Share this Job

Sr. Specialist, Cybersecurity Analyst

Apply now »

Date: Mar 14, 2018

Location: Libertyville, IL, US

Company: Hollister Incorporated

We Make Life More Rewarding and Dignified

Location: Libertyville 
Department: Information Technology 


The role of the Cybersecurity Analyst is to assist in the building and monitoring of Hollister’s cybersecurity architecture and operations globally, developing appropriate security controls for business partners and service providers. 

The Cybersecurity Analyst will ensure Cybersecurity architecture and practices safeguard products and solutions that meet business requirements while maintaining a strong security posture.

The Cybersecurity Analyst will handle all levels of triage for incoming security issues, assessing event priority, determining risks, and monitoring appropriate remediation activities.

The Cybersecurity Analyst will monitor security compliance through technical audits, risk assessments and issue management in order to maintain a compliant, audit ready posture.  This role also acts as a core team member to the Enterprise Architecture team and Project Management Office to deliver technical security advisory services.

The Cybersecurity Analyst will develop security procedures and metrics for the security of Hollister global networks, systems and applications.



1.     Develops and maintains the Cyber Security and privacy technical architecture.  Recommends guiding principles and technical standards that foster technology decisions.

1.     Collaborates with IT and business units to understand the requirements for security (stability, availability, integrity, privacy etc.).

2.     Stays abreast of technology innovations relating to cyber security to ensure decisions align with industry best practices.


2.     Steers security operations and implementation of security controls and solutions.

1.     Addresses cyber security service requests and tickets on a timely manner, to customer satisfaction, and within security standards or principles.

2.     Identifies and implements appropriate security and privacy monitoring within IT to safeguard Hollister's cybersecurity program. 

3.     Configure and support security end point protection, intrusion detection and prevention, Internet and messaging security gateways, encryption architecture, and threat intelligence.


3.     Steers security incident response and mitigation processes.

1.     Executes the security incident response lifecycle to drive threat remediation and strategic countermeasures.

2.     Addresses cyber-attacks through proactive identification, containment of security incident, mitigation of malicious threats and malicious software, and system recovery.


4.     Identifies Cyber Security and compliance requirements and develops specific solution architectures.

1.     Identifies security and compliance requirements that align with standards, policies, technical controls and architecture principles.  Reviews risk assessments completed as part of the project lifecycle.

2.     Builds solution architectures that meet project requirements and align with architecture principles and futures architecture vision.


5.     Performs security impact assessments to determine the enterprise's specific security and privacy related requirements and appropriate assurance monitoring.

1.     Advocates security risk management framework to ensure that security decisions are consistent and appropriate to Hollister’s needs for system and information protection, integrity, availability, privacy and regulatory compliance.

2.     Conducts audits and monitors issues to provide assurance reporting of how Hollister is complying with policies, standards, and industry regulatory requirements and the internal control framework in order to maintain a compliant, audit ready, posture. 

3.     Conducts security due diligence of third-parties (vendor, suppliers and partners) based on risk model including security contract language, and logical, physical and administrative controls.


6.     Researches and evaluates new technologies for fit into the enterprise and provides security advisory services to the IT Project Management Office (PMO).

1.     Provides feedback and act as a security technical advisor for IT projects and solutions.

2.     Identifies and recommends cyber security controls that will transition the architecture to support future vision. 

3.     Works with Project Managers to define security project cost, resource, and schedule estimates.


7.     Contributes to the Enterprise Architecture (EA) and Technical Review Board (TRB) requests for security architecture and technology solutions.

1.     Brings forward new solutions, architectures or technologies to ensure data security safeguards align with IT solutions that will transition the architecture to the denied future vision. 

2.     Applies risk based approach or value metrics to define security technical requirements and participate in evaluation scoring.




Academic Credentials/Length of Experience Requirements:

  • BS/BA Computer Science or equivalent related field of study required.

  • An industry leading security certification required such as Certified Information Systems Security Professional (CISSP) or equivalent.

  • Minimum 7 years of progressive technical IT experience focusing on cyber security

  • Talk on the phone with suppliers and Hollister Associates

  • Read technical manuals / trade journals

  • Travel via plane or automobile


Specialized skills/technical knowledge                                

  • Understanding on how to conduct investigations of security incidents.

  • Understanding on how to conduct third-party security due diligence or audits.

  • Understanding of SANS Critical Security Controls or NIST Computer Security Standards 

  • Knowledge of Next Generation Firewalls or Unified Threat Management (UTM) technologies.

  • Knowledge of Security Incident and Event Management (SIEM).

  • Knowledge of Privileged Access Management (PAM) solutions.

  • Knowledge of cloud based technology or Cloud Based Security Broker (CASB) technologies.

  • Knowledge of Vulnerability and Threat Management (VTM).

  • Strong understanding of shell scripting, and able to apply knowledge.


Hollister is an EO employer – M/F/Veteran/Disability

Job Req ID: 23321

Nearest Major Market: Chicago

Job Segment: Law, Risk Management, Information Systems, Computer Science, Information Technology, Legal, Finance, Technology