Core Responsibilities:
- Monitoring and Detection: Actively monitor network traffic, system logs, and security alerts for suspicious activity and potential security breaches.
- Incident Response: Investigate security incidents, analyze their root cause, and take appropriate actions to contain and remediate the situation.
- Vulnerability Management: Identify and assess vulnerabilities in systems and networks, and work with other teams to implement fixes and mitigations.
- Security Policy and Compliance: Develop, implement, and enforce security policies and procedures to ensure compliance with industry standards and regulations.
- Risk Assessment: Conduct regular risk assessments to identify potential threats and vulnerabilities and develop strategies to mitigate them.
- Security Awareness Training: Educate employees about security best practices and promote a security-conscious culture within the organization.
- Security Tools and Technologies: Utilize and maintain security tools such as firewalls, intrusion detection systems, antivirus software, and encryption technologies.
- Threat Intelligence: Stay up-to-date on the latest cyber threats and attack techniques, and share this knowledge with the team.
- Collaboration: Work closely with other IT teams, business units, and management to ensure a coordinated approach to information security.
- IT initiatives: Support other IT initiatives
Key Skills and Qualifications:
- Technical Skills: Strong understanding of networking concepts, operating systems, security technologies, and incident response procedures.
- Analytical Skills: Ability to analyze security events, identify patterns, and determine the root cause of incidents.
- Problem-Solving Skills: Ability to develop and implement effective solutions to security problems.
- Communication Skills: Ability to effectively communicate security risks and recommendations to both technical and non-technical audiences.
- Organizational Skills: Ability to manage multiple tasks, prioritize effectively, and meet deadlines.
- English as a second language requirement (B1 and above)
Education and Certifications:
A bachelor's degree in computer science, information security, or a related field is often required, along with relevant certifications such as Security+, CISSP, or CISM.
Are you this person?
Are you a highly talented, collaborative, intelligent, compassionate, committed, well-traveled, self-driven individual with leadership qualities, a passion for working in health care, a calling to help make lives better and driven by numbers?
Tipo de puesto: Tiempo completo