Do you have what it takes to be on the Pondurance Team?

Founded in 2008, Pondurance has since become one of the leading information security solution consultancies in the Midwest. Our experts engineer, pursue, and develop the latest industry trends and cutting-edge security technologies and innovations.

Every member of our team is an expert in their own right. This allows us to provide our clients with a formidable, confident and dedicated partnership. Many leading companies throughout the Midwest partner and collaborate with our team and have become trustees in our business.

Our Culture = Partners with Purpose

We operate with the lights on and windows open. Our clients can always reach us, and each team member operates with a sense of ownership and is a mentor to others on their team. We work hard to provide solid-as-a-rock, custom-fit solutions for our clients which means our partners (like you) have to be up for the challenge.

At Pondurance we thrive on a culture of excellence by adhering to the following core values:

  • Champion Others: Our foundation is rooted in a tenet of servant leadership.
  • Be Genuine: Strong relationships backed by a culture of integrity, purpose and trust.
  • Pursue Balance: Seek equilibrium in data, confidence, risk, work, and life itself.
  • Creative Collaboration: No islands. No outcasts. Problem solvers at heart designing impactful solutions.

If you think you have what it takes–submit your resume and cover letter to Below is a list of our current positions.


All Open Positions


The successful candidate will assist in Incident Detection and Response as well as Vulnerability Management for our Threat Management Solution clientele. The candidate will be expected to perform duties to include both host-based and network-based forensic investigations after correlating events from the analyst console tool as part of our monitoring service. The analyst will use static and dynamic malware analysis to repeatedly identify detectable indicators of compromise and work with the team to develop countermeasures. The candidate will also be required to work with the team to resolve issues, tweak current processes, and develop/improve existing work instructions. The candidate will also need to research new threats to an enterprise environment and work with the team to develop effective countermeasures.

Job Description


o Monitor and analyze large amounts of network traffic looking for attacker presence
o Analyze event and system logs, perform forensic analysis, implement incident response tactics, and analyze malware as it presents itself
o Identify threat vulnerabilities
o Document and escalate incidents
o Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
o Provide weekly threat reports to clients
o Conduct monthly vulnerability scans of clients networks


  • Must have excellent oral and verbal communication skills
  • Experience with system or network administration (Unix/Linux experience preferred)
  • Experience and knowledge of information security, IPv4/v6 networks, network devices, proxies, IDS/IPS, and monitoring tools
  • Experience with Windows OS
  • Demonstrate experience with 2 or 3 of the following: Packet Capture (PCAP) analysis using Wireshark, Familiarity with commercial or open source log or SIEM solutions, Event analysis, correlation, reporting, and alerting, Reverse engineering malware and host-based analysis/detection, Service discovery tools such as nmap and vulnerability scanning tools such as
  • Nessus, Nexpose, and/or Qualys
  • Ability to communicate technical problems, vulnerability, and risk into a business
  • context understood by the client.
  • Ability to multi-task and work independently with minimal supervision
  • Ability to make sound decisions and possess excellent problem-solving skills
  • Demonstrate strong composure with a balance of urgency and intensity, as well as focus.
  • Possess the desire to grow both technically and professionally in the information security field
  • Experience with electronics social engineering exercises and campaigns, using social media, email, and phone.


Degree in Computer Science, Engineering, or a related technical discipline or equivalent experience

Other Qualifications

Apply Now