Cyber Security Analyst III, Detection
2300 River Plaza Drive, United States
Sutter Health
Sutter Health provides comprehensive, award-winning ambulatory, acute and specialty care to communities across Northern and Central California.We are so glad you are interested in joining Sutter Health!
Organization:
SHSO-Sutter Health System Office-ValleyPosition Overview:
As a Cybersecurity Detection/Red Team Analyst at Level 3, you will play a dual-role in simulating adversarial behavior to identify security gaps and enhancing detection capabilities to defend against real-world threats. This role requires advanced technical expertise in offensive security tactics and the ability to improve detection frameworks by analyzing vulnerabilities and attack simulations.Key Responsibilities:
Red Team Operations
Design and execute advanced adversary emulation scenarios to simulate real-world attack tactics, techniques, and procedures (TTPs).
Identify vulnerabilities in infrastructure, applications, and processes through simulated attacks.
Develop detailed reports on findings, including remediation recommendations to reduce risks.
Detection Engineering
Collaborate with the Blue Team to create and fine-tune detection rules based on observed attack patterns.
Validate the effectiveness of detection mechanisms by simulating known and emerging threats.
Enhance SIEM, EDR, and other monitoring tools by integrating custom detection logic.
Threat Analysis & Response
Analyze attacker methodologies to improve the organization’s understanding of threats.
Provide insights into potential gaps in visibility and propose strategies to close those gaps.
Support incident response teams by providing technical expertise during investigations.
Collaboration & Mentorship
Work closely with threat intelligence teams to incorporate threat data into red team exercises and detection workflows.
Mentor junior analysts in red teaming techniques and detection methodologies.
Partner with IT and DevSecOps teams to improve system configurations and hardening practices.
Continuous Improvement
Stay updated on the latest attacker TTPs and emerging technologies in offensive and defensive security.
Evaluate and implement tools to enhance red teaming and detection capabilities.
Conduct post-assessment reviews to measure the impact and effectiveness of simulations.
Documentation & Reporting
Create comprehensive reports detailing red team exercises, vulnerabilities identified, and recommended fixes.
Maintain clear documentation of detection rules, attack simulations, and findings.
Present technical findings to stakeholders and provide actionable insights to strengthen security posture.
Job Description:
EDUCATION:
Equivalent experience will be accepted in lieu of the required degree or diploma.
Bachelor's in Business, Cybersecurity, Computer Science, Information Technology/Security, Risk Management, or related field
TYPICAL EXPERIENCE:
5 years recent relevant experience.
Experience providing cyber security support by planning, coordinating, integrating, and synchronizing cyber defense and prevention activities preferred.
Experience ensuring compliance with all applicable state and federal cyber laws and regulations preferred
Experience creating comprehensive and accurate reports that communicate risk profile impacts to peers and management preferred.
SKILLS AND KNOWLEDGE:
In-depth understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment.
Technical skills in planning, administration, and management of information systems; operational and technical security controls; and security risk analysis and management, including end point security controls, such as access control lists (ACLS), host intrusion prevention system (HIPS), registry, logging, and forensics.
Comprehensive knowledge of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS), data loss prevention (DLP) methodologies, DLP technologies, current information security trends and practices including security processes, methods, and procedures.
Thorough knowledge of software, hardware, databases, networks, firewalls, encryption, and other systems security devices, including a good understanding of end point operating systems (Windows and Linux), internet technologies such as Domain Name System (DNS), routing, Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP), and familiarity in a command line environment.
Expert knowledge of state and federal information services (IS) security and privacy-related regulatory requirements and laws.
Detailed knowledge regarding National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health Act (HIPAA/HITECH), Federal Information Processing Standards (FIPS), and other related industry security standards, regulations, and best practices.
Superior business acumen and analytic skills, including the ability to analyze data and information, reach practical conclusions, recommend corrective actions, resolve conflicts, and institute effective changes.
Organizational and project management skills required, including the demonstrated ability to prioritize tasks, manage multiple projects simultaneously, and complete deliverables.
Exceptional attention to detail with time management and organization skills, including attention to detail, clear documentation, diagnostic capabilities and problem solving skills.
Communication (written/verbal), interpersonal, and presentation skills to explain complex technical or sensitive information clearly and professionally to diverse audiences and all levels of internal and external constituencies.
Robust computer skills, including advanced knowledge of Microsoft Office Suite (Word, Excel, Outlook, and Access), various database architectures and related security and assessment tools and applications.
Leverage vast detailed knowledge and familiarity with security disciplines effectively and convert highly complex technical topics into language and diagrams understandable to a wide audience.
Job Shift:
DaysSchedule:
Full TimeDays of the Week:
Monday - FridayWeekend Requirements:
As NeededBenefits:
YesUnions:
NoPosition Status:
ExemptWeekly Hours:
40Employee Status:
RegularSutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.
Pay Range is $58.95 to $88.43 / hourThe salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package.
Tags: Antivirus Blue team Compliance Computer Science Cyber defense DevSecOps DNS EDR Encryption Firewalls Forensics HIPAA Incident response Intrusion prevention Linux Malware Monitoring NIST Offensive security Privacy Red team Risk analysis Risk management SIEM SMTP Threat intelligence TTPs Vulnerabilities Windows
Perks/benefits: Equity / stock options Health care Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.