Overview
On Site
USD 75,000.00 - 85,000.00 per year
Full Time
Skills
Endpoint Protection
Writing
Security Operations
IT Security
KPI
Network
Vulnerability Management
Social Engineering
Artificial Intelligence
Threat Analysis
Evaluation
Security Controls
Risk Assessment
Risk Management
Business Process
Security Awareness
Cloud Computing
Reporting
Leadership
Training
Python
Windows PowerShell
Scripting
Version Control
Technical Writing
Servers
Internet
Scheduling
Performance Metrics
QoS
Soft Skills
Research
Cost-benefit Analysis
Technical Analysis
Presentations
Process Engineering
Continuous Improvement
Analytical Skill
Problem Solving
Conflict Resolution
Incident Management
Root Cause Analysis
Documentation
Communication
SAFE
Agile
Supervision
Computer Science
Cyber Security
Information Security
System Administration
CISSP
SSCP
CISM
Vulnerability Scanning
Management
Network Administration
Regulatory Compliance
Firewall
Proxies
SIEM
IDPS
Taxes
Life Insurance
SEP
Collaboration
Partnership
Business Transformation
Law
Job Details
Description
Our client is looking for a Security Analyst. Hybrid around Plymouth, WI. (3 days per week)
75-85k/year converstion
Day to Day and types of experience we would like to see include:
Developing policies vulnerability management, security assessments,
Email protection, endpoint protection, threat intelligence
Understanding of firewall proxy/Security Operations
Writing security procedures and standards
Leveraging scripting for automation would be a plus
Security awareness training
Security operations - addressing alerts in tools
Phishing campaigns - running them
Metrics - they will do reporting on the metrics they have established
As an Information Security Analyst, you will be responsible for identifying, reporting and remedying cybersecurity
vulnerabilities, identifying and documenting IT security risks, and assisting the Information Security team in security event
triage, investigation, containment, and root cause analysis. Maintains information security standards, procedures, reports,
and metrics and assists in evaluating and implementing security technologies and tools.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following: other duties may be assigned.
TECHNICAL SKILLS
Collaborate with senior team members in developing and maintaining policies, procedures, standards, and associated plans
for information security, following industry-standard best practices. Contribute to establishing and maintaining performance
metrics, KPIs, and KRIs for reporting and tracking the security program's performance and effectiveness.
Administer the Vulnerability Management system, executing vulnerability scanning assessments on software, operating
systems, and network devices. Create and maintain vulnerability management reports under the guidance of senior team
members.
Administer email protection systems, ensuring day-to-day operational effectiveness. Implement and enforce established
protection policies. Conduct research on social engineering threats, contributing insights to enhance protection policies.
Assist in the creation and refinement of protection policies. Contribute to the assessment and implementation of AI-driven
solutions for potential integration. Provide support in the development and implementation of automated response actions.
Participate in conducting risk assessments for current and new technologies, identifying potential security risks and
vulnerabilities. Contribute to the analysis and quantification of risks, providing insights into the potential impact and
likelihood of scenarios. Assist in identifying and prioritizing vulnerabilities, contributing to efforts in reducing overall
security risk. Collaborate with the Information Security Manager on assessing threat intelligence relevance. Support the
evaluation of existing security controls and propose basic improvements based on risk assessments. Contribute to reports
for executive leadership, providing insights into the organization's risk posture. Begin collaborating with other departments
to integrate security risk management into business processes. Actively engage in cross-functional teams to address security
risks effectively.
Support the overall Security Awareness and Training program, contributing to the execution of strategies and initiatives.
Perform in the administration of the Security Awareness and Training cloud-based platform. Participate in the design and
execution of company-wide and focused phishing test campaigns based on trending threats and user risks. Contribute to the
design and scheduling of training campaigns. Contribute to the development and tracking of phishing and training metrics
and report preparation for leadership. Engage in continuous learning to stay abreast of evolving cybersecurity threats and
training methodologies.
Develop foundational scripting and coding skills in Python, PowerShell, or other relevant scripting languages. Begin
leveraging scripting and automation for foundational security tasks, including basic threat hunting, vulnerability
assessments, and response automation. Contribute to initiatives aimed at introducing automation to security processes within
the IT environment. Follow scripting best practices, including version control and documentation. Collaborate with IT teams
to understand and support basic automation strategies.
Participate in planning and contributing to the design, building, and implementation of security solutions. Contribute to
ensuring the protection of company information, emphasizing availability, integrity, confidentiality, and availability. Assist
in developing technical documentation and procedures for securing systems, servers, networks, and Internet systems, under
guidance.
Collaborate with senior team members to research emerging products, services, protocols, and standards to enhance security.
Support in recommending, scheduling, and participating in security improvements, upgrades, and/or purchases.
Coordinate small projects or project task related to medium, and large projects, working alongside internal and external
resources and consulting partners. Contribute to developing and implementing performance metrics, ensuring projects align
with specific Statements of Work. Support efforts to maintain the expected quality of service while managing project costs
effectively.
SOFT SKILLS
Assist in the research to the research on technologies, contributing to providing analysis and a breakdown of advantages
and disadvantages for each option, including recommendations with cost analysis. Develop the ability to explain technical
ideas and concepts in a clear manner to both technical and non-technical team members. Learn and practice communication
skills to participate in crucial conversations to resolve conflict or differences of opinion of a technical nature. Listen and
participate as directed in the interaction with vendors/partners, offering questions to understand the vendor and their
offerings. Develop technical analysis and provide explanations other technical resources using examples, diagrams, and
presentations.
Engage in inter-team and cross-team discussions on technical issues and process development and assist in troubleshooting
sessions. Learn and understand the value of continuous improvement for the environment and the value of self-improvement
in technical and non-technical skills. Develop and practice verbal and electronic communication skills and the importance
of the productive delivery of information and ideas within your team. Listen and engage with others to better understand
ideas and positions from others, asking questions to understand differing perspectives better.
Develop foundational skills in using troubleshooting tools and techniques for effective problem resolution. Build basic
analytical and problem-solving skills to contribute to identifying and resolving security issues. Actively participate in
incident response activities, providing support for basic security incidents and contributing to basic root cause analysis.
Learn and apply basic documentation practices for troubleshooting processes and solutions. Develop basic communication
skills for collaboration with team members and effective information conveyance.
Understand and explain SAFe Agile methodology, terminology, roles, and responsibilities of the Agile TRAIN to agile and
non-agile personnel. Understand the value of agile in planning and practice across increments and program increments; be
able to explain stories, features, and initiatives from a feature perspective. Recommend and construct fully developed stories,
including acceptance criteria, understand dependencies, and participate in discussions with supporting teams; suggest
features to the PO with acceptance criteria and business outcomes.
Must be willing to work outside of regular work hours for special projects and on-call responsibilities. Responsible for
reacting to all off-hour calls regarding system problems promptly and reasonably.
SUPERVISORY RESPONSIBILITIES
This job has no supervisory responsibilities.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements
below represent the required knowledge, skill, and/or ability. Reasonable accommodations may be made to enable
individuals with disabilities to perform essential functions. The applicant must be authorized to work in the USA legally.
EDUCATION and/or EXPERIENCE
Bachelor's degree in Computer Science, Information Security, Cybersecurity, or any IT-related field
3+ years of relevant Cybersecurity, Information Security, IT, or IT System Administration experience.
CISSP, SSCP, CISM certification is preferred.
Experience in vulnerability scanning and management tools are a plus.
A background in systems and network administration is highly desirable.
Understanding of Governance, Risk and Compliance.
Knowledgeable with NIST CSF or CIS Controls
Understanding of firewalls, proxies, XDR, SIEM, EPP and IDPS concepts
Pay and Benefits
The pay range for this position is $35.00 - $39.00/hr.
Eligibility requirements apply to some benefits and may depend on your job
classification and length of employment. Benefits are subject to change and may be
subject to specific elections, plan, or program terms. If eligible, the benefits
available for this temporary role may include the following:
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long-term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Plymouth,WI.
Application Deadline
This position is anticipated to close on Sep 26, 2025.
>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Our client is looking for a Security Analyst. Hybrid around Plymouth, WI. (3 days per week)
75-85k/year converstion
Day to Day and types of experience we would like to see include:
Developing policies vulnerability management, security assessments,
Email protection, endpoint protection, threat intelligence
Understanding of firewall proxy/Security Operations
Writing security procedures and standards
Leveraging scripting for automation would be a plus
Security awareness training
Security operations - addressing alerts in tools
Phishing campaigns - running them
Metrics - they will do reporting on the metrics they have established
As an Information Security Analyst, you will be responsible for identifying, reporting and remedying cybersecurity
vulnerabilities, identifying and documenting IT security risks, and assisting the Information Security team in security event
triage, investigation, containment, and root cause analysis. Maintains information security standards, procedures, reports,
and metrics and assists in evaluating and implementing security technologies and tools.
ESSENTIAL DUTIES AND RESPONSIBILITIES include the following: other duties may be assigned.
TECHNICAL SKILLS
Collaborate with senior team members in developing and maintaining policies, procedures, standards, and associated plans
for information security, following industry-standard best practices. Contribute to establishing and maintaining performance
metrics, KPIs, and KRIs for reporting and tracking the security program's performance and effectiveness.
Administer the Vulnerability Management system, executing vulnerability scanning assessments on software, operating
systems, and network devices. Create and maintain vulnerability management reports under the guidance of senior team
members.
Administer email protection systems, ensuring day-to-day operational effectiveness. Implement and enforce established
protection policies. Conduct research on social engineering threats, contributing insights to enhance protection policies.
Assist in the creation and refinement of protection policies. Contribute to the assessment and implementation of AI-driven
solutions for potential integration. Provide support in the development and implementation of automated response actions.
Participate in conducting risk assessments for current and new technologies, identifying potential security risks and
vulnerabilities. Contribute to the analysis and quantification of risks, providing insights into the potential impact and
likelihood of scenarios. Assist in identifying and prioritizing vulnerabilities, contributing to efforts in reducing overall
security risk. Collaborate with the Information Security Manager on assessing threat intelligence relevance. Support the
evaluation of existing security controls and propose basic improvements based on risk assessments. Contribute to reports
for executive leadership, providing insights into the organization's risk posture. Begin collaborating with other departments
to integrate security risk management into business processes. Actively engage in cross-functional teams to address security
risks effectively.
Support the overall Security Awareness and Training program, contributing to the execution of strategies and initiatives.
Perform in the administration of the Security Awareness and Training cloud-based platform. Participate in the design and
execution of company-wide and focused phishing test campaigns based on trending threats and user risks. Contribute to the
design and scheduling of training campaigns. Contribute to the development and tracking of phishing and training metrics
and report preparation for leadership. Engage in continuous learning to stay abreast of evolving cybersecurity threats and
training methodologies.
Develop foundational scripting and coding skills in Python, PowerShell, or other relevant scripting languages. Begin
leveraging scripting and automation for foundational security tasks, including basic threat hunting, vulnerability
assessments, and response automation. Contribute to initiatives aimed at introducing automation to security processes within
the IT environment. Follow scripting best practices, including version control and documentation. Collaborate with IT teams
to understand and support basic automation strategies.
Participate in planning and contributing to the design, building, and implementation of security solutions. Contribute to
ensuring the protection of company information, emphasizing availability, integrity, confidentiality, and availability. Assist
in developing technical documentation and procedures for securing systems, servers, networks, and Internet systems, under
guidance.
Collaborate with senior team members to research emerging products, services, protocols, and standards to enhance security.
Support in recommending, scheduling, and participating in security improvements, upgrades, and/or purchases.
Coordinate small projects or project task related to medium, and large projects, working alongside internal and external
resources and consulting partners. Contribute to developing and implementing performance metrics, ensuring projects align
with specific Statements of Work. Support efforts to maintain the expected quality of service while managing project costs
effectively.
SOFT SKILLS
Assist in the research to the research on technologies, contributing to providing analysis and a breakdown of advantages
and disadvantages for each option, including recommendations with cost analysis. Develop the ability to explain technical
ideas and concepts in a clear manner to both technical and non-technical team members. Learn and practice communication
skills to participate in crucial conversations to resolve conflict or differences of opinion of a technical nature. Listen and
participate as directed in the interaction with vendors/partners, offering questions to understand the vendor and their
offerings. Develop technical analysis and provide explanations other technical resources using examples, diagrams, and
presentations.
Engage in inter-team and cross-team discussions on technical issues and process development and assist in troubleshooting
sessions. Learn and understand the value of continuous improvement for the environment and the value of self-improvement
in technical and non-technical skills. Develop and practice verbal and electronic communication skills and the importance
of the productive delivery of information and ideas within your team. Listen and engage with others to better understand
ideas and positions from others, asking questions to understand differing perspectives better.
Develop foundational skills in using troubleshooting tools and techniques for effective problem resolution. Build basic
analytical and problem-solving skills to contribute to identifying and resolving security issues. Actively participate in
incident response activities, providing support for basic security incidents and contributing to basic root cause analysis.
Learn and apply basic documentation practices for troubleshooting processes and solutions. Develop basic communication
skills for collaboration with team members and effective information conveyance.
Understand and explain SAFe Agile methodology, terminology, roles, and responsibilities of the Agile TRAIN to agile and
non-agile personnel. Understand the value of agile in planning and practice across increments and program increments; be
able to explain stories, features, and initiatives from a feature perspective. Recommend and construct fully developed stories,
including acceptance criteria, understand dependencies, and participate in discussions with supporting teams; suggest
features to the PO with acceptance criteria and business outcomes.
Must be willing to work outside of regular work hours for special projects and on-call responsibilities. Responsible for
reacting to all off-hour calls regarding system problems promptly and reasonably.
SUPERVISORY RESPONSIBILITIES
This job has no supervisory responsibilities.
QUALIFICATIONS
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements
below represent the required knowledge, skill, and/or ability. Reasonable accommodations may be made to enable
individuals with disabilities to perform essential functions. The applicant must be authorized to work in the USA legally.
EDUCATION and/or EXPERIENCE
Bachelor's degree in Computer Science, Information Security, Cybersecurity, or any IT-related field
3+ years of relevant Cybersecurity, Information Security, IT, or IT System Administration experience.
CISSP, SSCP, CISM certification is preferred.
Experience in vulnerability scanning and management tools are a plus.
A background in systems and network administration is highly desirable.
Understanding of Governance, Risk and Compliance.
Knowledgeable with NIST CSF or CIS Controls
Understanding of firewalls, proxies, XDR, SIEM, EPP and IDPS concepts
Pay and Benefits
The pay range for this position is $35.00 - $39.00/hr.
Eligibility requirements apply to some benefits and may depend on your job
classification and length of employment. Benefits are subject to change and may be
subject to specific elections, plan, or program terms. If eligible, the benefits
available for this temporary role may include the following:
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long-term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Plymouth,WI.
Application Deadline
This position is anticipated to close on Sep 26, 2025.
>About TEKsystems:
We're partners in transformation. We help clients activate ideas and solutions to take advantage of a new world of opportunity. We are a team of 80,000 strong, working with over 6,000 clients, including 80% of the Fortune 500, across North America, Europe and Asia. As an industry leader in Full-Stack Technology Services, Talent Services, and real-world application, we work with progressive leaders to drive change. That's the power of true partnership. TEKsystems is an Allegis Group company.
The company is an equal opportunity employer and will consider all applications without regards to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.