Colorado Technology Jobs

Colorado Jobs

Job Information

SCL Health Security Analyst II in Wheat Ridge, Colorado

You.You bring your body, mind, heart and spirit to your work as a SecurityAnalyst II.You know how to move fast. You know how to stay organized. You know how tohave fun.You're equally comfortable with security threat hunting, securityvulnerability remediation, and data analysis.You're great at what you do, but you want to be part of something evengreater. Because you believe that while individuals can be strong, the rightteam is invincible.Us. is part of SCL Health, a faith-based, nonprofit healthcare organizationthat focuses on person-centered care. Our 249-bed community-based hospitalprovides comprehensive, specialty care to the poor, the vulnerable, ourcommunities and each other. Dating back to 1905, we are proud of the richhistory and inspiring mission our hospital has embodied for over 110 years. are one of the ways we encourage health for you and your family. Our generouspackage includes medical, dental and vision coverage. But health is morethan a well-working body: it encompasses body, mind and social well-being.To that end, we've launched a Healthy Living program to address yourholistic health. Healthy Living includes financial incentives, digitaltools, tobacco cessation, classes, counseling and paid time off. We alsooffer financial wellness tools and retirement planning.We.Together we'll align mission and careers, values and workplace. We'llencourage joy and take pride in our integrity.We'll laugh at each other's jokes (even the bad ones). We'll helloand high five. We'll celebrate milestones and acknowledge the value ofspirituality in healing.We're proud of what we know, which includes how much there is to learn.Your day.As a Security Analyst II, you need to know how to:Conduct active real-time security monitoring. Security event detection,triage and threat analysis for complex and/or escalated security events.Provide log/network/malware/device analysis and makes recommendationsfor remediation of security vulnerability conditions.Perform vulnerability assessment and confirmation of Internet facing assetsusing commercial, open source, and custom tools.Perform threat hunting to identify potential information security incidentsand escalates information to appropriate staff.Assess threat and vulnerability information from all sources (both internaland external) and promptly apply applicable mitigation techniques initiatingindications and warnings.Perform threat and vulnerability assessment and provides subject matterexpertise on appropriate threat mitigation.Develop/Monitor basic IDS/IPS rules to identify and/or prevent maliciousactivity.Provide other services as a key member of the Security Operations Center team.Your experience.We hire people, not resumes. But we also expect excellence, which is whywe require:Associate's Degree with 4 years relevant experience, or a Bachelor'sdegree is required1 year of Information Security, requiredTwo (2) year relevant experience such as: firewall administration andsupport, incident analysis, security architecture, malware research,SOC/CIRC, systems or network engineering or administration, requiredComputer Science, Software and Information Systems, Management InformationSystems, preferredGeneral understanding of HIPAA requirements and Payment Card Industry Data,preferredA technical qualification (preference to technical qualification in securityrealm) such as SANS GSEC, or CompTIA Security + or Network +,preferred Security industry certifications such as GIAC are preferred.Experience with NGFW technologies (Checkpoint, Cisco, Fortinet, PaloAlto), Proofpoint, Endpoint protection (CrowdStrike), FireEyeNX, FireEye ETP, Rapid 7 IDR, and Rapid 7 VM, preferredYour next move.