Cyber Security Engineer - Remote U.S.

Remote - US

Altera Digital Health

A global leader in healthcare IT, our solutions, services and partnerships enable organizations worldwide to build open, connect communities of health.

View all jobs at Altera Digital Health

Apply now Apply later

Altera, a member of the N. Harris Computer Corporation family, delivers health IT solutions that support caregivers around the world. These include the Sunrise™, Paragon®, Altera TouchWorks®, Altera Opal, STAR™, HealthQuest™ and dbMotion™ solutions. At the intersection of technology and the human experience, Altera Digital Health is driving a new era of healthcare, in which innovation and expertise can elevate care delivery and inspire healthier communities across the globe. A new age in healthcare technology has just begun.

***CYBER SECURITY ENGINEER***

Remote Role

U.S./Canada - Eastern Time Zone

Overview

The primary purpose of this role is to investigate escalated alerts from the SOC to determine true positives and mitigate infections. Additional responsibilities of this role include proactively securing Altera systems to prevent intrusion and notify the appropriate stakeholders if an event occurs. 

 

We are seeking a Mid-Tier Incident Response Analyst to join our Incident Response Team. In this role, you'll act as a key responder in the incident lifecycle, handling escalated alerts, conducting in-depth investigations, and supporting containment and recovery efforts. This is a hands-on technical position requiring a solid understanding of security operations, threat detection, and incident handling procedures. The ideal candidate is a highly motivated and inquisitive individual who thrives in a collaborative, fast-paced setting and is eager to expand their skillset. 

 

Responsibilities

  • Monitor, investigate, and respond to security alerts escalated from SOC analysts. 
  • Perform in-depth analysis of logs and endpoint data to identify indicators of compromise (IOCs) and determine root cause. 
  • Participate in incident containment, mitigation, and remediation efforts. 
  • Coordinate with cross-functional teams (IT, Legal, Risk) during security incidents. 
  • Support threat hunting initiatives and continuous tuning of detection tools (SIEM(s), EDR, IDS). 
  • Mentor SOC analysts and contribute to playbook and process development. 
  • Engage in continuous learning and cross-training to develop expertise in both security engineering and incident response. 
  • Contribute to the evaluation and implementation of new security tools and technologies. 
  • Collaborate with other teams to ensure security best practice and defined policies are integrated into all aspects of the business. 

 

Qualifications

Academic and Professional Qualifications:

  • Bachelor’s degree or equivalent/years of experience required.
  • Advanced certifications such as CISSP, CISA, or CESSLP, MS-500, AZ-500 strongly preferred

 

Experience:

  • 2–4 years of experience in a security operations or incident response role. 
  • Proficiency with SIEM tools (e.g., Splunk, QRadar, Sentinel) and endpoint detection tools (e.g., CrowdStrike, SentinelOne). 
  • Strong understanding of TCP/IP, operating systems (Windows/Linux), malware behaviors, and common attack vectors (e.g., phishing, ransomware, lateral movement). 
  • Experience analyzing logs from various sources: firewalls, proxies, IDS/IPS, and authentication systems. (e.g., KQL, CQL, RegEx) 
  • Ability to work under pressure and manage multiple incidents simultaneously. 
  • Excellent verbal and written communication skills. 

 

Travel Requirements:

  • Minimal travel is expected, primarily for conferences and internal meetings.

 

Working Arrangements:

  • This is a fully remote position based in the U.S. or Canada. The team primarily operates within the Eastern Time Zone, and work hours should align accordingly. 
  • Participation in an after-hours On-Call rotation will be expected after an initial period of onboarding and training (On-Call is approximately every six weeks for one week). 

Our company complies with all local/state regulations in regard to displaying salary ranges. If required, the salary range(s) are displayed below and are specifically for those potential hires who will perform work in or reside in the location(s) listed, if selected for the role. Any offered salary is determined based on internal equity, internal salary ranges, market data, ranges, applicant's skills and prior relevant experience, certain degrees and certifications (e.g. JD, technology), for example.

Salary Range$90,000—$110,000 USD

 Altera is an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state or local law.

If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact us at:

HR.Recruiting@AlteraHealth.com

 

 

Apply now Apply later
Job stats:  2  0  0

Tags: CISA CISSP CrowdStrike EDR Firewalls IDS Incident response IPS Linux Malware QRadar Sentinel SIEM SOC Splunk TCP/IP Threat detection Windows

Perks/benefits: Career development Conferences Equity / stock options

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.