Sr. Security Data Strategy Analyst
IT & Digital/IT
LHH
$60.00 - $75.00 per Hour
Chicago, IllinoisContractor
IT
IT & Digital
LHH is working with a Chicago-based client that is looking to hire a Sr. Security Data Strategy Analyst to join our team for a 6+ month project. The role will be hybrid (1 day at their Chicago Loop office required).
Candidates MUST be local to the Chicagoland area to be considered for this role. Candidates MUST be willing to work as a w2 employee of LHH to be considered.
This contract role is accountable for architecting and operationalizing the design phase of a Unified Vulnerability Management and Security Data Lake initiative. The role will define the canonical data model, quality and normalization patterns (e.g., Bronze/Silver/Gold), and integration approach across scanners, asset sources, and remediation workflows to deliver a single, normalized view of the vulnerability landscape.
The contractor will partner with Security Architecture, Vulnerability Management, Application Security, and Enterprise Data teams to evaluate platform options (e.g., Axonius vs. broader data platforms), establish vendor-agnostic data portability, and prepare the program for 2026 delivery stages. This is an individual contributor role providing strategic guidance on the development, implementation, operation, and governance of an enterprise-wide Information Security data strategy.
Key Responsibilities
Decision/Design Phase Leadership: Produce target-state architecture, integration patterns, and a delivery roadmap aligned with the phases outlined in the business case.
Canonical Data Modeling & Normalization: Define the vulnerability/asset/exposure canonical model and medallion architecture (Bronze → Silver → Gold) for ingestion, conformance, and consumption.
Data Quality & Governance: Establish data quality rules, metrics, and SLAs; define controls for lineage, cataloging, and business definitions.
Tooling Strategy: Evaluate the role of Axonius and alternative data services; document integration points and trade-offs.
Inter-Tool Mapping & Ingestion: Design and prototype ingestion/mapping for key systems; define normalization schema and harmonized identifiers.
Prioritization Methodology: Develop a scoring framework that fuses external severity with internal business risk factors.
Workflow & Ticketing Integration: Define integration patterns with ServiceNow for ticket creation, assignment, and status telemetry.
Standards Alignment: Ensure architecture and data flows comply with internal Vulnerability Management and Security Architecture standards.
Reporting & Consumption: Specify flexible reporting for technical and leadership stakeholders; define certified semantic layers and downstream access.
Vendor & Platform Due Diligence: Contribute to market scans and structured evaluations with success criteria and migration considerations.
Knowledge Transfer: Create a runbook and handoff plan for operations and engineering teams for 2026 delivery stages.
Required Skills
Data Architecture & Modeling: Expertise in canonical modeling, medallion/Delta patterns, data contracts, and MDM/ER techniques.
Security Data Domain: Working fluency with vulnerability, asset, and security datasets and their role in CTEM outcomes.
Integration & Pipelines: Hands-on experience with ingestion frameworks and schema evolution for scanners and asset sources.
Governance & Quality: Proven ability to define data quality rules, metrics, lineage, cataloging, and common definitions.
Workflow/ITSM: Familiarity with ServiceNow data models and ticket orchestration.
Communication & Influence: Ability to align diverse stakeholders around a unified architecture and phased delivery plan.
Education & Experience
Bachelor’s degree in Computer Science or related discipline, or equivalent work experience.
Minimum of 7 years of technical experience in data analytics, security vulnerability analysis, remediation management, data architecture, or security data strategy.
Preferred Qualifications
Experience in consulting or technical account management.
Certifications: CISSP, CCSP, PMP, Network+, Security+.
Experience with platforms such as Axonius, ArmorCode, TenableOne, Brinqa, Kenna Security.
Familiarity with vulnerability and remediation management data analysis.
Experience with cloud data platforms (e.g., BigQuery, Power BI, Tableau).
Pay Details: $60.00 to $75.00 per hour
Search managed by: William Staadt
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www-uat.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance
Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Sr. Security Data Strategy Analyst
IT & Digital/IT
LHH
$60.00 - $75.00 per Hour
Chicago, IllinoisContractor
IT
IT & Digital
LHH is working with a Chicago-based client that is looking to hire a Sr. Security Data Strategy Analyst to join our team for a 6+ month project. The role will be hybrid (1 day at their Chicago Loop office required).
Candidates MUST be local to the Chicagoland area to be considered for this role. Candidates MUST be willing to work as a w2 employee of LHH to be considered.
This contract role is accountable for architecting and operationalizing the design phase of a Unified Vulnerability Management and Security Data Lake initiative. The role will define the canonical data model, quality and normalization patterns (e.g., Bronze/Silver/Gold), and integration approach across scanners, asset sources, and remediation workflows to deliver a single, normalized view of the vulnerability landscape.
The contractor will partner with Security Architecture, Vulnerability Management, Application Security, and Enterprise Data teams to evaluate platform options (e.g., Axonius vs. broader data platforms), establish vendor-agnostic data portability, and prepare the program for 2026 delivery stages. This is an individual contributor role providing strategic guidance on the development, implementation, operation, and governance of an enterprise-wide Information Security data strategy.
Key Responsibilities
Decision/Design Phase Leadership: Produce target-state architecture, integration patterns, and a delivery roadmap aligned with the phases outlined in the business case.
Canonical Data Modeling & Normalization: Define the vulnerability/asset/exposure canonical model and medallion architecture (Bronze → Silver → Gold) for ingestion, conformance, and consumption.
Data Quality & Governance: Establish data quality rules, metrics, and SLAs; define controls for lineage, cataloging, and business definitions.
Tooling Strategy: Evaluate the role of Axonius and alternative data services; document integration points and trade-offs.
Inter-Tool Mapping & Ingestion: Design and prototype ingestion/mapping for key systems; define normalization schema and harmonized identifiers.
Prioritization Methodology: Develop a scoring framework that fuses external severity with internal business risk factors.
Workflow & Ticketing Integration: Define integration patterns with ServiceNow for ticket creation, assignment, and status telemetry.
Standards Alignment: Ensure architecture and data flows comply with internal Vulnerability Management and Security Architecture standards.
Reporting & Consumption: Specify flexible reporting for technical and leadership stakeholders; define certified semantic layers and downstream access.
Vendor & Platform Due Diligence: Contribute to market scans and structured evaluations with success criteria and migration considerations.
Knowledge Transfer: Create a runbook and handoff plan for operations and engineering teams for 2026 delivery stages.
Required Skills
Data Architecture & Modeling: Expertise in canonical modeling, medallion/Delta patterns, data contracts, and MDM/ER techniques.
Security Data Domain: Working fluency with vulnerability, asset, and security datasets and their role in CTEM outcomes.
Integration & Pipelines: Hands-on experience with ingestion frameworks and schema evolution for scanners and asset sources.
Governance & Quality: Proven ability to define data quality rules, metrics, lineage, cataloging, and common definitions.
Workflow/ITSM: Familiarity with ServiceNow data models and ticket orchestration.
Communication & Influence: Ability to align diverse stakeholders around a unified architecture and phased delivery plan.
Education & Experience
Bachelor’s degree in Computer Science or related discipline, or equivalent work experience.
Minimum of 7 years of technical experience in data analytics, security vulnerability analysis, remediation management, data architecture, or security data strategy.
Preferred Qualifications
Experience in consulting or technical account management.
Certifications: CISSP, CCSP, PMP, Network+, Security+.
Experience with platforms such as Axonius, ArmorCode, TenableOne, Brinqa, Kenna Security.
Familiarity with vulnerability and remediation management data analysis.
Experience with cloud data platforms (e.g., BigQuery, Power BI, Tableau).
Pay Details: $60.00 to $75.00 per hour
Search managed by: William Staadt
Benefit offerings available for our associates include medical, dental, vision, life insurance, short-term disability, additional voluntary benefits, EAP program, commuter benefits and a 401K plan. Our benefit offerings provide employees the flexibility to choose the type of coverage that meets their individual needs. In addition, our associates may be eligible for paid leave including Paid Sick Leave or any other paid leave required by Federal, State, or local law, as well as Holiday pay where applicable.
Equal Opportunity Employer/Veterans/Disabled
To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to https://www-uat.lhh.com/us/en/candidate-privacy
The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state, and local laws and/or security clearance requirements, including, as applicable:
- The California Fair Chance Act
- Los Angeles City Fair Chance Ordinance
- Los Angeles County Fair Chance Ordinance for Employers
- San Francisco Fair Chance Ordinance
Massachusetts Candidates Only: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.