Fulltime Information Security Analyst openings in Chicago, United States on September 03, 2022

System/Data Security Analyst – Global Information Security at Bank of America

Location: Chicago

System/Data Security Analyst – Global Information Security

Denver, Colorado;Washington, District of Columbia; Chicago, Illinois

Job Description:

This role will be focused on ensuring the data and process quality of the Access Management Monitoring and Control area is rationalized using supporting data. Streamlining and automating new and existing QA/QC routines, working closely with peer groups, and producing quality metrics are also implied in this role.

A person in this role will be responsible for:
• Maintaining existing QA/QC processes
• Evaluating GIS controls for QA/QC needs
• Creating new QA/QC processes
• Enhancing existing QA/QC processes through automation and streamlining
• Analyzing data for risk indicators and trends
• Creating and publishing information views to peer teams and senior management
• Participating in regulatory and audit inquiries

Skills and Experience required of this position are:
• SQL coding and data normalization in RDBMS platforms (Oracle, MSSQL, MySQL, DB2)
• Tableau or other visualization tool experience is a plus
• Ability to design processes from the ground up and translate those into requirements
• Ability to apply analytical skills in a heterogenous data environment
• Creating testing plans for processes that ensure processes are functioning within acceptable ranges
• Quality Assurance and Quality Control fundamentals
• Phantom/Python experience is a plus
• Cloudera experience is a plus

Enterprise Role Overview:

As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to the client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Monitors existing and proposed security standard setting groups. State and Federal legislation and regulations. Identifies and escalates changes that will affect information security policy, standards and procedures. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Job Band:

H5

Shift:

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

This role will be focused on ensuring the data and process quality of the Access Management Monitoring and Control area is rationalized using supporting data. Streamlining and automating new and existing QA/QC routines, working closely with peer groups, and producing quality metrics are also implied in this role.

A person in this role will be responsible for:
• Maintaining existing QA/QC processes
• Evaluating GIS controls for QA/QC needs
• Creating new QA/QC processes
• Enhancing existing QA/QC processes through automation and streamlining
• Analyzing data for risk indicators and trends
• Creating and publishing information views to peer teams and senior management
• Participating in regulatory and audit inquiries

Skills and Experience required of this position are:
• SQL coding and data normalization in RDBMS platforms (Oracle, MSSQL, MySQL, DB2)
• Tableau or other visualization tool experience is a plus
• Ability to design processes from the ground up and translate those into requirements
• Ability to apply analytical skills in a heterogenous data environment
• Creating testing plans for processes that ensure processes are functioning within acceptable ranges
• Quality Assurance and Quality Control fundamentals
• Phantom/Python experience is a plus
• Cloudera experience is a plus

Enterprise Role Overview:

As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to the client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Monitors existing and proposed security standard setting groups. State and Federal legislation and regulations. Identifies and escalates changes that will affect information security policy, standards and procedures. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on complex problems where analysis of situations or data requires an in-depth evaluation of various factors. Exercises judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results. Work leadership may be provided by assigning work and resolving problems. Typically 5-7 years of IT experience.

Shift:

1st shift (United States of America)

Hours Per Week:

40

Learn more about this role

Full time

JR-22082015

Band: H5

Manages People: No

Travel: Yes, 5% of the time

Manager:

Talent Acquisition Contact:

Ryan Bell

Referral Bonus:

0

Colorado pay and benefits information

Colorado pay range:

$74,000 – $122,000annualized salary, offers to be determined based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible . We provide industry-leading benefits, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.

Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity and affirmative action, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.

To view the “EEO is the Law” poster, CLICK HERE ([Link available when viewing the job] .

To view the “EEO is the Law” Supplement, CLICK HERE ([Link available when viewing the job] .

Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy (Policy) establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.

To view Bank of Americas Drug-free workplace and alcohol policy, CLICK HERE .
Apply Here
For Remote System/Data Security Analyst – Global Information Security roles, visit Remote System/Data Security Analyst – Global Information Security Roles

********

Staff Information Security Analyst at Fortinet Inc

Location: Chicago

• Fortinet is looking for an Information Security Analyst to join a global Security Operations Center (SOC).
• This is a highly technical role, monitoring security events, identifying threats, assessing risks, providing incidence response, and working with leaders across Fortinet offices in the region to continue maturing Fortinet security posture and compliance.
• Fortinet SOC operates based on a follow the sun approach 24*7*365.
• Working hours for this position includes 5 days/40 hours per week, including Saturdays and Sundays and 3 weekdays of the candidate choice.
• Description for Internal Candidates
• As a member of the Global Security Operations team, you will monitor logs, review alerts and investigate events and security incidents leveraging SIEM, SOAR and other tools
• Develop SOC processes and playbooks, and implement alerts, reports and dashboards to identify threats and incidents.
• Collect, review, and analyze security logs, identify abnormalities and violations.
• Coach and assist system administrators, product and application developers and users to ensure that appropriate controls are implemented and operating effectively in accordance with policies.
• Ensure compliance to required standards, procedures, guidelines and processes.
• 3+ years of experience in Information Technology or Information Security role.
• SOC/NOC experience desired.
• Excellent verbal, written and interpersonal communication skills as well as attention to detail.
• Knowledge of Internet threat landscape and attacker motivations (phishing, malware, APT, DoS, etc.)
• Previous experience in an information systems or network administration role.
• Previous experience of at least one scripting language (e.g. Python, Groovy, Perl, Ruby, Shell scripting, etc
• Working knowledge of information security control technologies including access control, cryptography, vulnerability management, SIEM/log management, ID/IPS, and penetration test.
• Working knowledge on information technologies including Linux, Windows, VMWare, MySQL, MSSQL, Oracle, etc.
• Working knowledge of network protocols, DNS, and networking devices – routers, VPNs, proxies, firewalls.
• Demonstrate ability to engage and collaborate with employees, presenting a friendly, approachable demeanor to leverage security to help others succeed.
• Proficient in English verbal and written.
• Proficiency in regional languages, a plus.
• Bachelor’s degree in Computer Science, Information Security or related field;
• GIAC GCFE, GCFA, GCIH would be a plus
Apply Here
For Remote Staff Information Security Analyst roles, visit Remote Staff Information Security Analyst Roles

********

Lead Information Security Analyst – IAM Controls at Wells Fargo

Location: Chicago

About This Role

Wells Fargo is seeking a Lead Information Security Analyst. This role is an individual contributor position that’s part of a team responsible for the assessment and adoption of Information Security Identity and Access Management (IAM) controls. The IAM organization owns and operates manual and automated controls to manage enterprise risk and reduce inappropriate access for organizational users. Frequent changes and updates to leveraged technology requires regular review of controls to confirm effectiveness as well as relevancy. Keeping abreast of changing risk, internal policy and regulatory landscape is critical to this role as well. Engaging with internal lines of defense, key business and technology stakeholders, and control owners/operators is part of the daily routine for this position. As a Lead Information Security Analyst – IAM Controls resource, you will be responsible for the assessment, adoption and oversight of IAM operated controls related to IAM products and services. You must be able to demonstrate in-depth knowledge of IAM controls and supported processes/procedures, risk assessment and controls testing methodologies across 3 lines of defense, and compliance and operational processes which includes successfully facilitating and completing associated deliverables. Knowledge of IT/IS control frameworks such as COSO, CoBIT, FFIEC and NIST is strongly encouraged as part of the benchmarking process that must also be supported by this role. This role is also responsible for the identification and escalation of emerging risks resulting from controls test findings, including providing input to control design/execution along with control administration changes. Partnership and collaboration with enterprise Risk and Control System (SHRP) administrators is necessary to ensure that controls are kept up-to-date, testing results are recorded and any findings are validated and have requisite remediation action plans. Familiarity with Risk and Control Self-Assessment (RCSA) processes and practices is foundational to ensure that IAM Controls resource has thorough understanding of how operational risks and the effectiveness of controls are assessed and examined.

In This Role, You Will
• Maintain an advanced awareness of bank security policies and government regulations pertaining to information security
• Formulate and implement information security solutions and controls
• make decisions and resolve issues regarding changes to information security policy, standards, and procedures as needed for systems, applications and tool
• Provide advanced information security consultation for all aspects of information security compliance policy, risk management, and remediation
• Direct information security risk assessment and research, and recommend remediation plans and strategies
• Influence stakeholders on net new or on material changes to an asset to influence control decisions
• Provide consulting on security risk assessment and research, and recommend remediation plans and strategies
• Act as more experienced lead to the organization to develop security risk awareness and mitigating actions
• Consult the organization on complex security issues and findings
• Manage the most complex and critical information assets
• Evaluate and interpret internal and companywide information security policies, processes, standards, and participate with more experienced leaders in decision making on information security
• Serve as information security lead to advise on the development and delivery of Information Security Education and Awareness
• Collaborate and consult with peers, colleagues, and mid-level to more experienced managers to resolve issues and achieve goals
• Lead projects and teams
• Coordinate with vendor manager on third party assets to manage information security risks
• Serve as a mentor to less experienced staff
Required Qualifications, US:
• 5+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
• 3+ years of IAM (Identity and Access Management) experience
• 2+ years of process improvement experience
Desired Qualifications:
• 3+ years of Microsoft office suite experience such as PowerPoint, Excel, Outlook and Word
• 5+ years of experience working with information security controls and deployments in a production environment
• 3+ years of IAM (Identity and Access Management) experience with application on-boarding, certifications or role management.
• 1+ years of information security architectural design and consulting experience
• Experience communicating and presenting complex information to multiple levels of the organization
• Strong time management skills and ability to meet deadlines
• Ability to work effectively, as well as independently, in a team environment
• Experience with synthesizing data from multiple sources and presenting it in appropriate formats
• Knowledge and understanding of information security management, audit, compliance and risk.
• Knowledge and understanding of financial services industry: compliance, risk management or audit operations
• Knowledge Information Security Frameworks and standards (FFIEC, NIST, ISO) experience
@RWF22

We Value Diversity

At Wells Fargo, we believe in diversity, equity and inclusion in the workplace; accordingly, we welcome applications for employment from all qualified candidates, regardless of race, color, gender, national origin, religion, age, sexual orientation, gender identity, gender expression, genetic information, individuals with disabilities, pregnancy, marital status, status as a protected veteran or any other status protected by applicable law.

Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit’s risk appetite and all risk and compliance program requirements.

Candidates applying to job openings posted in US: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.

Reference Number

R-161309-4
Apply Here
For Remote Lead Information Security Analyst – IAM Controls roles, visit Remote Lead Information Security Analyst – IAM Controls Roles

********

Analyst – Cyber Security Governance, Risk Management and Compliance (Remote Opportunity) at Hyatt Hotels Corporation

Location: Chicago

Summary

At Hyatt Hotels, Cyber Security is a very important part of our mission to take care of people so they can be their best. The Analyst – Cyber Security Governance, Risk Management, and Compliance (GRC) plays a crucial role in completing that mission every day by ensuring that Hyatt manages known and unknown risks. As a contributor on the Cyber Security GRC team the Analyst ensures compliance with Cyber Security regulations that Hyatt must follow, tracks compliance to the enterprise Risk Management Framework, and works to remediate identified security vulnerabilities in a timely manner. It is important that Hyatt maintain an effective cyber security compliance program and the Analyst plays the most important role in that function.

Qualifications

Position Responsibilities / Essential Functions
• Maintain Hyatt’s Payment Card Industry (PCI) compliance program, working with diverse teams throughout Information Technology and the Global Operations Center to ensure that Hyatt handles cardholder data in an appropriate way.
• Assists with Hyatt’s relationships with our credit card partners, ensuring all relevant timelines for document submissions are met.
• Act as the Cyber Security resource for security-related efforts conducted by Internal Audit.
• Participate on internal committees concerning information governance, records retention, and data privacy.
• Work with internal and external penetration testing resources to track the remediation of identified security vulnerabilities.
• Periodically update Hyatt’s Cyber Security Policies, taking into account the feedback of stakeholders and current events to craft a cohesive and readable document.
• Conduct global phishing awareness and training campaigns. Assist with aggregation and presentation of metrics to leadership.
• Demonstrate a commitment to Hyatt core values
• The position responsibilities outlined above are in no way to be construed as all encompassing. Other duties, responsibilities, and qualifications may be required and/or assigned as necessary

Experience
• At least three years of experience in the Cyber Security Governance or Auditing professions are preferred; however, any combination of experience, education, and certification that demonstrates the candidate can be successful in the position is acceptable.

Education
• A Bachelor’s degree or better in Cyber Security, Information Systems Auditing, or any other security-related subject is preferred; however, any combination of education, experience, and certification that demonstrates the candidate can be successful in the position is acceptable.

Certificates, Licenses, Registrations
• A CISSP or CISA certification is preferred; however, any combination of certification, education, and experience that demonstrates the candidate can be successful in the position is acceptable.

Computer Skills Needed To Perform This Job
• Experience with and detailed understanding of the requirements of the Payment Card Industry Data Security Standard (PCI-DSS) is required.
• Experience with phishing awareness platform(s) is preferred.
• Experience with and detailed understanding of the control requirements of the Center for Internet Security Critical Security Controls (CIS CSC) is preferred.
• Experience with project management and tracking remediation of cyber security vulnerabilities is preferred.
• Experience with and understanding of Sarbanes Oxley is preferred.

Additional Comments And Requirements
• Ability to travel on an as-needed basis (up to 10% of total work hours).
Apply Here
For Remote Analyst – Cyber Security Governance, Risk Management and Compliance (Remote Opportunity) roles, visit Remote Analyst – Cyber Security Governance, Risk Management and Compliance (Remote Opportunity) Roles

********

Information Security Technical Analyst – IntelliScript (Remote) at Milliman

Location: Chicago

• Milliman IntelliScript is a group of a few hundred experts in fields ranging from actuarial science to information technology to clinical practice.
• Together, we develop and deploy category-defining, data-driven, software-as-a-service (SaaS) products for a broad spectrum of insurance clients.
• We’re a business unit within Milliman, Inc., a respected consultancy with offices around the world.
• Candidates who have their pick of jobs are drawn to IntelliScript’s entrepreneurial and collaborative culture of innovation, excellence, exceptional customer service, balance, and transparency.
• Every single person has a voice in our company, and we challenge each other to push the outer limits of our full, diverse potential.
• And, we’ve shown sustained growth that ensures you’ll have room to grow your skillset, responsibilities, and career.
• Our team is smart, down-to-earth, and ready to listen to your best ideas.
• We reward excellence and offer competitive compensation and benefits.
• Visit our LinkedIn page for a closer look at our company, and learn more about our cultural values here.
• What this position entails
• As part of Milliman, IntelliScript is a cutting-edge software unit that specializes in risk management solutions for the insurance industry.
• Combining industry-leading expertise with dedicated customer service, we bring our clients innovative solutions.
• We are expanding our department and adding an Information Security Technical Analyst.
• The Information Security Technical Analyst reports to the Director of Information Security and help define and build the information security technical architecture, and to provide the Information Security and Information Technology teams with assessments of newly emerging threats.
• This individual will make an immediate impact on the security of our business, and drive innovation and contribute directly to information security practices, policies, and procedures.
• We can offer the right candidate a unique, entrepreneurial environment where they are supported to explore their passion.
• What you’ll be doing
• Join a collaborative team of intelligent innovators and reasoned risk takers committed to delivering results
• Help review, expand and improve the vulnerability management program
• Perform SIEM incident investigations
• Perform web application vulnerability assessments
• Work directly with IT and business teams to implement security improvements
• Collaborate with other Milliman groups to ensure best practice security controls
• Lead assigned information security projects
• Two years of professional or internship experience in related field such as information security
• Solid understanding of general information technology concepts
• Passion for driving improvements (new, managing change)
• Ability to partner with peers throughout the business
• Driven to continually improve knowledge and skills
• Strong analytical skills to assess potential risks and consider possible solutions (new – analytical thinking)
• Strong work ethic; willing to pitch in wherever needed
• What you bring to the table
• Excellent communication skills, and adheres to the utmost accuracy in all communications
• Demonstrated “let’s find a way to do it” attitude – no task is too big or too small
• Respond positively to change and the challenges and opportunities it brings (new – flexibility)
• Willing to take on new tasks over time
• Loves to learn, takes every opportunity to develop knowledge and skills
• Dedicated to getting the details right
• Self-driven to assess a need, research the situation, then present a resolution and the ability to find common ground with those think differently than you do on important matters
• Equally comfortable working autonomously and collaboratively
• Adapts to an established process, able to move projects along in a timeframe
• Thrive in an entrepreneurial and collaborative culture
• Pursue professional education and growth
• Associates or bachelor’s degree in information security, information technology, computer science, or other related degree
• Experience with performing vulnerability assessments and SIEM usage
• Experience in performing application security assessments
• Related industry standard security certification such as ISC2, SANS, CompTIA, etc.
• This position will be based out of the Milliman office in Brookfield, WI; however, this position is open to remote work.
• Applicants must be willing to travel to the Milliman office in Brookfield, WI as needed.
• The base salary for the position will vary with the candidate’s quali?
• cations and experience.
• The salary range for this position is $95,000 – $120,000 depending on relevant factors, including but not limited to education, work experience, certifications, location, etc.
• In addition, we offer a performance-based bonus plan, pro?
• t sharing, and generous bene?
• Milliman Benefits (Full time U.S. positions only)
• At Milliman, we focus on creating an environment that recognizes – and meets – the personal and professional needs of the individual and their family.
• Medical, dental, and vision coverage
• A Profit Sharing and Retirement Plan
• Paid Time Off (PTO)
• Milliman paid life insurance, AD&D, Short Term and Long-Term Disability
• Flexible and Health Savings Accounts
• Pre-tax commuter and transportation benefits
• Employee Assistance Program
• Paid Parental Leave
Apply Here
For Remote Information Security Technical Analyst – IntelliScript (Remote) roles, visit Remote Information Security Technical Analyst – IntelliScript (Remote) Roles

********

Cybersecurity Incident Response Analyst at Kimberly-Clark Corporation

Location: Chicago

Cybersecurity Incident Response Analyst

Job Description

You’re raising the stakes for your career to do more. Learn more. Impact more. Here, your innovation, ideas, and technical curiosity will help us deliver better care for billions of people worldwide. You’ll put your professional expertise, talent, and drive to work by building and managing the technology behind our portfolio of iconic brands.

As a Cyber Security Incident Response Analyst you’ll conduct incident response investigations on behalf of a wide variety of stakeholders. We’re looking for people that have a wide breath of knowledge across multiple IT and Information Security technologies. The individual must be able to independently lead information security investigations affecting Kimberly-Clark’s enterprise-wide computing environments and networks with minimum managerial assistance and communicate clearly and concisely with both technical staff and executive leadership. We’re looking for a candidate that is self-motivated and has the ability to recommend both tactical and strategic enterprise solutions to complex problems. The individual must also be a team player and be able to maneuver within the complexities associated with large fortune 100 companies such as changing policies, procedures and office politics. Attention to detail and investigative thoroughness are musts.

This role is viewed as an expert in complex security environments, encompassing both business process understanding and technical expertise. This individual directly interfaces with senior leadership and business units to communicate capabilities in business, non-technical terms. You will develop incident solutions and strategy for CS&A to deliver the business’ desired results. You’ll lead in developing innovative, technical solutions to important, highly complex strategic and operating problems, provides technical consulting on complex projects, and acts as a source of direction, training and guidance for other team members. This person is knowledgeable in industry best practices in their area of expertise and uses resources outside of KC to deliver solutions.

Key Accountabilities:
• Independently plan, organize and devise approaches necessary to respond to incidents and obtain useful forensic information from the evidence submitted, taking into consideration the requirements by agency regulations, federal and state laws – and company policies as they apply.
• Lead a virtual team of Incident Response participants during times of active incidents
• Advising incident responders in the steps to take to investigate and resolve computer security incidents.
• Prioritizing and differentiating between potential intrusion attempts and false alarms.
• Examples of incidents involve unauthorized access, denial of service, malware containment, eradication, and analysis, etc.
• Conduct incident and investigations post-mortem briefings, analysis, and reporting as required.
• Conduct forensic investigations including physical/logical disk and memory examinations. Provides technical guidance to investigations to correctly gather, analyze and present digital evidence to both business and legal audiences. Collates conclusions and recommendations and presents forensics findings to stakeholders. Contributes to the development of policies, standards and guidelines.
• Apply broad security industry, technology, business and professional knowledge to contribute to policymaking and process design.
• Correlate threat intelligence with active attacks and vulnerabilities within the enterprise
• Monitor and analyze security events and identify trends, attacks, and potential threats.
• Research and stay current on the latest trends, best practices, and technology developments.
• Creating and tracking security investigations to resolution.
• Facilitate the integration of threat and data feeds for the purposes of incident response.
• Interface effectively in key relationships, including IT peers (e.g. Security Operations, IT Operations, Enterprise Architecture, etc.) internal business partners (e.g. Compliance/Privacy, Legal, Corporate Communications, etc.), key external clients (e.g. service providers, external partners, etc.) and other leaders and partners within IT and the broader enterprise.

Required Qualifications:
• Bachelor’s degree in IT/computer science or related discipline (note Master’s Degree preferred.
• 3+ years of demonstrated experience in Incident Response
• Exceptional ability to remain calm under stress
• Experience working in a large enterprise that employs a wide range of security management tools such as IDS/IPS (network and host), advanced anti-malware (network and endpoint), DLP, encryption, anti-virus, firewalls, identity management, NAC, etc.
• Solid organizational, multi-tasking, and time-management skills
• Solid negotiation, influence, mediation & conflict management skills
• Expert understanding of operating systems (Windows, Linux, iOS/Android)
• Expert understanding of network architecture and security infrastructure placement
• The candidate must be available 24/7 in case there is a need to conduct an investigation off hours (work-life balance WILL BE observed)
• Travel is at a minimum. Since this is an enterprise position, some travel may be required.

Preferred Qualifications:
• Master’s Degree in computer security or related discipline.
• Computer forensics experience highly desired.
• Any SANS certifications (GCIH, GCFE, GREM, GCFA, etc.). CISSP is a plus.
• Magnet certification (MCFE), as well as Splunk certification.
• Proofpoint training and certifications.
• Cortex XDR.
• Extensive knowledge on SIEM, AV technologies, Email Protection.
• Understanding of threat modeling concepts such as threat indicators, threats actors and vectors.

About Us

Huggies®. Kleenex®. Cottonelle®. Scott®. Kotex®. Poise®. Depend®. 25% of people in the world use Kimberly-Clark products every day, and it takes the best people to make that happen.

We’re founded on 150 years of market leadership, and we’re always looking for new and better ways to perform, especially when it comes to product and process innovation. Our customers are always looking for new and better. Our competitors won’t stop evolving. And our communities demand responsible corporate practices. We need bold, transformative ideas from people who can turn them into reality. That means there’s no time like the present to make an impact at Kimberly-Clark. It’s all here for you at Kimberly-Clark.

About You

You were made to do this work: designing new technologies, diving into data, optimizing digital experiences, and constantly developing better, faster ways to get results. You want to be part of a performance culture dedicated to building technology for a purpose that matters. You want to work in an environment that promotes sustainability, inclusion, wellbeing, and career development.

You love what you do, especially when your work makes a difference. At Kimberly-Clark, we’re constantly exploring new ideas on how, when, and where we can best achieve results. When you join our team, you’ll experience Flex That Works: flexible (hybrid) work arrangements that empower you to have purposeful time in the office and partner with your leader to make flexibility work for both you and the business.

We always ask, “How can we improve this?” and we’re looking for like-minded people. This is one business that’s not chained to the status quo. “Good enough” isn’t good enough here. We stay ahead by keeping on top of trends, recognizing market gaps and looking to fill those gaps in ways that give us an advantage. In our diverse workforce, we encourage and guide each other to explore new ground, glad for the unique perspectives and skills every person brings. Join us in our rewarding and profitable journey.

Total Benefits

Here are a few of the benefits you’d enjoy. For a complete overview, see www.mykcbenefits.com.

Great support for good health with medical, dental, and vision coverage options. No waiting periods or pre-existing condition restrictions. Access to an on-site fitness center, occupational health nurse, and allowances for high-quality safety equipment.

Flexible Savings and spending accounts to maximize health care options and stretch dollars when caring for yourself or dependents.

Diverse income protection insurance options to protect yourself and your family in case of illness, injury, or other unexpected events.

Additional programs and support to continue your education, adopt a child, relocate, or even find temporary childcare.

To Be Considered

Click the Apply button and complete the online application process. A member of our recruiting team will review your application and follow up if you seem like a great fit for this role.

In the meantime, check out the careers website. You’ll want to review this and come prepared with relevant questions if and when you pass GO and begin interviews.

And finally, the fine print…

For Kimberly-Clark to grow and prosper, we must be an inclusive organization that applies the diverse experiences and passions of its team members to brands that make life better for people all around the world. We actively seek to build a workforce that reflects the experiences of our consumers. When you bring your original thinking to Kimberly-Clark, you fuel the continued success of our enterprise. We are a committed equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation, gender identity, age, pregnancy, genetic information, citizenship status, or any other characteristic protected by law.

The statements above are intended to describe the general nature and level of work performed by employees assigned to this classification. Statements are not intended to be construed as an exhaustive list of all duties, responsibilities and skills required for this position.

K-C requires that an employee have authorization to work in the country in which the role is based. In the event an applicant does not have current work authorization, K-C will determine, in its sole discretion, whether to sponsor an individual for work authorization. However, based on immigration requirements, not all roles are suitable for sponsorship. This position is subject to drug and alcohol testing, including pre-employment testing.

#LI-remote

Global VISA and Relocation Specifications:

Primary Location

USA-GA-Atlanta-Roswell

Additional Locations

USA-IL-Chicago, USA-TN-Knoxville, USA-TX-Dallas, USA-WI-Neenah

Worker Type

Employee

Worker Sub-Type

Regular

Time Type

Full time
Apply Here
For Remote Cybersecurity Incident Response Analyst roles, visit Remote Cybersecurity Incident Response Analyst Roles

********

Security Analyst at Northwestern Memorial Healthcare

Location: Chicago

Company Description

At Northwestern Medicine, every patient interaction makes a difference in cultivating a positive workplace. This patient-first approach is what sets us apart as a leader in the healthcare industry. As an integral part of our team, you’ll have the opportunity to join our quest for better healthcare, no matter where you work within the Northwestern Medicine system. At Northwestern Medicine, we pride ourselves on providing competitive benefits: from tuition reimbursement and loan forgiveness to 401(k) matching and lifecycle benefits, we take care of our employees. Ready to join our quest for better?

Job Description

The Security Analyst reflects the mission, vision, and values of NM, adheres to the organizations Code of Ethics and Corporate Compliance Program, and complies with all relevant policies, procedures, guidelines and all other regulatory and accreditation standards.

Responsibilities:
• Investigate alerts generated by security controls.
• Implement/provide recommendations to improve detection capability accuracy.
• Participate to the development/optimization of incident response standards and procedure to increase the organizations cyber resiliency.
• Coach and mentor junior resources.
• Analyze the enterprise information security environment and recommend security measures to safeguard valuable information assets.
• Help identify, evaluate, and report on information security risks.
• Collaborate with vendors and internal departments to recommendations to optimize performance of security controls.
• Collaborate with network and technology support team to enhance and improve security processes and documentation.
• Regularly evaluate and assess information security vulnerabilities, solutions, and organizational posture.
• Stays current with security technologies and threats in order to contextualize the events observed in the environment.
• Assist in providing initial assessment of impact severity for IT security incidents and executing the appropriate response.
• Investigates any fraud and other computer issues.
• Perform daily operational tasks required for the department to protect NM’s assets. Tasks range from (but are not limited to):
• Analyze security alerts
• Maintain endpoint protection infrastructure
• Facilitate risk evaluation related to vulnerability assessment findings and coordinate risk treatment

AA/EOE

Qualifications

Required:
• Bachelors degree or equivalent work experience
• Two or more years of professional IT experience, including Cyber Security
• Working knowledge of the following subjects:
• Network (protocols, topologies)
• Security controls (proxies, IPS, IDS, Firewall and packet analyzers)
• Systems (Windows, Linux/UNIX)
• Software development (development / scripting langages)
• Incident Response
• Threat and Vulnerability Management
• Experience and knowledge of at least two of the major security vendors relevant to the position.
• Working knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, HIPAA, PCI, ISO 27001&27002, ITIL).
• Excellent problem solving skills
• Demonstrated timely task completion involving solid organizational skills, task tracking, follow-up, and productive peer interaction.
• Excellent verbal and written communication skills.

Preferred:
• Certification or courses: Associate of (ISC)/CISSP, GSEC, GCWN, GCED or CEH a plus

Additional Information

Northwestern Medicine is an affirmative action/equal opportunity employer and does not discriminate in hiring or employment on the basis of age, sex, race, color, religion, national origin, gender identity, veteran status, disability, sexual orientation or any other protected status.
Apply Here
For Remote Security Analyst roles, visit Remote Security Analyst Roles

********

Information Security Analyst at Sodexo

Location: Chicago

Unit Description

Sodexo is currently seeking a dynamic Information Security Analyst . This is an exciting opportunity to join a growing global cybersecurity team with one of the world’s largest employers.

As a member of North American (NorAm) CyberSOC team, your role will be to:
• Be the main point of contact for all North American entities regarding security incidents.
• Identify and act on any malicious or anomalous activity
• Work with regional security teams to identify the appropriate incident response and remediation plan
• Investigate incident escalated by third party security providers including but not limited to:
• Phishing alerts
• Compromised accounts
• Compromised workstations
• Abnormal account activities like impossible travel
• …
• Monitor Information Security alerts using Security Information and Event Management (SIEM) to triage, mitigate, and escalate issues as needed while capturing essential details and artifacts.
• Utilize sensor data and correlated logs containing EDR, IDS, Windows events, Web Proxy, and similar data to establish context and rule out false positives.
• Ensure proper documentation of security incidents including attack details.
• Participate in root cause analysis or lessons learned sessions
• Provide feedback to SOC Manager and Regional CISO to enhance security sensor and improve detection capability.
• Collaborate with operational support teams to ensure they are actively engaged in incidence response process.
• Respond to incoming reports of security incidents from the organization via calls and emails.
• Coordinate with AMERICAS head of IT Security, SOC manager and GRP CISO as necessary to:
• Initiate timely and effective notifications and response measures for critical incidents or emergencies
• Prepare clear and concise written incident reports
• Perform analysis of security alerts to evaluate risk, determine containment action and identify required preventative measures.
• Mitigate and contain identified threats using approved incident response methodologies.

The successful candidate will possess the following: :
• Associate or Bachelor’s degree on Computer Sciences with specialization in Cyber Security.
• 1-2 years’ experience in cyber security incident handling. Examples to include but not limited to:
• Phishing incident investigation
• Fraud investigation
• Compromised account investigation
• Malware investigation
• Intrusion incident investigation
• Webshell detection and response
• Networking Equipment
• Endpoint Logging (Windows, Linux)
• Solid understanding of, IT architecture, Authentication and Authorization, security technologies.
• Strong communication capabilities.
• Experience with Qradar, Resilient SOAR, Qualys, Azure/O365and Python and/or Powershell scripting a plus.

Important :

This position is opened also for freshly graduated students passionate by cyber security with a critical mind and desiring to learn and grow on an international context.

At Sodexo, we believe every employee should have the resources to be their best. As part of our overall rewards, we offer benefits programs designed to help you maintain a healthy lifestyle including health, dental and vision insurance. We also offer other benefits like paid time off, financial and savings programs, 401k, and access to our employee assistance program and other discounts. Click here for more information about Sodexo’s Benefits (~~~) .

Not the job for you?

At Sodexo, we offer positions that support a variety of career goals working in diverse business segments, including Corporate Headquarters, Corporate, Schools, Universities, Government and Agencies, Healthcare, Senior Living and Sports and Leisure locations across the United States. Continue your search today (~~~) .

Working for Sodexo:

How far will your ambition, talent and dedication take you? Sodexo fosters a culture committed to the growth of individuals through continuous learning, mentoring and career growth opportunities.

Compensation range $50,000-$70,000 depending on experience and geography

Position Summary

Under limited supervision, performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Interfaces with user community to understand their security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security. Conducts accurate evaluation of the level of security required. Provides management with status reports.

Qualifications & Requirements

Basic Education Requirement – Associate’s Degree or equivalent experience

Basic Functional Experience – 2 years of experience in information security

Sodexo is an EEO/AA/Minority/Female/Disability/Veteran employer.

Location US-MD-Virtual | US-RI-Providence | US-CA-Sacramento | US-NJ-Atlantic City | US-VA-Arlington | US-NC-Charlotte | US-MA-Boston | US-TX-Austin | US-GA-Atlanta | US-MA-Boston | US-IL-Chicago | …

System ID 854898

Category IS&T

Relocation Type No

Employment Status Full-Time
Apply Here
For Remote Information Security Analyst roles, visit Remote Information Security Analyst Roles

********

Cyber Defense Engineer at Exelon Career Site New

Location: Chicago

Description

Be a part of something powerful at America’s premier energy provider!

At Exelon, we are united by our values and shared vision for a cleaner and brighter future. We encourage curiosity, value diverse perspectives and we never stop looking for ways to be, work and do better. We know the future is in our hands. That’s why we’re looking for people like you, who have the power to make a difference.

As the nation’s largest utility company, we serve more than 10 million customers through six fully regulated transmission and distribution utilities: Atlantic City Electric (ACE), Baltimore Gas and Electric (BGE), Commonwealth Edison (ComEd), Delmarva Power & Light (DPL), PECO Energy Company (PECO), and Potomac Electric Power Company (Pepco). All 18,000 of us are committed to delivering safe, reliable and affordable energy to our customers, strengthening our communities, supporting a clean energy future and reducing our impact on the changing climate.

Our people are the heart and soul of our business. Whether it’s powering lives, supporting communities or collaborating with colleagues, an Exelon employee is talented, compassionate, forward-thinking and inspired. We are empowered to evolve and advance our careers in an open and inclusive environment. We pride ourselves on being the kind of place where people want to come and stay. We know that investing in our employees’ futures strengthens ours, which is why we offer competitive compensation, incentives and health and retirement benefits.

PRIMARY PURPOSE OF POSITION

Perform the Security Monitoring process and escalate relevant issues to the Security Monitoring Team Lead. Identify potential security incidents and forward to the Incident Handling & Response team for analysis and remediation as appropriate.

PRIMARY DUTIES AND ACCOUNTABILITIES
• Complete Cyber Monitoring and Incident Response Operations Playbook/Checklist activities including, but not limited to: log review, vulnerability management activities, management report scheduling & running, alert analysis, filter modifications & escalation follow up activity status
• Develop, tune, and maintain tools to automate analysis capabilities for network-based, host-based and log-based security event analysis. Create signatures, rulesets, and content analysis definitions from various intelligence sources for a variety of security detection capabilities
• Organize and maintain documentation of detection capabilities, alert definitions, policy configurations, and tool rulesets.
• Maintain adherence to Corporate Security Operations Center standards, policies & procedures
• Remain up-to-date on the latest security information in order to validate the security analysis & identification capabilities of the security operations technologies
• Participate in efforts to analyze & define security filters & rules for a variety of security parameters

JOB SCOPE

Provide near real-time monitoring of business centric risks to Exelon by identifying potential security incidents from security alerts.

Qualifications
MINIMUM QUALIFICATIONS
• Bachelor’s Degree in Computer Science or a related 4-year technical degree (or a minimum 4 years of IT experience)
• Minimum 3 years IT Security experience
• Core Technical: Intrusion Detection, Netflow Analysis, Log Analysis, Rule/Signature/Content Development, Programming or scripting experience required.
• General: Must exhibit understanding and application of the principles of Network Security Monitoring (NSM). Ability to analyze log data, netflow data, alert data, network traffic and other data sources to validate security events. Ability to create signatures and detection content in IDS, SIEM and Log analysis platforms. Ability to consume, comprehend, utilize and create indicators of compromise. Ability to tune detection tools for accuracy. Execute on intelligence-driven detection capabilities. Perform daily analysis of detection reports and alerts. Maintain tools, scripts and applications for detection and automation capabilities. Identify opportunities for capability and efficiency improvements. Ability to conduct network and host analysis of compromised and baseline systems to identify anomalies. Exhibit understanding of tools, tactics and procedures (TTP) of malicious actors such as hacktivist groups, cybercrime organizations and advanced persistent threats. Identify and report on detection trends. Comprehensive knowledge of common networking protocols: HTTP, DNS, DHCP, SMTP, NTP, SSH, FTP.

PREFERRED QUALIFICATIONS
• General Info Security: Intelligence-Driven Detection, Security Principles, Threat Lifecycle Management, Incident Management & Lifecycle, Platform Analysis, Forensics & Investigations, NSM, DFIR
• Cyber SOC Process Management: Overall Process Design & SOC Threat Management, Teamwork, Collaboration and independent contributions
• Malware Analysis experience preferred.
Apply Here
For Remote Cyber Defense Engineer roles, visit Remote Cyber Defense Engineer Roles

********

Cyber Security Governance and Planning Analyst at Bank of America

Location: Chicago

Cyber Security Governance and Planning Analyst

Denver, Colorado;Washington, District of Columbia; Chicago, Illinois

Job Description:

Are you passionate about working with the best information security team in the world? Bank of America is hiring top talent to join our innovative and forward thinking team.

What We Do:

At Bank of America, we handle the finances of over 67 million client relationships every day, including helping them save, borrow, and invest for today and for their future. We stand by our clients each and every day giving them the power to realize their personal financial goals and help make their financial lives better.

The Global Information Security organization is responsible for protecting bank information systems, confidential and proprietary data, and customer information. The team:
• Develops the bank’s Information security strategy and policy
• Manages the Information security program and identifies and addresses vulnerabilities
• Develops, deploys and manages a risk-based controls portfolio
• Manages and operates a global security operations center that monitors, detects and responds to cybersecurity incidents

What We’re Looking For:

We’re looking for the next generation of Cyber security experts – those with a passion for growing a long-term career, building relationships and working with a team ofinnovative and forward thinkinginformation security professionals. Our cyber team is meant for those looking to make a real impact and build a career in information security. The role is ideal for those who have a passion to work with industry leaders to protect our brand and the customer/client experience by proactively detecting, disrupting, and mitigating cyber security across the organization.

What You’ll Get:

From day one, you’ll receive training including hands-on practice, personalized coaching and dedicated support throughout your on-boarding experience. With demonstrated success, you’ll have the opportunity to advance into many different roles with Global Information Security – with unlimited opportunity to grow throughout your career. You will be supported with dedicated programs, tools, and resources throughout your career journey.

We’ll help you:

•Build a successful career at Bank of America through world-class training and on-boarding programs that set you up for success

•Grow in your current role through one-on-one coaching from managers who are invested in your success and training programs that help you excel, build new skills or take on additional responsibility

•Continuously learn and advance your career goals through intentional career paths to the next best role

•Use resources and innovative technologies to optimize the client experience

•Expand your business knowledge and network by partnering with experts in Global Information Security, Global Technology and other lines of business

•Become an expert in what you do

What you can look forward to:

•Ongoing professional development to deepen your skills and optimize your expertise as the industry evolves and changes

•Resources and dedicated support to help you reach your full potential throughout your career

•A benefits program designed to meet the diverse needs of our employees at every stage of their life and help them plan for tomorrow

•Progressive workplace practices and initiatives that promote inclusion

We’re a culture that:

•Believes in responsible growth and has a proven dedication to supporting the communities we serve.

•Provides continuous training and developmental opportunities to help people achieve their goals, whatever their background or experience.

•Believes diversity makes us stronger, so we can reflect, connect to and meet the diverse needs of our clients and customers around the world.

•Is committed to advancing our tools, technology, and ways of working. We always put our clients first to meet their evolving needs.

Role Description:

The Cyber Security Assurance (CSA) Third Party Assessment Change Lead is responsible for processing all third party assessment change records and actively partnering with TPCA assessment teams, Enterprise Vendor Managers and TPCA Roster and Scheduling Managers to ensure research is thoroughly conducted and CR’s are processed in accordance with published Service Level Agreements (SLA’s).

Additional tasks include:

• Management of the TPCA Change Record process

• Identifying process optimization opportunities

• Working with TPCA assessment teams and Enterprise Vendor Managers to resolve conflicts that arise

• Identifying and escalating TPCA Change Record gaps

• Supporting inquiries into the program’s operations and/or assessment results from internal risk and audit partners

Required Skills:

• Proven self-starter with ability to influence and work collaboratively across peers both within and outside of the organization

• Ability to communicate clearly and effectively

• Highly organized with ability to plan routines to achieve business outcomes

• Excels at adapting to changing business needs, dealing with competing priorities and applying critical thinking

• Creative and proactive problem solver – ability to understand current state and offer future state suggestions

Enterprise Job Description: Responsible for defined work or projects of moderate scope and complexity to identify and mitigate third party information security risks. Works under the guidance of a more senior-level manager with limited direction. Possesses extensive technical or functional knowledge in third party risk management, information security, business continuity, and governance. Interacts extensively with internal or external stakeholders including business partners and/or external parties to identify, analyze, and resolve complex problems or security gaps. Typically has 3-5 years of relevant experience.

Job Band:

H5

Shift:

1st shift (United States of America)

Hours Per Week:

40

Weekly Schedule:

Referral Bonus Amount:

0

Job Description:

Are you passionate about working with the best information security team in the world? Bank of America is hiring top talent to join our innovative and forward thinking team.

What We Do:

At Bank of America, we handle the finances of over 67 million client relationships every day, including helping them save, borrow, and invest for today and for their future. We stand by our clients each and every day giving them the power to realize their personal financial goals and help make their financial lives better.

The Global Information Security organization is responsible for protecting bank information systems, confidential and proprietary data, and customer information. The team:
• Develops the bank’s Information security strategy and policy
• Manages the Information security program and identifies and addresses vulnerabilities
• Develops, deploys and manages a risk-based controls portfolio
• Manages and operates a global security operations center that monitors, detects and responds to cybersecurity incidents

What We’re Looking For:

We’re looking for the next generation of Cyber security experts – those with a passion for growing a long-term career, building relationships and working with a team ofinnovative and forward thinkinginformation security professionals. Our cyber team is meant for those looking to make a real impact and build a career in information security. The role is ideal for those who have a passion to work with industry leaders to protect our brand and the customer/client experience by proactively detecting, disrupting, and mitigating cyber security across the organization.

What You’ll Get:

From day one, you’ll receive training including hands-on practice, personalized coaching and dedicated support throughout your on-boarding experience. With demonstrated success, you’ll have the opportunity to advance into many different roles with Global Information Security – with unlimited opportunity to grow throughout your career. You will be supported with dedicated programs, tools, and resources throughout your career journey.

We’ll help you:

•Build a successful career at Bank of America through world-class training and on-boarding programs that set you up for success

•Grow in your current role through one-on-one coaching from managers who are invested in your success and training programs that help you excel, build new skills or take on additional responsibility

•Continuously learn and advance your career goals through intentional career paths to the next best role

•Use resources and innovative technologies to optimize the client experience

•Expand your business knowledge and network by partnering with experts in Global Information Security, Global Technology and other lines of business

•Become an expert in what you do

What you can look forward to:

•Ongoing professional development to deepen your skills and optimize your expertise as the industry evolves and changes

•Resources and dedicated support to help you reach your full potential throughout your career

•A benefits program designed to meet the diverse needs of our employees at every stage of their life and help them plan for tomorrow

•Progressive workplace practices and initiatives that promote inclusion

We’re a culture that:

•Believes in responsible growth and has a proven dedication to supporting the communities we serve.

•Provides continuous training and developmental opportunities to help people achieve their goals, whatever their background or experience.

•Believes diversity makes us stronger, so we can reflect, connect to and meet the diverse needs of our clients and customers around the world.

•Is committed to advancing our tools, technology, and ways of working. We always put our clients first to meet their evolving needs.

Role Description:

The Cyber Security Assurance (CSA) Third Party Assessment Change Lead is responsible for processing all third party assessment change records and actively partnering with TPCA assessment teams, Enterprise Vendor Managers and TPCA Roster and Scheduling Managers to ensure research is thoroughly conducted and CR’s are processed in accordance with published Service Level Agreements (SLA’s).

Additional tasks include:

• Management of the TPCA Change Record process

• Identifying process optimization opportunities

• Working with TPCA assessment teams and Enterprise Vendor Managers to resolve conflicts that arise

• Identifying and escalating TPCA Change Record gaps

• Supporting inquiries into the program’s operations and/or assessment results from internal risk and audit partners

Required Skills:

• Proven self-starter with ability to influence and work collaboratively across peers both within and outside of the organization

• Ability to communicate clearly and effectively

• Highly organized with ability to plan routines to achieve business outcomes

• Excels at adapting to changing business needs, dealing with competing priorities and applying critical thinking

• Creative and proactive problem solver – ability to understand current state and offer future state suggestions

Enterprise Job Description: Responsible for defined work or projects of moderate scope and complexity to identify and mitigate third party information security risks. Works under the guidance of a more senior-level manager with limited direction. Possesses extensive technical or functional knowledge in third party risk management, information security, business continuity, and governance. Interacts extensively with internal or external stakeholders including business partners and/or external parties to identify, analyze, and resolve complex problems or security gaps. Typically has 3-5 years of relevant experience.

Shift:

1st shift (United States of America)

Hours Per Week:

40

Learn more about this role

Full time

JR-22082637

Band: H5

Manages People: No

Travel: No

Manager:

Talent Acquisition Contact:

Stuart Collier

Referral Bonus:

0

Colorado pay and benefits information

Colorado pay range:

$92,000 – $132,800
annualized salary, offers to be determined based on experience, education and skill set.

Discretionary incentive eligible

This role is eligible to participate in the annual discretionary plan. Employees are eligible for an annual discretionary award based on their overall individual performance results and behaviors, the performance and contributions of their line of business and/or group; and the overall success of the Company.

Benefits

This role is currently benefits eligible . We provide industry-leading benefits, resources and support to our employees so they can make a genuine impact and contribute to the sustainable growth of our business and the communities we serve.

Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity and affirmative action, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates.

To view the “EEO is the Law” poster, CLICK HERE (~~~) .

To view the “EEO is the Law” Supplement, CLICK HERE (~~~) .

Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy (“Policy”) establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment.

To view Bank of America’s Drug-free workplace and alcohol policy, CLICK HERE .
Apply Here
For Remote Cyber Security Governance and Planning Analyst roles, visit Remote Cyber Security Governance and Planning Analyst Roles

********

The Tech Career Guru
We will be happy to hear your thoughts

Leave a reply

Tech Jobs Here
Logo