&A activities such as management of active directory structure in creation, administration of organizational units (OU), containers and sub containers throughout the domain from geographic to organizational standards, while setting policies and permissions.
• Candidate should have expert knowledge of Federation protocols including OAuth, SAML, WSFed, and a deep understanding of the IDP and SP roles associated with Federation environments.
• Candidate will have worked with Office 365 from an Identity standpoint and have an understanding of Azure Active Directory Sync and Identity Federation for Cloud services.
• Expertise should include attribute mapping and troubleshooting as well as rule sets associated with AADSync.
• Candidate must be able to correctly configure servers and clients for all services.
• Can isolate and repair most DNS and IP service problems.
• Understands and uses the appropriate tools in all instances during problem isolation and repair.
• Possesses an in depth understanding of communications technologies and can isolate and resolve most infrastructure issues.
Qualifications
• Associates Degree Minimum, prefer Computer Science or technology area or telecommunications science business minor
• Three (3) to six (6) months of specialized technical courses in Win and Active Directory technology's typically provided by vendors, technical societies, or equivalent experience.
Additional Information
To know more about this position, please contact:
Himanshu Prajapat
************
**********************************
Easy ApplyManager of IT Security
Information security analyst job in Elgin, IL
Responsibilities: • Provide leadership to define and implement a risk based strategy and program to manage our digital and information assets and then continuously review and set/update policies to support the program. • Lead the organization in identifying, developing, implementing and maintaining business and technology processes and systems across the organization to reduce information and information technology risks.
• Establish appropriate standards and policies, indirectly manage security technologies and direct the establishment and implementation of policies and procedures for recurring and urgent investigations, breaches, and assessments.
• Participate in key Operations and Systems operating routines to implement and drive information security risk strategy and business processes.
• Work with Client's Infrastructure team to ensure our applications are developed, enhanced and maintained according to the security-based best practices and associated security guidelines.
• Collaborate with Infrastructure, Internal IT, and marketing colleagues to help define and ensure Client -wide consistency of security protocols and risk management.
• Work with business colleagues to review RFPs, RFIs etc., and provide security and risk-related input into proposals.
• Monitor information security trends internal and keep leadership informed about information security-related issues and activities potentially affecting the organization.
Qualifications
Requirements:
• More than 10 years of experience in IT with at least 3 years in a security leadership role in a global organization.
• Application Life Cycle management and application development experience in the context of a security framework.
• Strong subject matter experience in infrastructure & application security, vulnerability testing and development of a risk appetite.
• Risk management experience with proven ability to effectively apply risk principles to challenging business situations.
• Superior business acumen, strategic planning skills and experience with an emphasis on visionary innovation and automation.
• Demonstrated organizational skills with the ability to identify priorities, drive performance, and execute plans on schedule.
• Excellent written and verbal communication skills, as well as effective presentation and persuasion capabilities, and management presence that elicits confidence and credibility.
• Resourceful, flexible, and open to new ways of thinking, with the ability to drive change.
• BS Degree in related field or equivalent experience
• Security certifications strongly desired
• Ability to work nonstandard hours including nights, weekends and holidays
• Domestic as well as International travel will be required
Additional Information
TItle:Security Manager / Director
keyworkds: Security
Information Security Manager
Information security analyst job in Downers Grove, IL
blue Stone Executive Search has been retained by our client, a multi billion dollar global organization, a world leader in their vertical, with a dedication to cutting-edge technology and work/family balance, to search for a motivated and energetic IT Leader to direct and manage their Information Security objectives on a company-wide basis.
Job Description
As the Manager of Information Security, you will be responsible for the development and execution of a comprehensive company wide information security strategy. The Information Security Manager will build and work with appropriate internal staff to deploy an information security awareness program to support compliance with information security policy, standards, procedures, and best practices. The Information Security Manager will develop needed security policies while working with appropriate HR and Legal teams on final version approval and distribution. You will also be expected to participate in information security response and provide audit/compliance and forensic activities for the company, as needed. As the Information Security Manager, you will implement proactive processes and technologies to monitor the company internal and external network environment for potential threats with appropriate response processes. You will also evaluate new technology that the company would use in execution of the information security strategy using both quantitative and qualitative methods. The Information Security Manager will also help to create a policy for the company and design and implement necessary tools to protect company data on employee owned devices.
Qualifications
Experience and familiarity with control and security frameworks such as COSO, COBiT, and ISO
Candidate has one or more current CISSP, CISM, CISA certifications
Two to five years security leadership experience required
Bachelor's degree in related field preferred
Solid understanding of information technology and information security including; firewalls, VPN's, penetration testing and other security devices with an emphasis on network security
Experience with management and administration with firewall technologies from Cisco and other firewall manufacturers
Knowledge in developing and socializing security policies and processes
Demonstrated ability to create information security strategy and execution plans
Knowledge of intrusion detection and prevention solutions and experience implementing them in a corporate environment
Excellent interpersonal skills with the ability to communicate with technical and non-technical contacts
Must be highly organized and detail oriented
Exceptional analytical and problem solving skills
Excellent written and verbal communication skills
Ability to manage multiple priorities to deliver results
Additional Information
blue Stone Executive Search successfully finds and secures the top talent within targeted industries. As executive search professionals, the advice we impart and the solutions we provide can have a significant impact on the businesses, careers and lives of others. We recognize these responsibilities and take them seriously. We value long-term relationships above short-term gain. We are continually seeking exceptional talent with the highest standards of professionalism.
E-mail resumes to
[email protected]
and phone ************.
Information Systems Security Officer (ISSO)
Information security analyst job in Chicago, IL
ISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
Auto-ApplyInformation Security Manager Architect_Deerfield, Illinois
Information security analyst job in Deerfield, IL
We are seeking an experienced Quality Assurance Analyst to test updates to our client's website and other interactive deliverables. Primary responsibilities include executing test plans, updating test reports, writing bug defects, verifying fixes, and testing pages and emails on supported environments.
Job Description
Interview mode: Phone and Skype (On site interview may be required)
We can submit C2C consultants
JD:
OBJECTIVES:
• Reports to the Head of Security Strategy & Architecture
• Provides leadership and guidance to the regional IT organization on cyber and information security and risk management activities, education, and solutions
• Contributes to defining global security strategy and architecture processes
• Defines and establishes regional security processes based on global security strategy and architecture, with a focus on practices for Vulnerability Management, Systems Development Lifecycle, Information Security Processes including risk based Architecture design.
• Directs a regional approach for the implementation of global IT security standards and methodologies
• Provides input to global security operations such as incident response, monitoring, trend identification, and security posture and remediation
ACCOUNTABILITIES:
• Reports to the Head of Security Strategy & Architecture on plans and status of relevant projects, including the regional security strategy and implementation initiatives
• Contributes to the design, development, and deployment of global security strategy and architecture concepts
• Cooperates with regional teams in understanding global security strategy and architecture requirements
• Conducts periodic review of security-related SDLC processes and stage gates
• Incorporates cyber security and IT risk management into regional activities
• Be the subject matter expert in security and assessments, including vulnerability management processes, vendor security reviews, penetration testing, and application security
• Conducts follow-ups on any identified corrective actions
• Functions as an advisor to system owners, security program managers and others in all matter (technical and otherwise) involving IT security and continuity
• Directs or delegates level 3 support services for the region
• Manages the relationship between IT security and regional business executives and business managers
• Provides recommendations in planning of programs and projects in the area of cyber security
• Reviews and manages budget and reports financial and event status to Head of Security Strategy & Architecture
EDUCATION, BEHAVIOURAL COMPETENCIES AND SKILLS:
Required:
• Bachelor's Degree (business administration, risk management, information security, Management Information Systems (MIS), Computer Science or related IT field) or high school degree
• 7+ years IT experience
• 5+ years of work experience in developing, implementing and managing security solutions
• 3+ years of work experience in designing and architecture security strategy and solutions
• Demonstrated leadership role in working with C-Suite executives and the Board
• Experience with implementing and operating security programs in a global environment, with a focus in Germany and European countries
• Hands-on experience with the development of security strategy and frameworks, architectural methodologies, and service delivery
• Project management experience including full lifecycle implementation
• Proven ability to analyze a wide variety of data and make calculated, risk-based decisions
• Ability to communicate ideas and data both verbally and written in a persuasive and appropriate manner
• Ability to assess strengths and weaknesses of staff members and provide suggestions for improvement
• Ability to write and speak in the English language
Desired:
• In-depth pharmaceutical industry and drug development experience
• Experience with validated systems
LICENSES/CERTIFICATIONS:
• Information security certification (CISSP, CISM, CISA, GIAC, CEH, CCSK)
TRAVEL REQUIREMENTS:
• Access to transportation to attend meetings
• Ability to fly to meetings regionally and globally
• Willingness to travel up to 25-50%.
Location: Deerfield, IL.
Duration: 1 Year+
Additional Information
All your information will be kept confidential according to EEO guidelines. Please call @ ************ Ext 183
Data and System Security Engineer
Information security analyst job in Lincolnshire, IL
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients. Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
Security & Fire Systems Engineer III
Information security analyst job in Calumet City, IL
Build your best future with the Johnson Controls team
As a global leader in smart, healthy and sustainable buildings, our mission is to reimagine the performance of buildings to serve people, places and the planet. Join a winning team that enables you to build your best future! Our teams are uniquely positioned to support a multitude of industries across the globe. You will have the opportunity to develop yourself through meaningful work projects and learning opportunities. We strive to provide our employees with an experience, focused on supporting their physical, financial, and emotional wellbeing. Become a member of the Johnson Controls family and thrive in an empowering company culture where your voice and ideas will be heard - your next great opportunity is just a few clicks away!
What we offer
Paid vacation/holidays/sick time - 15 days of vacation first year
Comprehensive benefits package including 401K, medical, dental, and vision care - Available day one
Extensive product and on the job/cross training opportunities with outstanding resources
Encouraging and collaborative team environment
Dedication to safety through our Zero Harm policy
Check us Out: A Day in a Life at Johnson Controls:
What you will do
Under specific direction, assists in the design, configuration, and operation of building systems including security, fire, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements. Assists in the development of software programs, commissioning and troubleshooting to ensure proper operations of the building control system. Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors.
How you will do it
Design and configure technically complex Security & Fire systems as defined by the contract documents. Create flow diagrams, sequence of operations and bill of material, network layouts and electrical schematics as required.
Develop and test software programs necessary to operate the system per the intent of the project requirements.
Use your ability to integrate different Security subsystems with each other.
Coordinate and create the necessary drawings and equipment schedules for submittals and installation.
Select, order, and track the delivery of materials for assigned projects.
Coordinate factory-mounting processes to meet factory and project schedule.
Assist in the loading and commissioning of all system and network-level controllers as required. Assist in validation of complete system functionality and troubleshoot problems with subcontractors and other trades to ensure proper operation.
Provide field change information to the project team for the creation of as-built drawings and software.
Keep management and JCI contractor or customer informed of job progress and issues. Assist in performing site-specific training for owner / operator on the total building control system.
Participate in release meeting with project field team. Perform value engineering to provide cost effective results while maintaining customer satisfaction.
Adhere to safety standards. Operate with a high degree of regard to employee and subcontractor safety.
What we look for:
Required
Experience in setting up application deployment (Installation, Configuration, Integration with other components) on Cloud environment based on underlying Application Architecture
Experience in Disaster Recovery setup
Administration, Maintenance and support of the Application instances on Reference, Validation and Customer environments
Identify any known incident resolutions using a knowledge management system
Apply identified resolutions to the incident and interact with the customer to ensure the incident has been properly resolved
Antivirus - Symantec (Installation, updates and remediation's of antivirus client for servers and computers
Off-shift support for machine moves quarterly maintenance
Deployment of physical and virtual server deployment, troubleshooting and maintenance
Ability to learn security software programs (I.E. C-cure9000, Milestone, Genetec)
Strong technical skills in the domain of Windows Server 2008/2012, Microsoft Hyper-V and SCCM/SCOM/SCVMM is essential
Basic MS SQL database and scripting skills is an asset Basic MS SQL database and scripting skills is an asset
HIRING SALARY RANGE: $85,000 - $106,000 Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at *****************************************
#LI - AD2
#LI - DS1
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
Auto-Apply