USRC's greatest strength in being a leader in the dialysis industry is our ability to recognize and celebrate the differences in our diverse workforce. We strongly believe in recruiting top talent and creating a diverse and inclusive work climate and culture at all levels of our organization.
SUMMARY
As a member of the Information Security team, the Cybersecurity Analyst is responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks. The cybersecurity analyst will be involved in supporting efforts to automate, integrate, and aggregate the data and systems needed to optimize and accelerate analysis.
Essential Duties and Responsibilities include the following. Other duties and tasks may be assigned.
Researches emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them
Provides incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies
Conducts network monitoring and intrusion detection analysis using various computer network defense (CND) tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security system (HBSS), etc.
Reviews alerts and data from sensors and documents formal, technical incident reports
Tests new computers, software, switch hardware and routers before implementation to ensure security
Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
Deploys cloud-centric detection to detect threats related to cloud environments and services used by the organization
Correlates activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity
Reviews alerts and data from sensors, and documents formal, technical incident reports
Works with threat intelligence and/or threat-hunting teams
Researches emerging threats and vulnerabilities to aid in the identification of incidents