Analyst III, Cyber Security, IT
Gurgaon, HR, IN
Boston Scientific
Boston Scientific is dedicated to transforming lives through innovative medical solutions that improve the health of patients around the world.Additional Locations: India-Haryana, Gurgaon
Diversity - Innovation - Caring - Global Collaboration - Winning Spirit - High Performance
At Boston Scientific, we’ll give you the opportunity to harness all that’s within you by working in teams of diverse and high-performing employees, tackling some of the most important health industry challenges. With access to the latest tools, information and training, we’ll help you in advancing your skills and career. Here, you’ll be supported in progressing – whatever your ambitions.
Purpose:
The Cyber Security Analyst will be responsible for managing the BSC Security Incident Response Operations.
The Analyst will work closely with our security operations center analysts. Candidate must have a strong technical background, demonstrate intuitive problem-solving skills, and have proficient communication skills.
The person will also be responsible for proactively finding, investigating, and mitigating advanced cyber threats targeting Boston Scientific. These responsibilities are accomplished through a combination of network traffic monitoring and analysis, proactive computer defense (CND) intelligence operations, cyber investigations, incident management, and malware analysis.
In order to effectively execute these tasks, the Cyber Security Threat Analyst develops good working relationships with IT Infrastructure, IT security, desktop support personnel and other stakeholders throughout the Enterprise. The Analyst also provides situational awareness to appropriate personnel through clear and concise communications.
Key Responsibilities:
- Focus on conducting full spectrum threat analysis resulting from CND Intelligence Operations information, threat reporting and ongoing incidents affecting the enterprise from advanced cyber threats.
- Should have exposure of handling investigations of security incidents over cloud infrastructure as per the Cloud Security best practices.
- Should have exposure of handling investigations of mail security incidents (phishing).
- Encourages investigations and research initiatives to move toward a more proactive state, resulting in advanced warning of cyber-attack, enhanced understanding of adversary collection requirements and new threat indicators that facilitate proactive threat discovery and mitigation.
- Must take the lead on providing situational awareness to appropriate personnel through clear and concise communications and promotes a proactive response to possible threats by staying current with, analyzing, and identifying mitigations for emerging threats to Boston Scientific’s IT Infrastructure.
- Malware Analysis using a defined set of analytical tools.
- Can serve on call when assigned.
- Communicate effectively with peers and other key stakeholders.
- Increase organizational threat awareness by providing briefings as required.
- Report findings and provide countermeasure recommendations and business cases based on standard security principles, policies, standards, and industry best practices.
- Promote a proactive approach to the changing threat landscape.
- Evaluate and recommend new security technologies, processes, and methodologies.
- Maintain and continually evaluate cyber threat intelligence sources for changes that increase effectiveness and timeliness.
- Assist with various other implementation tasks.
- Knowledge of Splunk, Crowdstrike, AWS and Azure Sentinel is a plus.
- Present threat intelligence, IOCs and develop measures that could be useful in detecting or preventing attacks.
- Collaborate with external entities and authorities to collect and share Indicators of Compromise (IoC) and discovered intelligence.
- Conducting research and track new exploits and cyber threats.
- Utilize ATT&CK to perform cybersecurity operations testing, and develop improvements to doing so, based on real adversary behavior.
- Evaluate the efficacy of existing detection mechanisms, analytics, and mitigations.
- Knowledge of SIEM and be able to conduct network, endpoint, and log analysis by utilizing SIEM/Tools consoles on a regular basis.
- Design and implement deception technology use-cases as part of a larger deception strategy.
Qualifications:
- Computer Science or Information Systems major related field experience with networking and IT Security.
- 7+ Years of Experience leading enterprise-level responses for major information security incidents.
- Good communication skills and experience answering inquiries is a must.
- Ability to read and understand system data, including, but not limited to, security event logs, Netflow and database structures.
- Understanding of analyzing forensic data concerning system and network security compromises.
- Experience with IT Security tools such as Anti-Malware, EDR, Web Proxy, Anti Phishing Mail Gateway, Firewalls is a plus.
- Experience with SIEM & EDR is highly desirable.
- Knowledge in deception tech and threat intelligence fields.
- Working knowledge of network/malware analysis is a plus.
- GIAC, CISSP, CEH, Security+ certifications are a plus.
Requisition ID: 594023
As a leader in medical science for more than 40 years, we are committed to solving the challenges that matter most – united by a deep caring for human life. Our mission to advance science for life is about transforming lives through innovative medical solutions that improve patient lives, create value for our customers, and support our employees and the communities in which we operate. Now more than ever, we have a responsibility to apply those values to everything we do – as a global business and as a global corporate citizen.
So, choosing a career with Boston Scientific (NYSE: BSX) isn’t just business, it’s personal. And if you’re a natural problem-solver with the imagination, determination, and spirit to make a meaningful difference to people worldwide, we encourage you to apply and look forward to connecting with you!
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics AWS Azure CEH CISSP Cloud CND Computer Science CrowdStrike EDR Exploits Firewalls GIAC Incident response IT infrastructure Log analysis Malware Monitoring Network security Sentinel SIEM SOC Splunk Strategy Threat intelligence
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.