Security Analyst II (Application security) Information Technology (IT) - Deerfield, IL at Geebo

Security Analyst II (Application security)

Would you like to see the impact of your work on the real world? Is hands-on world class engineering and problem-solving part of your passion? Welcome to WBA Tech.
We are a team of technologists, under our visionary CEO Rosalind Brewer, working to transform health care through innovations that make quality care more accessible, affordable, easier to use, efficient, and patient-focused.
Through the user of technology, we are pioneering a new approach to total health that puts people at the center of everything we do.
You will be part of a team that will build the future of a healthcare platform that connects customers with doctors' offices, hospitals, care centers, pharmacies, insurers and payors.
Working for WBA Tech is rewarding because your efforts will make a true difference to customers and patients across the communities we serve in the U.
S.
You will be involved in algorithm design, data structure at petabyte scale, imaging and speech processing, artificial intelligence and robotics, infrastructure and network designs at a massive scale.
We look for leaders and individual contributors in front end designers, backend Java programmers, Linux engineers, network engineers, software and algorithm designers (remember the big O notation?), AI implementers, image processing engineers, database designers (SQL and NoSQL), messaging engineers and security engineers with knowledge at protocol level.
WBA is #18 on the Fortune 500 list and our company purpose is more joyful lives through better health.
Job SummaryDevelops and implements standards and procedures meant to protect organizational data assets from unauthorized access, disclosure, modification, or destruction.
Job Responsibilities Assesses and evaluates systems to identify weaknesses and assess risk; performs vulnerability testing.
Implements new or upgraded security measures or controls, and documents system or process changes.
Reviews security violation reports or logs, investigates possible security exceptions and coordinates with internal teams or external agencies as needed, including managed service providers.
Develops and executes security controls, defenses and countermeasures to intercept and prevent internal or external attacks or attempts to infiltrate company email, data, e-commerce and web-based systems.
May advise on security controls for projects.
May advise on penetration testing and vulnerability assessments of applications, operating systems and/or networks.
May conduct complex cleanup of legacy environments Researches and evaluates cybersecurity threats and performs root cause analysis.
Assists in the creation and implementation of security solutions, which may include conducting vendor assessments to ensure vendor is complying with security contract language and WBA security requirements.
May conduct contract reviews for appropriate security language prior to a project/WBA signing May conduct remediation management or governance and/or escalations on vendors or operations issues requiring a solution May perform as Level 3 support in the event Managed Service provider is unable to resolve an issue.
May review projects to ensure alignment with Security Requirements and/or represent info security on projects, when necessary.
May conduct oversight of a particular area of Managed Service, when necessary Provides information to management as required, including Producing and delivering various dashboard, metrics and other reports, as required About Walgreens Boots AllianceWalgreens (www.
walgreens.
com) is included in the U.
S.
Retail Pharmacy and U.
S.
Healthcare segments of Walgreens Boots Alliance, Inc.
(Nasdaq:
WBA), an integrated healthcare, pharmacy and retail leader with a 170-year heritage of caring for communities.
WBA's purpose is t o create more joyful lives through better health.
Operating nearly 9,000 retail locations across America, Puerto Rico and the U.
S.
Virgin Islands, Walgreens is proud to be a neighborhood health destination serving nearly 10 million customers each day.
Walgreens pharmacists play a critical role in the U.
S.
healthcare system by providing a wide range of pharmacy and healthcare services, including those that drive equitable access to care for the nation's medically underserved populations.
To best meet the needs of customers and patients, Walgreens offers a true omnichannel experience, with fully integrated physical and digital platforms supported by the latest technology to deliver high-quality products and services in communities nationwide.
Basic Qualifications Bachelor's Degree and at least 1 year of experience in IT security OR High School/ GED and at least 4 years of experience in IT security.
Experience working in Security Engineering, Threat Response, Security Operations, IT Operations, IT Compliance and/or IT Governance Willing to travel up to 10% of the time for business purposes (within state and out of state).
Preferred Qualifications Bachelor's degree in CE, CS, IT, IS, Mathematics, Engineering preferred Experience in Application development preferred Experience in Enterprise Vulnerability scanning and associated tools Experience in Application penetration testing and using Burpsuite toolset preferred Experience with DAST/ SAST/MAST/IAST preferred Experience / knowledge of networking preferred CISSP or CISA or CEH Certification preferred To review benefits, please click here jobs.
walgreens.
com/benefitsAn Equal Opportunity Employer, including disability/veterans Recommended Skills Assessments Burpsuite Certified Ethical Hacker Certified Information Security Manager Certified Information Systems Security Professional E Commerce Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.