What are the responsibilities and job description for the Security Analyst II position at Touchette Regional Hospital?
Job Summary :
Monitors the health of Touchette Regional Hospital and SIHF Healthcare’s security threat posture and cybersecurity & network infrastructure.
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats.
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare’s governance models and compliance codes and standards.
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Functions and Duties :
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems.
Analyze threat intelligence to anticipate and mitigate potential risks.
Conduct root cause analysis of security incidents and recommend corrective actions.
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts.
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation.
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical.
Documents systems with vulnerability’s that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder’s and the IS Security Officer.
Develops the skills necessary to manage network security solutions.
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats.
Develops an understanding of the organization’s current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes.
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible.
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures.
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting.
Executes risk management initiatives to assess risk and gather information / data for defining / updating policy / standards.
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates / reports to the IS Security Officer on a regular basis.
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls.
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools.
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships.
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures.
Executes projects and programs for the Network and Security team as required.
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required.
Will be required to provide on-call support in rotating intervals and emergency support as needed.
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes.
Ability to participate in on-call rotation.
Provides second-level technical support to users concerning network & security system operations.
Performs all other duties as assigned.
Minimum Qualifications :
Bachelor’s degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
5-6 years of experience in information security, cybersecurity, or a related IT role.
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional – Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED).
In addition to the above qualifications, the successful candidate will demonstrate :
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies.
Enthusiasm
Teamworking skills
Attention to detail
Physical Demands :
Must be able to sit and / or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and / or move up to 50 pounds; 100 pounds with assistance.
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Security Analyst II?
Sign up to receive alerts about other jobs on the Security Analyst II career path by checking the boxes next to the positions that interest you.