$53 - $81 / Hour

Location

HOAG MEMORIAL HOSPITAL PRESBYTERIAN ,COSTA MESA, CA

Type

Full Time

Status

Open

Primary Duties and Responsibilities

The Cyber Security Analyst III establishes and maintains the corporate-wide Cyber Security program to ensure information assets are adequately protected. Responsible for ensuring the confidentiality, integrity, and availability of Hoag enterprise-wide security devices. Working with management, the Analyst III will direct system security assessments to identify vulnerabilities, remediation strategies, and implement effective safeguards. Conducts incident response activities from detection, analysis, remediation, and mitigation, to lessons-learned documentation. Adheres to and maintains Hoag Cyber Security policies, procedures, guidance. Works with multiple stakeholders (internal and/or external) to ensure deliverables are accurate, complete/on time.

Partners with the Incident Response Lead for Cyber Security Incident Response activities. Analyzes security events and incidents, ensuring optimal use of existing tool sets. Identifies any technical gaps and drives plans for improvement.

Proactively assesses security controls (technical, operational, procedural) for alignment with regulatory requirements (e.g., NIST CSF, HIPAA, HITRUST, PCI).

Develops and documents remediation guidance, develops and implements corrective action plans based on assessment findings and identified vulnerabilities. Ensures necessary feeds are being ingested into Splunk, and properly formatted for reviews. Leads the team in analyzing security log data, leveraging tools and technologies including but not limited to:

- Security Information and Event Management (SIEM) tools

- Access Control

- Network Security

- Intrusion Detection / Prevention Systems

- Identity Governance and Administration

- Malware Protection

- Email Security

- Data Loss Prevention

- Cloud Security solutions

Implements upskilling plans to improve team effectiveness. Leads training and Cyber exercises.

Identity Governance and Access Management (IGAM):

With the IGAM Lead, implements and enforces Multi Factor Authentication (MFA) requirements, access controls, and User Lifecycle Management (ULM). Provides Recommends to continuous improvements to IGAM processes to prevent end-user issues. Position entails work in a 24/7 department which may require work outside of normal business hours. Performs other duties as assigned.

Education and Experience

Required:

Bachelor's degree in a relevant technical area such as Cyber Security, Computer Science, Computer Information Systems, Engineering, or related technical field, or equivalent work experience.

A minimum of seven to ten (7-10) years of relevant business/industry experience. Hands-on experience with cyber security tools, process, methodologies and frameworks.

Expertise working incident response and cyber operations.

Technical leadership skills, ability to set priorities and meet obligations in a timely manner.

Preferred:

Master's degree in Computer Science, Computer Information Systems, Cyber Security, Cyber Forensics, Engineering, or related technical field.

Five plus (5+) translating business requirements and priorities into cyber security policies and procedures.

Five plus (5+) of experience in vulnerability assessment and/or penetration testing, digital forensics, or Incident Response.

Experience in a hospital or healthcare related organization.

Licenses Required

N/A

Licenses Preferred

N/A

Certifications Required

At least one of the following: GIAC Certified Incident Handler (GCIH),GIAC Advanced Security Essentials - Enterprise Defender (GCED), Certified Information Systems Security Professional (CISSP), or equivalent

Nearest Major Market: Orange County
Nearest Secondary Market: Los Angeles
Primary Duties and Responsibilities The Cyber Security Analyst III establishes and maintains the corporate-wide Cyber Security program to ensure information assets are adequately protected. Responsible for ensuring the confidentiality, integrity, and availability of Hoag enterprise-wide security devices. Working with management, the Analyst III will direct system security assessments to identify vulnerabilities, remediation strategies, and implement effective safeguards. Conducts incident response activities from detection, analysis, remediation, and mitigation, to lessons-learned documentation. Adheres to and maintains Hoag Cyber Security policies, procedures, guidance. Works with multiple stakeholders (internal and/or external) to ensure deliverables are accurate, complete/on time. Partners with the Incident Response Lead for Cyber Security Incident Response activities. Analyzes security events and incidents, ensuring optimal use of existing tool sets. Identifies any technical gaps and drives plans for improvement. Proactively assesses security controls (technical, operational, procedural) for alignment with regulatory requirements (e.g., NIST CSF, HIPAA, HITRUST, PCI). Develops and documents remediation guidance, develops and implements corrective action plans based on assessment findings and identified vulnerabilities. Ensures necessary feeds are being ingested into Splunk, and properly formatted for reviews. Leads the team in analyzing security log data, leveraging tools and technologies including but not limited to: - Security Information and Event Management (SIEM) tools - Access Control - Network Security - Intrusion Detection / Prevention Systems - Identity Governance and Administration - Malware Protection - Email Security - Data Loss Prevention - Cloud Security solutions Implements upskilling plans to improve team effectiveness. Leads training and Cyber exercises. Identity Governance and Access Management (IGAM): With the IGAM Lead, implements and enforces Multi Factor Authentication (MFA) requirements, access controls, and User Lifecycle Management (ULM). Provides Recommends to continuous improvements to IGAM processes to prevent end-user issues. Position entails work in a 24/7 department which may require work outside of normal business hours. Performs other duties as assigned. Education and Experience Required: Bachelor's degree in a relevant technical area such as Cyber Security, Computer Science, Computer Information Systems, Engineering, or related technical field, or equivalent work experience. A minimum of seven to ten (7-10) years of relevant business/industry experience. Hands-on experience with cyber security tools, process, methodologies and frameworks. Expertise working incident response and cyber operations. Technical leadership skills, ability to set priorities and meet obligations in a timely manner. Preferred: Master's degree in Computer Science, Computer Information Systems, Cyber Security, Cyber Forensics, Engineering, or related technical field. Five plus (5+) translating business requirements and priorities into cyber security policies and procedures. Five plus (5+) of experience in vulnerability assessment and/or penetration testing, digital forensics, or Incident Response. Experience in a hospital or healthcare related organization. Licenses Required N/A Licenses Preferred N/A Certifications Required At least one of the following: GIAC Certified Incident Handler (GCIH),GIAC Advanced Security Essentials - Enterprise Defender (GCED), Certified Information Systems Security Professional (CISSP), or equivalent Nearest Major Market: Orange County Nearest Secondary Market: Los Angeles
·4080 Views