GHR Technology
https://cdn.haleymarketing.com/templates/62669/ghr-technology.png
http://www.ghrtechnology.com
http://www.ghrtechnology.com
USD
120000.00
YEAR
true
Job Description: Lead SOC Analyst/Senior Cybersecurity Analyst (REMOTE or HYBRID)
Summary:
The Senior Cybersecurity Analyst will be responsible for the coordination and performance of Cybersecurity Incident Detection and Response activities protecting The Healthcare Network’ s Information Systems and will lead cybersecurity incident remediation efforts with cross-functional teams. This position is eligible to be full-time remote.
Essential Functions:
Other Duties:
Education, License & Certification:
Licenses:
Required Licenses, Certifications, and Other Requirements:
Lead SOC Analyst
Sayre, PA 18840 US
Posted: 05/19/2023
2023-05-19
2023-07-05
Job Number: 202372
Pay Rate: $120,000.00
Job Description
Job Description: Lead SOC Analyst/Senior Cybersecurity Analyst (REMOTE or HYBRID)
Summary:
The Senior Cybersecurity Analyst will be responsible for the coordination and performance of Cybersecurity Incident Detection and Response activities protecting The Healthcare Network’ s Information Systems and will lead cybersecurity incident remediation efforts with cross-functional teams. This position is eligible to be full-time remote.
Essential Functions:
- Lead SOC Analyst:
- Monitors and is responsible for the daily activities of the Security Operations Center (SOC).
- Reports the status of SOC operations to leadership.
- Coordinate SOC efforts with Network Defender(s).
- Detect and respond to threats in order to reduce risk to the organization.
- Lead threat hunting activities to detect and respond to previously undetected attackers.
- Act as the primary cybersecurity incident responder.
- Train peers in operational cybersecurity processes.
- Leverage technical expertise to provide guidance to leadership strategy.
- Coordinate purple team exercise activities with internal resources and third-party MSSP periodically.
- Incident Management:
- Responsible for end-to-end oversight of incident investigations.
- Coordinates incident response activities with appropriate teams.
- Reports Incident response and remediation status to leadership periodically and on-demand
- Provide formal security incident after action reports to leadership after any security incident meeting demands of policy.
- Lead incident response tabletop exercises on a periodic basis.
- Quality Assurance / Metric Reporting:
- Monitor and maintain quality assurance of the SOC services through periodic and on-demand quality metric reviews.
- Ensure continuous improvement of SOC services through process and system development informed by service measurement.
- Report on the SOC metrics to leadership periodically and on-demand.
- Improve SOC metrics to ensure that measurements provide an appropriate and accurate representation of SOC performance.
- Provide insight into common trends over time to include recurring threats, security gaps, and increases/decreases in security incidents.
- Implement Strategic Security Improvements:
- Leverage cybersecurity intelligence activities to identify and improve security controls to prevent, detect, contain, eradicate, and recover from security incidents.
- Coordinate and oversee internal and external control improvement activities.
- Provide periodic and on-demand recommendations for security control improvement to leadership.
- Cybersecurity information sharing:
- Be an industry thought leader through driving cybersecurity conversations and innovation.
- Actively participate in an ongoing manner in the Health Information Sharing and Analysis Center (Health-ISAC), and any other cybersecurity knowledge sharing initiatives to learn and share the impact of cybersecurity threats and the controls to treat these risks.
Other Duties:
- Keep supervisor informed on areas of responsibility.
- Performs other duties as assigned.
Education, License & Certification:
- Bachelor’ s degree or commensurate experience in a discipline related to information technology or cybersecurity.
- 2+ years of coordinating project efforts
- 3+ years of incident management experience: preparing, detecting, containing, and eradicating threats.
- Experience with Incident Detection and Response tools such as SIEM, EDR, IDS/IPS, ICES, SEG, NGFW, etc.
Licenses:
Required Licenses, Certifications, and Other Requirements:
-
- One or more: CISSP, CEH, CISM, CISA, CYSA+, Sec+ or other industry-relevant cyber-security certifications