Cybersecurity Consultant, Automation
2200 River Plaza Drive, United States
Sutter Health
Sutter Health provides comprehensive, award-winning ambulatory, acute and specialty care to communities across Northern and Central California.We are so glad you are interested in joining Sutter Health!
Organization:
SHSO-Sutter Health System Office-ValleyPosition Overview:
A Cybersecurity Automation Analyst - Consultant is responsible for designing, implementing, and optimizing automated solutions to enhance the organization's security operations and incident response capabilities. This role involves developing workflows, integrating tools, and driving process improvements to improve efficiency and reduce risks.Key Responsibilities:
Automation Design & Development
Architect and implement automated solutions for repetitive security tasks and workflows.
Develop, test, and deploy playbooks for SOAR platforms to streamline detection and response processes.
Integrate APIs and scripts to enhance the functionality of existing security tools.
Process Optimization
Analyze current security processes to identify and implement automation opportunities.
Collaborate with stakeholders to design solutions aligned with business and security objectives.
Ensure automated workflows are robust, scalable, and aligned with best practices.
Incident Response Support
Provide automated capabilities to support real-time threat detection, triage, and containment.
Enhance incident response efficiency through automated data enrichment and alert prioritization.
Serve as a key resource for implementing automation in high-severity incidents.
Collaboration & Mentorship
Work with security engineers, analysts, and architects to understand and address automation needs.
Mentor team members in automation tools, programming, and workflow development.
Collaborate with vendors and external partners to evaluate and integrate automation technologies.
Continuous Improvement
Research and implement emerging tools, techniques, and trends in cybersecurity automation.
Regularly review and optimize automated workflows to ensure ongoing effectiveness.
Address bottlenecks or gaps in automation processes and recommend enhancements.
Documentation & Reporting
Maintain clear documentation of automated workflows, processes, and integrations.
Generate reports and dashboards to showcase the impact and performance of automation initiatives.
Communicate automation outcomes and benefits to stakeholders using metrics and case studies.
Job Description:
EDUCATION:
Equivalent experience will be accepted in lieu of the required degree or diploma.
Bachelor's: Business, Cyber Security, Risk Management, Information Technology, Computer Science or related field
TYPICAL EXPERIENCE:
8 years recent relevant experience.
Experience providing cyber security support by planning, coordinating, integrating, and synchronizing cyber defense and prevention activities.
Experience ensuring compliance with all applicable state and federal cyber laws and regulations.
Experience creating comprehensive and accurate reports that communicate risk profile impacts to peers and management.
SKILLS AND KNOWLEDGE:
Thorough knowledge of information systems security concepts and current information security trends and practices including security processes and methods.
General knowledge of Federal and State IS security and privacy-related regulatory requirements and laws.
General knowledge regarding National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act (HIPAA), Federal Information Processing Standards (FIPS), and other recognized industry security standards. and best practices.
Detailed understanding of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS)
Detailed understanding of end point operating systems (Windows and Linux)
In depth knowledge of cyber security solutions, policies and technologies
Understanding of the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment
Working understanding of the anatomy of a cyber attack: advanced level of skill using Microsoft windows workstation and server, UNIX/Linux and network Os’s, proven ability to use internet technologies including DNS, routing, smtp, http, DHCP, and ftp etc.
Technical skills in planning, administration, and management of information systems, operational and technical security controls, and security risk analysis and management
Written/verbal interpersonal communication skills with the ability to interact effectively with a broad and diverse group of peers, users, and executives.
Proven ability to prioritize work while multi-tasking on assigned work.
Demonstrated ability to acquire images, either remote or local, to a workstation or server.
Proven ability to conduct forensics activities in the context of an active attack.
Technical skills in end point security controls, such as acls, hips, registry, logging, and forensics.
Ability to perform and conduct incident response and participate in security incident and post incident response process
Proven ability to break down highly complex technical topics into language and diagrams understandable to a wide audience.
Job Shift:
DaysSchedule:
Full TimeDays of the Week:
Monday - FridayWeekend Requirements:
As NeededBenefits:
YesUnions:
NoPosition Status:
ExemptWeekly Hours:
40Employee Status:
RegularSutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.
Pay Range is $68.59 to $109.75 / hourThe salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package.
Tags: Antivirus APIs Automation Compliance Computer Science Cyber defense DNS Forensics HIPAA Incident response Linux Malware NIST Privacy Risk analysis Risk management SMTP SOAR Threat detection UNIX Windows
Perks/benefits: Equity / stock options Health care Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.