People who do great work deserve great support. That's why we care about building a culture of flexibility, learning, and belonging. Our goal is to help you be the best 'you' that you can be, both inside and outside of work. That isn't just good for you - it's good for the people you love, too. Your best work starts here. We're excited about where it may take you!
Job Summary
The Fortified Threat Defense Center provides 24x7x365 managed security services for healthcare customers. Members of the Threat Defense team are responsible for monitoring and alerting on key security technologies within each customer environment, identifying security events, performing analysis, creating new and fine-tuning existing detection rules, and integrating with client’s incident response activities. In this role, the Senior Threat Defense Analyst will monitor, detect, analyze, and report on security alerts discovered within Fortified Health Security’s customer infrastructures. They will monitor various security technologies within these environments and report all investigated and validated findings to the proper customer in accordance with the approved communication plan.
Essential Job Functions
The following duties are normal for this position. The omission of specific statements of duties does not exclude them from being expected of this position if the work is similar, related, or a logical assignment for this position. Other duties may be required.
- Partner with clients on service delivery execution of all LOBs including but not limited to:
- Managed SIEM, Phishing, EDR, IoMT, & DLP
- Create, maintain, and mature Standard Operating Procedures (SOPs) and training documentation.
- Mentor, coach, and audit the activities of level I and II analysts.
- Perform advanced incident investigation.
- Ability to take lead on incident research when appropriate.
- Present alerts, metrics, and remediation tasks to customers via approved communication plans.
- Work with team members and manager to continually improve security services.
- Proactively and iteratively search through logs to detect advanced threats that are unknown to the current security solutions.
- Exercise multi-tasking skills by managing events in multiple systems, applications, and other priorities.
- Respond to incidents and client requests in a timely and professional manner.
- Generate end-of-shift reports for documentation and knowledge transfer to subsequent analysts on duty.
- Remain up to date on latest security threats and events.
- Create advanced rules based on latest security threats and events.
- Act as the SME for all technology used in service delivery.
- Improve skillset through training & certification acquisition.
- All other duties and responsibilities as assigned.
Knowledge & Skills
Education & Experience
- 4+ years’ hands-on experience with security tools such as scanners, monitoring and detection, malware protection, security analysis tools and compliance tools (both network and host-based solutions).
- 4+ years' technical experience in the security aspects of multiple computer platforms, operating systems, products, network protocols and system architecture or equivalent training and knowledge through education.
- Significant experience managing cases with enterprise SIEM and EDR systems.
- 4+ years of direct InfoSec experience and/or a bachelor’s degree in CS / MIS preferred.
Special Skills & Knowledge
- Intermediate understanding of the following subject matters/skills:
- Incident Response, Team building, Motivating, Arbitration & Consensus, Compliance Frameworks (NIST, HIPAA, HITRUST, PCI)
- Proficient understanding of the following subject matters/skills:
- Incident response, relationship management, technical presentation, detection & suppression rule management, scripting (Python, Bash, PowerShell), attack frameworks, documentation, written and verbal communication, security platform health management, security platform log analysis, Linux OS & events, Windows OS & events, & healthcare operational knowledge
- Common detection tools & attack techniques in the following areas:
- Endpoint security
- User security
- Network security
- Cloud security
- Data security
- Proficient understanding of network security concepts and defense in depth.
- Proficient understanding of security incident and event management (SIEM), log analysis, network traffic analysis, malware investigation/remediation, SIEM correlation logic and alert generation.
- Advanced understanding of the following subject matters/skills:
- Attack frameworks, written and verbal communication, security platform health management, security platform log analysis, healthcare operational knowledge, endpoint security knowledge, user security knowledge, network security knowledge, cloud security knowledge, data security knowledge, advanced documentation
- Demonstrated ability to analyze, triage and remediate security incidents.
- Advanced knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.).
- Advanced understanding of OSI model, network protocols and information security concepts.
Licenses, Certifications, etc.
- Security Certifications such as SANS, ISC2, GIAC or Cisco are a PLUS.
- Security Certifications such as CompTIA Security +, SANS, ISC2, GIAC or Cisco are a PLUS.
Working Conditions & Travel Requirements
- Hybrid Position. Needed in our Brentwood, TN office up to 3 days a week.
#J-18808-Ljbffr