What are the responsibilities and job description for the Data Scientist Med Device Cyber position at ITmPowered, LLC?
Data Scientist - Big Data - Cyber - ITmPowered Consulting
The Sr. Data Scientist - Big Data - Cyber will apply Data Science to solve enterprise Medical Device Cybersecurity, Network security, Attacks & Events. Leverage big data in support of an enterprise scale Medical Device Cybersecurity program spanning Risk Management, Cyber Digital Transformation, Threat Management, Network Security, End Point Security, IT Controls, Security Operations and Identity and Data Management. Will have direct impact providing strategic insight into Medical Device cybersecurity protection and improving networking security.
How you'll make an impact :
- Analyze large amounts of data and develop statistical models to find patterns and solve problems that will help drive strategic business decisions.
- Analyze data from numerous sources (Splunk, Qualis, CMDB / Asset Inventory, CyberArk, Armis, ForeScout, Automated Patch Management systems, Threat and Vulnerability, Network Traffic, Governance and Standards data, Risk Assessment data, Security baselines, etc.)
- Gather requirements for data, models, reports, and visualizations, and present solutions for stakeholders using : R, Tableau, SQL, Jupyter, Periscope, D3, ggplot, etc.
- Look at cybersecurity and machine learning opportunities identifying opportunities and goals (detect threats, predict attacks, prediction, prevention, detection, response, monitoring)
- Design and implementation of machine learning solutions using regression, model, clustering (KNN, K-means, Bayesian, Mean-shift), statistical profiling, inference, classification, and predictive analysis.
- Leverage AI and Machine Learning in both supervised (classification, regression) and unsupervised scenarios (clustering, association, dimension reduction).
- Looking at data across Network Security, network traffic analysis, Network security scanning (Wired, Wireless, cloud), Endpoint (anti-malware), Application Security (micro firewalls, WAF, Data firewalls), User Behavior Analytics, Device behavior analytics, access management. Security of data in transit, at rest, historically.
- Network Protection, Network Traffic Analytics, IP Traffic, Ports, intrusion detection. Identify different classes of network attacks - scanning and spoofing. Network anomaly detection, Encrypted traffic classification, Clustering for forensic analysis. Medical Device endpoint protection
Qualifications for success :
Preferred Expertise
LOGISTICS :