Hours:
Shift Start Time:
8 AMShift End Time:
4:30 PMAWS Hours Requirement:
8/40 - 8 Hour ShiftAdditional Shift Information:
FlexableWeekend Requirements:
As NeededOn-Call Required:
YesHourly Pay Range (Minimum - Midpoint - Maximum):
$31.691 - $39.614 - $47.537The stated pay scale reflects the range that Sharp reasonably expects to pay for this position. The actual pay rate and pay grade for this position will be dependent on a variety of factors, including an applicant's years of experience, unique skills and abilities, education, alignment with similar internal candidates, marketplace factors, other requirements for the position, and employer business practices.
What You Will Do
The Information Security Associate serves as the frontline defender of Sharp Healthcare's digital assets and sensitive information. This position is expected to continuously learn, develop, and progress in the Information Security role. The incumbent is responsible for learning to actively monitor network and systems for any signs of unauthorized access, suspicious activity, or potential security breaches. Through continuous analysis and assessment of security protocols, the Associate will contribute to the development and implementation of robust security measures to safeguard our organization's data integrity and confidentiality.
Preferred Qualifications
- Associate's Degree
- Bachelor's Degree
- 1 Year Exposure to information security or Information Technology thought formal education or self learning (i.e, College, Black Hat, Defcon).
Other Qualification Requirements
- Security Plus - PREFERRED Network Plus - PREFERRED
Essential Functions
- Email Security
Monitor and analyze email traffic for potential security threats such as phishing attempts, malware attachments, or suspicious links.
Investigate and respond to email-based security inquiries, including analyzing email headers, content, and attachments.
Review email security policies within Email Security Tools to suggest enhancements to increase protection against emerging threats.
Collaborate with other teams to ensure effective incident response and remediation for email-related security incidents. - SIEM
Monitor and learn to analyze logs and events from various sources such as network devices, servers, and applications to identify potential security incidents.
Create and maintain custom SIEM queries, dashboards, and alerts to proactively detect security threats and anomalies.
Learn to conduct analysis using SIEM Tools to determine the root cause of security incidents and identify any indicators of compromise (IOCs). - Endpoint Detection and Response (EDR) Tools
Monitor and learn to analyze endpoint activity and behavior to detect and respond to potential security threats such as malware infections, unauthorized access, or suspicious activities.
Review alerts generated by EDR tools to determine the nature and severity of security incidents affecting endpoints. - Vulnerability Scanning / Patching verification
Review regular vulnerability assessments reports from Vulnerability scanning tools to identify weaknesses in systems, applications, and infrastructure.
Prioritize vulnerabilities based on severity and potential impact on the organization's security posture. - Creating Ticket
Generate and manage tickets in the organization's ticketing system (e.g., Service Now) for security incidents, vulnerabilities, and other tasks.
Ensure that all relevant information, including incident details, actions taken, and resolution status, is accurately documented in tickets.
Monitor ticket queues, prioritize tasks, and collaborate with other SOC members to address security issues efficiently. - Problem Analysis and Resolution
Performs thorough problem analysis and resolution processes within Information Systems accepted framework using sound judgment, initiative, and professional discretion.
Knowledge, Skills, and Abilities
- Demonstrated ability to fulfill the duties and responsibilities described herein.
- Ability to collaborate with other members of the SOC team to triage, investigate, and respond to security incidents effectively.
- Stay up-to-date with the latest cybersecurity threats, vulnerabilities, and industry best practices.
- Participate in incident response event, exercises and drills to test the effectiveness of security controls and procedures.
- Document security incidents, investigations, and remediation actions for future reference and analysis.
- Highly skilled at communicating clearly, concisely, and accurately both verbally and in writing to achieve results for the organization.
- Ability to practice good time management and to multitask effectively.
Sharp HealthCare is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, gender, gender identity, sexual orientation, age, status as a protected veteran, among other things, or status as a qualified individual with disability or any other protected class