Security Analyst at Burwood Group Inc
Chicago, Illinois, USA -
Full Time


Start Date

Immediate

Expiry Date

08 Oct, 25

Salary

70.0

Posted On

09 Jul, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Good communication skills

Industry

Information Technology/IT

Description

WHO WE ARE

Burwood Group is not your average technology consulting firm. We are an innovative, culture-driven, industry leader and we are growing our team by leaps and bounds. Founded in 1997 in Chicago (and still headquartered here), we’ve grown to be a 200+ employee firm with people and offices spread from Southern California to North Carolina.
Our specialty is closing the gap between business strategy and technology solutions. Our clients view Burwood as a trusted advisor and partner who can help them select the best technology for the job, manage and execute first-rate implementation, and measure project success by the business outcomes achieved.
Job Description
Role Type: W2 Contract, potential conversion to full-time

Responsibilities

We are seeking a detail-oriented and technically proficient Security Analyst to support a critical Protocol Analysis & Remediation project for a client. This role will focus on analyzing log and configuration data to assess risk related to lateral movement, supporting security investigations, and assisting in the implementation of risk-reduction measures in alignment with zero-trust principles. The successful candidate will work closely with the security architecture and engineering teams to monitor threats, identify vulnerabilities, and ensure effective control implementations across both Windows and Linux environments.

Key Responsibilities:

  • Analyze security data, including log sources from Azure Log Analytics, to identify threats, trends, and lateral movement indicators.
  • Audit existing configurations and assist in identifying areas where security posture can be improved.
  • Perform vulnerability assessments, basic penetration testing, and protocol analysis to uncover security weaknesses.
  • Support the development and deployment of remediation strategies and compensating controls for insecure protocol use.
  • Collaborate with team members to investigate security incidents and ensure timely resolution.
  • Maintain up-to-date security documentation, including policies, technical procedures, and incident records.
  • Stay current on the latest cybersecurity threats, vulnerabilities, tools, and mitigation techniques.

Qualifications

Loading...