Overview
On Site
Contract - W2
Skills
Pharmaceutics
Network
Health Care
Supply Chain Management
Threat Analysis
Training
Continuous Monitoring
Workflow
FOCUS
ROOT
Collaboration
Impact Analysis
Risk Management
Mentorship
Knowledge Sharing
Security Controls
Security Operations
Computer Science
Information Systems
SIEM
Email Security
Cyber Security
D3.js
Analytical Skill
Incident Management
Communication
English
Documentation
Reporting
Security+
Certified Ethical Hacker
Scripting
Python
Windows PowerShell
Bash
Fluency
Spanish
French
Digital Forensics
DICE
Job Details
Be Part of a High-Performing Team
This opportunity is with a global leader in pharmaceutical services that powers a critical network for healthcare, supporting thousands of customers across the medical supply chain. The cybersecurity team is dedicated to protecting digital assets, ensuring resilience against evolving threats, and responding swiftly to incidents with technical expertise and rigor.
The team operates in a collaborative and fast-paced environment, leveraging industry-standard frameworks like MITRE ATT&CK and NIST. Members are highly skilled in enterprise-grade security tools including SIEM, EDR/XDR, and threat intelligence platforms. Team members participate in active incident response initiatives, threat hunting, and continuous operations monitoring to ensure optimal cyber defense posture. They also engage in internal exercises and training to stay ahead of advanced persistent threats.
What's In Store for You
How You Will Make an Impact
Are You a Cybersecurity Operations Rock Star?
Preferred Qualifications:
#Dice
This opportunity is with a global leader in pharmaceutical services that powers a critical network for healthcare, supporting thousands of customers across the medical supply chain. The cybersecurity team is dedicated to protecting digital assets, ensuring resilience against evolving threats, and responding swiftly to incidents with technical expertise and rigor.
The team operates in a collaborative and fast-paced environment, leveraging industry-standard frameworks like MITRE ATT&CK and NIST. Members are highly skilled in enterprise-grade security tools including SIEM, EDR/XDR, and threat intelligence platforms. Team members participate in active incident response initiatives, threat hunting, and continuous operations monitoring to ensure optimal cyber defense posture. They also engage in internal exercises and training to stay ahead of advanced persistent threats.
What's In Store for You
- Hybrid work schedule with 1-2 days per week onsite, providing a balance of collaboration and flexibility.
- Opportunity to work on advanced cybersecurity tooling and detection frameworks.
- Involvement in enterprise-level incident response, threat hunting, and security operations.
- Potential for growth through cross-functional collaboration and mentorship of junior analysts.
- A chance to work in a technically advanced and mission-driven environment that prioritizes continuous learning and cyber readiness.
How You Will Make an Impact
- Operate enterprise-grade security services including incident response, continuous monitoring, threat hunting, and digital forensics.
- Support detection and response workflows, with a primary focus on CrowdStrike Falcon XDR and other endpoint detection tools.
- Analyze, triage, and respond to suspicious events, determine root cause, and provide actionable recommendations.
- Participate in major incident response efforts and collaborate on high-impact investigations.
- Conduct cyber threat assessments and business impact analyses to inform strategic risk mitigation.
- Mentor junior analysts in daily security operations and help improve team knowledge-sharing.
- Contribute to the development and maintenance of security controls and response procedures.
- Participate in on-call rotations (including weekends) to ensure continuous security operations.
- Engage in internal cybersecurity drills and tabletop exercises to enhance organizational readiness.
Are You a Cybersecurity Operations Rock Star?
- 2-4 years of combined IT and cybersecurity experience, ideally in enterprise environments.
- Degree in Cybersecurity, Computer Science, Information Systems, or related field, or equivalent hands-on experience.
- Proficient in tools and processes related to SIEM, EDR/XDR (especially CrowdStrike Falcon), and Email Security Gateways.
- Experience with cybersecurity frameworks such as MITRE ATT&CK, D3FEND, NIST, or Cyber Kill Chain.
- Strong analytical and investigative skills, with the ability to translate technical findings into business-impact language.
- Demonstrated experience in incident response and proactive threat detection.
- Willingness to participate in 24/7 on-call rotation.
- Excellent communication skills, particularly in written English, for documentation and reporting.
Preferred Qualifications:
- Security certifications such as CompTIA Security+, CySA+, or CEH.
- Experience with scripting in Python, PowerShell, or Bash for automation or detection rule development.
- Familiarity with developing SOAR playbooks or detection engineering.
- Additional language fluency (e.g., Turkish, Spanish, French, Lithuanian) is a plus.
- Specialized experience in Threat Hunting or Digital Forensics is highly desirable.
#Dice
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.