Mid-level security analyst- Hybrid

  • Dallas, TX
  • Posted 60+ days ago | Updated 8 hours ago

Overview

On Site
Hybrid
Contract - W2

Skills

Security Operations
Partnership
Penetration Testing
Risk Assessment
Auditing
Threat Analysis
Cyber Security
Operating Systems
Research
Digital Forensics
Security Awareness
Training
Security Architecture
Technology Assessment
Collaboration
Network
Data Security
Quality Management
Business Continuity Planning
Reporting
Leadership
Static Timing Analysis
Licensing
Computer Science
SANS
CISSP
CISA
Information Security Governance
Regulatory Compliance
Information Technology
Business Analysis
Presentations
Information Security
Risk Management
Intrusion Prevention
IPS
Firewall
Endpoint Protection
Data Loss Prevention
DLP
Encryption
SEIM
Virtualization
SIEM
Forensics
Malware Analysis
Incident Management
Network Protocols
TCP
UDP
Dragon NaturallySpeaking
DNS
FTP
SMTP
DHCP
HIPAA
HITECH
Microsoft Windows
Management
Health Care
Communication
HIS

Job Details

Essential Job Functions and Responsibilities:

Security Operations:
Design and administer SIEM rules and Endpoint Detection and Response (EDR) behaviors to support 24/7 security operations in partnership with our Managed Security Team.
Monitor and create SIEM alerts based on cybersecurity incidents and threat intelligence analysis, translating them into actionable defensive measures.
Actively participate in incident response and forensic activities, deploying EDR controls as needed.
Perform penetration testing and install security measures to protect systems and information infrastructure, including firewalls and data encryption programs

Risk Management and Compliance:
Perform risk assessments on new technologies, upgrades, and infrastructure changes; provide design recommendations to ensure secure implementation.
Conduct regular internal and external audits of STA systems and processes, including managing contracted vendor audits.
Ensure compliance with relevant laws and regulations (e.g., HIPAA, GDPR).
Coordinate with external auditors and facilitate compliance audits, incorporating results into integrated risk management solutions.

Policy Development and Enforcement:
Develop, review, and maintain information security policies, standards, and guidelines.
Enforce adherence to security policies across the organization.
Provide insight and guidance to colleagues on prevention measures and serve as a subject matter expert for security-related questions.

Threat Analysis and Intelligence:
Analyze cybersecurity incidents detected from various platforms and operating systems to resolve issues and improve incident handling procedures.
Maintain a strong understanding of multiple technology platforms, threat vectors, and threat actors to track cyber campaigns using internal and external data.
Conduct research on the latest methods, tools, and trends in digital forensics analysis.

Security Awareness and Training:
Lead and present new and existing information security awareness programs to all STA staff through comprehensive security training.
Develop role-specific security training modules and implement phishing simulations to gauge staff awareness.

Security Architecture and Technology Evaluation:
Collaborate with IT team to design and implement secure network and system architectures.
Assess new security technologies and tools for potential adoption.
Work closely with other teams to understand the flow of sensitive data between systems and applications.

Incident Response Planning:
Develop and maintain detailed incident response plans.
Conduct regular tabletop exercises to test the effectiveness of incident response procedures.

Data Protection:
Implement Data Loss Prevention (DLP) strategies to protect sensitive information.
Ensure proper encryption methods are used for data at rest and in transit.

Third-Party Risk Management:
Evaluate the security posture of third-party vendors and partners.
Negotiate security requirements in vendor contracts.

Partner with the Director of Information Technology and the Director of Quality Systems and Risk to develop and maintain an IT business continuity plan.
Administer test exercises for IT business continuity.

Reporting and Metrics:
Generate reports on key security metrics for leadership.
Communicate identified risks and recommendations to stakeholders.
Performs other duties as assigned.

Compliance:
OSHA CATEGORY DEFINITION: Category 3 - The incumbent in this position has no potential for occupational exposure.
The incumbent will have access to confidential material and is required to use discretion with this information and comply with STA Confidentiality policy.

Education, Experience, and Licensing Requirements:
High School Diploma (Required)
Bachelor s Degree - Information Security, Computer Science, or related field (Preferred)
Certifications (SANS or other applicable industry or systems certification. (Example CISSP or CISA))
5+ years of Information Security, Governance, Risk and Compliance, Information Technology, or Business Analysis.
5+ years of experience developing, communicating and presenting Information Security and Risk Management concepts to varying audiences.
5+ years of experience with technologies such as Intrusion Prevention Systems (IPS), firewalls, endpoint protection, web/email filtering, Data Loss Prevention (DLP), digital rights management, encryption, Security Event and Incident Management (SEIM), and virtualization platforms.

Qualifications and Skills:
Experience with virmalware protection solutions.
Subject matter expert in SIEM, forensics, malware analysis, and incident handling
Understanding network protocols (TCP, UDP, DNS, FTP, SMTP, DHCP, etc.)
Familiarity with industry regulations (e.g., HIPPA, HITECH, etc.)
Microsoft Windows troubleshooting skills
Direct experience in a healthcare setting is strongly preferred.
Excellent communication skills required. Must have the ability to communicate effectively with all levels of personnel and to represent the organization publicly.
Ability to work both independently and as part of a team required.
Ability to cope with high levels of stress and able to handle a heavy workload.
Ability to travel in light and commercial aircraft or drive his/her personal auto in order to meet all job duties and responsibilities.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.