Enable job alerts via email!

Senior Incident Response Analyst

Centene

United States

Remote

USD 85,000 - 159,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated cybersecurity professional to enhance security measures and respond to incidents effectively. In this pivotal role, you'll leverage your expertise in cloud environments and incident management to protect a vast network. You'll work closely with various teams to ensure compliance and develop strategies to mitigate risks. This position offers a comprehensive benefits package and the opportunity to work in a flexible environment, making it an exciting chance to contribute to improving health outcomes for millions. If you're passionate about cybersecurity and ready to make a significant impact, this role is for you.

Benefits

Health insurance
401K
Stock purchase plans
Tuition reimbursement
Paid time off
Flexible work schedules

Qualifications

  • 4-6 years of experience in cybersecurity incident triage and response.
  • Bachelor's degree in a quantitative or business field required.

Responsibilities

  • Resolve security incidents and recommend enhancements.
  • Implement security measures and execute incident response plans.
  • Collaborate with teams to manage security breaches.

Skills

Cloud cybersecurity experience
AWS
Azure
Indicators of compromise (IOC)
Wiz & Wiz Defend
Endpoint protection software
Network technologies

Education

Bachelor's degree in a quantitative or business field

Tools

CrowdStrike
MS Defender

Job description

You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world. As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.

Position Purpose:

Resolves security incidents, recommending enhancements to improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team.

  • Reviews current configurations of Centene’s production information systems and networks against compliance standards.
  • Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated.
  • Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls.
  • Designs automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene’s systems has been detected.
  • Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene.
  • Notifies internal and/or external teams according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications.
  • Ties third party attack monitoring services and threat reporting services into internal CIRT (Cyber Incident Response Team) communications systems.
  • Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users.
  • Performs other duties as assigned.
  • Complies with all policies and standards.

Education/Experience:

A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 4 – 6 years of related experience.

Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.

Technical Skills:

  • 4-6 years of Cloud cybersecurity experience performing incident triage and response
  • Intermediate-to-advanced understanding of AWS and Azure environments
  • Knowledge of tools, techniques, and processes (TTP) used by threat actors
  • Knowledge of Indicators of compromise (IOC)
  • Knowledge of Wiz & Wiz Defend
  • Experience with Endpoint protection and enterprise detection & response software (such as CrowdStrike, MS Defender, etc.)
  • Knowledge of Network and infrastructure technologies including routers, switches, firewalls, etc.

Soft Skills:

  • Intermediate - Seeks to acquire knowledge in area of specialty
  • Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
  • Intermediate - Ability to work independently
  • Intermediate - Demonstrated analytical skills
  • Intermediate - Demonstrated project management skills
  • Intermediate - Demonstrates a high level of accuracy, even under pressure
  • Intermediate - Demonstrates excellent judgment and decision making skills

License/Certification:

  • SANS GIAC Security Essentials (GSEC), SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent, SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred

Pay Range: $85,300.00 - $158,100.00 per year

Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules. Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law. Total compensation may also include additional forms of incentives.

Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.

Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Senior Incident Response Analyst

Coalition Inc

Remote

USD 92,000 - 132,000

11 days ago

Senior Incident Response Analyst

Mondelēz International

Remote

USD 80,000 - 110,000

10 days ago

Incident Response Analyst - APAC (SOC)

Firewood Marketing, Inc.

Remote

USD 80,000 - 120,000

Yesterday
Be an early applicant

Senior Incident Responder

Avantor

Remote

USD 80,000 - 120,000

3 days ago
Be an early applicant

Senior Incident Response Consultant

Pondurance

Remote

USD 75,000 - 95,000

12 days ago

Cybersecurity Incident Response Analyst

Sonos Inc

Remote

USD 134,000 - 168,000

10 days ago

Cybersecurity Incident Response Analyst

Sonos

Remote

USD 134,000 - 168,000

11 days ago

Sr. Cybersecurity Incident Response Analyst (Application Analyst III) - Digital and Technology [...]

Mount Sinai Morningside

New York

Remote

USD 100,000 - 130,000

Yesterday
Be an early applicant

Sr. Cybersecurity Incident Response Analyst (Application Analyst III) - Digital and Technology [...]

Mount Sinai Health System

New York

Remote

USD 99,000 - 149,000

Yesterday
Be an early applicant