Job Description:
SUMMARY
Hobart Service, an ITW Company, is seeking an experienced Information Cybersecurity Analyst with experience in System Administration. As a Cybersecurity Analyst, you will play a crucial role in safeguarding our organization's critical information and systems from potential threats and vulnerabilities. You will be responsible for monitoring, assessing, and implementing security measures to protect our assets, ensuring compliance with industry regulations, and promoting a strong security posture throughout the organization. The ideal candidate should have a strong background in information security, a solid understanding of cybersecurity frameworks and technologies, and the ability to identify and mitigate risks effectively. Implementer/maintainer of our ITW Cybersecurity Framework.
Successful candidates for the role must have a positive attitude and essential skills in the areas of leadership and development of team mentality and guidance of less experienced personnel. Someone with strong communication skills when dealing with management and customers, as well as documentation, leadership, and mentoring traits and techniques would be a good fit for this role. The candidate will be someone who can be an implementer and maintainer of our ITW Cybersecurity Framework.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Conduct risk assessments and vulnerability scans to identify potential security threats and vulnerabilities across the organization's infrastructure, applications, and systems.Monitor and analyze security alerts and events from various sources to detect and respond to security incidents in a timely manner.Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements and industry best practices.Collaborate with cross-functional teams to identify security requirements and provide guidance on secure design and implementation of new systems and technologies.Perform regular security audits, penetration testing, and security assessments to evaluate the effectiveness of security controls and identify areas for improvement.Investigate and resolve security incidents, conducting root cause analysis and implementing corrective actions to prevent future occurrences.Stay up-to-date with the latest security trends, threats, and technologies, and provide recommendations to enhance the organization's security posture.Develop and deliver security awareness training and educational programs to educate employees about information security best practices.Maintain documentation of security incidents, risk assessments, policies, and procedures, ensuring accuracy and accessibility for auditing and compliance purposes.Collaborate with external vendors and partners to assess their security practices and ensure the security of shared data and systems.Stay relevant with network industry trends and innovations to evaluate and recommend possible improvements to the network and security infrastructure.Backup role in key network / telecommunications systems.Provide advanced level On-Call support as needed.The major responsibilities of this role include:
MANAGING EXECUTION: Collaborate as a team to effectively and efficiently execute day-to-day tasks. Ability to identify and remediate security problems in a timely manner; develop alternative solutions; use reason when dealing with emotional topics/situations. Proficient time management and prioritization skills. Organized in managing tasks and responsibilities.Adaptable and building collaborative relationships: In addition, this role works with internal customers for support. Having a good phone, online chats and in-person etiquette is required. One needs to adapt to the ever-growing, fast-paced environment. Must be adaptable, flexible, organized and act with a sense of urgency.Customer Focus: Cultivate external relationships with clients and vendors, manage peer and territory level customer relationships strategically, build solid connections, and ensure the delivery of customer-centric solutions aligned with strategic goals to reduce conflict and grow the business.Taking Initiative: Anticipates and meets the needs of our Cybersecurity initiatives and demonstrates commitment to ongoing improvement. Ability to define problems, collect data, establish facts, and draw valid conclusions as related to the job.BUILDING COLLABORATIVE RELATIONSHIPS: Build and maintain effective relationships to share information, establish partnerships, and leverage experience to accomplish the organization’s goals.QUALIFICATIONS
The requirements listed below are representative of the knowledge, skill, and/or ability required to perform this job successfully. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Desired Education and Work Experience
Associate or Bachelor’s degree in computer science, Information Security, or a related field. Relevant certifications such as CISSP, CISM, or GIAC are highly desirable.Technical Skills
Proven experience working as a Cybersecurity Analyst or in a similar security role, with a strong understanding of information security principles, practices, and technologies.In-depth knowledge of cybersecurity frameworks such as NIST, ISO 27001, or CIS Controls, and their application to secure enterprise environments.Experience with security technologies such as firewalls, intrusion detection and prevention systems (IDS/IPS), endpoint protection, SIEM, and vulnerability management tools.Familiarity with network protocols, system vulnerabilities, and common attack vectors.Strong analytical and problem-solving skills, with the ability to assess complex security issues and provide practical solutions.Ability to work independently, prioritize tasks, and manage multiple projects simultaneously while meeting deadlines.Strong attention to detail and a commitment to maintaining confidentiality and integrity of sensitive information.Continuous learning mindset with a passion for staying updated on the latest security trends, threats, and technologies.Experience in Endpoint Protection ManagementExperience with vulnerability remediation and prioritizationIntermediate network SD WAN, router, access point, and switch administration; preferably Cato and CiscoPreferred experience with network traffic monitoring, packet analyzers, and network assessment toolsWorking knowledge of WAN, LAN, and Wireless systemsThorough understanding of computer-related security systems including firewalls, encryption, and password protection and authentication.Strong security and remote connectivity background with knowledge of and utilizing VPNs, IPSEC, SSL, IPS , IDSFamiliarity with industry standard cybersecurity frameworks such as NIST, CIS, or ISO 27001/2Proficient in Microsoft Office Suite or related software, including collaboration tools like Microsoft TeamsInterpersonal Skills
Ability to work independently or as a team member.Excellent written and verbal communication skills, with the ability to effectively convey technical concepts to non-technical stakeholders.Organized with attention to detail.Demonstrated problem-solving and analytical skills.Excellent organizational skills to prioritize work and ability to balance maintenance and project work.Excellent communication skills with customers, senior level personnel, and team members.PHYSICAL DEMANDS & WORK ENVIRONMENT
The physical demands and work environmental characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Physical Demands
Regularly required to sit more than 6 hours.Working Conditions.
Standard office environment in a controlled climateCompensation Information:
The pay rate will depend on the successful candidate’s qualifications and prior experience.
ITW is an equal opportunity employer. We value our colleagues’ unique perspectives, experiences and ideas and create workplaces where everyone can develop their careers and perform to their full potential.
As an equal employment opportunity employer, ITW is committed to equal employment opportunity and fair treatment for employees, beginning with the hiring process and continuing through all aspects of the employment relationship.
All qualified applicants will receive consideration for employment without regard to race, color, sex, gender identity, sexual orientation, religion, national origin, age, disability, protected Veteran status or any other characteristic protected by applicable federal, state, or local laws.