United States Renal Care Incorporated - Plano, TX
posted 5 months ago
As a Senior Analyst in Information Security at U.S. Renal Care, you will play a crucial role in safeguarding the organization against cyber threats and ensuring the integrity of our information systems. This position is integral to our mission of providing high-quality care to patients living with kidney disease. You will be part of a dedicated Information Security team, responsible for protecting the company from intrusions, malware, threat actors, and other forms of cyber attacks. Your work will involve supporting efforts to automate, integrate, and aggregate the data and systems necessary for optimizing and accelerating analysis. In this role, you will research emerging threats and vulnerabilities to aid in the identification of network incidents. You will also support the creation of new architecture, policies, standards, and guidance to address these threats. Your responsibilities will include providing incident response support, which involves mitigating actions to contain activity and facilitating forensic analysis when necessary. Additionally, you will support the development of business continuity and disaster recovery plans, conducting tests, publishing results, and making necessary adjustments to address any deficiencies identified during these tests. You will conduct network monitoring and intrusion detection analysis using various computer network defense tools, such as intrusion detection/prevention systems (IDS/IPS), firewalls, and host-based security systems (HBSS). Your role will also require you to review alerts and data from sensors, document formal technical incident reports, and test new computers, software, switch hardware, and routers before implementation to ensure security. Furthermore, you will conduct log-based and endpoint-based threat detection to protect against threats from multiple sources, deploy cloud-centric detection for threats related to cloud environments, and correlate activity across various assets and environments to identify patterns of anomalous activity. Collaboration with threat intelligence and threat-hunting teams will also be a key aspect of your responsibilities.