USRC's greatest strength in being a leader in the dialysis industry is our ability to recognize and celebrate the differences in our diverse workforce. We strongly believe in recruiting top talent and creating a diverse and inclusive work climate and culture at all levels of our organization.
SUMMARY
As a member of the Information Security team, the Cybersecurity Analyst is responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks. The cybersecurity analyst will be involved in supporting efforts to automate, integrate, and aggregate the data and systems needed to optimize and accelerate analysis.
Essential Duties and Responsibilities include the following. Other duties and tasks may be assigned.
- Researches emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them
- Provides incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
- Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies
- Conducts network monitoring and intrusion detection analysis using various computer network defense (CND) tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security system (HBSS), etc.
- Reviews alerts and data from sensors and documents formal, technical incident reports
- Tests new computers, software, switch hardware and routers before implementation to ensure security
- Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
- Deploys cloud-centric detection to detect threats related to cloud environments and services used by the organization
- Correlates activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity
- Reviews alerts and data from sensors, and documents formal, technical incident reports
- Works with threat intelligence and/or threat-hunting teams
- Researches emerging threats and vulnerabilities to aid in the identification of incidents