⚡ Recent Activity
• Someone from Chicago viewed this job 3 hours ago
• Someone from Austin viewed this job 1 hour ago

Lead the charge against evolving cyber threats while shaping the security posture of a fast‑growing tech firm in the heart of Chicago. As an Information Security Analyst, you’ll blend cutting‑edge SIEM/SOAR expertise with proactive threat hunting, earning a competitive salary and a clear path to senior leadership.

About the Role

What You’ll Do

  • Monitor, analyze, and triage security alerts across enterprise networks, cloud services, and endpoint devices using advanced SIEM platforms (Splunk, Microsoft Sentinel, ArcSight).
  • Execute incident response playbooks, conduct forensic investigations, and document post‑mortems that drive continuous improvement.
  • Hunt for advanced threats using threat‑intel feeds, behavioral analytics, and automated SOAR workflows (Cortex XSOAR, Phantom).
  • Perform vulnerability assessments, penetration testing, and remediation validation to meet PCI DSS, HIPAA, and Illinois BIPA compliance standards.
  • Collaborate with IT, DevOps, and compliance teams to embed security controls into CI/CD pipelines and cloud configurations.

Why This Role Matters

In today’s digital economy, every breach can erode customer trust and cost millions. By joining our Illinois‑based security operations center (SOC), you become the guardian of critical data, the architect of resilient defenses, and the voice that influences strategic risk decisions across the organization. Your work directly safeguards our clients, partners, and the reputation of our brand in the Midwest tech hub.

Requirements

Essential Skills

  • 3+ years of hands‑on experience as an Information Security Analyst, SOC analyst, or equivalent.
  • Proficiency with SIEM tools (Splunk, Sentinel, QRadar) and SOAR automation platforms.
  • Strong knowledge of threat detection techniques, including IDS/IPS signatures, anomaly detection, and MITRE ATT&CK mapping.
  • Ability to write clear, actionable incident reports and remediation timelines.
  • Experience conducting vulnerability scans (Nessus, Qualys) and coordinating patch management.

Certifications & Education

  • CISSP, CISM, or CompTIA Security+ preferred.
  • Bachelor’s degree in Computer Science, Information Technology, or related field.
  • Familiarity with Illinois privacy legislation (BIPA) and healthcare compliance (HIPAA).

Benefits

Compensation & Growth

  • Base salary $95,000–$115,000 (aligned with Illinois market rates).
  • Performance‑based bonuses and annual equity grants tied to security milestones.
  • Dedicated career‑development budget for certifications, conferences, and training.

Work Environment

  • Hybrid model: 3 days in our Chicago downtown office + 2 remote days, offering flexibility without sacrificing collaboration.
  • State‑of‑the‑art SOC equipped with real‑time threat‑intelligence feeds, automated playbooks, and a 24/7 incident response team.
  • Core hours 9 am–5 pm CT with the option to adjust for peak threat periods.

Well‑Being

  • Comprehensive health, dental, and vision plans for you and your family.
  • 401(k) with company match and a wellness stipend for fitness, mental health, or ergonomic upgrades.
  • Generous PTO, paid parental leave, and access to counseling services.

Why Illinois?

Illinois offers a vibrant tech ecosystem, a robust talent pipeline, and a strategic location that connects you to Fortune‑500 clients and emerging startups alike. Chicago’s cybersecurity community, frequent industry meetups, and proximity to top‑tier universities provide endless learning opportunities. Working here means you’ll be at the intersection of Midwest innovation and national security standards, driving impact on a regional and national scale.

How to Apply

If you’re ready to protect data, mentor junior analysts, and shape security strategy in a fast‑moving environment, submit your résumé, a brief cover letter highlighting your most relevant incident response experience, and any certifications you hold. We’ll review applications on a rolling basis and aim to connect with top candidates within 7–10 days.