Lead Cyber Security Analyst
Listed on 2025-12-20
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Network Security
Lead Cyber Security Analyst
Quest Diagnostics
Job DescriptionThe Lead Cyber Security Analyst will be a key member of Cyber Defense Operations and Engineering (CDOE) team. Lead efforts in the detection of security events while assisting with the response to key events. Acting as an escalation point for major security incidents, liaising with the cybersecurity incident response, and other stakeholders from incident inception to remediation. Interface with other teams across the Company.
Ensure compliance with internal and regulatory policies, while applying industry best practices and standards.
Please note this is a hybrid opportunity (3 days in the office/ 2 days WFH).
Pay Range: $130 - $160 / year.
Benefits Information- Day 1 Medical, supplemental health, dental & vision for FT employees who work 30+ hours
- Best-in-class well-being programs
- Annual, no-cost health assessment program Blueprint for Wellness®
- healthy
MINDS mental health program - Vacation and Health/Flex Time
- 6 Holidays plus 1 "MyDay" off
- Fin Fit financial coaching and services
- 401(k) pre‑tax and/or Roth IRA with company match up to 5% after 12 months of service
- Employee stock purchase plan
- Life and disability insurance, plus buy‑up option
- Flexible Spending Accounts
- Annual incentive plans
- Matching gifts program
- Education assistance through MyQuest for Education
- Career advancement opportunities
- and so much more!
- Provide subject matter expertise (SME) for security solutions.
- Develop and document solution processes, procedures, and information workflows around security event management and cyber security operations.
- Monitoring and responding to security events that could impact the confidentiality, availability, and integrity of critical information security systems.
- Contributor to the IT Security Incident Response efforts across the organization.
- Provide training, mentoring, and coaching to the IT Security Team by understanding the core businesses and environment as well as the technology solutions supporting them.
- Implementation of security standards and security baseline.
- Analyze and recommend action on security related incidents.
- Track and maintain operational security metrics.
- Review and approve access requests.
- Participate in investigating possible security violations.
- Interface effectively in key relationships, including IT peers (e.g. IT Operations, Enterprise Architecture), internal business partners (e.g. Compliance/Privacy, Legal, Corporate Communications), key external clients (e.g. service providers, external partners), and other leaders and partners within IT and the broader enterprise.
- Apply a methodology to help identify key security events.
- Develop and publish key metrics for the team to illustrate value and accountability.
- Coordinate and present SOC briefings on a regular basis.
- Correlate threat intelligence with active attacks and vulnerabilities within the enterprise.
- Analyze security events collected by our Log Rhythm Security Incident and Event Monitoring (SIEM), Splunk, and other tools, and identify trends, attacks, and potential threats.
- Maintain current knowledge of information security vulnerabilities, threats, and exploits.
- Provide governance over Firewalls, Proxies, and Endpoint Security Solutions.
- Supervise Security Specialists in our Global Information Center (GIC).
- Other duties, as assigned.
Education Required:
Bachelor’s degree or equivalent work experience required.
- Certified Information Systems Security Professional (CISSP) or equivalent GIAC Certificates are a plus.
- 5+ years of Information Security or related technology experience.
- 3+ years of SIEM Experience.
- 3+ years with advanced knowledge of network protocols, routing and switching in complex environments.
- 3+ years’ experience with Firewalls, IDS/IPS, and Proxies.
- Next Generation endpoint protection technology is a plus (Crowd Strike and Cylance).
- Host Intrusion Detection Service (HIDS).
- Application Whitelisting/Blacklisting.
- Endpoint File System Encryption.
- Detection/monitoring/response (e.g. Threat Detection, Realtime vulnerability visibility).
- In‑depth understanding of iOS, Android, Windows, MacOS and Unix internals.
- OS Security Hardening for iOS, Android, Windows,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).