Fulltime Cloud Security Analyst openings in Chicago, United States on September 02, 2022

Cloud Security Analyst at TEKsystems

Location: Chicago

TEKsystems is seeking Cloud Security Analysts that are Azure focused. Please apply with having experience in the following. If you do not have everything on this list please still apply as we can consider you for other roles.

Description:

Our client is looking for FIVE Cloud Security Analysts to join our Global Information Security (GIS) team.

The Cyber Security Defense team in GIS is a true global operations shop with leading edge tools, processes, and people. The ideal candidate must have deep knowledge of security controls, features, and operations for top Cloud providers with the focus on Microsoft Azure. Candidate should have relevant experience to be able to build operational information protection control environment in Microsoft Azure. The candidate should be intellectually curious about technology and have a strong desire to find and mitigate risks.

They will be responsible for building up this new team, writing playbooks, eyes on glass, responding to alerts, documenting the alerts. The types of alerts are still being figured out as this environment is new to them. They will be using Azure Defender/Microsoft Defender as the SIEM tool for the monitoring of these alerts. They are really helping to build this from the ground up. The idea of this team is to evolve of his team, migrating a product (internal tool) to Azure cloud, moving from on prem to to the cloud. Build a cloud cyber security operations center – blue team, CSPM and workload security capabilities in place and configured and azure environment. Make sure the tools configured and cloud environment is in compliance with corporate standards, alerts built out, etc.

They are currently going through the milestones right now, continuing to mature the blue team, after October plan is to build in automation and enhancing capabilities, build cloud specific red team for purple team processes and continual improvement.

The Cloud Security Analyst will work closely other GIS teams as experts in the detection and analysis of all suspicious activity originating in or related to the bank’s Azure environment. The Analyst is responsible for the timely and accurate identification of security events, mastery of the technologies and information that we analyze, while maintaining expert-level knowledge of detection tools and techniques, and proper escalation of incidents for immediate response, containment, and recovery.

Operates processes and/or tools that provide alert monitoring, analysis, triage, and incident response. Uses advanced understanding of security threats, vulnerabilities, exploits, attack vectors, malware, and digital forensics to guide operations and reporting. Typically has 2-5 years of relevant experience across multiple information security and SOC disciplines as an individual contributor.

The ideal candidate must be information security savvy, self-motivated professional who has a strong passion for cyber security, and a serious desire to learn with a focus on cloud technologies. This individual should be interested in being challenged to stay one step ahead of an ever-changing cyber landscape of threats and adversaries. The Analyst must be capable of working both collaboratively and independently to execute against numerous playbooks, hunt down and identify anomalous or malicious activity, perform deep dives into suspicious security events, collect and analyze data from various sources, and determine if a critical system or data has been impacted.

Skills:

cloud, security operations, incident management, vulnerability, threat model

Top Skills Details:

cloud,security operations,incident management,vulnerability,threat model

Additional Skills & Qualifications:

Screening Questions to ask candidates and write up in sell packs:

a. Cloud Experience

i. Major cloud provider Security Components, AWS or Azure being the best.

ii. Any Cloud provider certifications would be a plus.

b. Security Operations

i. 2-5 years of professional experience as a SOC analyst

ii. Understanding and use of SIEM tools, eg Splunk, LogRhythm, QRadar, etc. Splunk Enterprise Security would be a plus.

c. Incident Management – Responding to security Events.

i. Understanding and execution of Incident Management Plans. Detection, Analysis, Notification, and remediation/mitigation. Etc.

d. Vulnerability Mgmt – identifying and managing risk from technical vulnerabilities.

i. Do they understand the differences between a threat, a vulnerability and a risk?

ii. Do they have experience using vulnerability scanning tools? A plus.

e. Threat Model

i. Knowledge and experience with various threat models, for example MITRE ATT&CK, STRIDE, OWASP etc

2. Compliance experience & exposure – NIST 800-53, etc.

Excellent verbal and written communication skills with ability to distill key data points and effectively present information.

Exceptional organizational abilities and attention to detail

Basic familiarity with common Information Security and data protection frameworks and standards (ie CIS, NIST, MITRE, ITIL, HIPAA, GDPR, PCI DSSS, ISO 270001).

Strong analytical background .

The ability to think creatively to find solutions to complex problems

The ability to work both independently and collaboratively within a larger team and across the broader GIS team globally

Demonstrated ability to analyze and correlate information from a wide variety of enterprise technologies

A willingness to be challenged along with a strong appetite for learning and teaching.

Highly organized and motivated self-starter who can deliver results with minimal direction

Ability to navigate and collaborate effectively within a geographically complex and dispersed global corporation.

Experience Level:

Entry Level About TEKsystems:

We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That’s the power of true partnership. TEKsystems is an Allegis Group company.

The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.

Web Reference : AJF/420724074-202
Posted Date : Fri, 02 Sep 2022

Please note, to apply for this position you will complete an application form on another website provided by or on behalf of TEKsystems. Any external website and application process is not under the control or responsibility of IT JobServe
Apply Here
For Remote Cloud Security Analyst roles, visit Remote Cloud Security Analyst Roles

********

Sr. Network Security Engineer at SonicJobs

Location: Chicago

You will be responsible for design and support in all aspects of Network infrastructure consisting of LAN/WAN, HW & SW, routers, switches, management systems, and monitoring systems, telecommunications equipment, voicemail systems, call center management systems and various other network and voice related infrastructure technologies. The incumbent will also functions as a Project Leader on various initiatives while training and instructing Network Engineers. Work involves providing diagnoses, resolution, and documentation in all aspects of supporting, implementing and managing an enterprise network environment. Resources to do the job require reliance on core competencies in various disciplines within IT Networking and knowledge FinTech policy and procedures.

The Senior Network Security Engineer is expected to contribute to the corporate security strategy with security leadership and other senior security staffers and technologists. Considered a highly knowledgeable individual, the Senior Network Security Engineer is expected to implement, monitor and manage secure solutions that address contemporary issues. General direction is received from the Manager, Cyber Security Operations
• Palo Alto FW, Prisma
• Okta * Cisco * Azure
• Security Credentials Expereince
• FinTech Experience

Responsibilities

Do you see yourself doing this?
• Handle day-to-day implementation, monitoring and operational support of hardware, software, customer applications, managed solutions and service provider relationships.
• Handle day-to-day Datacenter/IDF operational needs.
• Perform installation of required patches and or code updates in response to security vulnerabilities.
• Collect and review risk reports from various systems to identify issues, trends or develop recommendations to improve security operational performance.
• Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time, within budget and in accordance with service level agreements (SLAs).
• Recognize, identify and prioritize incidents in accordance with customer business requirements, organizational policies and operational impact.
• Assist with incident response and system stability issues as they occur. This may require work outside of standard business hours.
• In consultation with Security compliance, ensure that all network equipment is operating at appropriate levels of operating system and patch levels.
• Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members.
• Recognize, identify and prioritize incidents in accordance with customer business requirements, organizational policies and operational impact.
• Respond to and handle service and escalation tickets within SLA expectations.
• Participate regularly in change project and change management meetings.
• Research, validate and deploy solutions meeting security and business needs.
• Follow security engineering fundamentals and processes as outlined in NIST 800-160.
• Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention).
• Responsible for troubleshooting and problem resolution for network and telecomm related issues.
• Perform other duties as assigned.

Adhere to and ensure compliance of all business transactions with policy and process of the Bank Secrecy Act. Ensures compliance with all applicable state and federal laws, company procedures and policies. Maintains integrity and ethics in all actions and conversations with or regarding credit union members and their accounts; complies with Privacy Act directives.

Qualifications

What makes you a great fit?

You’ll be a great fit if in addition to the completion of a Bachelor’s degree in computer science, information assurance, MIS or related field, or equivalent, and you have:
• 7+ years related experience required
• Scripting/automation skills desired
• Highly technical and analytical expertise, with a proven deep background (preferred 5+ years’ IT experience in in technology design, implementation and delivery.
• Experience managing router/switches, firewalls, web proxies, IDS/IPS, NAC and other network and system monitoring tools.
• Some experience in cloud computing technologies desired
• Excellence in communicating business risk from cybersecurity issues.
• Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.
• CCNP/CCIE certifications are preferred.
• Demonstrable knowledge of as many of the following products as possible:
• Cisco Nexus Routing/Switch platform
• Cisco ASA firewalls
• Aruba/Cisco Wireless Solution
• Solarwinds
• Cisco Prime
• Proxy
• Azure/AWS
• Python, Ansible, Terraform
Apply Here
For Remote Sr. Network Security Engineer roles, visit Remote Sr. Network Security Engineer Roles

********

System/Data Security Analyst – Global Information Security at 94-1687665 Bank of America, National Association

Location: Chicago

Job Description:

This role will be focused on ensuring the data and process quality of the Access Management Monitoring and Control area is rationalized using supporting data. Streamlining and automating new and existing QA/QC routines, working closely with peer groups, and producing quality metrics are also implied in this role.

A person in this role will be responsible for:
• Maintaining existing QA/QC processes
• Evaluating GIS controls for QA/QC needs
• Creating new QA/QC processes
• Enhancing existing QA/QC processes through automation and streamlining
• Analyzing data for risk indicators and trends
• Creating and publishing information views to peer teams and senior management
• Participating in regulatory and audit inquiries

Skills and Experience required of this position are:
• SQL coding and data normalization in RDBMS platforms (Oracle, MSSQL, MySQL, DB2)
• Tableau or other visualization tool experience is a plus
• Ability to design processes from the ground up and translate those into requirements
• Ability to apply analytical skills in a heterogenous data environment
• Creating testing plans for processes that ensure processes are functioning within acceptable ranges
• Quality Assurance and Quality Control fundamentals
• Phantom/Python experience is a plus
• Cloudera experience is a plus

Enterprise Role Overview:

As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to the client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Monitors existing and proposed security standard setting groups. State and Federal legislation and regulations. Identifies and escalates changes that will affect information security policy, standards and procedures. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Shift:
1st shift (United States of America)

Hours Per Week:
40
Apply Here
For Remote System/Data Security Analyst – Global Information Security roles, visit Remote System/Data Security Analyst – Global Information Security Roles

********

Staff Information Security Analyst at Fortinet

Location: Chicago

Job Description

Fortinet is looking for an Information Security Analyst to join a global Security Operations Center (SOC). This is a highly technical role, monitoring security events, identifying threats, assessing risks, providing incidence response, and working with leaders across Fortinet offices in the region to continue maturing Fortinet security posture and compliance. Fortinet SOC operates based on a follow the sun approach 24*7*365. Working hours for this position includes 5 days/40 hours per week, including Saturdays and Sundays and 3 weekdays of the candidate choice.

Job Responsibilities

Description for Internal Candidates
• As a member of the Global Security Operations team, you will monitor logs, review alerts and investigate events and security incidents leveraging SIEM, SOAR and other tools
• Develop SOC processes and playbooks, and implement alerts, reports and dashboards to identify threats and incidents.
• Collect, review, and analyze security logs, identify abnormalities and violations.
• Coach and assist system administrators, product and application developers and users to ensure that appropriate controls are implemented and operating effectively in accordance with policies.
• Ensure compliance to required standards, procedures, guidelines and processes.

Skills And Qualifications
• 3+ years of experience in Information Technology or Information Security role.
• SOC/NOC experience desired. Excellent verbal, written and interpersonal communication skills as well as attention to detail.
• Knowledge of Internet threat landscape and attacker motivations (phishing, malware, APT, DoS, etc.)
• Previous experience in an information systems or network administration role.
• Previous experience of at least one scripting language (e.g. Python, Groovy, Perl, Ruby, Shell scripting, etc.).
• Knowledge and experience working with various information security frameworks (ISO/IEC 27001, NIST 800-53, COBIT, etc) and regulatory frameworks (SOX, PCI-DSS 3.2, HIPAA, GDPR, etc.)
• Working knowledge of information security control technologies including access control, cryptography, vulnerability management, SIEM/log management, ID/IPS, and penetration test.
• Working knowledge on information technologies including Linux, Windows, VMWare, MySQL, MSSQL, Oracle, etc.
• Working knowledge of network protocols, DNS, and networking devices – routers, VPNs, proxies, firewalls.
• Demonstrate ability to engage and collaborate with employees, presenting a friendly, approachable demeanor to leverage security to help others succeed.
• Proficient in English verbal and written. Proficiency in regional languages, a plus.

Educational & Certification Requirements
• Bachelor’s degree in Computer Science, Information Security or related field;
• A certification in one or more of the following desirable:
• CISSP, CCSP, CISA, CISM, CRISC, CCNA
• GIAC GCFE, GCFA, GCIH would be a plus

#GD

About Us

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network – today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

We are committed to providing reasonable accommodations for all qualified individuals with disabilities. If you require assistance or accommodation due to a disability, please contact us at accommadations@fortinet.com.

Fortinet is an equal opportunity employer. We value diversity in our company, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or any other applicable legally protected characteristics in the location in which the candidate is applying.
Apply Here
For Remote Staff Information Security Analyst roles, visit Remote Staff Information Security Analyst Roles

********

Jr. SOC Analyst at RKON

Location: Chicago

RKON Security Operations Center – Jr. SOC Analyst
• Location: *Chicago, Ill. (one block west of Union Station)
• Position: * Type: Full-time, exempt, hybrid.
• Job Type: *Full-time, permanent, W2 role.
Learn more about us here: www.rkon.com
Jr. SOC Analyst – Role and Responsibilities
RKON is seeking an experienced Cyber Security Analyst to work on the client-facing Security Operations Center (SOC) – Assurance and Response Team. This position requires a motivated fast learner, who is able to work within key vulnerability and security information event management functions to identify, analyze, and remediate potential threats to the environment. The candidate will require security industry knowledge that evolves with current and emerging vulnerabilities and threats, as well as an ongoing understanding of key business and technological processes. This position will report to the SOC Lead Security Analyst.
In this role you will perform key client-facing managed security services activities including identification of assets, scanning for infrastructure and application vulnerabilities, security penetration testing, and security monitoring. In addition, you will perform investigations and perform analyses of events in order to thwart internal and external threats to the environment. You will collaborate on an ongoing basis with clients’ key contacts and stakeholders to support detection, triage, incident analysis, containment, remediation and reporting of vulnerabilities, events, and escalated incidents while coordinating business priorities, emerging and actual threats and best practices to ensure the confidentiality, integrity, and availability of the clients information assets.
• You will be responsible for the following: *
• Assist in establishing a mature and optimized Security Operations Center discipline to support managed security services focused on client-facing vulnerability and security information event management engagements.
• Identify and remediate infrastructure and application vulnerabilities identified in continuous scanning and regular penetration testing exercises and assist with risk prioritization.
• Analyze and respond to security threats from Firewall (FW), Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Antivirus (AV), Endpoint Detection and Response (EDR), Network Detection and Response (NDR), Email Security, Cloud Security, and other security threat data sources.
• Respond to clients in a timely manner (within documented SLA) with thorough and concise analysis and recommended actions.
• Document actions in cases to effectively communicate information to internal and external stakeholders as well has for historical retrieval.
• Adhere to RKON company and client policies, procedures, and security practices.
• Resolve problems independently and understand escalation procedures.
• Conduct scanning and monitoring activities to provide in depth visibility into potential known and unknown vulnerabilities and threats that may pose risk to the RKON and client environments.
• Participate in security incidents and act as the technical Subject Matter Expert during significant security incidents.
• Utilize analytics to identify potential vulnerabilities and threats to the environment.
• Detect, respond, mitigate, and report on cyber threats/incidents that may impact the environment.
• Collaborate with RKON and client technical leads and Subject Matter Experts including Engineering, Operations, Service Desk, Applications and client key stakeholders on matters related to security scanning and monitoring across a global footprint.
• Collaborate and serve as liaison to key security vendor solution partners.
• Conduct operations surrounding cyber security incident response technologies including network logging and forensics, security information and event management tools, security analytics platforms, log search technologies, and host based forensics as applicable.
• Act as an internal information security consultant to the business and technology units, advising on risks, threats and control practices related to SOC – Assurance and Response.
• Assist in development and knowledge sharing within the team.
• Assist in security console tuning.
• Perform threat hunts that target known vulnerabilities, threats and other attack vectors.

Required Technical and Professional Expertise
• Desire to work in SOC, Vulnerability Management, Security Information Event Management, Threat Hunt, or Threat Intel team- on a long term basis.
• Critical thinking and problem-solving skills
• Passion for information security
• Strong business acumen including written and verbal communication skills
• Strong interpersonal and organization skills

Preferred Technical and Professional Expertise
• Experience with Vulnerability Management technologies
• Experience with Security Information Event Management technologies
• Practical experience with TCP/IP networking
• Working knowledge of Routing and Access Control Devices
• Experience with Linux, Windows, iOS, and Network Operating Systems
• Experience with Endpoint and Network Detection Response technologies
• Experience with Cloud Security configuration best practices
• Desire to pursue industry-related certifications: Security+, C|EH, GSEC, etc.

oA5dNZsfEq

Job Type: Full-time
Apply Here
For Remote Jr. SOC Analyst roles, visit Remote Jr. SOC Analyst Roles

********

Senior IT Security Engineer at CNO Financial Group

Location: Chicago

CNO’s IT team is hir ing a Sr IT Security Engineer. The Senior Engineer will work with minimal supervision with a diverse range of stakeholders to design and implement solutions for complex technical problems. The Senior Engineer will serve as the subject matter expert for security related tools, and lead/coach less senior team members. The Engineer will design, implement, and maintain related security tools and technologies for the company. This role monitors and controls performance and status of all security systems. The role is constantly looking for ways to optimize system resources to enhance the effectiveness and security of the environment.

As a Sr IT Security Engineer, your responsibilities will include:
• Annual projects and deliverables are established using company business goals and strategies, as communicated by the CISO and Director Security Architecture.
• Clear engineering diagrams, security analysis, whitepapers, system documentation, presentations, and other deliverables.
• The ability to present to diverse size groups and translate security technologies and concepts to a non-technical audience.
• Planning, designing, implementing, and maintaining security-related technologies.
• Participates in projects as required; analyze, design, develop, and implement security solutions which protect the information assets while enabling business functionality.
• Utilizes software and hardware tools, identifies and diagnoses problems affecting information security tools and systems providing 2nd and 3rd tier operational support.
• Provides information security expertise and consulting to internal IT, business system owners, and other stakeholders.
• Performs product and solution life cycle management ensuring capacity, integrity and availability of all security systems.
• Aligns technologies to support overall strategy and information security framework.
• Ensures new and existing products conform to information security policies, standards, and best practices.
• Conducts research on emerging technologies in support of enterprise operations.
• Reviews new and existing system designs for compliance with security standards and best practices.

The Sr IT Security Engineer position is well-suited for you if you:
• Have strong and solid knowledge of IT Infrastructure solutions (Operating Systems, Networks, DNS, Firewalls, SSO, MFA, F5s, Azure, Active Directory, etc.) including Cloud Services (IaaS, PaaS,and SaaS).
• Demonstrates strong group facilitation skills.
• Exhibit strong problem solving and analytical skills, including the ability to combine complex data from multiple sources for analysis.
• Can effectively prioritize and execute tasks within expectations and balancing multiple priorities.
• Collaborate across multiple business functions to elicit and document Business Requirements.
• Working with Junior Engineers to help engage and train on our Security tools to build their individual tool skill sets.

Qualified candidates will have:
• Bachelor’s degree, in Computer Science, Computer Engineering, Information Technology, or a related discipline OR 8 years relevant work experience as an equivalent.
• At least 5 years of Security Engineering or Infrastructure experience.
• Hands on Experience IT Infrastructure solutions (Operating Systems, Networks, DNS, Firewalls, SSO, MFA, F5s, Azure, Active Directory, etc.) including Cloud Services (IaaS, PaaS,and SaaS)Strong Documentation skills.
• Applicable certifications preferred.
• Experience working in highly regulated organizations
• Proficient in MS Office Suite and other business-related software
• Ability to work effectively and efficiently with a virtual and remote international team
Apply Here
For Remote Senior IT Security Engineer roles, visit Remote Senior IT Security Engineer Roles

********

Third Party Risk Security Analyst at TEKsystems

Location: Chicago

Description:

IT Security Specialist III – 3-5 years

The Third-Party Cyber Assurance (TPCA) Assessor will conduct pre-assessment activities in preparation of information security assessments for vendors providing services for our banking client. The TPCA Assessor will assist in assessment scope validation, meeting with Enterprise Vendor Managers and vendors to prepare them for the assessment, as well as conduct documentation collection and preparation of assessment work-papers.

Your primary responsibility will be to evaluate a third party’s information security risk with a holistic lens, ensuring they are receiving an assessment commensurate with their degree of risk. Upon confirmation of third-party risk and commensurate assessment, you will ensure each third party is prepared for the assessment and also meet with Enterprise Vendor Managers, acting as single point of contact to prepare the vendor for the assessment and answer detailed questions from these partners.

To succeed in this role, you should possess technical knowledge with specific emphasis on information security risk management. You should also possess strong written and verbal communication skills, including the ability to communicate clearly and concisely to various levels.

This will be a hybrid role as it may require some travel to perform on site assessments. We are looking for candidates that live in the Chicago, Denver or DC metro areas.

Skills:

Risk assessment, Security, Information security, Risk management, Cyber security, Audit, Third party risk, Vulnerability, Cisa, Cissp, Compliance, Network Security, Nessus, Qualis, Rapid 7, Pre-Assessment

Top Skills Details:

Risk assessment, Security, Information security, Risk management, Cyber security, Audit, Third party risk, Vulnerability, CISA, CISSP, Compliance, Network Security, Nessus, Qualis, Rapid 7, Pre-Assessment

Additional Skills & Qualifications:

Required Skills

Previous information technology/security audit/assessment experience preferred

Risk management focused with a passion for excellence and positive team attitude

Outstanding verbal and written communication skills

Desire to constantly learn new skills

Ability to think logically

Highly organized and project management skills

Strong understanding of cloud security

Solid grasp of NIST and SDLC standards

Ability to work with technical and non-technical partners

Bachelor’s degree in Information Technology, information security or related field

Strong analytical skills/problem solving/conceptual thinking

Minimally, CISSP, CEH, CRISC, GSEC, CISM, Security+ and/or CISA certifications are required. About TEKsystems:

We’re partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That’s the power of true partnership. TEKsystems is an Allegis Group company.

The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.

Web Reference : AJF/420066209-764
Posted Date : Fri, 02 Sep 2022

To apply for this position you will complete an application form on another website provided by or on behalf of TEKsystems. Please note IT Jobs for ColU Fans is not responsible for the application process on any external website.
Apply Here
For Remote Third Party Risk Security Analyst roles, visit Remote Third Party Risk Security Analyst Roles

********

Lead, Cyber Security IT Risk Management at Northern Trust Asset Management

Location: Chicago

• You will work with Northern Trust’s Technology Risk and Control team to perform risk assessments on a wide range of technology domains and oversee implementation of technology controls in adherence to company policies and standards.
• You will work with global information technology partners to advise on control design and measurement of control maturity and gaps.
• You will work with risk, compliance and audit partners to manage technology control-related issues to ensure proper resolution, escalation and reporting.
• Using advance data analytics methods, you will work with the Control Assurance team and the Control Officers to analyze large amount of transaction and behavior data to identify early warning, prevent major control gaps or failures.
• You will be part of a dedicated and outstanding team that focuses on promoting control awareness and properly manage risks within the global information technology organization.
• Advise Global Information Technology teams on technology risks and controls and comply with company’s technology policies and standards
• Perform control testing and risk assessment for various technology areas, including critical financial transaction systems and its supporting infrastructure.
• Use data analytics and automation to analyze performance of controls and identify early warinings
• Support Control Officers to manage executive reporting, issue tracking and resolution, and measurement of risk appetite
• Facilitate governance committees, working groups and owners as a trust risk and control advisor.
• Influence behaviors to reduce risk and foster a strong technology risk management culture throughout the enterprise.
• Experiences with technology operations, security assessments, and security processes.
• In-depth understanding and experiences of information security, risk assessments, security risk management principles.
• Strong collaboration and relationship management skills, including experiences in executive management relationship
• Strong written and verbal communication skills
• Your Employment Experience
• A Bachelor’s degree in a related technical field or equivalent practical experience
• At least 5 or more years of experiences in managing technology risk, control functions, audit services experience, or similar experience with transferable skills.
Apply Here
For Remote Lead, Cyber Security IT Risk Management roles, visit Remote Lead, Cyber Security IT Risk Management Roles

********

DLP Data Loss Protection and Security Analyst at Kforce Technology Staffing

Location: Chicago

RESPONSIBILITIES:
Kforce””s client seeks to hire a Data Security and Data Loss Protection (DLP) Analyst in either Chicago (IL), Dallas (TX) or Jacksonville (FL). This consultant opportunity is intended to be an opportunity for fulltime employment with our client for the right candidate.

Summary:
The Data Security and Data Loss Protection Analyst will be primarily responsible for the daily monitoring and maintenance of Data Loss Protection (DLP) solution(s), which encompasses the caring and administration of the Data Loss Protection (DLP) environments, monitoring and responding to the DLP alerts generated from DLP toolset, building DLP policies and rules based on ongoing regulatory requirements and analysis of user business processes, workflows and user behavior. The DLP Data Loss Protection and Security Analyst will interface and work with all lines of business, IT and non-IT functional areas and teams, including but not limited to data owners, records coordinators and the Data Risk Management Steering group members.

Responsibilities:
• Monitor DLP alerts generated from the DLP technologies to respond, triage, and escalate as needed
• Analyze and investigate DLP tool alert patterns to properly interpret and prioritize data remediation efforts
• Work with vendor(s) to support the DLP technology (troubleshooting, upgrades, etc.); and build out DLP capabilities for broad coverage across email, networks, OS, and cloud environments
• Creating DLP dashboards and reports and tracking and reporting key performance indicators and metrics
• Assist in identifying trends and support driving requirements aimed at improving and enhancing existing data loss protection detection policies
• Assist in the development and writing of DLP playbooks for incident responders
• Analyze and investigate event/alert patterns from other data protection devices to properly interpret the threat and prioritize remediation efforts

REQUIREMENTS:
• One of the following: CISSP (highly preferred)IA/Security+
• Bachelor””s degree in Computer Science, Information Systems or Information/Cybersecurity or related field preferred
• 5 years of Data or Cyber Security work experience; If you have the desired certification(s) & 3 years of experience with DLP, client will consider candidates with less than 5 years of experience
• 3+ years of DLP-Data Loss Protection experience is a must: Senior/SME level skills needed, so must have worked with DPL tool daily/frequently; Ability &/or experience with DLP: workflows, O/S impacts, Monitoring/Maintaining/Configuring, Triage/Audit/Regulatory, create/update Dashboards, understanding of False Positive vs. False Negative vs. True Position, creation/supporting DLP Playbooks, CASB, Network Proxies, Sensitive Data Scanning, Content Filtering, and Data Tagging/Classification tools
• 2+ years of enterprise level experience ideally regulatory in nature i.e. Financial Services, Insurance, Pharma, etc.
• Preferred DLP tool is Digital Guardia (network appliance), but open to all DLP tools such as: Digital Guardia/Forcepoint DLP/Symantec Data Loss Prevention/McAfee DLP/GTB Technologies DLP/Endpoint Protector/Spirion/Fidelis Network
• Demonstrated experience in Cybersecurity and Security Monitoring, and broader Incident Response
• Knowledge of current threats and best practices in the cybersecurity and data and OT security
• Highly motivated individual with the ability to self-start, prioritize, multi-task, and has a “can-do” attitude
• Plus Skills: Cloud/MS 365/Regulatory Domain experience (see above)

Kforce is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. – provided by Dice
Apply Here
For Remote DLP Data Loss Protection and Security Analyst roles, visit Remote DLP Data Loss Protection and Security Analyst Roles

********

Security Engineer at Insight Global

Location: Chicago

Required Skills:
• 10+ years of experience working as an Identity Engineer
• At least 2 years of experience working with security protocols and standards, vulnerability assessment tools, packet analyzers, scripting languages and security management suites, penetration testing tools and countermeasures and mitigation techniques applied to web applications.
• Experience with various IAM tools including: Ping Federate or ping directory, Saviynt or SailPoint, BeyondTrust or CyberArk
• Azure AD or other cloud services such as google, AWS – identity in cloud platforms is a must
• Experience with scripting in the following programming languages: Java, Python, PHP, C, C++, C#
• Bachelor’s degree

Preferred Skills:

Azure security technologies such as MS Purview Information Protection, MS Key Vault

CISSP or CISA Certification

Job Description:

This full time Security Engineer will be working hands on and also leading peer Engineers within the Identity team. The role is open due to expanding the currently Identity footprint at the enterprise. Candidates would be responsible for leading complex build and configuration, documentation, and maintenance of the clients Global Identity Access Management platform. This includes industry leading Identity Governance, SSO, MFA, Directory Services, PAM and Cloud Identity products.
Apply Here
For Remote Security Engineer roles, visit Remote Security Engineer Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo