Primary Duties and Responsibilities
The Cyber Security Analyst III establishes and maintains the corporate-wide Cyber Security program to ensure information assets are adequately protected. Responsible for ensuring the confidentiality, integrity, and availability of Hoag enterprise-wide security devices. Working with management, the Analyst III will direct system security assessments to identify vulnerabilities, remediation strategies, and implement effective safeguards. Conducts incident response activities from detection, analysis, remediation, and mitigation, to lessons-learned documentation. Adheres to and maintains Hoag Cyber Security policies, procedures, guidance. Works with multiple stakeholders (internal and/or external) to ensure deliverables are accurate, complete/on time.
Partners with the Incident Response Lead for Cyber Security Incident Response activities. Analyzes security events and incidents, ensuring optimal use of existing tool sets. Identifies any technical gaps and drives plans for improvement.
Proactively assesses security controls (technical, operational, procedural) for alignment with regulatory requirements (e.g., NIST CSF, HIPAA, HITRUST, PCI).
Develops and documents remediation guidance, develops and implements corrective action plans based on assessment findings and identified vulnerabilities. Ensures necessary feeds are being ingested into Splunk, and properly formatted for reviews. Leads the team in analyzing security log data, leveraging tools and technologies including but not limited to:
- Security Information and Event Management (SIEM) tools
- Access Control
- Network Security
- Intrusion Detection / Prevention Systems
- Identity Governance and Administration
- Malware Protection
- Email Security
- Data Loss Prevention
- Cloud Security solutions
Implements upskilling plans to improve team effectiveness. Leads training and Cyber exercises.
Identity Governance and Access Management (IGAM):
With the IGAM Lead, implements and enforces Multi Factor Authentication (MFA) requirements, access controls, and User Lifecycle Management (ULM). Provides Recommends to continuous improvements to IGAM processes to prevent end-user issues. Position entails work in a 24/7 department which may require work outside of normal business hours. Performs other duties as assigned.
Education and Experience
Required:
Bachelor's degree in a relevant technical area such as Cyber Security, Computer Science, Computer Information Systems, Engineering, or related technical field, or equivalent work experience.
A minimum of seven to ten (7-10) years of relevant business/industry experience. Hands-on experience with cyber security tools, process, methodologies and frameworks.
Expertise working incident response and cyber operations.
Technical leadership skills, ability to set priorities and meet obligations in a timely manner.
Preferred:
Master's degree in Computer Science, Computer Information Systems, Cyber Security, Cyber Forensics, Engineering, or related technical field.
Five plus (5+) translating business requirements and priorities into cyber security policies and procedures.
Five plus (5+) of experience in vulnerability assessment and/or penetration testing, digital forensics, or Incident Response.
Experience in a hospital or healthcare related organization.
Licenses Required
N/A
Licenses Preferred
N/A
Certifications Required
At least one of the following: GIAC Certified Incident Handler (GCIH),GIAC Advanced Security Essentials - Enterprise Defender (GCED), Certified Information Systems Security Professional (CISSP), or equivalent
Nearest Major Market: Orange County
Nearest Secondary Market: Los Angeles
Primary Duties and Responsibilities
The Cyber Security Analyst III establishes and maintains the corporate-wide Cyber Security program to ensure information assets are adequately protected. Responsible for ensuring the confidentiality, integrity, and availability of Hoag enterprise-wide security devices. Working with management, the Analyst III will direct system security assessments to identify vulnerabilities, remediation strategies, and implement effective safeguards. Conducts incident response activities from detection, analysis, remediation, and mitigation, to lessons-learned documentation. Adheres to and maintains Hoag Cyber Security policies, procedures, guidance. Works with multiple stakeholders (internal and/or external) to ensure deliverables are accurate, complete/on time.
Partners with the Incident Response Lead for Cyber Security Incident Response activities. Analyzes security events and incidents, ensuring optimal use of existing tool sets. Identifies any technical gaps and drives plans for improvement.
Proactively assesses security controls (technical, operational, procedural) for alignment with regulatory requirements (e.g., NIST CSF, HIPAA, HITRUST, PCI).
Develops and documents remediation guidance, develops and implements corrective action plans based on assessment findings and identified vulnerabilities. Ensures necessary feeds are being ingested into Splunk, and properly formatted for reviews. Leads the team in analyzing security log data, leveraging tools and technologies including but not limited to:
- Security Information and Event Management (SIEM) tools
- Access Control
- Network Security
- Intrusion Detection / Prevention Systems
- Identity Governance and Administration
- Malware Protection
- Email Security
- Data Loss Prevention
- Cloud Security solutions
Implements upskilling plans to improve team effectiveness. Leads training and Cyber exercises.
Identity Governance and Access Management (IGAM):
With the IGAM Lead, implements and enforces Multi Factor Authentication (MFA) requirements, access controls, and User Lifecycle Management (ULM). Provides Recommends to continuous improvements to IGAM processes to prevent end-user issues. Position entails work in a 24/7 department which may require work outside of normal business hours. Performs other duties as assigned.
Education and Experience
Required:
Bachelor's degree in a relevant technical area such as Cyber Security, Computer Science, Computer Information Systems, Engineering, or related technical field, or equivalent work experience.
A minimum of seven to ten (7-10) years of relevant business/industry experience. Hands-on experience with cyber security tools, process, methodologies and frameworks.
Expertise working incident response and cyber operations.
Technical leadership skills, ability to set priorities and meet obligations in a timely manner.
Preferred:
Master's degree in Computer Science, Computer Information Systems, Cyber Security, Cyber Forensics, Engineering, or related technical field.
Five plus (5+) translating business requirements and priorities into cyber security policies and procedures.
Five plus (5+) of experience in vulnerability assessment and/or penetration testing, digital forensics, or Incident Response.
Experience in a hospital or healthcare related organization.
Licenses Required
N/A
Licenses Preferred
N/A
Certifications Required
At least one of the following: GIAC Certified Incident Handler (GCIH),GIAC Advanced Security Essentials - Enterprise Defender (GCED), Certified Information Systems Security Professional (CISSP), or equivalent
Nearest Major Market: Orange County
Nearest Secondary Market: Los Angeles