Post job

Cyber Security Engineer jobs at Leidos

- 897 jobs
  • Information Security Engineer

    Waypoint Services 4.1company rating

    Green Bay, WI jobs

    We are looking for a Security Engineer to join a growing team. You help protect cloud environments, tighten controls, and support daily security operations. The team handles core protection, detection, and response across the enterprise. The role calls for someone who can own work, guide others, stay calm under pressure, and partner with IT, app teams, and leadership to strengthen the cloud posture and reduce risk. Key Responsibilities Support daily security operations, including log review, incident response, and coordination with a vendor SOC. Lead and assist with security projects across the business, including cloud security, endpoint security, and network security efforts. Support SDWAN rollout efforts with Fortinet tools. Help mentor junior engineers and support team growth. Recommend tools and process improvements to strengthen the security posture. Required Skills 3+ years' experience with the Microsoft security stack, including Defender, Entra, and/or Sentinel. Hands-on experience with Windows 10/11 Enterprise and Intune. Understanding of conditional access and identity controls within EntraID. Experience with Fortinet technologies, including Fortigate and Fortigate SDWAN. Experience with vulnerability management tools. Ability to stay calm and effective during high pressure security events. Self-starter with strong collaboration habits. Preferred Skills Cisco Secure Workload or micro-segmentation experience, including Cisco ICE. Experience rolling out new security offerings or tools. Any Azure certifications such as AZ-900, AZ-200, or AZ-500. Exposure to OT security tooling. Team & Culture The team offers autonomy, trust, and room to grow. Engineers help shape tools, practices, and direction. The environment supports ownership and ongoing development without heavy bureaucracy. The organization follows security frameworks and guidelines with established processes, though not a rigid formal policy structure.
    $75k-102k yearly est. 5d ago
  • Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*

    Providence Health & Services 4.2company rating

    Los Angeles, CA jobs

    Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you'll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence's Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making -making you a key player in protecting millions of lives through secure healthcare technology. If you're passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below. + Washington: Seattle, Redmond, Renton, Vancouver + California: Los Angeles, Irvine + Oregon: Portland Please note the following important details regarding this position: + This is a hybrid role, involving a combination of in-office and remote work each week. + The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: + Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. + Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives + Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK + Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. + Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. + Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. + Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. + Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: + Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience + Upon Hire: CISSP, CEH, or an equivalent certification + 8 or more years of related experience + Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: + Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering + Experience in a Healthcare environment + 8 or more years of cyber threat intelligence analysis experience + Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs + Skilled in correlating intelligence from multiple sources to assess potential organizational impact + Familiarity with reverse engineering and categorizing malware + Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities + Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others + Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. + Experience working with insider threat teams a plus + Capability to develop threat profiles and integrate tactical intelligence into detection rules + Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: + California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 + Oregon: Portland Service Area: Min: $68.33, Max: $116.36 + Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 + Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities. About Providence At Providence, our strength lies in Our Promise of "Know me, care for me, ease my way." Working at our family of organizations means that regardless of your role, we'll walk alongside you in your career, supporting you so you can support others. We provide best-in-class benefits and we foster an inclusive workplace where diversity is valued, and everyone is essential, heard and respected. Together, our 120,000 caregivers (all employees) serve in over 50 hospitals, over 1,000 clinics and a full range of health and social services across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. As a comprehensive health care organization, we are serving more people, advancing best practices and continuing our more than 100-year tradition of serving the poor and vulnerable. The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Providence offers a comprehensive benefits package including a retirement 401(k) Savings Plan with employer matching, health care benefits (medical, dental, vision), life insurance, disability insurance, time off benefits (paid parental leave, vacations, holidays, health issues), voluntary benefits, well-being resources and much more. Learn more at providence.jobs/benefits. Applicants in the Unincorporated County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Unincorporated Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act." About the Team Providence Shared Services is a service line within Providence that provides a variety of functional and system support services for our family of organizations across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. We are focused on supporting our Mission by delivering a robust foundation of services and sharing of specialized expertise. Providence is proud to be an Equal Opportunity Employer. We are committed to the principle that every workforce member has the right to work in surroundings that are free from all forms of unlawful discrimination and harassment on the basis of race, color, gender, disability, veteran, military status, religion, age, creed, national origin, sexual identity or expression, sexual orientation, marital status, genetic information, or any other basis prohibited by local, state, or federal law. We believe diversity makes us stronger, so we are dedicated to shaping an inclusive workforce, learning from each other, and creating equal opportunities for advancement. Requsition ID: 401760 Company: Providence Jobs Job Category: Information Security Job Function: Information Technology Job Schedule: Full time Job Shift: Day Career Track: Business Professional Department: 4011 CYBERSECURITY Address: CA Irvine 15480 Laguna Canyon Rd Work Location: Providence System Offices Discovery Park-Irvine Workplace Type: Hybrid Pay Range: $See Job Posting - $See Job Posting The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.
    $96k-130k yearly est. Auto-Apply 16d ago
  • Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*

    Providence Health & Services 4.2company rating

    Vancouver, WA jobs

    Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you'll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence's Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making -making you a key player in protecting millions of lives through secure healthcare technology. If you're passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below. + Washington: Seattle, Redmond, Renton, Vancouver + California: Los Angeles, Irvine + Oregon: Portland Please note the following important details regarding this position: + This is a hybrid role, involving a combination of in-office and remote work each week. + The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: + Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. + Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives + Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK + Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. + Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. + Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. + Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. + Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: + Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience + Upon Hire: CISSP, CEH, or an equivalent certification + 8 or more years of related experience + Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: + Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering + Experience in a Healthcare environment + 8 or more years of cyber threat intelligence analysis experience + Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs + Skilled in correlating intelligence from multiple sources to assess potential organizational impact + Familiarity with reverse engineering and categorizing malware + Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities + Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others + Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. + Experience working with insider threat teams a plus + Capability to develop threat profiles and integrate tactical intelligence into detection rules + Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: + California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 + Oregon: Portland Service Area: Min: $68.33, Max: $116.36 + Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 + Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities. About Providence At Providence, our strength lies in Our Promise of "Know me, care for me, ease my way." Working at our family of organizations means that regardless of your role, we'll walk alongside you in your career, supporting you so you can support others. We provide best-in-class benefits and we foster an inclusive workplace where diversity is valued, and everyone is essential, heard and respected. Together, our 120,000 caregivers (all employees) serve in over 50 hospitals, over 1,000 clinics and a full range of health and social services across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. As a comprehensive health care organization, we are serving more people, advancing best practices and continuing our more than 100-year tradition of serving the poor and vulnerable. The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Providence offers a comprehensive benefits package including a retirement 401(k) Savings Plan with employer matching, health care benefits (medical, dental, vision), life insurance, disability insurance, time off benefits (paid parental leave, vacations, holidays, health issues), voluntary benefits, well-being resources and much more. Learn more at providence.jobs/benefits. Applicants in the Unincorporated County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Unincorporated Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act." About the Team Providence Shared Services is a service line within Providence that provides a variety of functional and system support services for our family of organizations across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. We are focused on supporting our Mission by delivering a robust foundation of services and sharing of specialized expertise. Providence is proud to be an Equal Opportunity Employer. We are committed to the principle that every workforce member has the right to work in surroundings that are free from all forms of unlawful discrimination and harassment on the basis of race, color, gender, disability, veteran, military status, religion, age, creed, national origin, sexual identity or expression, sexual orientation, marital status, genetic information, or any other basis prohibited by local, state, or federal law. We believe diversity makes us stronger, so we are dedicated to shaping an inclusive workforce, learning from each other, and creating equal opportunities for advancement. Requsition ID: 401760 Company: Providence Jobs Job Category: Information Security Job Function: Information Technology Job Schedule: Full time Job Shift: Day Career Track: Business Professional Department: 4011 CYBERSECURITY Address: CA Irvine 15480 Laguna Canyon Rd Work Location: Providence System Offices Discovery Park-Irvine Workplace Type: Hybrid Pay Range: $See Job Posting - $See Job Posting The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.
    $94k-127k yearly est. Auto-Apply 16d ago
  • Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*

    Providence Health & Services 4.2company rating

    Seattle, WA jobs

    Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you'll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence's Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making -making you a key player in protecting millions of lives through secure healthcare technology. If you're passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below. + Washington: Seattle, Redmond, Renton, Vancouver + California: Los Angeles, Irvine + Oregon: Portland Please note the following important details regarding this position: + This is a hybrid role, involving a combination of in-office and remote work each week. + The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: + Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. + Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives + Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK + Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. + Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. + Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. + Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. + Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: + Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience + Upon Hire: CISSP, CEH, or an equivalent certification + 8 or more years of related experience + Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: + Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering + Experience in a Healthcare environment + 8 or more years of cyber threat intelligence analysis experience + Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs + Skilled in correlating intelligence from multiple sources to assess potential organizational impact + Familiarity with reverse engineering and categorizing malware + Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities + Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others + Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. + Experience working with insider threat teams a plus + Capability to develop threat profiles and integrate tactical intelligence into detection rules + Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: + California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 + Oregon: Portland Service Area: Min: $68.33, Max: $116.36 + Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 + Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities. About Providence At Providence, our strength lies in Our Promise of "Know me, care for me, ease my way." Working at our family of organizations means that regardless of your role, we'll walk alongside you in your career, supporting you so you can support others. We provide best-in-class benefits and we foster an inclusive workplace where diversity is valued, and everyone is essential, heard and respected. Together, our 120,000 caregivers (all employees) serve in over 50 hospitals, over 1,000 clinics and a full range of health and social services across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. As a comprehensive health care organization, we are serving more people, advancing best practices and continuing our more than 100-year tradition of serving the poor and vulnerable. The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Providence offers a comprehensive benefits package including a retirement 401(k) Savings Plan with employer matching, health care benefits (medical, dental, vision), life insurance, disability insurance, time off benefits (paid parental leave, vacations, holidays, health issues), voluntary benefits, well-being resources and much more. Learn more at providence.jobs/benefits. Applicants in the Unincorporated County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Unincorporated Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act." About the Team Providence Shared Services is a service line within Providence that provides a variety of functional and system support services for our family of organizations across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. We are focused on supporting our Mission by delivering a robust foundation of services and sharing of specialized expertise. Providence is proud to be an Equal Opportunity Employer. We are committed to the principle that every workforce member has the right to work in surroundings that are free from all forms of unlawful discrimination and harassment on the basis of race, color, gender, disability, veteran, military status, religion, age, creed, national origin, sexual identity or expression, sexual orientation, marital status, genetic information, or any other basis prohibited by local, state, or federal law. We believe diversity makes us stronger, so we are dedicated to shaping an inclusive workforce, learning from each other, and creating equal opportunities for advancement. Requsition ID: 401760 Company: Providence Jobs Job Category: Information Security Job Function: Information Technology Job Schedule: Full time Job Shift: Day Career Track: Business Professional Department: 4011 CYBERSECURITY Address: CA Irvine 15480 Laguna Canyon Rd Work Location: Providence System Offices Discovery Park-Irvine Workplace Type: Hybrid Pay Range: $See Job Posting - $See Job Posting The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.
    $93k-126k yearly est. Auto-Apply 16d ago
  • Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*

    Providence Health & Services 4.2company rating

    Irvine, CA jobs

    Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you'll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence's Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making -making you a key player in protecting millions of lives through secure healthcare technology. If you're passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below. + Washington: Seattle, Redmond, Renton, Vancouver + California: Los Angeles, Irvine + Oregon: Portland Please note the following important details regarding this position: + This is a hybrid role, involving a combination of in-office and remote work each week. + The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: + Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. + Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives + Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK + Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. + Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. + Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. + Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. + Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: + Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience + Upon Hire: CISSP, CEH, or an equivalent certification + 8 or more years of related experience + Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: + Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering + Experience in a Healthcare environment + 8 or more years of cyber threat intelligence analysis experience + Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs + Skilled in correlating intelligence from multiple sources to assess potential organizational impact + Familiarity with reverse engineering and categorizing malware + Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities + Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others + Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. + Experience working with insider threat teams a plus + Capability to develop threat profiles and integrate tactical intelligence into detection rules + Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: + California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 + Oregon: Portland Service Area: Min: $68.33, Max: $116.36 + Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 + Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities. About Providence At Providence, our strength lies in Our Promise of "Know me, care for me, ease my way." Working at our family of organizations means that regardless of your role, we'll walk alongside you in your career, supporting you so you can support others. We provide best-in-class benefits and we foster an inclusive workplace where diversity is valued, and everyone is essential, heard and respected. Together, our 120,000 caregivers (all employees) serve in over 50 hospitals, over 1,000 clinics and a full range of health and social services across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. As a comprehensive health care organization, we are serving more people, advancing best practices and continuing our more than 100-year tradition of serving the poor and vulnerable. The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Providence offers a comprehensive benefits package including a retirement 401(k) Savings Plan with employer matching, health care benefits (medical, dental, vision), life insurance, disability insurance, time off benefits (paid parental leave, vacations, holidays, health issues), voluntary benefits, well-being resources and much more. Learn more at providence.jobs/benefits. Applicants in the Unincorporated County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Unincorporated Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act." About the Team Providence Shared Services is a service line within Providence that provides a variety of functional and system support services for our family of organizations across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. We are focused on supporting our Mission by delivering a robust foundation of services and sharing of specialized expertise. Providence is proud to be an Equal Opportunity Employer. We are committed to the principle that every workforce member has the right to work in surroundings that are free from all forms of unlawful discrimination and harassment on the basis of race, color, gender, disability, veteran, military status, religion, age, creed, national origin, sexual identity or expression, sexual orientation, marital status, genetic information, or any other basis prohibited by local, state, or federal law. We believe diversity makes us stronger, so we are dedicated to shaping an inclusive workforce, learning from each other, and creating equal opportunities for advancement. Requsition ID: 401760 Company: Providence Jobs Job Category: Information Security Job Function: Information Technology Job Schedule: Full time Job Shift: Day Career Track: Business Professional Department: 4011 CYBERSECURITY Address: CA Irvine 15480 Laguna Canyon Rd Work Location: Providence System Offices Discovery Park-Irvine Workplace Type: Hybrid Pay Range: $See Job Posting - $See Job Posting The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.
    $95k-129k yearly est. Auto-Apply 16d ago
  • Principal Security Engineer IS, Cyber Threat Intelligence *Hybrid*

    Providence Health & Services 4.2company rating

    Portland, OR jobs

    Providence caregivers are not simply valued - they're invaluable. Join our team at Enterprise Information Services and thrive in our culture of patient-focused, whole-person care built on understanding, commitment, and mutual respect. Your voice matters here, because we know that to inspire and retain the best people, we must empower them. Providence is looking for a seasoned Principal Security Engineer with deep expertise in Cyber Threat Intelligence. In this pivotal role, you'll be the strategic force behind identifying and neutralizing emerging threats, safeguarding critical systems, and empowering Providence's Global Security Operations Center. Your insights will directly inform risk strategies and guide executive decision-making -making you a key player in protecting millions of lives through secure healthcare technology. If you're passionate about staying ahead of adversaries and driving innovation in cybersecurity, this is your chance to lead at the highest level. Providence offers hybrid work options for candidates living within a daily commuting distance -up to 65 miles-from any of our primary office locations listed below. + Washington: Seattle, Redmond, Renton, Vancouver + California: Los Angeles, Irvine + Oregon: Portland Please note the following important details regarding this position: + This is a hybrid role, involving a combination of in-office and remote work each week. + The weekly hybrid schedule will be determined by the manager based on departmental needs. Essential Functions: + Conduct in-depth analysis and research on cyber threats, including identifying threat actors, their motivations, tactics, techniques, and procedures (TTPs), and providing insights on their potential impact on the organization. + Prepare and deliver well researched, impactful analytic findings that combine self-driven research and findings from team threat hunting efforts to convey cyber threat risk and impact, tailored appropriately to technical and non-technical stakeholders, including executives + Serve as a mentor to teammates for leveraging advanced analytic toolsets such as Structured Analytic Techniques + Ability to classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as MITRE ATT&CK + Maintain strong breadth and depth of knowledge about the healthcare industry threat landscape, including threat actors, malware, hacking techniques, emerging threats, and trends that may impact the organization + Collaborate with internal teams to provide timely and actionable intelligence, aligned with operational needs, that support CTI, CIRT, Attack Surface Management, and other cybersecurity initiatives + Develop and maintain threat profiles with tactical intelligence to enhance detection engineering and threat hunting operations. + Perform root cause analysis and provide recommendations for proactive measures to help prevent cyber intrusions. + Continuously update and refine existing threat intelligence processes and methodologies to ensure the organization remains at the forefront of cyber defense. + Stay informed about the latest trends, tools, and techniques in the field of threat intelligence and incorporate best practices into daily operations. + Monitor and assess emerging technologies, such as AI and machine learning capabilities to augment and enhance threat detection, triage, and analysis. Required Qualifications: + Bachelor's Degree in Computer Engineering, Computer Science, Mathematics, Engineering -OR- a combination of equivalent education / experience + Upon Hire: CISSP, CEH, or an equivalent certification + 8 or more years of related experience + Experience designing security controls and countermeasures for operating systems, databases, applications, Web services, user devices, and wireless networks. Preferred Qualifications: + Master's Degree in Computer Engineering, Computer Science, Mathematics, Engineering + Experience in a Healthcare environment + 8 or more years of cyber threat intelligence analysis experience + Experience conducting in-depth analysis and research on cyber threats, including identifying threat actors' motivations, intent, and TTPs + Skilled in correlating intelligence from multiple sources to assess potential organizational impact + Familiarity with reverse engineering and categorizing malware + Strong knowledge of healthcare cybersecurity risks, including ransomware, phishing, and supply chain vulnerabilities + Demonstrated experience applying frameworks such as MITRE ATT&CK, Cyber Kill Chain, Diamond Model of Intrusion Analysis, others + Experience working cross-functionally with CIRT/IR teams, vulnerability management, and SOC operations teams. + Experience working with insider threat teams a plus + Capability to develop threat profiles and integrate tactical intelligence into detection rules + Ability to influence risk-based decision-making with clear, concise reporting Salary Range by Location: + California: Los Angeles and Irvine: Min: $71.23, Max: $121.29 + Oregon: Portland Service Area: Min: $68.33, Max: $116.36 + Washington: Seattle, Renton, Redmond: Min: $71.23, Max: $121.29 + Washington: Vancouver: Min: $68.33, Max: $116.36 Why Join Providence? Our best-in-class benefits are uniquely designed to support you and your family in staying well, growing professionally, and achieving financial security. We take care of you, so you can focus on delivering our Mission of caring for everyone, especially the most vulnerable in our communities. About Providence At Providence, our strength lies in Our Promise of "Know me, care for me, ease my way." Working at our family of organizations means that regardless of your role, we'll walk alongside you in your career, supporting you so you can support others. We provide best-in-class benefits and we foster an inclusive workplace where diversity is valued, and everyone is essential, heard and respected. Together, our 120,000 caregivers (all employees) serve in over 50 hospitals, over 1,000 clinics and a full range of health and social services across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. As a comprehensive health care organization, we are serving more people, advancing best practices and continuing our more than 100-year tradition of serving the poor and vulnerable. The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities. Providence offers a comprehensive benefits package including a retirement 401(k) Savings Plan with employer matching, health care benefits (medical, dental, vision), life insurance, disability insurance, time off benefits (paid parental leave, vacations, holidays, health issues), voluntary benefits, well-being resources and much more. Learn more at providence.jobs/benefits. Applicants in the Unincorporated County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the Unincorporated Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act." About the Team Providence Shared Services is a service line within Providence that provides a variety of functional and system support services for our family of organizations across Alaska, California, Montana, New Mexico, Oregon, Texas and Washington. We are focused on supporting our Mission by delivering a robust foundation of services and sharing of specialized expertise. Providence is proud to be an Equal Opportunity Employer. We are committed to the principle that every workforce member has the right to work in surroundings that are free from all forms of unlawful discrimination and harassment on the basis of race, color, gender, disability, veteran, military status, religion, age, creed, national origin, sexual identity or expression, sexual orientation, marital status, genetic information, or any other basis prohibited by local, state, or federal law. We believe diversity makes us stronger, so we are dedicated to shaping an inclusive workforce, learning from each other, and creating equal opportunities for advancement. Requsition ID: 401760 Company: Providence Jobs Job Category: Information Security Job Function: Information Technology Job Schedule: Full time Job Shift: Day Career Track: Business Professional Department: 4011 CYBERSECURITY Address: CA Irvine 15480 Laguna Canyon Rd Work Location: Providence System Offices Discovery Park-Irvine Workplace Type: Hybrid Pay Range: $See Job Posting - $See Job Posting The amounts listed are the base pay range; additional compensation may be available for this role, such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.
    $95k-128k yearly est. Auto-Apply 16d ago
  • Senior Cyber Security Engineer - Network Security

    Sanford Health 4.2company rating

    Remote

    Sanford Health is one of the largest and fastest-growing not-for-profit health systems in the United States. We're proud to offer many development and advancement opportunities to our nearly 50,000 members of the Sanford Family who are dedicated to the work of health and healing across our broad footprint. Work Shift: Scheduled Weekly Hours: 40Salary Range: $40.00 - $66.00Pay starts at $40 and increases according to years of applicable experience. Union Position: No Department Details ***Working remotely is an option if you currently live in SD, ND, MN, IA, NE or WI. Required Skills and Qualifications: Strong communication skills to explain complex concepts to various stakeholders Excellent documentation skills for development of diagram, requirements, process mapping and overall design solutions Strong team player with curious and flexible nature. Strong understanding of network protocols (TCP/IP, OSI model) and network security concepts Expertise in network switch, routing, and security technologies (firewalls, VPNs, IDS/IPS, etc.) Experience with security frameworks and standards (NIST, CIS, ISO 27001) Proficiency in scripting languages (Python, Perl, PowerShell) Strong problem-solving and analytical skills Excellent communication and interpersonal skills Summary Responsible for the technical and operational delivery of enterprise cybersecurity solutions. Focuses on the development and implementation of processes and tools for identifying, evaluating, implementing, troubleshooting, and maintaining technical security controls for the organization. These controls are designed to prevent, detect, and contain security threats; enabling Sanford to be productive while maintaining a secure environment that optimizes Sanford's return on investment. Job Description Lead the building, configuring, and maintaining of cybersecurity systems to ensure our operational environments stay compliant and secure. Implements security controls using industry best practices across numerous technologies including, but not limited to SIEM, email filtering, web and content filtering, firewall, IPS/IDS systems, identity and access management, SSO/MFA, vulnerability management, and data protection. Skillfully maintains the existing security systems, including implementing new features, performing upgrades, and managing technical configurations/policies across a variety of business-critical systems. Proficiently monitors and responds to security system health alerts. Respond to day-to-day operational work such as managing security tools while simultaneously multitasking with strategic project initiatives. Provide security consulting services to other Sanford health groups. Provide assistance to a 24x7 team of dedicated security engineers focused on maintaining operational stability while reducing risk. Build and maintain key vendor and supplier relationships. Lead strategic project initiatives ensuring the processes and procedures are well defined and documented. Recognize both internal and external threats and understand/communicate risks to Sanford Assets. Make strategic recommendations to enhance and improve overall security posture. Advise on methods to increase efficiency of current toolsets (such as script automation or process improvement recommendations). Mentor others within the team as well as receive instruction and guidance from others within the team. Write documentation that can be used by all team members and other employees. Identify gaps in established/documented process and update as needed. Works under limited guidance due to previous experience/breadth of knowledge of processes and organizational knowledge. Acts independently to determine methods and procedures on new assignments. Regularly presented with new assignments and projects that require the application of independent judgement/interpretation of policies/practices. Checks own work and the work of other team members. Qualifications Bachelor's degree in cyber security or an information technology related field. Minimum of 4 years experience working in Cyber Security field. Security Certifications (CISSP, CISA, CISM, Security+, CEH, etc.) are highly desired Sanford is an EEO/AA Employer M/F/Disability/Vet. If you are an individual with a disability and would like to request an accommodation for help with your online application, please call ************** or send an email to ************************.
    $40-66 hourly Auto-Apply 25d ago
  • Cyber Security Analyst

    Hello Heart 3.9company rating

    Menlo Park, CA jobs

    Hello Heart is on a mission to change the way people care for their hearts. The company provides the first app and connected heart monitor to help people track and manage their heart health. With Hello Heart, users take steps to control their risk of heart attacks and stroke - the leading cause of death in the United States. Peer-reviewed studies have shown that high-risk users of Hello Heart have seen meaningful drops in blood pressure, cholesterol and even weight. Recognized as the digital leader in preventive heart health, Hello Heart is trusted by more than 130 leading Fortune 500 and government employers, national health plans, and labor organizations. Founded in 2013, Hello Heart has raised more than $138 million from top venture firms and is a best-in-class solution on the American Heart Association's Innovators' Network and CVS Health Point Solutions Management platform. Visit ****************** for more information. About the Role We are seeking a Cyber Security Analyst to strengthen our security operations and compliance posture. Reporting into our Information Security Officer, you will play a key role in protecting sensitive data, ensuring regulatory compliance, and supporting the secure adoption of new technologies such as AI. You will work cross-functionally with IT, Engineering, Compliance, and HR to build and maintain secure, resilient processes across the organization. Responsibilities Support secure access lifecycle processes, including provisioning, deprovisioning, role-based access, and MFA/SSO management Conduct periodic access reviews and ensure identity data quality Perform vulnerability scans across systems and applications, track remediation progress, and partner with teams to prioritize risk-based fixes Assist with security assessments of cloud systems and applications, aligning with HIPAA, HITECH, NIST, and HITRUST frameworks Support internal and external audit preparation and execution Enforce encryption, access controls, and data loss prevention strategies for sensitive data Conduct third-party vendor risk assessments and oversee remediation efforts Support secure adoption of AI tools by monitoring for risks such as data leakage and prompt injection, establishing governance guardrails, and delivering awareness training Participate in endpoint security monitoring, disaster recovery exercises, tabletop simulations, and awareness training initiatives Contribute to ongoing security operations, risk management efforts, and special security projects Qualifications 3+ years of experience in IAM, IAM operations, or security analyst roles (healthcare technology or other regulated environments preferred) Hands-on experience with identity platforms such as Okta, Azure AD, or Google IdP, plus SCIM, SAML/OIDC/OAuth, directory services, group policy, and conditional access Experience with vulnerability management platforms (Tenable, Qualys, Rapid7, AWS Inspect, Kandji) and patch orchestration workflows Working knowledge of HIPAA, HITECH, NIST CSF/800-66, and CIS Controls (familiarity with HITRUST CSF is a plus) Knowledge of cloud security basics (AWS, Azure, GCP), least-privilege IAM, and networking fundamentals (TCP/IP, DNS, HTTP, VPN, segmentation) Familiarity with endpoint security solutions (CrowdStrike Falcon, Cynet, SentinelOne) and DLP tools Familiarity with GenAI, keeping up to date with innovative security programs and artificial intelligence systems Proactive communication and documentation skills, with the ability to collaborate across technical and non-technical teams globally The US base salary range for this full-time position is $130,000.00 to $145,000.00. Salary ranges are determined by role and level. Compensation is determined by additional factors, including job-related skills, experience, and relevant education or training. Please note that the compensation details listed in US role postings reflect the salary only, and do not include equity or benefits. #LI-DNP Hello Heart has a positive, diverse, and supportive culture - we look for people who are collaborative, creative, and courageous. Oh, and if you want to see some recent evidence of the fun things we do at Hello Heart, check out our Instagram page.
    $130k-145k yearly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    GE Healthcare 4.8company rating

    Waukesha, WI jobs

    The Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters. **Job Description** **Responsibilities** + Drive tailored SDL practice into specific engineering- + Engage in application, platform and domain-specific threat modeling and attack surfaceanalysis/reduction + Work closely with cross-functional teams in requirements gathering and security-focused software design + Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). + Develop and design innovative cyber security solutions for unique and complex technologies. + Work in partnership with government agencies, leading industry experts, and academia. + Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. + Assess and investigate specific threats to an information system in terms of severity and impact. + Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. + Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. + Interacting with global teams to promote consistency and maximize synergies across common software platforms + Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. + Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. + Support process improvements which guide development, sustaining & support activities + Drive world-class quality in the development and support of products + Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques + Understand performance parameters and assess application performance + Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness **Required Qualifications** + Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience + Certification in Privacy, Security & Regulatory domain or related certification + Experience in object-oriented design methodology and various programming languages such as C/C++ Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... + Experience in working with Windows API and application programming. + Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. + Good skills in knowing how to debug software issues. + Experience with multicore and multi-threaded software design and computing environment. **Desired Characteristics** Technical Expertise: + Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. + Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. + Hands-on experience working with Windows and Linux based systems. + Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). + Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. + Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. + Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. + Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. + Strong problem-solving abilities and capable of articulating specific technical topics or assignments. + Expert in breaking down problems and estimate time for development tasks. + Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. + Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. + Good understanding of workflow in the healthcare industry. + Demonstrated experience with development of medical device software + Ultrasound SW development experience + Knowledge of ultrasound or demonstrated experience with development of medical device software **Other** + Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin + Self-starter, energizing, results oriented and able to multi-task; tenacious and organize + Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates + Ability to influence and build consensus with other scrum teams and leadership + Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities + Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. **Additional Information** GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer (****************************************************************************************** . Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. **Relocation Assistance Provided:** No
    $85k-109k yearly est. 3d ago
  • Cyber Security Engineer

    GE Healthcare 4.8company rating

    Waukesha, WI jobs

    SummaryThe Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters.Job DescriptionResponsibilities Drive tailored SDL practice into specific engineering- Engage in application, platform and domain-specific threat modeling and attack surface analysis/reduction Work closely with cross-functional teams in requirements gathering and security-focused software design Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). Develop and design innovative cyber security solutions for unique and complex technologies. Work in partnership with government agencies, leading industry experts, and academia. Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. Assess and investigate specific threats to an information system in terms of severity and impact. Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. Interacting with global teams to promote consistency and maximize synergies across common software platforms Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. Support process improvements which guide development, sustaining & support activities Drive world-class quality in the development and support of products Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques Understand performance parameters and assess application performance Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness Required Qualifications Bachelor's Degree in Computer Science or “STEM” Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience Certification in Privacy, Security & Regulatory domain or related certification Experience in object-oriented design methodology and various programming languages such as C/C++ Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... Experience in working with Windows API and application programming. Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. Good skills in knowing how to debug software issues. Experience with multicore and multi-threaded software design and computing environment. Desired Characteristics Technical Expertise: Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. Hands-on experience working with Windows and Linux based systems. Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. Strong problem-solving abilities and capable of articulating specific technical topics or assignments. Expert in breaking down problems and estimate time for development tasks. Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. Good understanding of workflow in the healthcare industry. Demonstrated experience with development of medical device software Ultrasound SW development experience Knowledge of ultrasound or demonstrated experience with development of medical device software Other Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin Self-starter, energizing, results oriented and able to multi-task; tenacious and organize Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates Ability to influence and build consensus with other scrum teams and leadership Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. Additional Information GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. Relocation Assistance Provided: No
    $85k-109k yearly est. Auto-Apply 2d ago
  • Cyber Security Analyst - Information Security (Identity and Access Management)

    Northwell Health 4.5company rating

    Melville, NY jobs

    **Req Number** 155883 + Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards. + Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets. + Create and maintain detailed IAM system and workflow documentation based on business and technical requirements. + Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services. + Develop, execute, and document test cases to validate IAM workflow enhancements and system changes. + Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories. + Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives. + Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents. + Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations. + Participate in on-call rotation as needed to support critical IAM functions and operational continuity. Highly Preferred Skills: + 2-5 years of experience as an IAM Analyst, Business Analyst, or similar technical/functional role. + Strong business analysis skills, including requirements gathering, process mapping, and workflow design. + Experience writing and executing test cases, test scripts, and test plans. + Familiarity with IAM systems and concepts such as identity lifecycle management, authentication, authorization, roles, and entitlements. + Experience with IAM tools (e.g., Okta, SailPoint, Azure AD/Entra ID, Duo) is preferred but not required. + Working knowledge of SQL, Power BI, or other reporting tools is a plus. + Strong documentation skills using MS Word, Excel, Visio, or similar tools. + Excellent verbal and written communication skills; able to translate between business and technical language. + Detail-oriented, analytical thinker, and effective problem solver. + Willingness to participate in testing activities and occasional on-call or after-hours support if needed. Job Description Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur. Job Responsibility Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions. Job Qualification Bachelor's degree in Computer Science, Cyber Security or related field, required. Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required. 2-4 years of related experience, required. *Additional Salary Detail The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity). The salary range for this position is $79,880-$136,340/year It is Northwell Health's policy to provide equal employment opportunity and treat all applicants and employees equally regardless of their age, race, creed/religion, color, national origin, immigration status or citizenship status, sexual orientation, military or veteran status, sex/gender, gender identity, gender expression, disability, pregnancy, genetic information or genetic predisposition or carrier status, marital or familial status, partnership status, victim of domestic violence, sexual or other reproductive health decisions, or other characteristics protected by applicable law.
    $79.9k-136.3k yearly 4d ago
  • Cyber Security Engineer

    Global Medical Response 4.6company rating

    Denver, CO jobs

    Cybersecurity Endpoint Engineer Remote (Preferred: Denver, CO Area) $129000K-$132000K Range Why Choose GMR? Global Medical Response (GMR) and its family of solutions are dedicated to delivering compassionate, quality medical care, primarily in the areas of emergency and patient relocation services. Here you'll embark in meaningful work that will make an impact on you and the customers we service. View our employee's stories on how we provide care to the world at ************************* JOB SUMMARY The Cybersecurity Endpoint Engineer plays a critical role in developing and managing GMR's Endpoint Protection Program, ensuring endpoints are protected against evolving threats through technical implementation and continuous improvement of endpoint tooling, system hardening, and data loss prevention (DLP) capabilities. This individual will serve as a hands-on engineer responsible for administering endpoint protection, and leading endpoint and server hardening efforts aligned with NIST 800-53 and 800-171 controls. The position reports to the Manager of Architecture & Engineering and collaborates closely with the SOC, Compliance, Infrastructure, and Desktop Support teams. ESSENTIAL FUNCTIONS/DUTIES * Administer and optimize endpoint protection using CrowdStrike Falcon across enterprise workstations and servers. * Support Microsoft Defender for Endpoint and related Microsoft security tools. * Build and manage the Endpoint Protection Program, including policies, governance, enforcement, and reporting. * Lead the development and maintenance of secure system and server baselines, aligned with CIS Benchmarks and NIST standards (800-53, 800-171). * Develop and enforce endpoint-based DLP controls, including USB restrictions and sensitive file transfer monitoring, leveraging CrowdStrike and Microsoft tooling. * Collaborate with the SOC to ensure efficient incident response workflows related to endpoint alerts and containment. * Partner with infrastructure and desktop teams to integrate endpoint security tooling and hardening into image builds, deployment, and patching. * Maintain documentation for configurations, baselines, standard operating procedures (SOPs), and endpoint protection policies. * Contribute to audit readiness, cyber maturity assessments, and risk register items tied to endpoint controls. * Develop and track KPIs and metrics related to endpoint coverage, compliance, and DLP activity. * Stay current with emerging threats, vulnerabilities, and technologies to continuously improve endpoint defenses. QUALIFICATIONS Education/Licensing/Certification * Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent experience. * Preferred certifications: CrowdStrike CCFA/CCSA, Microsoft SC-200, Security+, GSEC, or CISSP. Experience * 3-5 years of experience in a cybersecurity, endpoint, or systems security engineering role. * Direct experience administering and managing CrowdStrike Falcon in an enterprise environment. * Experience with Microsoft Defender for Endpoint and Microsoft Security Center platforms. * Strong background in implementing system and server hardening based on NIST and CIS standards. * Experience tuning and managing DLP policies at the endpoint level. * Familiarity with compliance frameworks such as NIST 800-53, NIST 800-171, HIPAA, or PCI DSS. Preferred Background * Applicants with prior military service - especially those with cybersecurity or IT backgrounds - are encouraged to apply and bring mission-driven focus to our team. * Experience supporting healthcare, emergency services, or other regulated environments is a plus. Knowledge and Skills * Advanced endpoint protection experience such as Cybereason, CrowdStrike or other similar products. * Requires excellent analytical ability, consultative skills, strong judgment and the ability to work effectively in a cross-functional, multi-disciplinary, team environment. * Ability to adjust to changing priorities while multitasking effectively. * An analytical demeanor and the ability to effectively communicate with individuals across all levels of the organization. * Requires strong verbal and written communication skills to effectively communicate across various levels with the ability to influence others is critical to success. * Proven ability to understand and develop expertise on new technologies quickly. * Must be well organized with excellent follow up skills to meet deadlines, coordinates work of others while fostering team work and cooperation; handling multiple concurrent tasks. * Understanding of security controls in Cloud and Onprem environment. * A proven leadership abilities to interface across the organization with other teams, such as Engineering and Security, Application Teams, Internal Audit, etc. * Proficient in endpoint security controls, telemetry, and threat detection. * Working knowledge of secure configuration management and endpoint hardening frameworks. * Strong cross-functional communication skills; able to work across IT, compliance, and security teams. * Excellent technical documentation and procedural writing skills. * Ability to manage multiple priorities and respond quickly in dynamic environments. * Working knowledge of compliance frameworks and security management standards (e.g., NIST 800-53, NIST CSF, ISO 27002, COBIT, PCI DSS, HIPAA) To learn more about GMR and how our values are at the core of our services and vital to how we approach care, visit ****************************** EEO Statement Global Medical Response and its family of companies are an Equal Opportunity Employer, which includes supporting veterans and providing reasonable accommodations for individuals with a disability. * Salary Range $128,000-$132,000 Range * Check out our careers site Benefits | GMR Careers to learn more about our comprehensive benefit options, which include medical, vision, dental, 401k, disability, FSA, HSA, EAP, vacation and paid time off. * The application window for this position is anticipated to close on 1.10.2025 R0048992
    $128k-132k yearly Auto-Apply 4d ago
  • Cyber Security Analyst - Information Security (Identity and Access Management)

    Northwell Health 4.5company rating

    Melville, NY jobs

    Document and analyze Identity and Access Management (IAM) processes, procedures, and controls to ensure accuracy, consistency, and alignment with organizational standards. Troubleshoot and resolve identity-related issues identified through reports, alerts, or incident tickets. Create and maintain detailed IAM system and workflow documentation based on business and technical requirements. Collaborate with business stakeholders and IT leadership to design, develop, and enhance IAM operational workflows using existing technologies and services. Develop, execute, and document test cases to validate IAM workflow enhancements and system changes. Build and maintain business-facing reports and dashboards using Power BI, SQL queries, and LDAP queries across targeted identity repositories. Communicate effectively with team members, cross-functional partners, and business units to ensure consistent understanding of IAM processes and initiatives. Support the governance, maintenance, and execution of IAM operational workflows, including responding to and resolving team service requests and incidents. Conduct data analysis to identify, investigate, and remediate user data inconsistencies, anomalies, and policy deviations. Participate in on-call rotation as needed to support critical IAM functions and operational continuity. Highly Preferred Skills: 2-5 years of experience as an IAM Analyst, Business Analyst, or similar technical/functional role. Strong business analysis skills, including requirements gathering, process mapping, and workflow design. Experience writing and executing test cases, test scripts, and test plans. Familiarity with IAM systems and concepts such as identity lifecycle management, authentication, authorization, roles, and entitlements. Experience with IAM tools (e.g., Okta, SailPoint, Azure AD/Entra ID, Duo) is preferred but not required. Working knowledge of SQL, Power BI, or other reporting tools is a plus. Strong documentation skills using MS Word, Excel, Visio, or similar tools. Excellent verbal and written communication skills; able to translate between business and technical language. Detail-oriented, analytical thinker, and effective problem solver. Willingness to participate in testing activities and occasional on-call or after-hours support if needed. Job Description Protects the organization's digital assets from unauthorized access. This includes securing both online and on-premise infrastructures, responding to alerts, mitigating risks before breaches occur and guiding the efforts to contain, triage and recover from cyber incidents when they occur. Job Responsibility Works on moderately complex assignments to protect computer systems, networks, and data from loss and potential service interruptions due to cyber incidents. Analyzes and documents security risks, breaches, and incidents using independent judgment within defined procedures to determine appropriate actions and approaches. Analyzes, reports, and responds to detected cyber incidents. Uses cybersecurity tools to proactively search for and identify threats to systems and networks. Installs and operates security software and measures to protect systems and information infrastructure. Collaborates with the security team and peers to perform tests and find network weaknesses which could lead to a cyber security incident. Makes decisions based on precedent, previous experience and professional guidelines. Researches and recommends cyber security enhancements and tools. Works with management to develop and enhance cyber security best practices. Researches and keeps current on the latest cyber security intelligence technologies, trends, and standards. Trains junior level staff on network and cyber security technologies and procedures. Performs related duties as required. All responsibilities noted here are considered essential functions of the job under the Americans with Disabilities Act. Duties not mentioned here, but considered related are not essential functions. Job Qualification Bachelor's degree in Computer Science, Cyber Security or related field, required. Certifications including but not limited to Security+, CISSP, CISM, CEH, ISSAP, ISSEP, or GSEC, required. 2-4 years of related experience, required. *Additional Salary Detail The salary range and/or hourly rate listed is a good faith determination of potential base compensation that may be offered to a successful applicant for this position at the time of this job advertisement and may be modified in the future.When determining a team member's base salary and/or rate, several factors may be considered as applicable (e.g., location, specialty, service line, years of relevant experience, education, credentials, negotiated contracts, budget and internal equity).
    $90k-131k yearly est. Auto-Apply 4d ago
  • Senior Security Engineer

    Headspace 4.7company rating

    New York, NY jobs

    About the Senior Security Engineer at Headspace: At Headspace, we're pushing boundaries with cutting-edge innovations and a relentless focus on security posture and purpose-driven impact. As a Senior Security Engineer, you will be at the forefront of automating response playbooks, seamlessly integrating our security tooling, and crafting innovative detection strategies. Join us in transforming the way we approach cloud solutions while advancing your career in a dynamic and meaningful environment where your expertise truly makes a difference. You will support our efforts to bring innovative features to life, leverage cutting-edge technologies, and ensure our platform's security for over 65 million users. A big goal needs talented leadership, so come join us and give your career a sense of purpose! Location: We are currently hiring this role in San Francisco (hybrid), Los Angeles (remote), New York City (remote) and Seattle (remote). Candidates must permanently reside in the US full-time and be based in these cities. For candidates with a primary residence in the greater SF and LA areas, this role will follow our hybrid model. You'll work 3 days per week from our office, allowing for impactful in-office collaboration and connection, while enjoying the flexibility of remote work for the rest of the week. Your recruiter will share more details about our hybrid model. What you will do: Implement, manage, and maintain critical security tools and infrastructure. Lead and respond to security incidents. Design and implement automated security investigation, response, and operational workflows. Integrate diverse security platforms such as SIEM, SOAR, EDR for a unified defense. Conduct proactive threat modeling to identify risks in systems and processes. Develop and maintain advanced threat detection rules and analytics. Collaborate with partner teams to embed security best practices. Research emerging cybersecurity threats, vulnerabilities, and innovative defense strategies. Analyze security data to identify trends, measure control effectiveness, and provide reports. Participate in security incident response and post-incident reviews Contribute to the development of detection strategies and automation playbooks What you will bring: 5+ years of relevant work experience. Bachelor's Degree in Computer Science or Engineering or equivalent. Experience in developing and tuning threat detection rules and signatures. Understanding of incident response procedures and forensic techniques. Proficiency in a scripting language for automation. Strong understanding of threat modeling. Knowledge of networking, operating systems internals, and cloud (AWS, Azure, GCP) security. Excellent analytical, problem-solving, and verbal and written communication skills. Experience maintaining procedure documentation for internal and external stakeholders. Preferred Skills: Experience in healthcare Pay & Benefits: The anticipated new hire base salary range for this full-time position is $122,400-$195,500 + equity + benefits. Our salary ranges are based on the job, level, and location, and reflect the lowest to highest geographic markets where we are hiring for this role within the United States. Within this range, individual compensation is determined by a candidate's location as well as a range of factors including but not limited to: unique relevant experience, job-related skills, and education or training. Your recruiter will provide more details on the specific salary range for your location during the hiring process. At Headspace, base salary is but one component of our Total Rewards package. We're proud of our robust package inclusive of: base salary, stock awards, comprehensive healthcare coverage, monthly wellness stipend, retirement savings match, lifetime Headspace membership, generous parental leave, and more. Additional details about our Total Rewards package will be provided during the recruitment process. About Headspace Headspace exists to provide every person access to lifelong mental health support. We combine evidence-based content, clinical care, and innovative technology to help millions of members around the world get support that's effective, personalized, and truly accessible whenever and wherever they need it. At Headspace, our values aren't just what we believe, they're how we work, grow, and make an impact together. We live them daily: Make the Mission Matter, Iterate to Great, Own the Outcome, and Connect with Courage. These values shape our decisions, guide our collaborations, and define our culture. They're our shared commitment to building a more connected, human-centered team-one that's redefining how mental health care supports people today and for generations to come. Why You'll Love Working Here: A mission that matters-with impact you can see and feel A culture that's collaborative, inclusive, and grounded in our values The chance to shape what mental health care looks like next Competitive pay and benefits that support your whole self How we feel about Diversity, Equity, Inclusion and Belonging: Headspace is committed to bringing together humans from different backgrounds and perspectives, providing employees with a safe and welcoming work environment free of discrimination and harassment. We strive to create a diverse & inclusive environment where everyone can thrive, feel a sense of belonging, and do impactful work together. As an equal opportunity employer, we prohibit any unlawful discrimination against a job applicant on the basis of their race, color, religion, gender, gender identity, gender expression, sexual orientation, national origin, family or parental status, disability*, age, veteran status, or any other status protected by the laws or regulations in the locations where we operate. We respect the laws enforced by the EEOC and are dedicated to going above and beyond in fostering diversity across our workplace. *Applicants with disabilities may be entitled to reasonable accommodation under the terms of the Americans with Disabilities Act and certain state or local laws. A reasonable accommodation is a change in the way things are normally done which will ensure an equal employment opportunity without imposing undue hardship on Headspace. Please inform our Talent team by filling out this form if you need any assistance completing any forms or to otherwise participate in the application or interview process. Headspace participates in the E-Verify Program . Privacy Statement All member records are protected according to our . Further, while employees of Headspace (formerly Ginger) cannot access Headspace products/services, they will be offered benefits according to the company's benefit plan. To ensure we are adhering to best practice and ethical guidelines in the field of mental health, we take care to avoid dual relationships. A dual relationship occurs when a mental health care provider has a second, significantly different relationship with their client in addition to the traditional client-therapist relationship-including, for example, a managerial relationship. As such, Headspace requests that individuals who have received coaching or clinical services at Headspace wait until their care with Headspace is complete before applying for a position. If someone with a Headspace account is hired for a position, please note their account will be deactivated and they will not be able to use Headspace services for the duration of their employment. Further, if Headspace cannot find a role that fails to resolve an ethical issue associated with a dual relationship, Headspace may need to take steps to ensure ethical obligations are being adhered to, including a delayed start date or a potential leave of absence. Such steps would be taken to protect both the former member, as well as any relevant individuals from their care team, from impairment, risk of exploitation, or harm. For how how we will use the personal information you provide as part of the application process, please see: ******************************************
    $122.4k-195.5k yearly Auto-Apply 60d+ ago
  • Cyber Security Engineer

    GE Healthcare Technologies Inc. 4.2company rating

    Waukesha, WI jobs

    The Cyber Security Engineer will be a Security Evangelist helping engineers in secure implementation of technology stack in a enterprise/cloud environment. GE HealthCare is a global leader in medical technology and digital solutions, dedicated to improving lives in the moments that matter. We innovate to transform healthcare delivery and empower clinicians worldwide. Join us to turn ideas into world-changing realities in an inclusive environment where every voice matters. Job Description Responsibilities * Drive tailored SDL practice into specific engineering- * Engage in application, platform and domain-specific threat modeling and attack surface analysis/reduction * Work closely with cross-functional teams in requirements gathering and security-focused software design * Discover and mitigate vulnerabilities in sensitive Critical Infrastructure/ Key Resource Domains (CI/KR). * Develop and design innovative cyber security solutions for unique and complex technologies. * Work in partnership with government agencies, leading industry experts, and academia. * Leverage traditional and non-traditional research methodologies to advance GE's overall Cybersecurity practice. * Assess and investigate specific threats to an information system in terms of severity and impact. * Create detailed reports on vulnerabilities, bugs, and design flaws found in industrial information systems. * Create IPS/IDS rules or other mitigations to protect vulnerable systems. Plan and implement applicable risk mitigating security solutions. * Interacting with global teams to promote consistency and maximize synergies across common software platforms * Able to join the team and gain mastery of the Ultrasound domain and contribute towards the development Software Infrastructure. * Leveraging technical and clinical depth to work on business initiatives aimed at innovation and quality excellence. * Support process improvements which guide development, sustaining & support activities * Drive world-class quality in the development and support of products * Apply principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation Practices, refactoring and Testing Techniques * Understand performance parameters and assess application performance * Proactively share information across the team, to the right audience with the appropriate level of detail and timeliness Required Qualifications * Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) with minimum 3 years of experience * Certification in Privacy, Security & Regulatory domain or related certification * Experience in object-oriented design methodology and various programming languages such as C/C++ * Working knowledge in configuration management tools such as Perforce, GIT, ClearCase, etc... * Experience in working with Windows API and application programming. * Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain -preferable Ultrasound. * Good skills in knowing how to debug software issues. * Experience with multicore and multi-threaded software design and computing environment. Desired Characteristics Technical Expertise: * Familiarity with identifying, analyzing, and ethically exploiting the various classes of vulnerabilities that affect executable code. * Strong knowledge of TCP/IP networking. Ability to use Wireshark to capture and analyze network traffic. * Hands-on experience working with Windows and Linux based systems. * Programming skills in one or more languages (we develop using Python, C, C++, CUDA, Java and others). * Ability to understand machine language, operating systems, common APIs, libraries, and runtime environments and how they interact with hardware, firmware, and binary code. * Familiar with digital electronics and microcontrollers. Exposure to SCADA/DCS systems or industrial technologies. * Knowledge of application risk identification and evaluation techniques, and knowledge of Cyber Security and related engineering functions. * Business Acumen: Able to translate vulnerability information into business risks relevant to our customers. * Strong problem-solving abilities and capable of articulating specific technical topics or assignments. * Expert in breaking down problems and estimate time for development tasks. * Strong desire to experiment, use new tools and techniques. Can be a creative problem solver. * Experience in software platform, advanced applications, user-interface design and/or systems engineering especially in the healthcare domain. * Good understanding of workflow in the healthcare industry. * Demonstrated experience with development of medical device software * Ultrasound SW development experience * Knowledge of ultrasound or demonstrated experience with development of medical device software Other * Must be willing to work onsite at least 3 days a week in Wauwatosa/Waukesha, Wisconsin * Self-starter, energizing, results oriented and able to multi-task; tenacious and organize * Ability to foresee obstacles, identify workarounds, leverage resources, rally teammates * Ability to influence and build consensus with other scrum teams and leadership * Demonstrates adaptability and openness to change, effectively navigating ambiguity and responding to evolving information, circumstances, and priorities * Exhibits clear and strategic thinking, translating complex strategies into actionable steps. Makes timely, informed decisions and communicates priorities with clarity and precision We will not sponsor individuals for employment visas, now or in the future, for this job opening. Additional Information GE HealthCare offers a great work environment, professional development, challenging careers, and competitive compensation. GE HealthCare is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. GE HealthCare will only employ those who are legally authorized to work in the United States for this opening. Any offer of employment is conditioned upon the successful completion of a drug screen (as applicable). While GE HealthCare does not currently require U.S. employees to be vaccinated against COVID-19, some GE HealthCare customers have vaccination mandates that may apply to certain GE HealthCare employees. Relocation Assistance Provided: No
    $87k-111k yearly est. 3d ago
  • Cyber Security Engineer

    Practice Xpert Inc. 3.7company rating

    Lansing, MI jobs

    Skills Required: SIEM - IBM QRadar Vulnerability Management - Qualys Scanning Asset Management Remedy Networking Cisco Firewalls - Checkpoint Load Balancer F5 Experience Required: 5+ years with a SIEM (QRadar included) Installation and configuration of QRadar SIEM Vulnerability Assessments PCI Compliance & Scanning Network engineering Network/Security Design & Documentation Experience Preferred: Ability and experience to train other staff in the QRadar SIEM Education Required: Security Training Additional Information Thanks & Regards Aravind ************
    $77k-106k yearly est. 3h ago
  • Cyber Security Analyst (Medical Device Security)

    Scottish Rite for Children 4.2company rating

    Dallas, TX jobs

    Our patients are our number one priority! We're committed to giving children back their childhood! Job Posting Title: Cyber Security Analyst (Medical Device Security) Additional Posting Details: Monday - Friday Day Shift -Hybrid schedule Job Description: Posting Summary Seeking a Cyber Security Analyst with a focus on Medical Device Security. This role will serve as the primary liaison between IT, Biomedical Services, Departmental Leadership, and Asset Owners to ensure the cybersecurity of all medical devices. The analyst will coordinate and execute cybersecurity tasks, support compliance initiatives, and manage lifecycle activities for medical devices. The position requires strong cross-departmental communication, project coordination skills, and a solid understanding of both IT/cybersecurity best practices and clinical workflows. Focus Area: Medical Device Security Each Cyber Security Analyst is assigned a specific focus area representing their primary domain of expertise and responsibility within the cybersecurity team. For this position, the focus area is Medical Device Security. The analyst will concentrate on safeguarding the hospital's medical device ecosystem, coordinating cybersecurity tasks, compliance, and lifecycle management for all medical equipment, and serving as the primary liaison between IT, Biomedical Services, and clinical departments. Position Summary Reviewing inventory of medical devices and identifying cybersecurity risks such as missing patches, outdated software, or configuration weaknesses. Addressing identified risks directly or through vendor/department coordination, ensuring follow-up and risk resolution. Defining and communicating technical requirements for device configuration, VLANs, authentication, and encryption to vendors and departments. Supporting policy and configuration compliance initiatives by aligning device configurations with internal technical control standards. Periodically updating control standards to ensure configurations remain current. Collaborating with GRC and security teams on logging, auditing, access control, risk assessments, and compliance automation. Periodically reviewing medical device inventory to ensure lifecycle management (rounding, end-of-life tracking, replacement planning). Coordinating and delivering cybersecurity awareness and training for medical device stakeholders. Maintaining and reconciling the medical device asset inventory. General Cybersecurity Analyst Responsibilities Monitoring & Incident Response: Monitor security alerts, investigate potential threats, and respond to security incidents in collaboration with the SOC and IT operations teams. Threat Detection & Vulnerability Management: Conduct regular vulnerability scans, risk assessments, and penetration tests. Analyze results and prioritize remediation efforts. Security Event Analysis: Collect, analyze, and correlate logs from various systems and devices (SIEM tools) to detect anomalous or malicious activity. Policy & Compliance Support: Assist in developing, maintaining, and enforcing information security policies, procedures, and standards. Support internal and external audits. Access Management: Support identity and access management (IAM) functions, including privileged access reviews and role-based access control enforcement. Network & Endpoint Protection: Collaborate with infrastructure teams to maintain secure configurations, firewall rules, and endpoint protection policies. Incident Documentation & Reporting: Document incidents, root cause analyses, and remediation outcomes. Prepare periodic reports for leadership and compliance. Security Awareness & Training: Support organization-wide security awareness initiatives and assist with phishing simulations or targeted education campaigns. Continuous Improvement: Stay informed about emerging cybersecurity threats, technologies, and regulatory requirements. Recommend improvements to enhance organizational resilience. Qualifications Bachelor's degree in Cybersecurity/Information Security, Biomedical Engineering (with a focus on Cybersecurity or IT), Computer Science, or related field (or equivalent experience). 5+ years of cybersecurity experience, medical device experience, IT systems experience in healthcare or regulated environments (or equivalent experience). Familiarity with medical device security, FDA cybersecurity guidance, HIPAA, and NIST 800-53/800-171 frameworks. Hands-on experience medical devices and IT systems. Preferred: Certifications such as Security+, CySA+, or CISSP. Periodically reviewing medical device inventory to ensure lifecycle management (rounding, en-of-life tracking, replacement planning) Coordinating and delivering cybersecurity awareness and training for medical device stakeholders. Maintaining and reconciling the medical device asset inventory. General Cybersecurity Analyst Responsibilities Monitoring & Incident Response: Monitor security alerts, investigate potential threats, and respond to security incidents in collaboration with the SOC and IT operations teams. Threat Detection & Vulnerability Management: Conduct regular vulnerability scans, risk assessments, and penetration tests. Analyze results and prioritize remediation efforts. Security Event Analysis: Collect, analyze, and correlate logs from various systems and devices (SIEM tools) to detect anomalous or malicious activity. Policy & Compliance Support: Assist in developing, maintaining, and enforcing information security policies, procedures, and standards. Support internal and external audits. Access Management: Support identity and access management (IAM) functions, including privileged access reviews and role-based access control enforcement. Network & Endpoint Protection: Collaborate with infrastructure teams to maintain secure configurations, firewall rules, and endpoint protection policies. Incident Documentation & Reporting: Document incidents, root cause analyses, and remediation outcomes. Prepare periodic reports for leadership and compliance. Security Awareness & Training: Support organization-wide security awareness initiatives and assist with phishing simulations or targeted education campaigns. Continuous Improvement: Stay informed about emerging cybersecurity threats, technologies, and regulatory requirements. Recommend improvements to enhance organizational resilience. Qualifications Bachelor's degree in Cybersecurity/Information Security, Biomedical Engineering (with a focus on Cybersecurity or IT), Computer Science, or related field (or equivalent experience). 5+ years of cybersecurity experience, medical device experience, IT systems experience in healthcare or regulated environments (or equivalent experience). Familiarity with medical device security, FDA cybersecurity guidance, HIPAA, and NIST 800-53/800-171 frameworks. Hands-on experience medical devices and IT systems. Preferred: Certifications such as Security+, CySA+, or CISSP.
    $68k-93k yearly est. Auto-Apply 3d ago
  • Cyber Threat Analyst

    Maximus, Inc. 4.3company rating

    Arlington, VA jobs

    Description & Requirements Maximus is looking for a Cyber Threat Analyst who can provide technical and analytical insights into information related to cyber incidents, vulnerabilities, and threat actor activity. They will also support daily operations management, communication with partners, and other administrative or program management duties as needed. This is an onsite position in Arlington, VA; candidates must be located in the National Capital Region and willing/able to work in-person up to several times per week. Essential Duties and Responsibilities: * Perform complex risk analyses and risk assessment. * Establish and satisfy Information Assurance (IA) and security requirements based upon the analysis of user, policy, regulatory, and resource demands. * Support customers in the development and implementation of doctrine and policies. * Advise information system owners on client/project security policies and requirements for systems. * Keep abreast of emerging security technologies and make appropriate recommendations regarding the enhancement of the security posture of systems and their implementation. Job-Specific Essential Duties and Responsibilities: * Assess threat and vulnerability information shared by partners for potential impact to federal agency systems and critical infrastructure * Determine validity and impact of threat information, provide analysis, and collaborate to determine necessary partner notifications and potential product development * Coordinate with internal and external stakeholders to facilitate timely and informed cyber incident response activities * Monitor inboxes and other real-time communication channels for partner communications, respond to cyber partner inquiries, coordinate cybersecurity products (alerts, advisories, etc.) among targeted partners for technical before public distribution * Apply knowledge of evolving cyber threat landscape, emerging threats, and geopolitical events and trends to enhance the organization's operational mission Job-Specific Minimum Requirements: * 5+ years of related professional experience * U.S. Citizenship required (required by federal government for position) * Active Top Secret/SCI security clearance required Preferred Skills and Qualifications: * Bachelor's degree in a relevant field * Industry standard certifications are a plus (CompTIA Sec+, CEH, etc.). * Cyber operations, analysis, and/or incident management response experience Successful candidates will have: * Excellent communications skills, both written and verbal, and ability to brief senior-level clients on operational activity * Experience supporting a federal government client, with preference for DHS or other national security agencies * Ability to apply knowledge of cybersecurity concepts, policies, and procedures in a high-paced operational environment * Customer service orientation with strong leadership, interpersonal, organizational, problem-solving, and strategic thinking skills * Ability to work well with other client and contractor team members in a hybrid environment * Proficiency with open-source and commercial threat intelligence tools * Prior experience supporting a federal government client, preferably in the national security field #clearance #techjobs #VeteransPage Minimum Requirements * Please refer to the additional information section of the job requisition for this opening to determine clearance eligibility required. * Bachelor's Degree in related field. * 5-7 years of relevant professional experience required. * Equivalent combination of education and experience considered in lieu of degree. EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality and quantity of work, required travel (if any), external market and internal value analysis including seniority and merit systems, as well as internal pay alignment. Annual salary is just one component of Maximus's total compensation package. Other rewards may include short- and long-term incentives as well as program-specific awards. Additionally, Maximus provides a variety of benefits to employees, including health insurance coverage, life and disability insurance, a retirement savings plan, paid holidays and paid time off. Compensation ranges may differ based on contract value but will be commensurate with job duties and relevant work experience. An applicant's salary history will not be used in determining compensation. Maximus will comply with regulatory minimum wage rates and exempt salary thresholds in all instances. Accommodations Maximus provides reasonable accommodations to individuals requiring assistance during any phase of the employment process due to a disability, medical condition, or physical or mental impairment. If you require assistance at any stage of the employment process-including accessing job postings, completing assessments, or participating in interviews,-please contact People Operations at **************************.
    $73k-100k yearly est. Easy Apply 18d ago
  • Senior Information Security Engineer

    Whoop 4.0company rating

    Boston, MA jobs

    At WHOOP, we're on a mission to unlock human performance. WHOOP empowers members to perform at a higher level through a deeper understanding of their bodies and daily lives. WHOOP is seeking a Senior Information Security Engineer to serve as a technical leader in our Security team reporting to our Information Security Manager. In this role, you will drive the deployment and continuous enhancement of controls that protect millions of users' biometric and health data, build scalable defenses across our infrastructure and applications, and lead incident response efforts with visibility across the business. This is an opportunity to have direct impact at scale, working alongside engineers, product teams, and executives to drive forward-looking security strategies. RESPONSIBILITIES: Implement and enhance security controls by leading the deployment, integration, and tuning of solutions such as CNAPP, SIEM, CASB, EDR, DLP, and MDM to maximize effectiveness. Support security design decisions by providing subject matter expertise on cloud and SaaS security best practices while influencing architecture led by the Security Architect role. Lead incident response and investigations by guiding containment, remediation, root cause analysis, and post-incident improvements. Strengthen application security by overseeing secure development practices and managing SAST, SCA, and DAST tooling. Advance identity and access management by supporting IAM policy enforcement, SSO, MFA, SCIM, RBAC, and user lifecycle governance. Secure AI systems and integrations by assessing and protecting embedded APIs and organizational AI tool usage to ensure resilience, privacy, and compliance. Collaborate cross-functionally by working with Engineering, IT, and GRC teams to embed security into systems and workflows. Mentor and influence by providing technical guidance, reviewing work, and promoting security-first thinking across the organization. Stay ahead of threats and regulations by tracking emerging risks, technologies, and compliance requirements to inform forward-looking strategies. Participate in and help improve the on-call rotation by providing guidance, escalation support, and driving improvements in response processes. QUALIFICATIONS: Bachelor's degree in Computer Science, Information Security, or a related technical field and/or advanced certifications (CISSP, CISM, AWS Security Specialty, SANS, etc.). 8+ years of hands-on experience in Information Security, IT Security, or a related role, including at least 2 years in a senior or lead capacity. Proven track record implementing and managing advanced security technologies (e.g., CASB, CNAPP, CSPM, SIEM, SOAR, DLP, SWG). Experience securing AI/ML systems or APIs, including governance of third-party AI integrations and organizational use of AI tools. Strong understanding of modern cloud security architecture (AWS, Azure, GCP) and experience performing threat modeling and risk assessments on cloud-based systems. Hands-on experience with application security tooling (SAST, SCA, DAST) and embedding secure development practices. Demonstrated leadership in security incident response, investigations, and root cause analysis. Effective communicator with the ability to influence stakeholders and explain security concepts to technical and non-technical audiences. Strong project management skills and the ability to drive initiatives to completion in a fast-paced environment. Experience mentoring engineers and setting operational standards. Familiarity with compliance and risk frameworks relevant to health and AI (SOC 2, ISO 27001, PCI, GDPR, FTC guidance, HIPAA-adjacent state laws) is a plus. Interested in the role, but don't meet every qualification? We encourage you to still apply! At WHOOP, we believe there is much more to a candidate than what is written on paper, and we value character as much as experience. As we continue to build a diverse and inclusive environment, we encourage anyone who is interested in this role to apply. WHOOP is an Equal Opportunity Employer and participates in E-verify to determine employment eligibility. It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. The WHOOP compensation philosophy is designed to attract, motivate, and retain exceptional talent by offering competitive base salaries, meaningful equity, and consistent pay practices that reflect our mission and core values. At WHOOP, we view total compensation as the combination of base salary, equity, and benefits, with equity serving as a key differentiator that aligns our employees with the long-term success of the company and allows every member of our corporate team to own part of WHOOP and share in the company's long-term growth and success. The U.S. base salary range for this full-time position is $150,000 - $190,000. Salary ranges are determined by role, level, and location. Within each range, individual pay is based on factors such as job-related skills, experience, performance, and relevant education or training. In addition to the base salary, the successful candidate will also receive benefits and a generous equity package. These ranges may be modified in the future to reflect evolving market conditions and organizational needs. While most offers will typically fall toward the starting point of the range, total compensation will depend on the candidate's specific qualifications, expertise, and alignment with the role's requirements. Learn more about WHOOP.
    $150k-190k yearly Auto-Apply 60d+ ago
  • Information Security Associate or Specialist

    DHD Consulting 4.3company rating

    Alpharetta, GA jobs

    The use of IT (Information Technology) infrastructure in the company is vital for daily operation. The IS (Information Security) Specialist should Provide secure Information Technology infrastructure service to the company as well as companywide employees and staff. Role Description. Define and implement Macro (Servers, Groups and Shared resource) and Micro (Personal and Single) IT infrastructure. Analyze, Plan, Design, Develop and Implement IT Infrastructure and IT Security solutions to support company IT requirements. Analyze and prevent any Information risk ensuring the companys information integrity. Define, maintain and monitor the execution of IS and IT policies. Execute and monitor company IT/IS Compliance. Essential Duties and Responsibilities -Monitoring and maintaining computer systems and networks -Responding in a timely manner to service issues and requests -Providing technical support across the company -Support equipment repair and replacement service -Testing Benchmarking new technology -Maintain and execute IT Training program for new employs -Monitor IT/IS Infrastructure (including servers and network devices) to ensure data integrity -Reporting of daily system issues. -Analyze and propose system improvements. -Documentation related to IT/IS policies, issues, and procedures. -Participation and active analyst, designer, and developer in IT projects. -Monitoring of IT/IS infrastructure-related expenses. -Other duties as assigned. Requirements Qualifications: Listed below are the minimum and/or desired qualifications of the position including education, work experience, and knowledge & skills that are required to perform satisfactorily in the position: Education and Work Experience: -Vocational or undergraduate degree in information systems and computer science or related field. -One (1) to three (3) years of information systems, computer science and/or IT-related experience. Knowledge and Skills: -PC and Server management -IT Hardware and Software installation -Initiative skills -Problem-solving skills -Understanding of IT infrastructure and application architectures -Great Social and Communication Skills -Great Oral and Written Communication Skills -System process analysis and design capabilities/experience -Server Operating systems (Windows Server, Linux, HP-UX, Unix, Sun Solaris) -Antivirus, NAC, DLP, MDM and other IS Solutions -IS Related definition and policies (ex. ISO 27001) -Networking (Cisco/HP) and network devices (Routers and Switch) -VPN -TCP/IP, UDP, Network standards -LDAP, Active Directory and Exchange -Access Control -Security Cameras -Firewall, Web Filter and other network security appliance solutions -Database systems (SQL Server/MySQL/Oracle) and programming skill (is a plus) -MS Office skills (especially Excel skills) Physical Demands: -Position requires sitting at a desk working on a computer for at least 2/3 of time. -Position requires regular and reliable attendance. -Position requires local travel up to 10% of the time.
    $76k-109k yearly est. 60d+ ago

Learn more about Leidos jobs

View all jobs