Tech Stack
AWSAzureCloudCyber SecurityDNSGoogle Cloud PlatformPythonSplunkTCP/IP
About the role
- Monitor security alerts and events from SIEM and other security tools
- Perform initial triage and investigation of potential security incidents
- Escalate and coordinate incident response activities with internal teams
- Conduct threat hunting and proactive analysis to identify emerging threats
- Maintain and update incident response documentation and playbooks
- Collaborate with other cybersecurity teams to improve detection and response capabilities
- Assist in vulnerability management and remediation tracking
- Generate reports and metrics for incident trends
- Protect patient data and healthcare systems from unauthorized access and breaches
Requirements
- 2–3 years of professional experience in cybersecurity
- At least one role in a SOC or as a Security Analyst
- Associate’s degree in Cybersecurity, Computer Science, Information Technology, or a related field
- Understanding of TCP/IP, DNS, HTTP, and other network protocols
- Basic scripting knowledge (Python, PowerShell) is a plus
- Experience with endpoint detection and response (EDR) tools
- Soft Skills: Strong analytical and problem-solving abilities
- Excellent written and verbal communication
- Ability to work in a fast-paced, team-oriented environment
- Preferred Experience: Exposure to cloud security monitoring (AWS, Azure, GCP)
- Hands-on experience with threat intelligence platforms
- Familiarity with MITRE ATT&CK framework and incident classification
- Experience securing healthcare systems and EHR platforms
- Bachelor’s / Master’s degree is a plus
- Certifications (Highly Regarded): CompTIA Security+, Certified SOC Analyst (CSA), GIAC Security Essentials (GSEC), Cisco CyberOps Associate, CEH, CySA +, SSCP.
- Familiarity with SIEM platforms (e.g., Splunk, QRadar , Sentinel )