In this role, you will perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
In this role, the selected candidate will design, improve, implement and maintain security controls throughout the IT infrastructure to ensure optimal security posture; ensure security initiatives, efforts, and security vulnerabilities are being accomplished throughout IT and the end-user community.
The Senior Analyst, Privacy and Information Security Risk Management (Senior Analyst) serves as the first point of contact for assigning, scheduling, and conducting security risk reviews for Information Services (IS) systems and solutions, as well as external partners and vendors.
In this role, you will rapid analysis and correlation of logs/alerts and determine whether reported events constitute security incidents and escalate to appropriate teams for additional assistance as required.
In this role, the selected candidate will be responsible for conducting comprehensive analyses of information security systems and applications in order to enhance information security and drive strategic solutions.
In this role, the selected candidate will act as an incident response handler for cyber security incidents including forensic investigation/analysis, advanced incident handling, intelligence gathering, forensic research, and formal incident investigation.
In this role, the selected candidate will establishes and performs procedures and policies necessary to ensure the security of information systems assets and to protect them from intentional or inadvertent access or destruction in accordance with company policies and external requirements such as HIPAA, DMHC, DHCS, OIG and other relevant regulatory requirements.
This individual will play a key role in developing, maintaining and continuing to enhance the Cyber Security Program with customer; this is hands-on positions which will require strong technical expertise in many security technologies.
In this role, the selected candidate will review logs and reports of all in-place devices that are under direct control or indirect control; interpret the implications of that activity and devise plans for appropriate resolution.
In this role, the selected candidate will implement processes to document and monitor the network portfolio using a risk based approach; lead new and recurring network security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, you will have experience analyzing, troubleshooting, and investigating information security incidents from a variety of reporting platforms such IPS/IDS, NAC, DLP, SIEM, and vulnerability monitoring systems.
In this role, you will plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
This position requires strong interpersonal and communication skills, an ability to work as part of a team or independently under minimal direction. Interfacing with teams outside of the IT Operations group to gather requirements, collaborate, evangelize and incorporate security policy will be a key component of this role.
In this role, you will be responsible for working knowledge of log, network, and system forensic investigation techniques. Working knowledge of diverse operating systems, networking protocols, and systems administration.
In this role, you will monitor process and inspect system and network data for computer and network usage policy compliance, system integrity, and incident response. Interface with Information Security Office to report incidents.