Senior GRC Analyst, Information Security

AZ, United States

⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️

Apply now Apply later

Job Description


Job Summary
The Sr Analyst, Info Security will utilize a deep understanding of security controls to detect, contain, and remediate threats to the network infrastructure. Applies forensics, log analysis, and malware triage skills to solve advanced threats discovered on the Molina network.
 

Knowledge/Skills/Abilities


• Conduct host and network-based forensics, log analysis, and malware triage in support of incident response investigations.
• Perform digital hunting to detect threats that may already have a foothold inside the network.
• Utilize cutting edge technology and processes to conduct large-scale investigations and examine endpoint and network-based sources of evidence.
• Recognize and quantify attacker tools, tactics, and procedures in indicators of compromise (IOCs) that can be applied to current and future investigations.
• Create scripts, tools, or methodologies to enhance Molina's incident investigation processes.
• Work with security and IT operations to implement remediation plans in response to incidents..
 

Job Qualifications



Required Education
Bachelor's Degree in Computer Science or related technical discipline, related certifications, or equivalent experience.
Required Experience
• Minimum 3-5 years of applicable experience; minimum 6 years of experience if no degree
• Experience with hands-on penetration testing against Windows, wireless, Unix, or web application targets
• Experience administering and utilizing enterprise EDR platforms (Tanium, Cisco AMP, Crowdstrike)
• Applied knowledge in at least one scripting or development language (i.e. Python)
• Extensive understanding of enterprise security controls in Active Directory / Windows environments
• Experience with Windows disk and memory forensics
• Experience with Unix or Linux disk and memory forensics
• Experience with Network Security Monitoring (NSM), network traffic analysis, and log analysis
• Experience with Static and dynamic malware analysis
• Ability to document and explain technical details in a concise, understandable manner
Preferred Experience
• Experience with programming/scripting languages
• Background in operational information security disciplines (e.g. incident response, security infrastructure management or monitoring services)
• Background performing incident response and digital forensics
• Experience in config/mgmt of feeds into event aggregation and correlation systems (e.g., Exabeam, Splunk)
• Experience with improvement of analyst effectiveness by optimizing signature quality in collaboration with other analysts and developers
• Background in systems administration for Windows and/or *nix based environments
• Familiarity with host-based security tools (e.g., EnCase, Forensic Toolkit, ECAT, Volatility, Memory Forensics)
• Services: HTTP, HTTPS, DNS, DHCP, FTP, SMTP, etc.
Preferred License, Certification, Association
GIAC GCIH, GCIA, GCFA, GCFE, GREM
 

To all current Molina employees: If you are interested in applying for this position, please apply through the intranet job listing.

Molina Healthcare offers a competitive benefits and compensation package. Molina Healthcare is an Equal Opportunity Employer (EOE) M/F/D/V.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Active Directory Computer Science CrowdStrike DNS EDR EnCase Exabeam Forensics GCFA GCFE GCIA GCIH GIAC GREM Incident response Linux Log analysis Malware Monitoring Network security NSM Pentesting Python Scripting SMTP Splunk UNIX Windows

Perks/benefits: Competitive pay

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.