Cyber Security Analyst III, Incident Response

2300 River Plaza Drive, United States

Apply now Apply later

We are so glad you are interested in joining Sutter Health!

Organization:

SHSO-Sutter Health System Office-Valley

Position Overview:

Responsible for providing data security support and guidance to Sutter Health regions and affiliates. Is representative on projects, privacy investigation, and information security initiatives. Works with other IS operations support departments to identify and recommend solutions on security-related issues. Provides hands-on security administration of a broad range of security duties and requires a high level of technical experience. Duties and responsibilities include, but are not limited to, oversight of design, engineering, analysis, research, testing and monitoring.

Job Description:

EDUCATION:
Equivalent experience will be accepted in lieu of the required degree or diploma.

  • Bachelor's in Business, Cybersecurity, Computer Science, Information Technology/Security, Risk Management, or related field


TYPICAL EXPERIENCE:

  • 5 years recent relevant experience.

  • Experience providing cyber security support by planning, coordinating, integrating, and synchronizing cyber defense and prevention activities preferred.

  • Experience ensuring compliance with all applicable state and federal cyber laws and regulations preferred

  • Experience creating comprehensive and accurate reports that communicate risk profile impacts to peers and management preferred.


SKILLS AND KNOWLEDGE:

  • In-depth understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment.

  • Technical skills in planning, administration, and management of information systems; operational and technical security controls; and security risk analysis and management, including end point security controls, such as access control lists (ACLS), host intrusion prevention system (HIPS), registry, logging, and forensics.

  • Comprehensive knowledge of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS), data loss prevention (DLP) methodologies, DLP technologies, current information security trends and practices including security processes, methods, and procedures.

  • Thorough knowledge of software, hardware, databases, networks, firewalls, encryption, and other systems security devices, including a good understanding of end point operating systems (Windows and Linux), internet technologies such as Domain Name System (DNS), routing, Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP), and familiarity in a command line environment.

  • Expert knowledge of state and federal information services (IS) security and privacy-related regulatory requirements and laws.

  • Detailed knowledge regarding National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health Act (HIPAA/HITECH), Federal Information Processing Standards (FIPS), and other related industry security standards, regulations, and best practices.

  • Superior business acumen and analytic skills, including the ability to analyze data and information, reach practical conclusions, recommend corrective actions, resolve conflicts, and institute effective changes.

  • Organizational and project management skills required, including the demonstrated ability to prioritize tasks, manage multiple projects simultaneously, and complete deliverables.

  • Exceptional attention to detail with time management and organization skills, including attention to detail, clear documentation, diagnostic capabilities and problem solving skills.

  • Communication (written/verbal), interpersonal, and presentation skills to explain complex technical or sensitive information clearly and professionally to diverse audiences and all levels of internal and external constituencies.

  • Robust computer skills, including advanced knowledge of Microsoft Office Suite (Word, Excel, Outlook, and Access), various database architectures and related security and assessment tools and applications.

  • Leverage vast detailed knowledge and familiarity with security disciplines effectively and convert highly complex technical topics into language and diagrams understandable to a wide audience.

Job Shift:

Days

Schedule:

Full Time

Days of the Week:

Monday - Friday

Weekend Requirements:

As Needed

Benefits:

Yes

Unions:

No

Position Status:

Exempt

Weekly Hours:

40

Employee Status:

Regular

Sutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.

Pay Range is $58.95 to $88.43 / hour

The salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package. ​

Apply now Apply later
Job stats:  1  0  0

Tags: Antivirus Compliance Computer Science Cyber defense DNS Encryption Firewalls Forensics HIPAA Incident response Intrusion prevention Linux Malware Monitoring NIST Privacy Risk analysis Risk management SMTP Windows

Perks/benefits: Equity / stock options Health care Insurance

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.