5+ years of experience
Concerned about your lack of experience? Learn More...
Employment Type:
Full time
Job Category:
Information Services
See more jobs for students and recent grads who studied:
Senior Cyber Security Specialist
Request Technology - Robyn Honquest | Mundelein, Illinois
Tell Us More About Your Job Preferences
By telling us what you think of this job, we can help find jobs that match your interests. If you want to see more jobs like this, click on the smiley face. Or if this job isn't what you are looking for, click the frowny face. Learn More...

Follow This Company

Job Description

Looking for a candidate with experience doing vulnerabilities, threat indicators, develop procedures build monitor investigate security incidents SANS, NIST, threats IAM IDS/IPS Windows, networks, desktops etc.


  • Develops and maintains the Cyber Security and privacy technical architecture. Recommends guiding principles and technical standards that foster technology decisions.
  • Steers security operations and implementation of security controls and solutions.
  • Steers security incident response and mitigation processes.
  • Identifies Cyber Security and compliance requirements and develops specific solution architectures.
  • Performs security impact assessments to determine the enterprise's specific security and privacy related requirements and appropriate assurance monitoring.
  • Researches and evaluates new technologies for fit into the enterprise and provides security advisory services to the IT Project Management Office (PMO).
  • Contributes to the Enterprise Architecture (EA) and Technical Review Board (TRB) requests for security architecture and technology solutions.


  • BS/BA Computer Science or equivalent related field of study required.
  • An industry leading security certification required such as Certified Information Systems Security Professional (CISSP) or equivalent.
  • Minimum 5-7 years of progressive technical IT experience focusing on cyber security
  • Working knowledge of Windows Server and Desktop Operating Systems, Active Directory Domain design and implementation, and endpoint security.
  • Understanding on how to conduct investigations of security incidents.
  • Understanding on how to conduct third-party security due diligence or audits.
  • Understanding of SANS Critical Security Controls or NIST Computer Security Standards
  • Knowledge of TCP/IP, switching, routing, VLANs and VPNs.
  • Knowledge of Next Generation Firewalls or Unified Threat Management (UTM) technologies.
  • Knowledge of Identity and Access Management (IAM) technologies.
  • Knowledge of Security Incident and Event Management (SIEM).
  • Knowledge of Intrusion Detection/Prevention Systems (IDS/IPS) technologies.
  • Knowledge of Privileged Access Management (PAM) solutions.
  • Knowledge of cloud based technology or Cloud Based Security Broker (CASB) technologies.
  • Knowledge of Vulnerability and Threat Management (VTM).
  • Knowledge of virtualized environments and infrastructure technologies.
  • Strong understanding of Shell Scripting, and able to apply knowledge.
  • Knowledge of encryption techniques and PKI infrastructure.


Applicants must be eligible to work in the specified location

This company profile was created by AfterCollege and is about Request Technology - Robyn Honquest. This page is not endorsed by or affiliated with Request Technology - Robyn Honquest. For questions regarding company profiles, please email: care@aftercollege.com.