Cybersecurity Analyst II
Columbia, South Carolina, United States
BlueCross BlueShield of South Carolina
Summary
Performs daily monitoring and review of security events. Keeps up with the cyber threat landscape in order to rapidly identify potential threats and work with the senior staff to ensure that company’s security tools are properly tuned.
Description
Position Purpose:
Performs daily monitoring and review of security events. Keeps up with the cyber threat landscape in order to rapidly identify potential threats and work with the senior staff to ensure that company’s security tools are properly tuned.
What You'll Do:
Performs daily monitoring and review of security events in a corporate setting. Performs investigations as needed and responses to potential incidents rapidly and accurately.
Plans and performs security assessments such as penetration testing or vulnerability scanning. Anticipates and mitigates potential attacks through enterprise connections to ensure the security of the system (s). Exploits weaknesses detected in systems to assess and prevent potential break-ins. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks. Keeps up with the cyber threat landscape in order to rapidly identify potential threats. Ensures security tools are properly tuned to identify and contain cyber-attacks before they happen.
Develops and implements enterprise information security architectures and solutions. Research, designs, and advocates new technologies, infrastructure, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Identifies, plans and implements security tools.
Evaluates and recommends procedures and processes for the prevention, detection, containment and correction of information security breaches. Analyzes business impact and exposure based on security threats, vulnerabilities, and risks. Advises management and users regarding security procedures.
Monitors security agencies and services in order to keep apprised of current security threats and concerns. Evaluates products and/or procedures to enhance productivity and effectiveness of information security across the organization.
Work Environment: Fast paced, multi-platformed environment which may require action and response 24X7 to support the technical business needs of the customer.
To Qualify for This Position, You'll Need:
This position requires a clearance, which requires U.S. Citizenship to obtain.
Required Education:
Bachelor's degree in a job-related field
Degree Equivalency:
Associates degree plus an extra 2 years job related work experience for a total of 8 years of required work experience (see "required work experience")
OR
10 total years required work experience
Required Work Experience:
6 years of job-related technical experience.
Required Skills and Abilities:
Strong analytical, data gathering and problem-solving skills with experience analyzing network attacks.
Understanding of system and network security, incident management, intrusion detection, log analysis, and related technologies.
Creativity to recognize and address new threats and security challenges as they arise.
Knowledge of enterprise data architecture, systems engineering and data communications as applied to the automated storage and retrieval of information, using multiple platforms and protocols with the inherent security risks of each.
Ability to effectively prioritize and execute tasks in a high-pressure environment.
Comprehensive understanding of the organization’s goals and objectives.
Expertise with threat analysis risk management, configuration management, business continuity and contingency planning.
Advanced knowledge of administrative, procedural and technical controls used to reduce security risks.
Ability to troubleshoot multi-vendor Security issues.
Strong organizational, interpersonal and oral communication skills.
Advanced proficiency in network troubleshooting, diagnostic root cause analysis.
Excellent analytical and problem-solving abilities.
Required Software and Other Tools:
Strong proficiency with applicable IT Security tools (software and hardware).
Microsoft Office.
We Prefer that You Have:
Master's degree in Cybersecurity
Previous experience working on an Enterprise Security Operation team.
Firsthand experience accessing the Darknet
Experience working with Government and Private sector Intel services.
Strong incident response experience in a medium to large sized enterprise.
Experience interpreting and acting on cyber threat intelligence.
ISC2 Certified Information Systems Security Professional (CISSP)
COMPTIA Security +
ISACA Certified Information Systems Auditor (CISA)
EC Certified Ethical Hacker (CEH)
ISC2 System Security Certified Practitioner (SSCP)
What We Can Do for You:
We understand the value of a diverse and inclusive workplace and strive to be an employer where employees across all spectrums have access and opportunity to develop their skills, advance their careers and contribute their unique abilities to the growth of our company.
Our comprehensive benefits package includes:
401(k) retirement savings plan with company match
Subsidized health plans and free vision coverage
Life insurance
Paid annual leave — the longer you work here, the more you earn
Nine paid holidays
On-site cafeterias and fitness centers in major locations
Wellness programs and a healthy lifestyle premium discount
Tuition assistance
Service recognition
What to Expect Next:
After submitting your application, our recruiting team members will review your resume to ensure you meet the qualifications. This may include a brief telephone interview or email communication with our recruiter to verify resume specifics and salary requirements. Management will be conducting interviews with those candidates who qualify with prioritization given to those candidates who demonstrate the preferred qualifications.
We participate in E-Verify and comply with the Pay Transparency Nondiscrimination Provision. We are an Equal Opportunity Employer.
Some states have required notifications. Here's more information.
Equal Employment Opportunity Statement
BlueCross BlueShield of South Carolina and our subsidiary companies maintain a continuing policy of nondiscrimination in employment to promote employment opportunities for persons regardless of age, race, color, national origin, sex, religion, veteran status, disability, weight, sexual orientation, gender identity, genetic information or any other legally protected status. Additionally, as a federal contractor, the company maintains Affirmative Action programs to promote employment opportunities for minorities, females, disabled individuals and veterans. It is our policy to provide equal opportunities in all phases of the employment process and to comply with applicable federal, state and local laws and regulations.
We are committed to working with and providing reasonable accommodations to individuals with physical and mental disabilities.
If you need special assistance or an accommodation while seeking employment, please e-mail mycareer.help@bcbssc.com or call 1-800-288-2227, ext. 47480 with the nature of your request. We will make a determination regarding your request for reasonable accommodation on a case-by-case basis.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CEH CISA CISSP Clearance CompTIA Exploits Incident response Intrusion detection ISACA Log analysis Monitoring Network security Pentesting Risk management Security assessment SSCP Threat intelligence Vulnerabilities
Perks/benefits: 401(k) matching Health care Insurance Startup environment Team events Wellness
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.