"Alerted.org

Job Title, Industry, Employer
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Advanced Search

Advanced Search

Cancel
Remove
+ Add search criteria
City & State or Zip Code
20 mi
  • 0 mi
  • 5 mi
  • 10 mi
  • 20 mi
  • 50 mi
  • 100 mi
Related to

  • Cybersecurity Analyst 1

    ITW (Troy, OH)



    Apply Now

    Job Description:

    ITW Food Equipment Group LLC designs and manufactures commercial food equipment for food service and retail customers through its subsidiaries. The company’s products include ware washing equipment; cooking equipment, including ovens, ranges, and broilers; refrigeration equipment, including refrigerators, freezers, and prep tables; food processing equipment, including slicers, mixers, and scales; and kitchen exhaust, ventilation, and pollution control systems. ITW FEG has the largest service network in this industry to support our global customers, with highly specialized technicians and best-in-class supply chain procedures. The company was incorporated in 2001 and is based in Troy, Ohio. ITW Food Equipment Group LLC is an Illinois Tool Works Inc. subsidiary.

    SUMMARY

    The Cybersecurity Analyst role is responsible for day-to-day activities related to our Cybersecurity initiatives. Someone with strong communication skills when dealing with management and customers, as well as documentation, and attention to detail. The candidate will be someone who can be an implementor and maintainer of our ITW Cybersecurity Framework and has experience in Systems Administration.

    ESSENTIAL DUTIES AND RESPONSIBILITIES

    These are the most significant job duties performed. The size, scope and complexity of assigned duties and responsibilities are dependent on the level and experience of the incumbent. To perform this job successfully, an individual must be able to perform each assigned essential duty satisfactorily. Other responsibilities or special projects not specifically listed below may also be assigned.

    The responsibilities of this role include:

    + **Adaptable and building collaborative relationships** : Collaborating with cross-functional teams to identify security requirements and provide guidance on secure design and implementation of new systems and technologies. Investigate and resolve security incidents, conduct root cause analysis and implement corrective actions to prevent future occurrences. Develop and deliver security awareness training and educational programs to educate employees about information security best practices. Collaborate with external vendors and partners to assess their security practices and ensure the security of shared data and systems. Excellent communication skills with customers, senior level personnel, and team members. Having a good phone, online chats and in-person etiquette is required.

    + **Action oriented:** Ability to identify and remediate security problems in a timely manner; develop alternative solutions; use reason when dealing with emotional topics/situations. Build and maintain effective relationships to share information, establish partnerships, and leverage experience to accomplish the organization’s goals. Provide advanced level On-Call support as needed. Backup role in key Systems Administration functions such as Server Administration. Experience in Entra/Azure, MDR, Security education, and vulnerability management. Confidence in new implementations of Cybersecurity standards and

    + **Plans and Aligns:** Conduct risk assessments and vulnerability scans to identify potential security threats and vulnerabilities across the organization's infrastructure, applications, and systems. Monitor and analyze security alerts and events from various sources to detect and respond to security incidents in a timely manner. Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements and industry best practices. Thorough understanding of computer-related security systems including firewalls, encryption, password protection and authentication. Familiarity with industry standard cybersecurity frameworks such as NIST, CIS, or ISO 27001/2.

    + **Taking Initiative:** Anticipates and meets the needs of our Cybersecurity initiatives and demonstrates commitment to ongoing improvement. Ability to define problems, collect data, establish facts, and draw valid conclusions as related to the job. Perform regular security audits, penetration testing, and security assessments to evaluate the effectiveness of security controls and identify areas for improvement. Stay up to date with the latest security trends, threats, and technologies, and provide recommendations to enhance the organization's security posture. Stay relevant with network industry trends and innovations to evaluate and recommend possible improvements to the network and security infrastructure. Ability to work independently, prioritize tasks, and manage multiple projects simultaneously while meeting deadlines.

    MINIMUM QUALIFICATIONS

    The requirements listed below are representative of the knowledge, skill, and/or ability required to perform this job successfully. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

    Desired Education and Work Experience

    + Associate or Bachelor’s degree in computer science, Information Security, or a related field. Relevant certifications such as Security+, CompTIA CySA+, GIAC Security Essentials (GSEC) ,or Microsoft Azure Security Technologies AZ500 are highly desirable.

    PHYSICAL DEMANDS & WORK ENVIRONMENT

    _The physical demands and work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions._

    Physical Demands

    + Regularly required to sit more than 6 hours.

    + Operates standard office equipment

     

    Working Conditions.

     

    + Standard office environment in a controlled climate

    Hours of Work

    + Normal business hours with extended hours as needed

    Compensation Information:

    The pay rate will depend on the successful candidate’s qualifications and prior experience.

     

    _ITW is an equal opportunity employer. We value our colleagues’ unique perspectives, experiences and ideas and create workplaces where everyone can develop their careers and perform to their full potential._

     

    _As an equal employment opportunity employer, ITW is committed to equal employment opportunity and fair treatment for employees, beginning with the hiring process and continuing through all aspects of the employment relationship._

     

    _All qualified applicants will receive consideration for employment without regard to race, color, sex, gender identity, sexual orientation, religion, national origin, age, disability, protected Veteran status or any other characteristic protected by applicable federal, state, or local laws._

     


    Apply Now



Recent Searches

  • Web Development Engineer Knowledge (United States)
  • Staff Software Engineer Backend (Maine)
  • Data Visualization Analyst (United States)
  • Senior Lead User Experience (Connecticut)
[X] Clear History

Recent Jobs

  • Cybersecurity Analyst 1
    ITW (Troy, OH)
  • Java Lead Developer
    Cognizant (Tampa, FL)
  • Sr. Sourcing Specialist, Mechanical (Starlink)
    SpaceX (Redmond, WA)
[X] Clear History

Account Login

Cancel
 
Forgot your password?

Not a member? Sign up

Sign Up

Cancel
 

Already have an account? Log in
Forgot your password?

Forgot your password?

Cancel
 
Enter the email associated with your account.

Already have an account? Sign in
Not a member? Sign up

© 2025 Alerted.org