Optum - Garner, NC

posted 4 days ago

Full-time - Mid Level
Remote - Garner, NC
Insurance Carriers and Related Activities

About the position

The Cybersecurity Analyst at UnitedHealth Group is responsible for conducting network security investigations, cloud forensics, log analysis, host-based forensics, incident response, and case management. This role requires effective communication of findings to stakeholders at all levels and involves mentoring junior analysts while improving incident response processes. The position offers the flexibility to work remotely from anywhere in the U.S.

Responsibilities

  • Mentor analysts, providing training and guidance through complex incidents
  • Identify deficiencies in processes and tools, make corrective recommendations, and drive implementation of solutions and efficiencies
  • Monitor incident throughput and ensure team consistently follows established processes
  • Improve incident response times, establishing SLAs
  • Integrate and collaborate with other subject matter experts throughout the organization
  • Influence the creation and/or adoption of new standards and procedures
  • Perform host-based digital forensics on Microsoft Windows systems primarily and other operating systems and document findings in clear and concise language
  • Preserve evidence (both network and host) using forensically sound methods
  • Establish, evaluate, and implement performance metrics
  • Work with Security Architecture and Engineering teams to remain abreast of changes to IT infrastructure and business environments

Requirements

  • 4+ years of experience working in computer forensics, cybersecurity investigation and other related fields
  • 4+ years of experience conducting complex forensic investigations using industry standard forensic tools including but not limited to EnCase, FTK, F-Response or X-Ways
  • 1+ years of experience with cloud environments and Forensics techniques in Azure, AWS, and GCP cloud services providers
  • 3+ years enterprise level triage; collecting artifacts from endpoints, network sensors, and application logs and performing corresponding analysis
  • 4+ years working with and understanding enterprise-wide technology risks that are inherent to a business and an ability to effectively communicate those risks to stakeholders
  • U.S. Citizenship is required

Nice-to-haves

  • Undergraduate degree or 4 years equivalent experience
  • 1+ of the following certifications: QSA, CCFP, EnCE, X-Pert, GCFE, GCFA, GNFA, CISSP, and/or GREM Certification
  • Direct experience with current advanced persistent threats (APT)
  • Experience with NetWitness, FireEye, Splunk, and/or RSA Security Analytics
  • Deep expertise with EnCase
  • Knowledge of Volatility, Rekall and/or Mandiant Redline
  • Knowledge of Chain of Custody process and procedures
  • Network traffic knowledge

Benefits

  • Comprehensive benefits package
  • Incentive and recognition programs
  • Equity stock purchase
  • 401k contribution
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service