Monitor and respond to security incidents using SIEM/IDS/firewalls; perform vulnerability assessments and penetration testing; analyze threat intelligence; collaborate with IT to implement security best practices; support SOC 2 compliance, reporting, policies, and employee training.
Cybersecurity Analyst is a detail-oriented and proactive member of our dynamic infrastructure team.
This position monitors, analyzes and responds to security incidents, ensuring compliance with industry standards and helping to fortify our defenses against emerging risks. This role plays a critical part in protecting our organization's information systems from cyber threats.
If you're passionate about cybersecurity and thrive in a fast-paced environment, this is your opportunity to make a real impact.
Responsibilities- Monitor network traffic, systems, and applications for suspicious activities using security tools like SIEM (Security Information and Event Management) systems, intrusion detection systems (IDS), and firewalls.
- Conduct vulnerability assessments and penetration testing to identify and mitigate potential security weaknesses.
- Investigate and respond to security incidents, including malware infections, data breaches, and unauthorized access attempts, following established incident response protocols.
- Analyze threat intelligence from various sources to stay ahead of emerging cyber threats and recommend proactive measures.
- Collaborate with IT and development teams to implement security best practices, such as secure coding, access controls, and encryption.
- Prepare detailed reports on security findings, incidents, and compliance status for management and regulatory bodies.
- Assist in developing and updating security policies, procedures, and training programs for employees.
- Ensure compliance with relevant regulations (e.g., GDPR, HIPAA, NIST frameworks) and participate in audits.
- Stay current with cybersecurity trends, tools, and certifications through continuous learning and professional development.
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field (or equivalent experience).
- 2+ years of experience in cybersecurity, IT security, or a similar role.
- Strong knowledge of networking protocols, operating systems (Windows, Linux), and cloud environments (AWS, Azure).
- Hands-on experience with vulnerability management tools (web application and infrastructure scanning)
- SOC 2 compliance knowledge: Understanding of Type 1 & Type 2 controls, audit processes, and evidence requirements
- SQL proficiency: Comfortable writing queries to analyze logs, generate reports, and support compliance activities
- Cloud security experience: Working knowledge of Microsoft 365/Azure, AWS, or GCP environments
- Incident response skills: Experience investigating and responding to security incidents, phishing, account compromises
- Access management: Understanding of least-privilege principles and user access controls in SaaS environments
- Ability to work independently and as part of a team in high-pressure situations.
Top Skills
Siem,Ids,Firewalls,Windows,Linux,Aws,Azure,Gcp,Microsoft 365,Sql,Vulnerability Scanning,Penetration Testing
Similar Jobs
Edtech • Healthtech
Lead institution-wide cybersecurity risk and assurance activities, perform vulnerability management and application security testing (DAST/SAST/SCA), drive remediation (POA&M), support continuous monitoring, respond to client security questionnaires, oversee third-party risk and data governance, and serve as AIR's HIPAA Security Officer.
Top Skills:
Dast,Sast,Sca,Cnapp,Azure,Aws,Google Cloud,Vulnerability Scanning,Static Code Analysis,Dynamic Application Security Testing,Container Security,Red Teaming,Continuous Threat Exposure Management,Forensic Log Analysis,Security Posture Management
Healthtech
Perform advanced alert monitoring and incident response within the Cybersecurity Operations Center. Investigate, document, and escalate incidents from detection through resolution, collaborate with DFIR and partner teams, use SIEM/EDR toolsets, conduct root-cause analysis, and influence departmental strategy on moderately complex to complex technical issues.
Top Skills:
Siem,Edr,Dfir,Csoc
Information Technology • Software
Perform cybersecurity compliance assessments and RMF-based authorization activities, track and remediate findings, develop policies and technical standards, support cyber assessments and incident response, review network architectures for compliance, and coordinate with customers and DoD stakeholders to achieve cybersecurity objectives.
Top Skills:
Microsoft Word,Microsoft Excel,Microsoft Powerpoint,Microsoft Sccm,Powerbi,Elasticsearch,Splunk,Microsoft Azure,Cisco,Redhat
What you need to know about the Chicago Tech Scene
With vibrant neighborhoods, great food and more affordable housing than either coast, Chicago might be the most liveable major tech hub. It is the birthplace of modern commodities and futures trading, a national hub for logistics and commerce, and home to the American Medical Association and the American Bar Association. This diverse blend of industry influences has helped Chicago emerge as a major player in verticals like fintech, biotechnology, legal tech, e-commerce and logistics technology. It’s also a major hiring center for tech companies on both coasts.
Key Facts About Chicago Tech
- Number of Tech Workers: 245,800; 5.2% of overall workforce (2024 CompTIA survey)
- Major Tech Employers: McDonald’s, John Deere, Boeing, Morningstar
- Key Industries: Artificial intelligence, biotechnology, fintech, software, logistics technology
- Funding Landscape: $2.5 billion in venture capital funding in 2024 (Pitchbook)
- Notable Investors: Pritzker Group Venture Capital, Arch Venture Partners, MATH Venture Partners, Jump Capital, Hyde Park Venture Partners
- Research Centers and Universities: Northwestern University, University of Chicago, University of Illinois Urbana-Champaign, Illinois Institute of Technology, Argonne National Laboratory, Fermi National Accelerator Laboratory



