Senior Security Analyst - IoT, Medical & Industrial Device
Information Security Analyst Job 23 miles from Wheaton
The Senior Security Analyst is the principal advisor in driving upgrades to UL's technical requirements, programs, processes to maintain UL as the highest quality provider for cybersecurity services. Remain up to date on all cybersecurity related topics. Perceived as both the customer's and internal security team's trusted advisor. Conduct advanced penetration tests, hacking to identify issues in embedded products and software.
Responsibilities:
Provides upgrades to UL and industry technical requirements on security requirements along with other standard bodies by collaborating the Software & Security team.
Conducts security tests using automated tools, ad-hoc tools, and manual testing.
Conducts penetration testing against different technological domains including, but not limited to, web products, hardware products, wireless products, software, cloud based software, smart device applications.
Assesses and calculates risk based on vulnerabilities and exposures discovered during testing.
Creates required information security documentation, technical reports, and formal papers on test findings, and complete requests in accordance with requirements.
Handles and completes customer projects to the defined requirements in the timeframe required by customers with the highest quality and integrity of work.
Meets and exceeds customer expectations with projects and other related tests and activities.
Supports security team in building and improving UL's assurance programs and services.
Supports the security team in building the lab for security services.
Provides sales support and the sale of more complex projects.
Qualifications:
• University Degree (Equivalent to a Master's degree) in Computer Science or a related discipline plus generally four years' experience in cybersecurity, software development, or ethical hacking.
• Experience installing and using various OS distributions and application packages.
• Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, nessus, ettercap, static source code analysis tools, fuzzing tools, dynamic binary testing tools
• Understanding of security issues on various operating systems, open source web and database platforms
• Experience scripting in one (1) or more of the following languages: sh, csh, perl, python, awk, ruby and programming experience in C, C++, Java
• Security related certifications a plus: CISSP, CISA, CEH, GIAC
• Strong expertise in testing in two or more of the following domains: Embedded software, embedded security, industrial control systems / SCADA, medical devices, telecom and networking equipment.
Total Rewards: We understand compensation is an important factor as you consider the next step in your career. The estimated salary range for this position is $100,000 to $130,000 and is based on multiple factors, including job-related knowledge/skills, experience, geographical location, as well as other factors. This position is eligible for annual bonus compensation with a target payout of 10% of the base salary. This position also provides health benefits such as medical, dental and vision; wellness benefits such as mental and financial health; and retirement savings (401K) commensurate with the standard rewards offered in each individual location or country. We also provide full-time employees with paid time off including vacation (15 days), holiday including floating holidays (12 days) and sick time off (72 hours).
#LI-SG2
#LI-Hybrid
SAP BTP Security Architect
Information Security Analyst Job 22 miles from Wheaton
Lemongrass Consulting (***************************** is a professional and managed service provider of SAP Business Technology Platform (BTP) services. Our objective is to delight our customers every day by reducing the cost and increasing the agility of their SAP BTP solutions. We do this with our continuous innovation, automation, migration and operation, delivered on the world's most comprehensive cloud platforms - AWS, Azure and GCP.
Our team is what makes Lemongrass exceptional and why we have the excellent reputation in the market that we enjoy today. At Lemongrass, you will work with the smartest and most motivated people in the business. We take pride in our culture of innovation and collaboration that drives us to deliver exceptional benefits to our clients every day.
Summary: We are seeking a highly skilled and experienced SAP BTP Security Architect to join our team. The ideal candidate will possess a strong background in SAP Identity Management (IDM), Single Sign-On (SSO), and SAP Cloud Identity Services. This role will focus on designing and implementing robust security architectures for SAP environments while ensuring seamless integration with corporate identity providers and third-party identity management tools.
Responsibilities:
Design and implement authentication and SSO architecture for SAP BTP.
Develop and manage user provisioning and SAP Identity Management (IDM) solutions.
Integrate SAP BTP with the corporate identity provider of the customer.
Configure and implement SAP Cloud Identity Services (IAS/IPS).
Enable integration with third-party Identity Management/Identity Providers such as OKTA and SailPoint.
Ensure secure cloud-to-on-premises integration using Principal Propagation.
Provide expert guidance on SAP Central User Administration, IDM, and SSO Server functionalities.
Collaborate with stakeholders to align security solutions with organizational goals.
Qualifications:
Bachelor's Degree required in either, Computer Science, Computer Software Engineering, or Software Programming and Development
5-10 years' experience required
Prior Knowledge of legacy SAP Central User Administration and IDM solutions.
Familiarity with SAP Cloud Platform Security services.
Strong analytical and problem-solving capabilities.
Proven experience in SAP Identity Management and SSO tools.
Hands-on expertise with SAP BTP Cloud Identity Services (IAS/IPS).
Strong understanding of integration principles with corporate identity providers (e.g., Azure AD).
Experience with third-party IDM/IDP tools (e.g., OKTA, SailPoint).
Solid knowledge of cloud-to-on-premises security integration and Principal Propagation.
Excellent communication and stakeholder management skills.
SAP BTP and security architecture certifications are a plus.
Ability to communicate complex procedures to other colleagues
Commercial and business awareness
Good communication skills - both written and verbal
Attention to detail and desire to probe further into data
Selected applicant will be subject to a background investigation, which will be conducted and the results of which will be used in compliance with applicable law.
Lemongrass Consulting is proud to be an Equal Opportunity and Affirmative Action employer. We do not discriminate on the basis of race, religion, color, national origin, religious creed, gender, sexual orientation, gender identity, gender expression, age, genetic information, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics.
Senior Consultant - Enterprise Security Risk Management
Information Security Analyst Job 22 miles from Wheaton
At HUB International, we are a team of entrepreneurs. We believe in protecting and supporting the aspirations of individuals, families, and businesses. We help our clients evaluate their risks and develop solutions tailored to their needs. We believe in empowering our employees to learn, grow, and make a difference. Our structure enables our teams to maintain their own unique, regional culture while leveraging support and resources from our corporate centers of excellence.
HUB is the 5th largest global insurance and employee benefits broker, providing a boundaryless array of business insurance, employee benefits, risk services, personal insurance, retirement, and private wealth management products and services. With over $5 billion in revenue and almost 20,000 employees in 600 offices throughout North America, HUB has grown substantially, in part due to our industry leading success in mergers and acquisitions.
About HUB's Risk Services Division
The division is a team of risk management consulting professionals with certification, education, and experience across a variety of industries and disciplines. Located throughout Canada and the USA, our team has the proven knowledge and experience to assist our clients to identify current and potential risks and implement controls to reduce their exposure to loss. Our goal is to assist clients to confidently identify, quantify, and reduce risk through the application of tailored solutions designed to protect what matters most: their people, property, and profitability.
About the Position
The Senior Risk Consultant will utilize Enterprise Security Risk Management (ESRM) principles and other accepted best practices in security risk management and organizational resilience to identify hazards, assess risk, and develop and implement risk management solutions for clients. This role's primary focus will be risk management initiatives with prevention, response, recovery focused planning related to physical security, cyber security, critical incident response, crisis management, business continuity management, and emerging technologies that can help clients mitigate and manage security risk.
Primary Responsibilities:
Collaborate with HUB account executives and clients to evaluate, mitigate, and deliver security risk reduction programs
Provide exceptional service to clients across North America
Work collaboratively with HUB Risk Services Division consultants to ensure client needs are met
Consult with clients to understand risk management needs and objectives
Advise clients on best practices in comprehensive security risk mitigation and management strategies
Support the implementation of risk management initiatives using generally accepted project management and consulting practices
Support client acquisition and retention activities
Develop and deliver C-Suite, management, and all employee level training sessions for clients as needed
Perform comprehensive security program audits and assessments at client sites
Facilitate readiness drills and table top exercises at client sites
Develop/manage working relationships with insurance carrier and vendor partners
Provide subject matter awareness content and supporting collateral to HUB sales teams, service teams, and risk service consultants
Respond to requests for proposals regarding consulting opportunities with existing and prospective clients
Develop and deliver national and regional educational webinars in support of HUB marketing efforts
Respond to media requests for interviews and requests to speak at industry events
Contribute to and participate with HUB's internal crisis management team
Contribute to special projects as required
Required Experience
Minimum ten (10) years of progressive consulting experience as a risk/loss control professional in the insurance brokerage or carrier environments, or as a risk/safety/security manager in industry, or other applicable enterprise security risk management roles
Varied industry experience is desirable
Master's Degree in Occupational Safety, or Risk/Safety/Security/ or Emergency Management is desired
Experience in a consulting role is highly desirable
Completion of (or progression towards) professional risk/safety/security designations such as CPP, PMP, CSP, CISSP, CEM, CBCP, CRM, ARM is desirable
Strong working knowledge of ESRM principles and security related national standards, guidelines, and regulations
Proven analytical and problem-solving skills
Strong project management skills
Excellent written and verbal communication skills in English; fluency in a second language is desirable
Attention to detail and accuracy, as well as the ability to work under pressure and consistently meet deadlines
Proficiency with the Microsoft Office suite of applications
Highly motivated with demonstrated ability to work independently with limited supervision
Ability to travel across the HUB footprint in the US and Canada (up to 30% of work schedule) and work beyond normally scheduled workweek as necessary.
Compensation & Benefits:
HUB offers a competitive compensation & benefits package commensurate with the candidate's experience and abilities
JOIN OUR TEAM
Do you believe in the power of innovation, collaboration, and transformation? Do you thrive in a supportive and client focused work environment? Are you looking for an opportunity to help build and drive change in a rapidly growing and evolving organization? When you join HUB International, you will be part of a community of learners and doers focused on our Core Values: entrepreneurship, teamwork, integrity, accountability, and service.
The expected salary range for this position is $150,000 to $180,000 (plus bonus) and will be impacted by factors such as the successful candidate's skills, experience and working location, as well as the specific position's business line, scope and level. If you believe that your qualifications and experience surpass the minimum requirements for this role, we encourage you to submit your application. By doing so, we will be able to keep your application on file for consideration for potential future positions within our organization. HUB International is proud to offer comprehensive benefit and total compensation packages which could include health/dental/vision/life/disability insurance, FSA, HSA and 401(k) accounts, paid-time-off benefits such as vacation, sick, and personal days, and eligible bonuses, equity and commissions for some positions.
IT SAP Production Planning Solutions Analyst
Information Security Analyst Job 22 miles from Wheaton
Role description:
We are seeking a highly skilled and experienced IT Production Planning Solutions Analyst with global IT experience and a strong background in SAP PP/PPDS modules and satellite planning solutions (such as SAP IBP or Blue Yonder) to join our team and provide E2E expert support for integrated business planning and production execution. The ideal candidate will have a deep understanding of SAP PP/PPDS, a strong track record of delivering successful projects, and a passion for driving operational excellence in a global context.
Responsibilities:
Operational Support: Provide timely and effective support for production-related issues, troubleshooting problems, and resolving incidents
Project Involvement: Contribute to planning and production execution related projects as needed, including implementation, upgrades, and enhancements
Planning Solutions: Leverage expertise in planning tools to support planning projects and optimize processes
Global Coordination: Work with global teams to ensure consistent processes and data management across different regions
Business Requirements Analysis: Translate business requirements into functional specifications for IT Application solutions
Best Practices: Identify and implement IT best practices to optimize planning and production execution
Continuous Improvement: Drive continuous improvement initiatives to enhance efficiency and effectiveness
Knowledge Sharing: Share expertise and knowledge with team members to foster a culture of learning and development
Project Management: Capable of efficiently managing concurrent projects, project teams and prioritizing tasks to achieve project goals within specified timelines
Minimum skills / qualifications:
Bachelor's degree in IT or a related field
Seven (7) years of hands-on experience with SAP PP/PPDS
Five (5) years of hands-on experience with IBP applications (SAP IBP, Blue Yonder or comparable solutions)
In-depth knowledge of SAP PP/PPDS modules (e.g., production planning, scheduling, MRP, material master, BOMs, Routing).
In-depth knowledge of Integrated Business Planning applications preferable SAP IBP and Blue Yonder
Good understanding of SAP ECC modules and integration with other planning modules
Familiarity with IT infrastructure and cloud technologies.
Configure SAP PP/PPDS modules to meet specific business needs, including master data setup, planning strategies, and scheduling parameters.
Work with developers to deliver custom solutions and enhancements.
Ensure the quality of SAP ECC and Integrated Business Planning solutions through rigorous testing and validation.
Preferred skills / qualifications:
Deep understanding of application development and lifecycle management.
Ability to analyze project, program, and portfolio needs.
Teamwork, Oral & written Communications, Logical Analysis, Business skills and methods, Business and Strategic Processes
Knowledge of problem analysis, structured analysis, and design techniques.
Experience in a global operations environment.
Strong analytical and conceptual skills; ability to create original concepts/theories for a variety of stakeholders
Ability to facilitate business meetings and influence best practices
About Ardagh Group
Ardagh Glass Packaging is a global leader in glass packaging solutions, producing packaging for the world's leading brands. We trace our roots all the way back to the Irish Glass Bottle Company, founded in 1932. Since then, we have grown rapidly to a team of more than 20,000 people with revenues of over $9 billion.
Today we have a presence across Europe, Africa, and North America.
Did you know that Ardagh produce many of the beverage cans and bottles you drink your favorite beverages from?
Did you know we produce metal and glass packaging which are permanent materials, meaning they can be infinitely recycled without any loss of quality?
Did you know we produce more than 160 million containers per day?
Ardagh is passionate about sustainability and have a reputation for innovation. We push the boundaries of what's possible, pioneering new production methods, new design techniques and new ways to recycle and save energy. Our aim is to reduce any negative environmental impact while remaining economically sustainable and socially responsible. We believe that the success of our business depends on the success of our people. We strive to create working environments where our employees feel valued, can work to their full potential, and where their achievements are celebrated. Here at Ardagh, we offer exciting and rewarding opportunities for talented and creative people. If you have ambition and want to make an impact with your career, come and join our team, you'll enjoy the journey!
Benefits Offered
Medical, prescription, dental and vision plans
Health Savings Account (HSA) and Flexible Spending Accounts (FSA)
Life insurance
401(k) retirement plan with company match and an employer retirement contribution
Paid holidays, floating days and vacation
Short- and Long-Term Disability (STD/LTD)
Employee Assistance Program (EAP)
Tuition reimbursement program
Professional and personal development opportunities through Employee Resource Groups
Benefits available from day 1 of employment
Flexible and hybrid working hours
Ardagh Group is an Equal Employment Opportunity (EEO) Employer and does not discriminate on the basis of age, race, color, religion, gender, sexual orientation, gender identity, gender expression, national origin, protected veteran status, disability or any other basis prohibited by federal, state, and local law.
Ardagh Group complies with federal, state, and local disability laws and makes reasonable accommodations for applicants and employees with disabilities. Contact Clare McHugh (****************************) if a reasonable accommodation is needed.
Information Security Specialist
Information Security Analyst Job 22 miles from Wheaton
Harrison Street is a leading investment management firm exclusively focused on alternative real assets. Headquartered in Chicago and London with offices throughout North America, Europe and Asia, the Firm has more than 280-employees and nearly $56 billion in assets under management. Clients of the Firm include a global institutional investor base domiciled in North America, Europe, Asia-Pacific, Middle East and Latin America.
Under direction of the Director, Head of Information Security, Global CISO, the candidate will support and assist on Harrison Street's (HS's) multi-faceted cybersecurity program. The candidate works with internal and external business partners, technology staff, and third-party vendors to drive the cybersecurity strategy, manage tactical cybersecurity initiatives, and complete day to day cybersecurity related tasks. Further, the candidate will assist in external communications and maintain reporting requirements with the security program to maintain a best-in-class program in a regulated environment. Attention to detail, ownership, accountability, and critical thinking skills are required.
Responsibilities50% HS 3rd Party / External Cybersecurity Program Management Manage 3rd party vendor cybersecurity assessments, risk tracking, and other activities. Leads cybersecurity conversations with vendors to provide ongoing monitoring and control enforcement of required controls. Lead execution of cybersecurity audits on HS Operating Partners and other 3rd party partners and managers. With input from the CISO, as needed, oversees and improves the cybersecurity maturity models, risk ratings, and internal/external facing audit output templates. Works to understand the evolving cybersecurity risk at the asset, JV, and manager levels and continually enhances the program to mitigate. Builds a working relationship with third party partners to provide advisory input, cybersecurity posture and potential enhancements. Works with internal stakeholders to prioritize audits and conducts follow up debrief calls with operating partners. Provides input into third party audit requests and generates evidence as needed. 25% Documentation, Configuration, Technical Writing, and Communication Provide input to and assist with the updates of policies, procedures, and other program related documentation. Assist with the configuration & oversight of cybersecurity tools & platforms. With support from the CISO as needed, produce executive level documentation, audit reports, analysis, technical writings, and communication. Effectively communicate with executives, business level stakeholders, employees, operating partners, and vendors. Communicate details around complex topics Set and manage realistic and appropriate expectations 20% HS Cybersecurity Program Management Support Assist in maintaining a program aligned to the NIST cybersecurity framework, SEC and other regulatory guidance, and industry best practices. Assist with the evaluation, mitigation, and reporting of information security risks within Harrison Street. Provide input into firmwide risk meetings; participates in quarterly security strategy and risk management meetings, as appropriate. Assist with the improvement of Harrison Street's existing cybersecurity toolset by planning and executing on toolset enhancements, as appropriate. Assists with monitoring threats, responding to incidents, and taking preventative measures. Assists with audits, e.g., SOX, data privacy and regulatory compliance, and other initiatives. Leverages IT tools to support audit artifact requests. 5% Miscellaneous Attend meetings and serve on committees, as requested. Maintain and increase knowledge and skills through attendance at meetings, conferences, training seminars and in-service training sessions.
Qualifications: 3+ years of experience in a regulated mid-market technology environment. Bachelor's Degree in a technical discipline such as Information Security, Computer Science, Information Services, or related field. Experience with Program and Project Management. Security certifications such as CISSP, CISA, or CISM preferred. Knowledge of PCI-DSS, HIPAA, HITRUST, and SSAE 18 SOC 1 & 2 preferred. Experience with various hardware, software, and communications products preferred. Knowledge of data communications and network security fundamentals preferred. Knowledge of database fundamentals preferred. Knowledge of platform and system integrations preferred. Knowledge of Enterprise Architecture design preferred. Knowledge of M&A diligence and integrations preferred.
Required Skills Must be able to evaluate critical problems and determine solutions. Must have excellent written and verbal communication skills. Must be able to interpret and apply relevant laws, regulations and policies. Must be able to read and understand technical manuals. Must be able to work for extended time at keyboard/terminal. Must be able to maintain professional and effective working relations with supervisors, co-workers. Must be able to work flexible hours, including weekends and evenings. Must be able to learn new skills and technologies.
Required Travel Ability to travel up to 10%
Information Security Specialist
Information Security Analyst Job 22 miles from Wheaton
Foley & Lardner LLP is a great place to work because of what we do and how we do it. Here, your unique perspectives, experiences, and abilities will be embraced and developed, so you can excel. Being a part of Foley means having the opportunities and resources necessary to gain experience, advance professional goals, and forge meaningful connections. It's a place where you can build your career and enjoy professionally satisfying work. We have over 2,300 people who are #HappyatFoley, and we think you will be too. #LIHybrid
Foley & Lardner is currently seeking an Information Security Specialist to join our team. The Specialist will be responsible for the development, monitoring, implementation, maintenance, and support of the firm's information technology security infrastructure.
Responsibilities
Proactively monitors security tools, systems, and alerts, and remediates / escalates issues as needed
Assists in operation and maintenance of full security technology stack, e.g., EDR, multi-factor authentication, External DNS, Active Directory, Data Loss Prevention, SIEM, Vulnerability Management, Security Orchestration and Automation, etc.
Ensures proper maintenance, patching, configuration, and updating of security tools and technologies
Supports the development and enforcement of Information Security policies, processes, capabilities, and tools
Actively involved in Vulnerability Management, Data Loss Prevention, Data Protection, Security Monitoring, and Incident Response programs
Assists in and supports the resolution of end-user issues relating to security problems and products
Participates in on-call rotations, requiring evaluation, escalation, and resolution of high-priority security events, incidents, and alerts
Works in concert with management and senior members of the Information Security team to recommend, evaluate, and implement new technology solutions as warranted
Works across multiple parallel projects using formal project planning techniques
Creates Data Loss Prevention monitoring and alerting rules to identify data loss risk to firm and client data
Proactively monitors DLP alerts and identifies / escalates issues as needed
Participates in security investigations and analysis of logs, events, incidents, as required
Develops tools and scripts to assist in automating manual processes
Participates in risk management and compliance / audit activities
Qualifications
High School Diploma or GED required; Bachelor's Degree in Cybersecurity, Engineering, Information Technology, or Management Information Systems strongly preferred
Minimum of three (3) years of experience in cybersecurity operations or other related technology field required
Security Industry certification(s) and/or specialized experience in cybersecurity/information security (CISSP, OSCP, CEH, GIAC, Azure, etc.) desired
Experience with following technologies: Palo Alto Firewalls, Tenable Security Center, MFA, Cisco Umbrella, VPN, EDR, Email Security, DLP, UEBA, SOAR, NAC, SIEM, CASB, Public Cloud Security preferred
Experience with Microsoft PowerShell, Python, and/or other scripting languages preferred
Experience in performing Digital Forensics and Incident Response preferred
Cyber Security Analyst
Information Security Analyst Job 9 miles from Wheaton
Double Good's mission is to create joy. We create joy with our delectable and award-winning popcorn. We create joy with our easy-to-use fundraising platform that raises a meaningful amount of money for youth sports and activities, empowering kids to pursue their dreams. We create joy through our Kids Foundation which hosts Double Good Days events across the country to bring all-ability fun to children with special needs and their families. As featured on the Today Show, Double Good is not just about the product; we have a strong social mission.
In recent years, Double Good has seen 40% year over year growth, and we're excited about our future! We're excited about the possibility of you joining our mission. We are looking for a Cyber Security Analyst to join our growing IT team.
Location - onsite at our Elmhurst facility.
About the role:
* Guard all company data, particularly sensitive information, from both internal and external threats by designing broad defenses against would-be intruders
* Take the lead in day-to-day monitoring for unusual activities, implement defensive protocols, and report incidents
* Collaborate with other members of the cross-functional steering committee to develop new protocols, layers of protection, and other proactive and defensive systems for remaining ahead of cyber criminals
* Maintain documentation of security guidelines, procedures, standards, and controls
* Maintain knowledge of current cybercrime tactics.
* Collect data on current security measures for risk analysis, and write systems status reports regularly
* Monitor constantly for attacks and run appropriate defensive protocols if a breach occurs
* Conduct testing to identify vulnerabilities, and collaborate with the cybersecurity team to update defensive protocols when necessary
* Help lead security awareness employee training to prevent phishing and other forms of cyberattack
* Configure antivirus systems, firewalls, data centers, and software updates with a security-first mindset.
Grant credentials to authorized users, monitor access-related activities and check for unregistered information changes.
Experience & Skills we value:
* Bachelor's degree (or equivalent) in Cyber Security Engineering or related field.
* Three to five years of experience in cybersecurity at a midsize or large company.
* Deep knowledge of IT, including hardware, software, and network security.
* A meticulous eye for detail and an ability to perform in a fast-paced growing environment.
* Strong abilities in critical thinking, problem-solving, logic, and forensics.
* Excellent verbal and written communication skills.
* Ability to work successfully in both individual and team settings.
* Experience in writing security policies and procedures for the company and publishing and helping with adoption
Nice to have and/or you'll learn:
* Ability to think like a hacker in order to stay ahead of threats
* Certified Information Systems Security Professional (CISSP)
Equal Pay Disclosure(s):
We're on a mission to create more joy in people's lives, and that includes our internal employees. We create a place people love to be a part of, where people can discover and practice their unique skill sets, a place where they can contribute and do their best work. We do this by offering our employees a competitive compensation & benefits plan.
Base Pay range for this position:
* $85,000 - $120,000 annually
* Target Annual Reward Plan (ARP): Bonus paid at 15% (% of Annualized Base Pay, paid quarterly)
The final discretionary compensation that will be offered for this role depends on a variety of factors, including job-related knowledge, skills, experience, and market location.
Benefits:
* Double Good offers competitive benefits including medical, dental and vision coverage with plans that can fit each teammate's needs. We offer immediate vesting in our 401k plan, paid time off, company-paid leaves and other perks including a Popcorn Allowance (yup, free popcorn!).
* Visit the Careers page on our website for more information at ***********************************
Double Good is an Equal Opportunity and Affirmative Action employer, working in compliance with both federal and state laws. We are committed to the concept of Equal Employment opportunity. Qualified candidates will be considered for employment regardless of race, color, religion, age, sex, national origin, marital status, medical condition, or disability. The EEO is the law and is available here. Right to Work Statement (English and Spanish).
Security Operations Center (SOC) - Information Security Analyst
Information Security Analyst Job 12 miles from Wheaton
Title: Security Operations Center (SOC) - Information Security Analyst Company: Award-Winning, $50B Publicly Traded Company Type: Full-Time Location: Hybrid - Chicagoland Area (Onsite 3-4 Days/Week) Travel: None Job Overview Join an award-winning, publicly traded company and be part of a fast-paced, cutting-edge security team! This newly developed SOC Analyst role offers an exciting and dynamic environment where no two days are the same. You'll have the opportunity to work with leading security tools like Splunk, CrowdStrike, Digital Shadows, and Proofpoint, while collaborating with a skilled and supportive security engineering team. You'll be part of a tight-knit, communicative team that values collaboration, knowledge-sharing, and professional growth. If you thrive in fast-paced security operations and enjoy hands-on problem-solving, this is an excellent opportunity to make an impact. Key Responsibilities:
Manage the Phish Alert mailbox.
Perform QA on tickets for a service provider.
Handle tier 2 escalated inquiries.
Support security operations through log aggregation and analysis.
Leadership & Team Culture The leadership team is known for holistically supporting its team members, ensuring that growth, learning, and well-being remain top priorities. They provide ongoing career development opportunities, mentorship, and hands-on training to help employees expand their expertise and advance their careers. Beyond technical growth, leadership fosters a culture of inclusivity and collaboration, ensuring that every team member is heard, valued, and supported. Open communication, continuous learning, and a strong sense of community define the workplace, empowering individuals to contribute, innovate, and succeed. Requirements
3+ years of experience in cybersecurity or a related field.
Proficiency with at least some of the following tools: CrowdStrike, Proofpoint, Digital Shadows, or Splunk
Experience working in a Security Operations Center (SOC) environment is a plus, but not required.
Compensation & Benefits
Base Salary: $70,000 - $90,000 (dependent on qualifications, skills, and experience).
Bonus Eligible.
Comprehensive Benefits Package Includes:
Medical, Dental, Vision, and Life Insurance
Traditional and Roth 401(k) with company match
Employee Stock Purchase Plan (ESPP)
And much more!
Apply Today!
Information Security Analyst I
Information Security Analyst Job 22 miles from Wheaton
At the United Center, we believe that people's stories are enhanced by sports, entertainment, and community. Our purpose is to enhance everyone's stories through iconic experiences while at the United Center. In the role as Security Analyst I you will help our team bring the next round of stories to life on the United Center campus.
The Information Security Analyst will play a key role in monitoring, analyzing, and responding to security incidents and threats targeting our environment. The ideal candidate will be a self-starter, have a strong analytical mindset, attention to detail, and a passion for identifying and mitigating cybersecurity risks. This is a hybrid position.
General Responsibilities (including but not limited to):
Responsible for validating security alerts and ensuring appropriate action is taken to mitigate threats
Investigate security incidents, and vulnerabilities to ensure appropriate action is taken to mitigate threats
Technical owner for internal security tools and primary contact for external partners
Maintain security incident response plans, procedures, and documentation
Modify or establish internal controls, process and procedures related to IT Security
Collaborate with cross-functional teams to implement security controls and measures to prevent and mitigate security threats
Provide cybersecurity recommendations on new technologies and/or how to address new risk
Manage assigned projects and tasks, ensuring timely completion and communication
Stay current on the latest cybersecurity threats, trends, and vulnerabilities to proactively address potential risks
Participate in third party security assessments
Other duties may be assigned
Requirements:
At least 2 years of professional experience in cybersecurity
Strong understanding of cybersecurity principles, practices, frameworks, and technologies
Experience with security incident detection, analysis, and response using security tools
Knowledge of common cybersecurity threats, attack vectors, and mitigation strategies
Excellent analytical and problem-solving skills with the ability to prioritize and manage multiple tasks in a dynamic environment
Effective communication skills with the ability to effectively communicate technical information to non-technical stakeholders
Education:
Bachelor's degree in computer science, Information Security, or related field.
Or combination of associate degree and appropriate experience.
Specific Job Knowledge, Skill, and Ability:
Language Skills - Ability to read, analyze and interpret the most complex documents.
Math Skills - Ability to add, subtract, multiply and divide in all units of measure, using whole numbers, percentages and draw and interpret bar graphs.
Reasoning Ability - Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems. Ability to deal with nonverbal symbolism.
The pay range for this role is $65,000-85,000 annually. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to skill set, depth of experience, certifications, and specific work location.
The total compensation package for this position may also include annual performance bonus, 401K retirement plan with company match, paid time off and commuter benefits. Additional perks include access to our state-of-the-art gym with free fitness classes, catered meals, fun events and free parking.
Senior Securities Analyst II
Information Security Analyst Job 22 miles from Wheaton
NFA is purpose-driven. We safeguard the integrity of the derivatives markets, protect investors and ensure that our Members meet their regulatory obligations. We take pride in our work; maintain a conviction to do the right thing; empower each other; and support our community. Envision your career in a place where performing critical regulatory work within the financial industry is as significant as the passionate and talented individuals with whom you work.
When you join NFA as a Senior Securities Analyst, Market Regulation, you will utilize your analytical and problem-solving skills to support NFA's Market Regulation program. By conducting detailed trade analysis and market surveillance (primarily for security-based (SB) swaps), you'll be responsible for assisting swap execution facilities (SEF) in meeting their self-regulatory responsibilities to monitor trading on their own platforms.
Bring your curiosity and critical thinking skills. Bring your thirst for knowledge and learning. Bring a healthy skepticism and an eye for detail.
What you'll do:
You'll join a high-performing team of dedicated problem solvers who conduct detailed trade analysis and market surveillance on behalf of SEFs who contract with NFA for these services. Specifically, your responsibilities will include:
* Reviewing trade activity related to trade exceptions and alerts triggered by surveillance systems.
* Conducting SEF pricing analysis.
* Documenting findings and preparing requests for information for firms, if necessary.
* Reviewing staff analysis and ensuring daily work and investigations are progressing in a timely manner.
* Reviewing price distortions and, where possible, disruptions of delivery or cash settlement processes.
* Utilizing outside quote vendors and market data to monitor various market situations.
* Reviewing basis relationships between SBSEF products and corresponding markets.
* Surveilling off-SBSEF block trades to ensure they are executed in conformity with exchange rules and SEC regulations.
* Ensuring trade cancellations are conducted in accordance with SEC regulations and exchange rules.
* Leading monthly meetings with exchanges and communicating with exchange and clearing firm staff.
What we're looking for:
Detail-oriented, driven individuals thrive in this collaborative, analytical role. We value unique perspectives and are looking for motivated applicants with a broad range of backgrounds and experiences. If you're eager to apply your problem-solving abilities to serve a public good-supporting the integrity of the derivatives markets-and meet the qualifications below, we encourage you to apply to join our Market Regulation department as a Senior Securities Analyst.
* Bachelor's degree in a relevant field or equivalent work experience within the financial services industry
* Minimum of five years of experience in trade surveillance, regulation, compliance, analytics or a closely related field
* Prior experience with or development proficiency in technologies such as Python, C++, Java, C#, SQL, and Excel (including VBA)
* Hands-on experience with SB swaps and off-SBSEF block trades
* In-depth knowledge of SBSEF rules, SEC regulations and market regulation surveillance systems
* Demonstrated leadership skills with the ability to be proactive and foster a collaborative environment
The salary range for this position is $88,400-$147,400.00
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.
Requisition ID:680
Cyber Security Analyst
Information Security Analyst Job 7 miles from Wheaton
Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at *************************
Job Title: Cyber Security Analyst
Duration: 12 Months
Location: Oakbrook Terrace, IL
Job Description:
Responsible for planning, designing, and implementing a process for cyber security monitoring, incident detection, and incident response. 1-3 yrs of experience and a Bachelor's degree in IT systems or a related discipline.
Position Requirements:
- Configuration and administration of logging aggregation and security event monitoring tools (like Industrial Defender, Splunk, etc.)
- Configuration and maintenance of performance monitoring tools (like Solarwinds, Uptime, CA Spectrum, etc.)
o Understands and can configure tools and endpoint systems to use SNMP for monitoring
- General IT Support (application patching, client updates, remote access and administration tools)
- General Networking knowledge (IP Networking, OSI Stack, etc.)
Additional Information
Thanks & Regards'
___________________________________________________________________________
Vikram Bhalla | Team Recruitment | Mindlance, Inc. | W: ************
All your information will be kept confidential according to EEO guidelines.
IAM Information Security Controls Specialist
Information Security Analyst Job 22 miles from Wheaton
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Global Information Security (GIS) is responsible for protecting bank information systems, confidential and proprietary data, and customer information. GIS develops the bank's Information Security strategy and policy, manages the Information Security program, identifies and addresses vulnerabilities and operates a global security operations center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that enables the right individuals to access the right resources at the right times and in the right context. IAM addresses the mission-critical need to ensure appropriate access to the resources across increasingly heterogeneous technology environments, and to meet increasingly rigorous compliance requirements.
What you can expect in Identity & Access Management:
In today's highly connected world, managing and securing the identity of users is essential to the safety and success of our workforce. The Identity & Access Management (IAM) team works within Global Information Services (GIS) and in close participation with all other LOB teams as well as second and third line of defense partners. This role is highly visible and requires frequent interaction with senior management and key stakeholders. Are you passionate about the latest IT technologies and thrive in a fast-paced international environment? In a typical day, you may work with other team members on the book of work, operational concerns, or risk items. You will help overcome obstacles and maintain good relationships with key stakeholders across The Bank to ensure timely and effective delivery. We offer you the opportunity to collaborate with passionate competent people, experts in their field. We thrive on being challenged and everything we do is anchored in managing risk for The Bank.
This role is responsible for supporting Identity and Access Management (IAM) break/fix issues impacting end user and service functionality. You will regularly collaborate with experts and the user community in and out of our team, both in country and in other regions, so excellent communication skills are very important. The role will also involve discussion with employees and senior leadership. You will utilize in-depth subject matter expertise and business requirements to deliver against risk and performance metrics. Staying current with common and emerging threats related to access, you will have an opportunity to proactively develop, implement, and influence controls and policy advancements. You will partner with key stakeholders from line of business organizations to respond rapidly to security events and escalations that pose risk to the organization.
Responsibilities will include but not limited to:
* Actively troubleshoot access issues, verify policy compliance approach to resolving incident tickets
* Communicate effectively with end users and business partners.
* Build and monitor alerting and dashboards.
* Identify areas for further process automation, simplification, and improvement.
* Provide status updates for executives and stakeholders in non-technical terms encompassing risk, impact, containment, remediation, etc.
* Risk management experience and mindset.
* Comprehensively document analysis, investigative activities, actions, etc.
* Ability to work non-standard hours, to include occasional on-call time during nights, weekends, and holidays.
* Apply knowledge of the Identity and Access Management industry policies and standards including laws, rules, regulations, and information security concepts related to access provisioning, validate alignment of processes and controls to requirements, and report on gaps related to adherence to policy requirements.
* Lead complex technical projects to successful delivery, includes facilitating project meetings, authoring project documentation and driving adoption.
Required Qualifications:
* Minimum of 3 years' experience within the operational side of the Information Technology, Security industry and Identity and Access Management
* Ability to analyze data and evaluate relevance to a specific issue or incident under investigation.
* Ability to handle multiple competing priorities in a fast-paced environment; ability to be decisive and take action without causing an undue delay.
* Ability to exercise independent judgment when responding to alerts.
* Ability to communicate effectively across all levels of the organization, to both technical and non-technical audiences.
* Familiarity with identity management standards, social engineering TTPs, and the incident response lifecycle.
* Knowledgeable of current access based exploits in traditional and cloud environments, for both human and non-human accounts.
* Proven experience presenting findings via written reports and orally to key stakeholders in clear and concise language.
* Ability to work in a strong team-orientated environment that is geographically dispersed with a sense of urgency and resilience.
* Critical thinking - must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks while remaining risk and objective focused.
* A strong working knowledge of security threat vectors, networking, network security and application security.
* Advanced problem solving skills.
* Demonstrates the capability of working in a team environment and collaborating with overseas partners.
* Ability to work independently.
* Strong leadership skills and qualities which enable you to work with peers and various levels of management.
* Strong analytical skills/problem solving/conceptual thinking.
Desired Qualifications:
* Broad technical knowledge of IAM lifecycle, ecosystem and enterprise scale products.
* Experience in the deployment of multi-factor authentication, role and attribute-based access control, and other strong authentication methods and solutions.
* Hands-on experience with IAM products and particularly on Ping suite of products (Ping Access, Ping Federate and PingID) and federation concepts.
* Strong technical knowledge of authentication and authorization protocols: OIDC, SAML, XACML, LDAP, OAuth, OpenID.
* 3-5 years' experience with cloud platforms (AWS, Azure, GCP etc.)
Shift:
1st shift (United States of America)
Hours Per Week:
40
Investment Operations Data Analyst - Security Data Management
Information Security Analyst Job 22 miles from Wheaton
At Harris, the true value of what makes us successful is found in our people. It is our unique mix of cultures, experiences, beliefs and backgrounds that sets Harris apart from the rest. We constantly strive to cultivate, nurture and amplify an unparalleled environment, where we value intellectual curiosity and uniqueness of thought. Inclusion is embedded in the very fabric of our culture of collaboration and openness.
We understand that a only tells one part of a broader story, and Harris is seeking dynamic candidates who can add to our best-in-class environment. We recognize that qualifications can be gained through both traditional and non-traditional paths, and we are committed to considering candidates who possess the potential to be excellent in this role regardless of prior experiences.
Therefore we encourage ALL interested individuals to submit their applications, even if they do not meet every requirement outlined in the job description.
The Position
The Security Data Management (SDM) group is responsible for the management of data and systems related to enterprise security reference data and security life cycle events such as corporate actions, proxy voting, pricing and market data management.
The Data Analyst is responsible for administering corporate actions and proxy voting events along with ensuring the accuracy and consistency of security reference and pricing data for the firm. This includes information stored in systems and data repositories, as well as information sourced both internally and externally. This position works closely with business partners throughout the firm to help define, manage, and access security data and to resolve issues as they arise. This individual will need to excel in a fast-paced, time-sensitive environment and be proactive in establishing productive relationships with key stakeholders throughout the process.
Responsibilities
Establish, monitor, and proactively manage the firm's security master data. This will include new security setups for trading, ensuring data integrity, and confirming all integrations occur on time and correctly.
Perform all tasks related to Pricing and Valuations for the Firm. This will include ensuring all securities are priced accurately and in a timely manner. As well as working with the Pricing Committee on all Fair Value activities for our securities.
Monitor and administer corporate actions events. This will include daily monitoring for corporate actions, accurate and timely processing into our portfolio accounting systems, calculate and apply any estimated prices, and provide leadership and coordination of corporate action events across all operational and trading teams.
Monitor and administer proxy voting events. This will include monitoring all upcoming votes on a daily basis through our proxy system, work with the Research team to ensure all polices are adhered to and ensure timely and accurate votes across all of our securities.
Leverage BI tools to analyze the operational data to ensure quality.
Assist with market data related activities and vendor management. This will include procurement of market data for the firm from selection, legal agreement and negotiations, and implementation of the data needed by various teams within the firm.
Support departmental and firm-wide projects as needed. Serve as key contributor and team member in firm-wide data initiatives.
Work with Technology teams on various data related integration projects.
Assist with the development and implementation of procedures and training materials for the team.
Serve as the Firm's subject matter expert on corporate actions and proxy voting by gaining a thorough understanding of the firm's proxy voting guidelines, security reference and market data.
Qualifications
Required
Bachelor's degree with a strong academic track record.
Minimum one year experience within investment management operations, consulting, audit or other relevant experience.
Sound understanding of security characteristics (Equity, Fixed income and Options).
Self-starter with the ability to assess, explain and solve complex problems.
Demonstrated ability to prioritize and juggle multiple tasks while remaining flexible to new requests.
Highly organized with ability to operate effectively in a fast-paced, deadline driven environment.
Acute attention to detail with an understanding of impacts to downstream processes.
The ability to work effectively both independently and in a team environment.
Excellent time management skills
Preferred
Experience in data management.
Experience with security reference data management systems (i.e. Eagle RDC).
Experience with querying database using SQL.
Experience in corporate action processing and proxy voting administration.
Healthy curiosity about the industry and trends in data management.
Willingness to Learn
Business Applications (Eagle, CRD, SS&C Advent Axys)
We offer a comprehensive benefits package designed to integrate life and work and to support our employees and their families. Benefits include, but are not limited to; medical, prescription drug, dental and vision insurance, paid time off, profit sharing plan, 401k plan, tuition reimbursement, commuter and holistic wellness benefits along with volunteer programs.
Actual annual base salaries may vary based on factors including but not limited to education, training, experience, and other job-related factors. If hired, base pay will be determined on an individualized basis and is only one part of the total compensation package, which, depending on the position, may also include a discretionary performance bonus and other Harris sponsored benefit programs.
Expected range for this Chicago-based role$75,000—$95,000 USD
Equal Employment Opportunity Policy Statement
Harris Associates L.P. pursues a policy of equal opportunity in all areas of employment including recruitment, hiring, training, compensation, benefits, advancement, and treatment on the job. This means that Harris does not discriminate against employees, or qualified applicants, based on an individual's race, color, religion, creed, sex, age, national origin, physical disability, sexual orientation, trans-gender status, transsexual status, status as a veteran or disabled veteran, genetic information or for any other reason prohibited by law. Harris reserves the right to review publicly available information about applicants (i.e., via social networking sites), to the extent permissible under applicable law.
Reasonable Accommodation Notice
We provide reasonable accommodation for individuals with disabilities and disabled veterans in job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the alternative email address below to contact us about your interest in employment at ****************** or you can call us at ************.
Privacy Statement
The information you send to us is used for employment purposes only. What you send is kept confidential-we will not give your personal information to outside parties without your consent.
Information Security Principal
Information Security Analyst Job 22 miles from Wheaton
GENERAL SUMMARY: The Information Security role is responsible for monitoring and managing the security posture of the Center for Research in Security Prices (CRSP), LLC. This security professional is tasked with identifying, responding to, and mitigating security threats; as well as participating as a member of a team in CRSP Project efforts.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Monitor and manage the organization's security posture:
Establishing security measures to detect, prevent, and mitigate cyber-attacks.
Assist with monitor and analysis of logs, network traffic, and other data sources to identify potential threats and vulnerabilities.
Review patching updates by working with the appropriate teams.
Oversee cybersecurity incident response activities as needed.
Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.
Recovery and Remediation
Plan, review and confirm annual Disaster Recovery tests.
Review and document Rapid Recovery requirements.
Craft disaster recovery plans for compromised data.
Serve as the primary point of contact for auditors, clients, and internal teams regarding information security issues.
Ensure adherence to security best practices, frameworks, and standards.
Function as a trusted advisor to senior leadership on emerging threats, compliance requirements, and operational risks.
Lead the support of third-party penetration testing, scheduling, and remediation efforts.
Stay current with emerging cybersecurity threats, vulnerabilities, and best practices.
Establish and verify security incident responses and playbooks.
Ensure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned.
Assist with technical expertise for confirming required compliances.
Deliver regular information security reports and assessments to management, oversight committees, and other stakeholders as needed.
Meet with technology owners regularly to ensure full visibility and understanding of open security vulnerabilities and the risks inherent with those vulnerabilities.
Research, design, and conduct ongoing training for staff on information security related areas.
Other duties as assigned.
REQUIRED QUALIFICATIONS:
Minimum Required Education/Experience:
Bachelor's degree and a minimum of five years' experience OR Associate degree with at least six years of relevant experience OR Experience with Linux, Windows and Windows server administration.
Experience in root cause analysis.
Knowledge of common information security management frameworks, such as ISO/IEC 27001, and NIST.
Excellent verbal and written English communication and interpersonal skills, including active listening skills.
Demonstrated ability to communicate and document technical concepts.
Demonstrated critical thinking and problem-solving skills required, including the ability to analyze and evaluate information objectively.
Demonstrated ability to be reliable, accountable, and exhibit organization and time management skills, with the ability to coordinate multiple activities simultaneously.
This position may require work outside of normal work hours for maintenance and upgrades.
A strong attention to detail is required to be successful in this role.
PREFERRED QUALIFICATIONS:
CISA, CISM, GSEC, or other security certifications.
Working knowledge of Microsoft SQL Server.
Working knowledge of appliance and software-based firewalls.
Working knowledge of enterprise server and / storage systems.
Working knowledge of PowerShell and BASH scripting.
TRAVEL REQUIRED:
Minimal travel required; however, candidates should be open to occasional travel as needed to support business objectives.
WORK ENVIRONMENT:
The noise level in the work environment is usually moderate.â¯
PHYSICAL DEMANDS:
While performing the duties of this job, the employee is regularly required to communicate with others. The employee is frequently required to stand, walk, sit, demonstrate hand and finger dexterity in the course of their work, handle or feel, and reach with hands and arms. The employee is occasionally required to climb, balance, stoop, kneel, crouch or crawl.â¯â¯â¯
The expected physical workload is classified as:â¯
Light Work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force frequently, and/or a negligible amount of force constantly to move objects. If the use of arm and/or leg controls requires exertion of forces greater than that for Sedentary Work and the worker sits most of the time, the job is rated for Light Work. walking and standing are required only occasionally, and all other sedentary criteria are met.â¯â¯
LOCATION: 105 West Adams Street, Suite 1700, Chicago, IL
HOURS: Full Time 8:30 a.m. - 5:00 p.m. normal working hours, Monday through Friday. Some flexibility may be required. Some overnight and weekend and overtime may be required.
Salary Range = $166,335.00-$216,236 USD Annually + Benefits
The referenced salary range is based on the Company's good faith belief at the time of posting. Actual compensation may vary based on factors such as work experience, market conditions, education/training and skill level.
Center for Research in Security Prices, LLC is an Equal Opportunity / Affirmative Action Employerâ¯
Information Security Manager
Information Security Analyst Job 6 miles from Wheaton
blue Stone Executive Search has been retained by our client, a multi billion dollar global organization, a world leader in their vertical, with a dedication to cutting-edge technology and work/family balance, to search for a motivated and energetic IT Leader to direct and manage their Information Security objectives on a company-wide basis.
Job Description
As the Manager of Information Security, you will be responsible for the development and execution of a comprehensive company wide information security strategy. The Information Security Manager will build and work with appropriate internal staff to deploy an information security awareness program to support compliance with information security policy, standards, procedures, and best practices. The Information Security Manager will develop needed security policies while working with appropriate HR and Legal teams on final version approval and distribution. You will also be expected to participate in information security response and provide audit/compliance and forensic activities for the company, as needed. As the Information Security Manager, you will implement proactive processes and technologies to monitor the company internal and external network environment for potential threats with appropriate response processes. You will also evaluate new technology that the company would use in execution of the information security strategy using both quantitative and qualitative methods. The Information Security Manager will also help to create a policy for the company and design and implement necessary tools to protect company data on employee owned devices.
Qualifications
Experience and familiarity with control and security frameworks such as COSO, COBiT, and ISO
Candidate has one or more current CISSP, CISM, CISA certifications
Two to five years security leadership experience required
Bachelor's degree in related field preferred
Solid understanding of information technology and information security including; firewalls, VPN's, penetration testing and other security devices with an emphasis on network security
Experience with management and administration with firewall technologies from Cisco and other firewall manufacturers
Knowledge in developing and socializing security policies and processes
Demonstrated ability to create information security strategy and execution plans
Knowledge of intrusion detection and prevention solutions and experience implementing them in a corporate environment
Excellent interpersonal skills with the ability to communicate with technical and non-technical contacts
Must be highly organized and detail oriented
Exceptional analytical and problem solving skills
Excellent written and verbal communication skills
Ability to manage multiple priorities to deliver results
Additional InformationblueStone Executive Search successfully finds and secures the top talent within targeted industries. As executive search professionals, the advice we impart and the solutions we provide can have a significant impact on the businesses, careers and lives of others. We recognize these responsibilities and take them seriously. We value long-term relationships above short-term gain. We are continually seeking exceptional talent with the highest standards of professionalism.
E-mail resumes to [email protected] and phone ************.
Information Security Specialist
Information Security Analyst Job 22 miles from Wheaton
Foley & Lardner LLP is a great place to work because of what we do and how we do it. Here, your unique perspectives, experiences, and abilities will be embraced and developed, so you can excel. Being a part of Foley means having the opportunities and resources necessary to gain experience, advance professional goals, and forge meaningful connections. It's a place where you can build your career and enjoy professionally satisfying work. We have over 2,300 people who are #HappyatFoley, and we think you will be too. #LIHybrid
Foley & Lardner is currently seeking an Information Security Specialist to join our team. The Specialist will be responsible for the development, monitoring, implementation, maintenance, and support of the firm's information technology security infrastructure.
Responsibilities
Proactively monitors security tools, systems, and alerts, and remediates / escalates issues as needed
Assists in operation and maintenance of full security technology stack, e.g., EDR, multi-factor authentication, External DNS, Active Directory, Data Loss Prevention, SIEM, Vulnerability Management, Security Orchestration and Automation, etc.
Ensures proper maintenance, patching, configuration, and updating of security tools and technologies
Supports the development and enforcement of Information Security policies, processes, capabilities, and tools
Actively involved in Vulnerability Management, Data Loss Prevention, Data Protection, Security Monitoring, and Incident Response programs
Assists in and supports the resolution of end-user issues relating to security problems and products
Participates in on-call rotations, requiring evaluation, escalation, and resolution of high-priority security events, incidents, and alerts
Works in concert with management and senior members of the Information Security team to recommend, evaluate, and implement new technology solutions as warranted
Works across multiple parallel projects using formal project planning techniques
Creates Data Loss Prevention monitoring and alerting rules to identify data loss risk to firm and client data
Proactively monitors DLP alerts and identifies / escalates issues as needed
Participates in security investigations and analysis of logs, events, incidents, as
Develops tools and scripts to assist in automating manual processes
Participates in risk management and compliance / audit activities
Qualifications
High School Diploma or GED required; Bachelor's Degree in Cybersecurity, Engineering, Information Technology, or Management Information Systems strongly preferred
Minimum of three (3) years of experience in cybersecurity operations or other related technology field required
Security Industry certification(s) and/or specialized experience in cybersecurity/information security (CISSP, OSCP, CEH, GIAC, Azure, etc.) desired
Experience with following technologies: Palo Alto Firewalls, Tenable Security Center, MFA, Cisco Umbrella, VPN, EDR, Email Security, DLP, UEBA, SOAR, NAC, SIEM, CASB, Public Cloud Security preferred
Experience with Microsoft PowerShell, Python, and/or other scripting languages preferred
Experience in performing Digital Forensics and Incident Response preferred
#l
Information Security Manager Architect_Deerfield, Illinois
Information Security Analyst Job 26 miles from Wheaton
We are seeking an experienced Quality Assurance Analyst to test updates to our client's website and other interactive deliverables. Primary responsibilities include executing test plans, updating test reports, writing bug defects, verifying fixes, and testing pages and emails on supported environments.
Job Description
Interview mode: Phone and Skype (On site interview may be required)
We can submit C2C consultants
JD:
OBJECTIVES:
• Reports to the Head of Security Strategy & Architecture
• Provides leadership and guidance to the regional IT organization on cyber and information security and risk management activities, education, and solutions
• Contributes to defining global security strategy and architecture processes
• Defines and establishes regional security processes based on global security strategy and architecture, with a focus on practices for Vulnerability Management, Systems Development Lifecycle, Information Security Processes including risk based Architecture design.
• Directs a regional approach for the implementation of global IT security standards and methodologies
• Provides input to global security operations such as incident response, monitoring, trend identification, and security posture and remediation
ACCOUNTABILITIES:
• Reports to the Head of Security Strategy & Architecture on plans and status of relevant projects, including the regional security strategy and implementation initiatives
• Contributes to the design, development, and deployment of global security strategy and architecture concepts
• Cooperates with regional teams in understanding global security strategy and architecture requirements
• Conducts periodic review of security-related SDLC processes and stage gates
• Incorporates cyber security and IT risk management into regional activities
• Be the subject matter expert in security and assessments, including vulnerability management processes, vendor security reviews, penetration testing, and application security
• Conducts follow-ups on any identified corrective actions
• Functions as an advisor to system owners, security program managers and others in all matter (technical and otherwise) involving IT security and continuity
• Directs or delegates level 3 support services for the region
• Manages the relationship between IT security and regional business executives and business managers
• Provides recommendations in planning of programs and projects in the area of cyber security
• Reviews and manages budget and reports financial and event status to Head of Security Strategy & Architecture
EDUCATION, BEHAVIOURAL COMPETENCIES AND SKILLS:
Required:
• Bachelor's Degree (business administration, risk management, information security, Management Information Systems (MIS), Computer Science or related IT field) or high school degree
• 7+ years IT experience
• 5+ years of work experience in developing, implementing and managing security solutions
• 3+ years of work experience in designing and architecture security strategy and solutions
• Demonstrated leadership role in working with C-Suite executives and the Board
• Experience with implementing and operating security programs in a global environment, with a focus in Germany and European countries
• Hands-on experience with the development of security strategy and frameworks, architectural methodologies, and service delivery
• Project management experience including full lifecycle implementation
• Proven ability to analyze a wide variety of data and make calculated, risk-based decisions
• Ability to communicate ideas and data both verbally and written in a persuasive and appropriate manner
• Ability to assess strengths and weaknesses of staff members and provide suggestions for improvement
• Ability to write and speak in the English language
Desired:
• In-depth pharmaceutical industry and drug development experience
• Experience with validated systems
LICENSES/CERTIFICATIONS:
• Information security certification (CISSP, CISM, CISA, GIAC, CEH, CCSK)
TRAVEL REQUIREMENTS:
• Access to transportation to attend meetings
• Ability to fly to meetings regionally and globally
• Willingness to travel up to 25-50%.
Location: Deerfield, IL.
Duration: 1 Year+
Additional Information
All your information will be kept confidential according to EEO guidelines. Please call @ ************ Ext 183
Data and System Security Engineer
Information Security Analyst Job 25 miles from Wheaton
AYR Global IT Solutions is a national staffing firm focused on cloud, cyber security, web application services, ERP, and BI implementations by providing proven and experienced consultants to our clients.
Our competitive, transparent pricing
model and industry experience make us a top choice of Global System
Integrators and enterprise customers with federal and commercial
projects supported nationwide.
Job Role: Data and System Security Engineer
Location: Lincolnshire, IL
Duration: 6+ Months
Qualifications
Job Description:
Data and System Security engineer
Experience with data encryption management solutions, such as Vormteric and CloudLink
Experience with PKI management solutions, such as ADCS and External providers
Investigative and analytical problem solving skills
Customer service/support experience
Additional Skills:PKI
Knowledge of encryption management technologies, such as Vormetric, CloudLink.
Additional Information
If anyone might be intersted please send resumes to kmarsh@ayrglobal (dot) com or you can reach me direct at **************
IAM Information Security Controls Specialist
Information Security Analyst Job 22 miles from Wheaton
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Position Summary
Individual contributor position, Info Security Controls Specialist, responsible for daily granting of logical access with the highest quality of service for hundreds of proprietary applications on different technology models and platforms. Result-oriented, business focused, and successful team player at interfacing across multiple organizational units, at various levels. Analytical mindset that enjoys working on troubleshooting root cause definition for complex business problems where analysis of situations or data requires an in-depth evaluation of various factors.
Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Comfortable with ambiguity and uncertainty on day-day duties by leveraging creativity and collaboration through team synergies to best solve challenges to enable business on real time.
Required Qualifications:
* 3+ years of previous experience in Information Technology / Information Security / Identity and Access Management
* Detailed, bank specific access administration knowledge in Windows, and/or Midrange and Mainframe Platforms with emphasis on security and access controls
* Experience leading complex technical projects, meeting target timelines, facilitating project meetings, authoring project documentation, issue resolution, and project resource identification
* Excellent process design capability to improve overall efficiency, mitigate resource conflicts, and improve customer/client experience
* Ability to navigate and work effectively across a complex, geographically dispersed organization that includes technical and non-technical partners
* A risk oriented perspective is required along with the ability to support access management processes
* Strong analytical skills/problem solving/conceptual thinking
* Communicates effectively and confidently with others and collaborates productively to get things done
* Demonstrable ability to self-direct project outcomes, with minimal supervision to achieve program goals
* Strong leadership skills and qualities which enable you to work with peers and various levels of management
* Microsoft Office Proficient (Excel, Word, Outlook, Visio, PowerPoint, Etc.)
Desired Qualifications:
* Experience or relevant course work with various languages such as Python, PowerShell, JAVA, VBA, Angular, SQL/Toad, etc.
* Strong reporting and documentation skills including experience in Microsoft Visio
* Data analysis and visualization tools such as Tableau, Python, Visio, etc.
Shift:
1st shift (United States of America)
Hours Per Week:
40
Information Security GRC Senior Manager
Information Security Analyst Job 22 miles from Wheaton
Foley & Lardner LLP is a great place to work because of what we do and how we do it. Here, your unique perspectives, experiences, and abilities will be embraced and developed, so you can excel. Being a part of Foley means having the opportunities and resources necessary to gain experience, advance professional goals, and forge meaningful connections. It's a place where you can build your career and enjoy professionally satisfying work. We have over 2,300 people who are #HappyatFoley, and we think you will be too.
Foley & Lardner LLP is currently seeking a Senior Manager, Information Security GRC to join our team. The right candidate will lead efforts to identify, assess, and manage Information Security risk across the firm's information and technology environment. This individual is responsible for assessing risk and control effectiveness based on industry standards in order to drive Information Security compliance, prioritization, and program planning to effectively manage risk while enabling the firm's attorneys to provide effective and secure client service. This individual is responsible for operating the risk management and audit program - leading efforts to plan, test, evaluate, document, remediate, and improve IT and security control effectiveness and maturity.
This individual will collaborate with stakeholders from Information Technology and Information Security architecture and operations teams to translate risk into a strategic and operational roadmap for the Information Security program. The Senior Manager will also be the primary liaison with key stakeholders, third-parties, and clients to coordinate internal and external security reviews and reporting. They will maintain compliance with third-party security controls, and provide subject matter expertise and independent validation of program health and metrics to senior leadership. The ideal Senior Manager will have proven and demonstrated leadership skills including relationship-building and collaboration skills with clear ability to influence, gain buy-in and negotiate with a diverse group of key business partners/stakeholders, including senior management.
Responsibilities
Conduct risk and standards-based Information Security risk assessments and IT/Security audits
Assess control effectiveness and associated Information Security capability maturity to drive strategic and operational prioritization for Information Security and Information Technology
Establish audit work programs to effectively evaluate IT operations, based on best practices, regulatory requirements, and the operating environment
Review IT and Security systems, processes, documentation, and tools to make an assessment of the firm's information technologies and business systems activities to determine operating effectiveness, risk assessment, appropriateness of testing activities in order to achieve established objectives
Maintain compliance to industry standards and certifications such as ISO 27001. Conduct reviews and special projects to verify that IT system controls are adequate and operating effectively
Develop recommendations for security controls and processes
Maintain up-to-date reports to satisfy third-party security requirements
Design and enhance all IT audit efforts, specifically audit methodology and techniques, pursuant to firm and professional standards such as COBIT
Produce a high-quality end-product that clearly documents the audit work performed while adhering to schedules and deadlines
Make oral or written presentations to management to highlight noted deficiencies and recommended corrective action to improve internal operations and reduce costs
Participate in appraising adequacy of corrective actions taken by management to improve the reported deficient conditions
Review, document, evaluate, and test business processes and/or manual and automated technology controls in the IT environment
Develop and implement testing methodologies for business processes (including Business Continuity and Disaster Recovery) and/or availability, integrity, and confidentiality in the IT environment
Comply with the firm's Professional Responsibilities and ethical standards
Perform other duties as assigned including:
Responding to Requests for Information (“RFIs”) from customers
Supporting the Information Security team with physical security tasks, as assigned
Qualifications
Bachelor's degree required; Degree in IT, Information Security, Computer Science, Business, Finance, or related field preferred
CISSP, CISA, CRISC, CISM or similar certifications preferred
Minimum of ten (10) years of increasingly substantive roles in information security and risk management or information technology required
Minimum of five (5) years of experience in information security required; experience in governance, risk, and compliance strongly preferred
Prior people management experience required
Direct experience and/or management of information security systems, tools, and operational functions required
Demonstrated experience in testing, evaluating, and documenting IT controls for compliance required
Information systems internal audit experience at a mid or larger size company strongly preferred
Strong familiarity with IT auditing techniques, COBIT, ISO 27001, NIST 800-53 or equivalent framework
Solid understanding of assessing and designing internal controls in an enterprise-level environment
High level of familiarity with various data privacy, security and compliance regulations across multiple jurisdictions
Experience managing complex projects to completion #LI-Hybrid
Pursuant to the Colorado Equal Pay for Equal Work Act and Illinois Equity Pay Act, the salary range for this Denver or Chicago based position is between $157,500 - $256,900. Pursuant to the Washington DC Pay Transparency Law, the salary range for this Washington DC based position is between $171,800 - $280,400. These figures represent the full compensation range of this position. The actual offered amount will be determined based on the following factors: education, experience, geographic market, and internal pay equity at Foley. We are accepting ongoing applications.