Mission Diversity Inspiration Growth
OUR MISSION
At U.S. Renal Care, we're changing the lives of everyone living with kidney disease.
OUR DIVERSITY IS OUR STRENGTH
At USRC, we are building a culture of diversity and inclusion where each employee has a voice, and every team member is valued for their individual talents. Our common purpose is the pursuit of excellence for our patients and our shared values lived out through compassion for one another.
A PATH FOR SUCCESS
When you join U.S. Renal Care, your journey begins with training programs to set each new employee on a course for success. Ongoing development ensures every team member remains fully supported and empowered to chart their career path towards growth and opportunity.
INSPIRATION and GROWTH
USRC is also dedicated to open communication that fosters dialogue and understanding of our vision and goals. We recognize and reward innovation to inspire one another as we endeavor to lead our industry in the highest quality of care for our patients.
Job Description
USRC's greatest strength in being a leader in the dialysis industry is our ability to recognize and celebrate the differences in our diverse workforce. We strongly believe in recruiting top talent and creating a diverse and inclusive work climate and culture at all levels of our organization.
SUMMARY
As a member of the Information Security team, the
Cybersecurity Analyst is responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks. The cybersecurity analyst will be involved in supporting efforts to automate, integrate, and aggregate the data and systems needed to optimize and accelerate analysis.
Essential Duties and Responsibilities include the following. Other duties and tasks may be assigned.
- Researches emerging threats and vulnerabilities to aid in the identification of network incidents, and supports the creation of new architecture, policies, standards, and guidance to address them
- Provides incident response support, including mitigating actions to contain activity and facilitating forensics analysis when necessary
- Supports the creation of business continuity/disaster recovery plans, to include conducting disaster recovery tests, publishing test results, and making changes necessary to address deficiencies
- Conducts network monitoring and intrusion detection analysis using various computer network defense (CND) tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, host-based security system (HBSS), etc.
- Reviews alerts and data from sensors and documents formal, technical incident reports
- Tests new computers, software, switch hardware and routers before implementation to ensure security
- Conducts log-based and endpoint-based threat detection to detect and protect against threats coming from multiple sources
- Deploys cloud-centric detection to detect threats related to cloud environments and services used by the organization
- Correlates activity across assets (endpoint, network, apps) and environments (on-premises, cloud) to identify patterns of anomalous activity
- Reviews alerts and data from sensors, and documents formal, technical incident reports
- Works with threat intelligence and/or threat-hunting teams
Researches emerging threats and vulnerabilities to aid in the identification of incidents
-
Qualifications/Requirements:
To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
Requirements include:
- Bachelor's degree preferred; degree in computer science, engineering, information systems or another related discipline strongly preferred.
- Five plus (5+) years of work experience in information security, especially in a network security analyst role.
- Desired, but not required: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM)
- Technical expertise in analyzing threat event data, evaluating malicious activity, documenting unusual files and data, and identifying tactics, techniques and procedures used by attackers
- Familiarity with business needs and commitment to delivering high-quality, prompt and efficient service to the business
- Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
- An understanding of organizational mission, values, and goals and consistent application of this knowledge
- Strong problem-solving and trouble-shooting skills
- Self-motivated and possessing of a high sense of urgency and personal integrity