Overview
On Site
USD 8.00 per hour
Full Time
Skills
System On A Chip
Technical Direction
Communication
IT Security
Policies and Procedures
IT Management
Risk Assessment
Evaluation
Client/server
Development Testing
Firewall
Intrusion Detection
Encryption
Backup
Recovery
Access Control
Software Security
SIEM
CSIRT
Threat Analysis
Leadership
Sarbanes-Oxley
Privacy
Internal Control
Analytical Skill
Conflict Resolution
Problem Solving
Information Security
Incident Management
Security Operations
Splunk
Malware Analysis
Taxes
Life Insurance
Business Transformation
Law
Job Details
Description
Under technical direction, assists in the evaluation, development, implementation, communication, monitoring and maintenance of information technology security policies and procedures.
Provides technical expertise and support to client, IT management and staff in risk assessments, implementation and operational aspects of appropriate information security procedures and products.
Participates in the evaluation, development and implementation of security standards, procedures and guidelines for multiple platforms and diverse systems environments (e.g., firm-wide, distributed, client server systems, and e-applications).
Reviews the development, testing and implementation of security plans, products and control techniques. Also investigates and recommends appropriate corrective actions for information security incidents.
Tests and implements appropriate security methods and control techniques such as firewalls, data access rules tables, intrusion detection software, data encryption, data backup and recovery.
Performs access control and account administration of critical information resources.
Acts as liaison to product groups and assists them in implementation of data privacy, information security technologies, and application security.
Maintains an awareness of existing and proposed security standard setting groups, state and federal legislation and regulations pertaining to information security.
Identifies regulatory changes that will affect information security policy, standards and procedures, and recommends appropriate changes.
Skills, Knowledge & Abilities
1. In-depth understanding of SIEM operations and the CSIRT process
- Expertise in Incident response including but not limited to Malware, Ransomware, Phishing attempts, data breaches, unauthorized access etc.
2. Proven experience with industry standard security technologies, such as advanced endpoint detection technologies, threat intelligence aggregation tools, open sourced investigative technologies, EDR Technologies, and threat hunting.
3. Proven experience applying information security principles to secure platforms and prevent threats.
4. Proven ability to interact effectively with senior business leadership to effectively resolve information security incidents when necessary.
5. Working knowledge of regulations (e.g., SOX, privacy, etc.) and internal controls as they apply to IT.
6. Strong understanding of malware in static and dynamic environments and mitigation strategies to protect against it.
7. Superior analytical and problem-solving skills and the ability to effectively communicate highly technical information to business leaders.
8. Proven ability to influence change and adoption of information security protocols and concepts.
9. Ability to work extremely well under pressure while maintaining a professional image and approach
Skills
incident response, security operations, splunk, Crowdstrike, malware analysis
Top Skills Details
incident response,security operations,splunk,Crowdstrike,malware analysis
Pay and Benefits
The pay range for this position is $8.00 - $85.00/hr.
Eligibility requirements apply to some benefits and may depend on your job
classification and length of employment. Benefits are subject to change and may be
subject to specific elections, plan, or program terms. If eligible, the benefits
available for this temporary role may include the following:
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long-term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Chicago,IL.
Application Deadline
This position is anticipated to close on May 26, 2025.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Under technical direction, assists in the evaluation, development, implementation, communication, monitoring and maintenance of information technology security policies and procedures.
Provides technical expertise and support to client, IT management and staff in risk assessments, implementation and operational aspects of appropriate information security procedures and products.
Participates in the evaluation, development and implementation of security standards, procedures and guidelines for multiple platforms and diverse systems environments (e.g., firm-wide, distributed, client server systems, and e-applications).
Reviews the development, testing and implementation of security plans, products and control techniques. Also investigates and recommends appropriate corrective actions for information security incidents.
Tests and implements appropriate security methods and control techniques such as firewalls, data access rules tables, intrusion detection software, data encryption, data backup and recovery.
Performs access control and account administration of critical information resources.
Acts as liaison to product groups and assists them in implementation of data privacy, information security technologies, and application security.
Maintains an awareness of existing and proposed security standard setting groups, state and federal legislation and regulations pertaining to information security.
Identifies regulatory changes that will affect information security policy, standards and procedures, and recommends appropriate changes.
Skills, Knowledge & Abilities
1. In-depth understanding of SIEM operations and the CSIRT process
- Expertise in Incident response including but not limited to Malware, Ransomware, Phishing attempts, data breaches, unauthorized access etc.
2. Proven experience with industry standard security technologies, such as advanced endpoint detection technologies, threat intelligence aggregation tools, open sourced investigative technologies, EDR Technologies, and threat hunting.
3. Proven experience applying information security principles to secure platforms and prevent threats.
4. Proven ability to interact effectively with senior business leadership to effectively resolve information security incidents when necessary.
5. Working knowledge of regulations (e.g., SOX, privacy, etc.) and internal controls as they apply to IT.
6. Strong understanding of malware in static and dynamic environments and mitigation strategies to protect against it.
7. Superior analytical and problem-solving skills and the ability to effectively communicate highly technical information to business leaders.
8. Proven ability to influence change and adoption of information security protocols and concepts.
9. Ability to work extremely well under pressure while maintaining a professional image and approach
Skills
incident response, security operations, splunk, Crowdstrike, malware analysis
Top Skills Details
incident response,security operations,splunk,Crowdstrike,malware analysis
Pay and Benefits
The pay range for this position is $8.00 - $85.00/hr.
Eligibility requirements apply to some benefits and may depend on your job
classification and length of employment. Benefits are subject to change and may be
subject to specific elections, plan, or program terms. If eligible, the benefits
available for this temporary role may include the following:
Medical, dental & vision
Critical Illness, Accident, and Hospital
401(k) Retirement Plan - Pre-tax and Roth post-tax contributions available
Life Insurance (Voluntary Life & AD&D for the employee and dependents)
Short and long-term disability
Health Spending Account (HSA)
Transportation benefits
Employee Assistance Program
Time Off/Leave (PTO, Vacation or Sick Leave)
Workplace Type
This is a hybrid position in Chicago,IL.
Application Deadline
This position is anticipated to close on May 26, 2025.
About TEKsystems and TEKsystems Global Services
We're a leading provider of business and technology services. We accelerate business transformation for our customers. Our expertise in strategy, design, execution and operations unlocks business value through a range of solutions. We're a team of 80,000 strong, working with over 6,000 customers, including 80% of the Fortune 500 across North America, Europe and Asia, who partner with us for our scale, full-stack capabilities and speed. We're strategic thinkers, hands-on collaborators, helping customers capitalize on change and master the momentum of technology. We're building tomorrow by delivering business outcomes and making positive impacts in our global communities. TEKsystems and TEKsystems Global Services are Allegis Group companies. Learn more at TEKsystems.com.
The company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, sexual orientation, gender identity, genetic information or any characteristic protected by law.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.