Over $60 billion in revenue, focused on providing local solutions to ensure accessibility, quality, and culturally attentive healthcare programs
Voted one of Fortune’s Most Admired Companies for 2019
WHAT THEY OFFER YOU:
A career focused on developing your skillset while providing value through new ideas and innovative thinking
Employee development and growth opportunities: learn new skills, cross paths with other disciplines, and grow within the organization
Collaborative environment, work with a team to provide quality healthcare solutions coast-to-coast
Work with purpose every day in an environment built around helping others
Excellent benefits package including Medical, Dental, and Vision coverage in addition to other benefits such as tuition reimbursement/educational assistance, paid company holidays, and adoption reimbursement.
WHAT YOU WILL DO:
Identify gaps or vulnerabilities in security systems, network devices, and controls to validate effectiveness and configuring of security devices and tools; assign appropriate SLAs to drive system compliance and remediation efforts
Identify, analyze, correlate, mitigate, track, and develop content for tools & processes related to indicators of comprise
Assist with execution of monitoring, incident response, and threat hunting efforts
Identify anomalous activity and potential insider threats by analyzing external and internal log sources to identify attack trends and threat tactics; create strategic threat intelligence reports and briefings
Collect and analyze post exploit data and leverage the results to prevent recurrences
Perform advanced analysis of adversary tactics, exploits, malicious code, and capabilities
Responsible for enterprise scale cyber threat intelligence, threat hunting, and vulnerability analysis.
Perform advanced analysis of adversary tactics, exploits, and capabilities.
Utilize a mixture of open source and subscription tools to conduct cyber threat and intelligence analysis, developing briefings and reports for all levels of leadership to aid in decision making and proactive mitigation efforts.
Possess a deep understanding of the cyber kill chain, existing network & host security controls, to conduct vulnerability assessments for new and emerging common vulnerabilities and exposures (CVEs).
QUALIFICATIONS:
Bachelor’s degree in Information Technology, Engineering, or Business Administration.
4+ years of experience with cyber security tools, network topologies, intrusion detection, defense, and secured networks.