Job Title: Data Scientist (Parental Cover) - Retail Analytics & Business Intelligence Team Duration: 6 months Role Overview: We are seeking a highly motivated and skilled Data Scientist to join our Retail Analytics & Business Intelligence team for a 6-month parental cover assignment. As part of this role, you will be responsible for contributing to the development and enhancement of analytics solutions that support our retail operations and decision-making processes. You will work closely with cross-functional teams to implement and optimize analytics systems, and your expertise in software engineering and programming will be critical in ensuring the success of various initiatives. Key Responsibilities: Data Science & Analytics Development: Collaborate with the product team to design, develop, and implement proof-of-concept analytics systems that provide actionable insights to support business decisions in the retail domain. System Maintenance & Enhancement: Take ownership of the maintenance of current analytics solutions, ensuring system reliability and performance. Continuously improve and upgrade existing solutions by adding new features, optimizing processes, and implementing best practices. Data Processing & Analysis: Utilize your strong data manipulation and statistical analysis skills to process large datasets, extract valuable insights, and communicate findings to stakeholders in a clear and actionable manner. Programming & Software Engineering: Leverage your expertise in Python, SQL, and related tools to build scalable and efficient data pipelines, perform complex analyses, and develop automation solutions to support data workflows. Cloud Integration & Deployment: Utilize Google Cloud Platform (GCP) to deploy and scale analytics applications and solutions. Collaborate with the infrastructure team to ensure smooth integration and maintain system performance in cloud environments. Collaboration with Cross-functional Teams: Work closely with other data scientists, business analysts, product managers, and stakeholders to understand business requirements, translate them into technical specifications, and deliver analytics solutions that meet business needs. Proof-of-Concept & Experimentation: Lead and contribute to proof-of-concept projects by developing prototype models and running experiments to validate new analytical approaches or technologies. Documentation & Reporting: Provide clear documentation of your work, including methodologies, code, and system architecture. Present findings to both technical and non-technical stakeholders and contribute to regular progress reports. Required Skills and Qualifications: Technical Expertise: Strong programming skills in Python and experience working with libraries such as Pandas, NumPy, and Scikit-learn. Proficiency in SQL for data manipulation and querying. Cloud Computing Knowledge: Practical experience working with Google Cloud Platform (GCP) services, including BigQuery, Cloud Storage, DataFlow, or similar tools. Analytics & Data Science Experience: Proven experience in performing data analysis, building machine learning models, and providing actionable insights in a data-driven environment, preferably within retail analytics or similar industries. Problem-Solving & Innovation: Ability to approach complex problems with creative solutions, utilizing both technical expertise and analytical thinking to build robust, scalable, and high-impact systems. Communication & Teamwork: Excellent communication skills with the ability to collaborate effectively in cross-functional teams and convey complex technical concepts to non-technical stakeholders. Desired Qualifications: Retail Analytics Knowledge: Familiarity with retail business metrics, customer segmentation, sales forecasting, inventory management, or other relevant retail concepts is a plus. Experience with BI Tools: Experience using Business Intelligence tools (eg, Tableau, Power BI) for data visualization and reporting. This is an exciting opportunity to contribute to innovative analytics solutions in a fast-paced retail environment. If you are a data-driven problem solver with strong programming skills and a passion for working in the retail industry, we encourage you to apply.
15/01/2025
Project-based
Job Title: Data Scientist (Parental Cover) - Retail Analytics & Business Intelligence Team Duration: 6 months Role Overview: We are seeking a highly motivated and skilled Data Scientist to join our Retail Analytics & Business Intelligence team for a 6-month parental cover assignment. As part of this role, you will be responsible for contributing to the development and enhancement of analytics solutions that support our retail operations and decision-making processes. You will work closely with cross-functional teams to implement and optimize analytics systems, and your expertise in software engineering and programming will be critical in ensuring the success of various initiatives. Key Responsibilities: Data Science & Analytics Development: Collaborate with the product team to design, develop, and implement proof-of-concept analytics systems that provide actionable insights to support business decisions in the retail domain. System Maintenance & Enhancement: Take ownership of the maintenance of current analytics solutions, ensuring system reliability and performance. Continuously improve and upgrade existing solutions by adding new features, optimizing processes, and implementing best practices. Data Processing & Analysis: Utilize your strong data manipulation and statistical analysis skills to process large datasets, extract valuable insights, and communicate findings to stakeholders in a clear and actionable manner. Programming & Software Engineering: Leverage your expertise in Python, SQL, and related tools to build scalable and efficient data pipelines, perform complex analyses, and develop automation solutions to support data workflows. Cloud Integration & Deployment: Utilize Google Cloud Platform (GCP) to deploy and scale analytics applications and solutions. Collaborate with the infrastructure team to ensure smooth integration and maintain system performance in cloud environments. Collaboration with Cross-functional Teams: Work closely with other data scientists, business analysts, product managers, and stakeholders to understand business requirements, translate them into technical specifications, and deliver analytics solutions that meet business needs. Proof-of-Concept & Experimentation: Lead and contribute to proof-of-concept projects by developing prototype models and running experiments to validate new analytical approaches or technologies. Documentation & Reporting: Provide clear documentation of your work, including methodologies, code, and system architecture. Present findings to both technical and non-technical stakeholders and contribute to regular progress reports. Required Skills and Qualifications: Technical Expertise: Strong programming skills in Python and experience working with libraries such as Pandas, NumPy, and Scikit-learn. Proficiency in SQL for data manipulation and querying. Cloud Computing Knowledge: Practical experience working with Google Cloud Platform (GCP) services, including BigQuery, Cloud Storage, DataFlow, or similar tools. Analytics & Data Science Experience: Proven experience in performing data analysis, building machine learning models, and providing actionable insights in a data-driven environment, preferably within retail analytics or similar industries. Problem-Solving & Innovation: Ability to approach complex problems with creative solutions, utilizing both technical expertise and analytical thinking to build robust, scalable, and high-impact systems. Communication & Teamwork: Excellent communication skills with the ability to collaborate effectively in cross-functional teams and convey complex technical concepts to non-technical stakeholders. Desired Qualifications: Retail Analytics Knowledge: Familiarity with retail business metrics, customer segmentation, sales forecasting, inventory management, or other relevant retail concepts is a plus. Experience with BI Tools: Experience using Business Intelligence tools (eg, Tableau, Power BI) for data visualization and reporting. This is an exciting opportunity to contribute to innovative analytics solutions in a fast-paced retail environment. If you are a data-driven problem solver with strong programming skills and a passion for working in the retail industry, we encourage you to apply.
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
15/01/2025
Full time
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
14/01/2025
Full time
Security Engineer Salary: $140k-$150k + bonus Location: Chicago, IL or Dallas, TX Hybrid: 3 days onsite, 2 days remote *We are unable to provide sponsorship for this role* Qualifications Bachelor's degree 3+ years of related experience Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Responsibilities Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned.
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
14/01/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
14/01/2025
Full time
*Hybrid, 3 days onsite, 2 days remote* *We are unable to sponsor as this is a permanent Full time role* A prestigious company is looking for an Associate Principal, Cyber Defense. This role is focused on threat intelligence, incident response, security alerts, events analysis, network traffic, etc. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Qualifications: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices.
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
13/01/2025
Full time
NO SPONSORSHIP Associate Principal, Data Analytics Engineering SALARY: $110k flex plus 10% bonus LOCATION: Chicago, IL Hybrid 3 days in office and 2 days remote You will be expanding analytics capabilities to design and build internal analytics within data warehouse using on-premises and cloud-based tools. You will create dashboards or visualization using the tools tableau powerBI SQL Queries Alteryx Jira services now. GIT a big plus, AWS or loud data warehouse airflow bs degree masters preferred this is working for operational risk 5 years experience building dashboards any audit risk knowledge is a plus This role will drive a team responsible for expanding analytics capabilities by making internal corporate data accessible and usable to analysts throughout the organization. Primary Duties and Responsibilities: Work closely with data analyst and business stakeholders to understand their data needs and provide support in data access, data preparation, and ad hoc queries Automate data processes to reduce manual interventions, improve data processing efficiency and optimize data workflow for performance scalability Integrate data form multiple sources and ensure data consistency and quality Build data models to ensure information is available in our analytics warehouse for downstream uses, such as analysis and create dashboards or visualizations using Tableau, Power BI to present insights Maintain performance requirements of our analytics warehouse by tuning optimizations and processes Create documentation and testing to ensure data is accurate and easily understandable Promote self-service capabilities and data literacy for business users leveraging the platform through development of training presentations and resources Discover and share best practices for data and analytics engineering with members of the team Invest in your continued learning on data and analytics engineering best practices and evaluate them for fit in improving maintainability and reliability of analytics infrastructure Qualifications: Ability to collaborate with multiple partners (eg, Corporate Risk, Compliance, Audit, Production Operations, DBAs, Data Architecture, Security) to craft solutions that align business goals with internal security and development standards Ability to communicate technical concepts to audiences with varying levels of technical background and synthesize non-technical requests into technical output Comfortable supporting business analysts on high-priority projects. High attention to detail and ability to think structurally about a solution Experience working within an agile environment Technical Skills & Background Ability to write and optimize complex analytical (SELECT) SQL queries Experience with data viz/prep tools Tableau and Alteryx [Preferred] Experience with SaaS tools and their backends, such as Jira and ServiceNow [Preferred] Applied knowledge of Python for writing custom pipeline code (virtual environments, functional programming, and unit testing) [Preferred] Experience with a source code repository system (preferably Git) [Preferred] Familiarity with at least one cloud data platform, such as AWS or GCP [Preferred] Experience creating and/or maintaining a cloud data warehouse or database [Preferred] Exposure to data orchestration tools, such as Airflow [Preferred] Understanding of applied statistics and hands-on experience applying these concepts Bachelor's degree in quantitative discipline (eg, Statistics, Computer Science, Mathematics, Physics, Electrical Engineering, Industrial Engineering) or equivalent professional experience 5+ years of experience as a business analyst, data analyst, data engineer, research analyst, data engineer, analytics engineer, Business Intelligence analyst, data analyst, data scientist, or research analyst
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
10/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Institution is currently seeking a Sr. Cyber Defense Threat Engineer. Candidate will be responsible for the in-depth analysis and response to security incidents escalated from Tier 1 analysts. This role involves investigating complex security events, identifying potential threats, and implementing measures to mitigate risks. The Tier 2 analyst plays a critical role in maintaining the security posture of the organization by leveraging advanced threat intelligence and incident response techniques. Responsibilities: Monitor security alerts and events from various security tools and technologies. Perform advanced analysis of security logs, network traffic, and endpoint data. Review and respond to security incidents escalated by Tier 1 analysts. Conduct thorough investigations to determine the scope and impact of security incidents. Implement containment, eradication, and recovery measures for confirmed incidents. Document and report findings, actions taken, and lessons learned. Work closely with threat intelligence team to enhance detection and response capabilities. Collaborate with other security team members and IT staff to address security incidents. Provide guidance and support to Tier 1 analysts on complex security issues. Communicate effectively with stakeholders regarding security incidents and mitigation efforts. Participate in post-incident reviews to identify areas for improvement. Stay current with the latest cybersecurity trends, threats, and technologies. Contribute to the development and enhancement of SOC processes and procedures. Qualifications: Proven team player will be working primarily with other staff members, on both long-term projects and rapid response under tight deadlines. Team Leadership experience, taking initiative; providing and following through on solutions across various skillsets. Knowledge and experience implementing controls based on security regulation (eg, NIST Cyber Security Framework) is a plus. Effective and excellent oral and written communication, analytical, judgment and consultation skills. Ability to effectively communicate in both formal and informal review settings with all levels of management. Ability to work with local and remote IT staff/management, vendors and consultants. Ability to work independently and possess strong project management skills. Log analysis and security content development in SIEM solutions (Splunk, IBM QRadar, LogRhythm, etc.). SOAR products such as Splunk SOAR, Cortex XSOAR, FortiSOAR, etc. SOAR playbook development experience is a plus. Endpoint detection and response tools, eg CrowdStrike, SentinelOne, Microsoft Defender, etc. Incident Response playbook development, managing security incident analysis and remediation. Network-based preventative and detective technologies (IDS/IPS, Firewalls, Proxy Servers) Standard technical writing tools including MS Word, Excel, Project and Visio Vulnerability assessment tools (Qualys, Nessus, nmap, etc.). Directory services, LDAP, and their inherent security (Active Directory, CA Directory, Entra ID). Client Server platforms including Sun Solaris, Windows, Linux. Operating system hardening procedures (Solaris, Linux, Windows, etc.) Web Application Firewalls. Cloud based security tools and techniques (AWS, Azure, GCP, etc.) Scripting and development activities to appropriately leverage Application Programing Interfaces (APIs) to optimize integrations between disparate security monitoring and analysis devices. Education and Experience: Bachelor's degree in cybersecurity, computer science, or another related field. Minimum three years of information security experience, preferably in the financial services industry. Hands-on security operations experience including interdisciplinary experience with two or more of the following: Cyber Threat Analysis, Incident Response, Application Security, Operating Systems Security, Networking, Programming languages, Incident Response. Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies, and motives. Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure. Industry knowledge of leading-edge security technologies and methods. Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities. Previous people/project management experience is a plus. Strongly prefer at least one of the following certifications: CISSP, GCIA, GCIH, CHFI, GCFA, CASP+.
Request Technology - Craig Johnson
Chicago, Illinois
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking a Strategic Sourcing Data Analytics Analyst. Candidate will play a crucial role in developing quantitative methods to govern the procurement process. This includes designing a scorecard for the Strategic Sourcing function, creating and maintaining reports for managing procurement activities, and designing processes for intake and resource allocation. This role offers extensive collaboration opportunities with cross-functional teams. By working closely with Strategic Sourcing, IT, Finance, Legal, PMO, Data Governance and Operations, you can represent the department across the company and drive data-driven decision-making for Strategic Sourcing. Responsibilities: Implement processes to collect, manage and analyze procurement data, ensuring the organization has the necessary infrastructure for effective data-driven decision making. Oversee KPIs and metrics that measure performance of the Strategic Sourcing function. Prepare regular reports for internal and external stakeholders. Generate and communicate regular performance and resource allocation reports that translate procurement process data into actionable insights for internal teams and external stakeholders. Represent the Strategic Sourcing function by thoroughly assessing and validating all new intake requests, incorporating feedback from diverse stakeholders and customers. Exercise strong judgment to determine the most suitable approach for each project and engage the necessary stakeholders for productive discussions. Maintain a deep understanding of the department scope and sourcing strategies to navigate ambiguous situations/requests and collaborate with the appropriate stakeholders to solve challenges. Integrate data and resulting insights into procurement processes: Collaborate with procurement team and IT to embed analytics tools into the procurement workflow (such as for spend analysis and forecasting, savings analysis, supplier information gathering and analysis for selection, pricing and contract analytics, benchmarking, compliance to sourcing strategies and bid analysis). Develop and delivertraining programs to empower procurement and cross-functional teams with the skills and knowledge needed to effectively utilize reports and tools, promoting a culture of data-driven decision-making. Liaise with IT on requirements and testing for dashboards and reports in various systems including Oracle, ServiceNow, Archer, Apptio, Power BI, Tableau and others Qualifications: . Strong understanding of business analytics with ample experience in procurement, IT contracts, and/or PMO. Knowledge of the sources of data that support the development and execution of sourcing strategies. Process analysis and improvement experience, with the ability to define and reinforce processes. Proven ability to collaborate and problem-solve effectively with cross-functional teams by developing partnerships with teams such as Strategic Sourcing, Legal, Finance, IT, Operations to understand, influence and obtain support to achieve objectives. Project management skills to manage data analytics projects that require frequent communication, organization and time management. Successful track record in discerning when and how to escalate and issue for resolution. Excellent communication and presentation skills with the ability to convey complex data findings and data-driven solutions to both technical and nontechnical stakeholders, the capability to create compelling presentations and reports, and to lead meetings. Attention to detail to ensure accuracy and completeness in reporting. Familiarity with relevant regulatory and industry requirements. Other functional experience particularly in IT, business strategy, business analysis or finance is an advantage 3+ years' experience using an ERP system, using data visualization tools, and administering Sharepoint sites. Familiarity with analytics capabilities built into procurement-specific software, such as Oracle Fusion. Prefer experience in one or more of the following: ServiceNow, Archer, Apptio, Power BI, and/or Tableau. Advanced knowledge of Microsoft Office products and applications (Excel, PowerPoint, Word, Visio, etc.) [Preferred] Procurement or Sourcing Professional Certification or in Data Analytics 3+ years preferred experience in procurement roles involving strategic sourcing, procure-to-pay, supplier performance measurement, or in supply chain management roles. 3+ years of experience working cross functionally with tech and non-tech teams 2+ years preferred in project management office, and/or developing, implementing, and evaluating new and revised methods, procedures, and performance standards. 3+ years preferred experience in the financial services industry. Bachelor's degree in business management, supply chain, data science, information technology or a related field, ORan equivalent combination of experience, skills, training and education. Optional: Certifications in data science, business analytics, or supply chain are beneficial.
09/01/2025
Full time
*We are unable to sponsor for this permanent Full time role* *Position is bonus eligible* Prestigious Financial Company is currently seeking a Strategic Sourcing Data Analytics Analyst. Candidate will play a crucial role in developing quantitative methods to govern the procurement process. This includes designing a scorecard for the Strategic Sourcing function, creating and maintaining reports for managing procurement activities, and designing processes for intake and resource allocation. This role offers extensive collaboration opportunities with cross-functional teams. By working closely with Strategic Sourcing, IT, Finance, Legal, PMO, Data Governance and Operations, you can represent the department across the company and drive data-driven decision-making for Strategic Sourcing. Responsibilities: Implement processes to collect, manage and analyze procurement data, ensuring the organization has the necessary infrastructure for effective data-driven decision making. Oversee KPIs and metrics that measure performance of the Strategic Sourcing function. Prepare regular reports for internal and external stakeholders. Generate and communicate regular performance and resource allocation reports that translate procurement process data into actionable insights for internal teams and external stakeholders. Represent the Strategic Sourcing function by thoroughly assessing and validating all new intake requests, incorporating feedback from diverse stakeholders and customers. Exercise strong judgment to determine the most suitable approach for each project and engage the necessary stakeholders for productive discussions. Maintain a deep understanding of the department scope and sourcing strategies to navigate ambiguous situations/requests and collaborate with the appropriate stakeholders to solve challenges. Integrate data and resulting insights into procurement processes: Collaborate with procurement team and IT to embed analytics tools into the procurement workflow (such as for spend analysis and forecasting, savings analysis, supplier information gathering and analysis for selection, pricing and contract analytics, benchmarking, compliance to sourcing strategies and bid analysis). Develop and delivertraining programs to empower procurement and cross-functional teams with the skills and knowledge needed to effectively utilize reports and tools, promoting a culture of data-driven decision-making. Liaise with IT on requirements and testing for dashboards and reports in various systems including Oracle, ServiceNow, Archer, Apptio, Power BI, Tableau and others Qualifications: . Strong understanding of business analytics with ample experience in procurement, IT contracts, and/or PMO. Knowledge of the sources of data that support the development and execution of sourcing strategies. Process analysis and improvement experience, with the ability to define and reinforce processes. Proven ability to collaborate and problem-solve effectively with cross-functional teams by developing partnerships with teams such as Strategic Sourcing, Legal, Finance, IT, Operations to understand, influence and obtain support to achieve objectives. Project management skills to manage data analytics projects that require frequent communication, organization and time management. Successful track record in discerning when and how to escalate and issue for resolution. Excellent communication and presentation skills with the ability to convey complex data findings and data-driven solutions to both technical and nontechnical stakeholders, the capability to create compelling presentations and reports, and to lead meetings. Attention to detail to ensure accuracy and completeness in reporting. Familiarity with relevant regulatory and industry requirements. Other functional experience particularly in IT, business strategy, business analysis or finance is an advantage 3+ years' experience using an ERP system, using data visualization tools, and administering Sharepoint sites. Familiarity with analytics capabilities built into procurement-specific software, such as Oracle Fusion. Prefer experience in one or more of the following: ServiceNow, Archer, Apptio, Power BI, and/or Tableau. Advanced knowledge of Microsoft Office products and applications (Excel, PowerPoint, Word, Visio, etc.) [Preferred] Procurement or Sourcing Professional Certification or in Data Analytics 3+ years preferred experience in procurement roles involving strategic sourcing, procure-to-pay, supplier performance measurement, or in supply chain management roles. 3+ years of experience working cross functionally with tech and non-tech teams 2+ years preferred in project management office, and/or developing, implementing, and evaluating new and revised methods, procedures, and performance standards. 3+ years preferred experience in the financial services industry. Bachelor's degree in business management, supply chain, data science, information technology or a related field, ORan equivalent combination of experience, skills, training and education. Optional: Certifications in data science, business analytics, or supply chain are beneficial.