The Cybersecurity Analyst Senior is a general cybersecurity subject matter expert that has attained additional in-depth IT and security expertise in specific technologies and/or subject areas. Accountable for implementation of cybersecurity strategy under the direction of the Cybersecurity Manager. Proactively analyzes and anticipates changes in the cyber-threat landscape and actively participates in the design of effective countermeasures. Participates on cross-functional, multi-departmental teams to implement security-in-design solutions that effectively prevent, detect and respond to threat in Geisinger Health System's (GHS) computing environment. Performs risk assessment and management activities in regard to technology, process, and applications. Required to continue developing specialized cybersecurity expertise to remain current in field. Demonstrates a passion for Information Technology and Security and willingness to share knowledge with other team members. Contributes to a culture of security-by-design for technology initiatives.
COMPETENCIES AND SKILLS:
Demonstrates a thorough understanding of the current threat landscape and the ability to predict landscape changes as well as adjust operational approaches accordingly.
Demonstrates expertise in security data analytics and ability to identify indicators of compromise.
Communicates meaningful and thoughtful information regarding all aspects of the security operation's function and supports ISO leadership to resolve security related issues.
Demonstrates ability to negotiate and gain consensus, offer creative ideas, and complete assignments.
Demonstrates an ability to resolve conflicts in a productive and professional way. Ability to bring passion, motivation and drive. Lead by example and mentor other staff members.
Project management skills with an emphasis on implementation planning and execution. Demonstrated ability to lead multiple project efforts at one time.
Technical skills should include a conceptual understanding with hands-on configuration and troubleshooting experience with two or more of the following: Operating Systems, Wireless Technologies, Encryption technologies, Intrusion Detection, Firewalls, Active Directory, Routers/Switches, Anti-Virus, Mobile devices, Web Applications, HTTP(s), Identity and Access Management (IAM), provisioning, role management, access management.
Demonstrates high quality writing and verbal skills, and presentation skills to present thoughts, ideas, project plans, status updates. Ability to develop business cases for investment with management presentation skills.
Understands and applies technology standards methodologies and frameworks such as NIST, ITIL, and ISO.
Demonstrates capability and evidence of being self-motivated, proactively initiate projects and activities. Interact with peers, physicians and other healthcare professionals to provide solutions for reducing cyber-risk within the business environment
Demonstrates ability for critical thinking and problem solving.
Demonstrates passion for continuous learning and application of new technologies and/or self-initiative for acquiring security skills such as ethical hacking, penetration testing, threats, vulnerabilities, risk assessments.
Knowledgeable of HIPAA, PCI, and other regulations and how to integrate into secure architecture design.
Demonstrates understanding of risk management and the application of risk management frameworks.
Demonstrates ability to conduct complex risk assessments.
Conceptual understanding of big-data security architecture design.
EDUCATION AND EXPERIENCE:
Bachelor's Degree in Information Security, Information Technology, or related field required.
Minimum of five or more years of experience required, working within a Cybersecurity function with in-depth specialized skills in two or more of the following concentrations:
Secure architecture design, including network, servers, endpoints, and application technologies.
Incident response and preparedness.
Threat hunting and security data analytics.
Vulnerability analysis and program management.
Penetration testing and program management.
Threat and intelligence gathering and application.
Digital forensics to include hardware, network and malware analysis.
Security Information and Event Monitoring design, implementation, and maintenance.
IT Risk frameworks (ISO27005, ISACA Risk IT, etc.)
Regulatory compliance (PCI, HIPAA, etc.)
Risk assessment and/or risk management
Security culture and resilience
Professional Certification in Information Security that demonstrates a specialized and in-depth understanding of a specialized field required.
In lieu of degree, may consider eleven or more years of experience in the Information Security field.