Available Job

Cybersecurity Analyst - Threat and Vulnerability Management


Job Summary:Performs all necessary duties to ensure the safety of digital assets and to protect systems from intentional or inadvertent access. Provides input to solutions to identified needs, meeting operational and business objectives, technology capabilities. May perform monitoring, analytics, incident response or account security. This role is primarily focused on the operations of our Threat and Vulnerability Management program. Collaborates with Cybersecurity peers on projects and assist with the direction of the Cybersecurity program.Job Responsibilities:* Participates in Cybersecurity projects, including planning, obtaining customer input and projecting resource requirements.* Reviews security system requirements with customers and translates requirements into specific functions or deliverables.* Analyzes flow chart processes and recommends ways to reduce steps and increase efficiency through use of technology.* Responds immediately to security incidents.* Responsible for being aware of and understanding security policies and procedures.* Oversees and monitor routine security administration.* Define access privileges, control structures and resources.* Epic Security Analysts provide 24/7 coverage for Epic Security and must be knowledgeable of all aspects of Epic security (Design, build, user roles, classes, security points, sub-templates, templates, and provisioning).* Provides after-hours support and other duties as assigned.* Other duties as assigned.Preferred Qualifications:* Identify known vulnerabilities and configuration baseline standard deviations in our environment by operating our vulnerability management platform.* Conduct analysis and processing on findings and ensure they are prioritized correctly.* Assist in communicating vulnerability and configuration baseline findings to the respective business units, assigning tickets, securing commitments, and tracking progress on remediation.* Create and distribute vulnerability advisories to business units* Collaborates with subject matter experts to identify solutions, mitigate risk, and reduce the cyberspace attack surface* Assist with the development of our Threat and Vulnerability Management (TVM) program.* Basic understanding of Tenable/Nessus vulnerability management platform* Ability to understand, create, and modify Powershell scripts used to process vulnerability management data.Education:* Bachelor's degree in Information Technology/Computer Science or related field preferred.* A High School diploma/GED required.Certifications:* Certifications from SysAdmin, Audit, Network and Security Institute (SANS), International Information Systems Security Certification Consortium (ISC2) or Computing Technology Industry Association (CompTIA) or other position related certifications preferred.* For Information Technology Division caregivers, ITIL Foundations certification is required within 6 months of position start date.Complexity of Work:* Strong analytical, administrative, presentation, and project management skills are required.* Must have strong communication skills (both written and verbal) and the ability to work with minimal supervision.* Understanding of networking/distributed computing environment concepts.* Basic understanding of domain structures, user authentication mechanisms and fundamental cryptography.* Basic knowledge of network topology and the underlying OSI model.* Understands principles of client/server configuration.* Excellent knowledge of security technology and strong analytical skills.Work Experience:* High School Diploma/GED: A minimum of 3 years Information, Cyber Security, Clinical, or Financial Systems experience, including directing, planning and scheduling a major information system project.* Bachelor's Degree: A minimum of 1 year Information, Cyber Security, Clinical, or Financial Systems experience, including directing, planning and scheduling a major information system project.Physical Requirements:* Requires the ability to sit and be stationary for prolonged periods of time, normal or corrected vision and manual dexterity sufficient to perform work on a personal computer.* Requires the ability to walk to various locations throughout the organization and to function in a stressful environment.Personal Protective Equipment:* Follows standard precautions using personal protective equipment as required.Keywords: Cyber Security, Cyber, IT Security, vulnerability, Threat and Vulnerability Management (TVM), Tenable/Nessus, Powershell, Epic#LI-MV1The policy of Cleveland Clinic and its system hospitals (Cleveland Clinic) is to provide equal opportunity to all of our employees and applicants for employment in our tobacco free and drug free environment. All offers of employment are followed by testing for controlled substance and nicotine. Job offers will be rescinded for candidates for employment who test positive for nicotine. Candidates for employment who are impacted by Cleveland Clinic's Smoking Policy will be permitted to reapply for open positions after 90 days. Decisions concerning employment, transfers and promotions are made upon the basis of the best qualified candidate without regard to color, race, religion, national origin, age, sex, sexual orientation, marital status, ancestry, status as a disabled or Vietnam era veteran or any other characteristic protected by law. Information provided on this application may be shared with any Cleveland Clinic facility.Cleveland Clinic is pleased to be an equal employment employer: Women/Minorities/Veterans/Individuals with Disabilities

Location/Region: Beachwood, OH (44122)


Apply Now!