Information Technology Security Analyst in Warrenville, IL at ITG

Date Posted: 10/18/2021

Job Snapshot

  • Employee Type:
    Full-Time
  • Experience:
    At least 5 year(s)
  • Date Posted:
    10/18/2021

Job Description

The Company 

Industrial Technology Group (ITG), is the parent of many independent manufacturing companies which produce a wide array of equipment and products. The independent business model fosters entrepreneurship and growth and allows professional development at all levels. Industrial Technology Group (ITG) is wholly owned by The Heico Companies, LLC.

Our philosophy of developing a close customer contact to provide prompt, responsive service and to meet our customer's changing needs allows us to be leaders within our respective industries. Equipment and products are marketed domestically through a direct sales force, manufacturer's representatives and an established network of independent dealers. Internationally, Pettibone sells in more than 60 countries through an independent distributor network, company sales representatives, licensees and agents. Our company is diverse and has a solid management base, product/market niches and efficient manufacturing capabilities.

The Position

The Information Security Analyst will plan, build, and carry out the group’s security measures to protect the organization’s computer networks and systems. Ensure the highest levels of confidentiality, integrity, and availability. Develop, implement, and manage the IT Security Roadmap to protect all enterprise systems, applications, and data. Establish an enterprise security stance through policy enforcement, best practice architecture models and consistent training processes.

Primary Responsibilities

  • Monitor the organization’s networks for security breaches and react quickly to mitigate the threat.
  • Take a proactive approach in understanding and staying up-to-date to address technology shifts and threats on the horizon.
  • Conduct ongoing penetration testing to identify any potential vulnerabilities and exploits
  • Relay best practice recommendations based on evolving threat landscape to protect intellectual property and drive strong security culture.
  • Manage the creation and maintenance of a comprehensive education and awareness program.
  • Assist the Enterprise in developing information security policy, standards, and guidelines appropriate to business, technology, and legal requirements and in accordance with best industry practice.
  • Recommend roles and responsibilities with regard to information data ownership, classification, accountability and protection.
  • Create documentation concerning IT systems and IT procedures.
  • Develop and communicate standards of use, operations and security of network, personal computers, and data.
  • Take ownership of security control reviews following security incidents. Drive action plans to completion to shore up our environment based upon the understanding from the Root Cause Analysis.
  • Shape solution delivery to protect the company’s data, systems, and intellectual property.
  • Drive and instill continuous improvement discipline within IT and in the business. Strive to identify opportunities to reduce the overall cost to serve and operate new solutions.
  • Identify and recommend improvement opportunities based on unsatisfactory regulatory compliance results and responsible for remedial actions to their resolution.
  • Research and evaluate new IT security technology trends and applicability of software/hardware solutions.
  • Make recommendations regarding hardware and software acquisitions.
  • Maintain existing applications and services owned by IT Security.
  • Play a key role in disaster recovery and business continuity.
  • Report regularly to Global IT Director and Group Management Team, keeping them abreast of the threat landscape and the tactical controls and strategic plans to achieve success.
  • Liaise among various groups inside and outside of IT, including Corporate Compliance, Internal Audit, Finance, Legal and HR management teams as required.

Job Requirements

  • Bachelor’s Degree in Computer Science, Information Assurance, Programming or comparable degree
  • 5+ years operational experience in IT Security
  • Required CompTIA Security+ certification. Other certifications like (CISSP, CISM, CISA, GIAC, SANS or similar) are a plus.
  • Deep technical background in IT Infrastructure and IT Operations:
  • Microsoft products e.g. Microsoft server operating systems, Active Directory, SQL, Enterprise Office 365, Azure, OneDrive, SharePoint, and Teams
  • Server Management incl. configuration, anti-virus, virtualization, patching, backup
  • Networking: switching and routing, layer 2 VLANS, layer 3 routing, TCP/IP, MPLS, VPN
  • Firewall (SonicWall preferred)
  • Solid Information Security background, including information and cyber security assessment, risk analysis, privacy, data protection, regulatory frameworks, as well as risk and security architecture and demonstrated experience in leading cyber incident response.
  • Strong knowledge of information security threats, vulnerability management, and countermeasures and associated operational best practices.
  • Experience in developing and maintaining information security policy, standards, and guidelines.
  • Experience with security industry standards (ISO 27001, NIST Cybersecurity Framework, PCI).
  • Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX) and Payment Card Industry/Data Security Standard Personally Identifiable Information (PII).
  • Understanding of overall business and IT strategy and ability to develop solutions with management at all levels.
  • Service oriented approach in IT (ITIL certified is a plus).
  • Customer orientation (e.g., short response times, appropriate communication and continuous information flow, adequate solutions).
  • Good analytical, communication and presentation skills.
  • Drive for excellence in own work and cooperation with customers/ colleagues/ employees.
  • Value based people management including “leading by example”.
  • Ability and willingness to integrate, cooperate and succeed in a multi-national group (i.e., traveling abroad, understanding corporate needs, and implementing, co-operating, and communicating with colleagues from overseas).
  • Efficient and resilient work style (e.g., priority setting, willingness to work overtime in peaks, absorb pressure).
  • Interest in continuous learning.

Key Leadership Competencies

  • Unquestionable Integrity - Demonstrates the highest degree of integrity when engaging with associates, and stakeholders. Leads ethically by example and fosters a culture firmly grounded in the values of the organization.
  • Collaborative Style – Engages stakeholders in problem solving and decision making. Is adept at bringing people together to tackle issues rather than dictate solutions. Has a collegial, inclusive working style and is professional and courteous. Builds strong relationships both internally and externally. Is both confident and humble.
  • Communication Skills - Excellent verbal and written communication skills with the ability to effectively deliver and reinforce consistent messages at all levels. Excellent listening skills.

EOE M/F/D/V