Vacancy caducado!
Resp & Qualifications
PRINCIPAL ACCOUNTABILITIES:Under the supervision of the Manager, Cyber Operations, the incumbent’s accountabilities include, but are not limited to the following:- Perform security event monitoring and triage using relevant security technologies such as security information and event management (SIEM) and security orchestration and automated response (SOAR), in a SOC/CIRT environment
- Perform in-depth analysis on security events, intrusion detection, malware analysis, threat hunting and all phases of security investigations and incident response using a wide range of security platforms and utilizing industry best practice processes
- Support and deploy systems, information security applications and hardware, and infrastructure components to protect the security of CareFirst information.
- Provide appropriate training to other security specialists and external customers on developed standards, procedures and guidelines.
- Implement necessary enhancements/updates/upgrades to existing security products.
- Assist in the configuration and installation of security products. Where possible, suggesting and implementing possibilities to automate manual operational activities.
- Represent Information Security in disaster recovery procedures and exercises.
- Test and report on new technologies and reporting security concerns through the creation of security vulnerability assessments.
- Serve as senior technical information security coordinator/project lead and as a contributor to cross functional teams for deployment and support of security specific infrastructure to provide information security to the enterprise.
- Provide support and guidance to a team of technically diverse personnel of junior level security specialists
- Design and implement security solutions to monitor the efficiency and effectiveness of security operations, controls and infrastructure
- Performing security governance through the design and implementation of security policies, procedures, guidelines and standards to maintain the confidentiality, integrity and availability of information systems and data.