More jobs:
Job Description & How to Apply Below
Cyber Security Analyst
Posted today
Job DescriptionJOB PURPOSE:
The Cyber Security Analyst creates a comprehensive program for establishing a Healthcare carrier‑class Security Operation Center. S/he develops and maintains threat monitoring and security incident response procedures within Naufar. The analyst designs frameworks, procedures, and toolkits to enhance capabilities in professional forensic collection and digital evidence analysis. S/he also develops dashboards for reporting the organization's threat landscape, awareness and security posture to senior management.
This is an expert role with extensive responsibilities.
Description
- Develops and implements a cyber‑security program to enhance Naufar capabilities regarding cyber‑attack incident monitoring, incident response and intrusive and non‑intrusive forensics capabilities.
- Develops and matures the service capabilities of the SOC, such as forensics, threat management, penetration assessments, and tool management.
- Develops, contributes and maintains the cyber security strategy.
- Implements, configures and maintains security controls and processes to ensure threat indicators are rated by severity and responded to in a manner consistent with the threat.
- Identifies deficiencies and recommends corrective action to strengthen information security controls and reduce the risk of data breach.
- Maintains and updates standard operation policies and procedures for incident response plans, e‑discovery processing, remote acquisition/analysis tools, collections and forensic analysis techniques.
- Maintains industry standard tools and processes used for forensic analysis and eDiscovery collections and processes.
- Monitors security alerts for potential events/incidents as well as trending and historical analysis and ensures all incident reports are complete and written within standard operations and ensures ticket audits and reviews are completed.
- Utilizes leading forensic software to identify, collect, preserve and analyze electronic data from laptops, desktops, servers, email archives, infrastructure logs, network file servers, backup tapes, cell phones, PDAs and a wide variety of other media devices.
- Manages requests for electronic data and digital forensic investigations that relate to litigation, regulatory matters, compliance, and employee investigations.
- Performs cybersecurity incident analysis and assists with incident response, including analysis of network content and metadata for investigations or malware detection and identifies the cause and extent of a breach.
- Serves as a subject‑matter expert and technical advisor in matters relating to the proper collection, preservation, packaging, and submission of digital and multimedia evidence.
- Participates in incident electronic evidence collection activities in major field investigations. Ensures evidence handling requirements are met.
- Performs post‑incident report according to standard operations.
- Analyzes the tools and methodology used for investigation and accordingly presents improvements in control and corrective actions if any.
- Escalates and works with senior management on resolutions to overdue security items or any negative trends identified.
- Develops focused reporting and briefings for advanced cyber threats.
- Conducts studies and research for improving forensic analyses, scientific methods, and resolving forensic examination problems.
- Creates detailed, professional documentation and reports, including performance metrics and presentations for management.
- Leads or contributes to key projects related to corporate threat monitoring, forensics or information security initiatives.
- Facilitates group risk assessment activities and identifies any security‑related process improvement opportunities.
- Monitors and performs trending on root cause analysis activities within assigned group and participates as needed to resolve clinical systems security related incidents.
- Assists on monitoring compliance with information security policies, standards and enterprise‑wide strategy and facilitates threat and vulnerability evaluations on a regular basis. Measures and reports on the effectiveness of information security controls.
- Supp…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×