Optum

posted 4 days ago

Full-time - Mid Level
Remote
Insurance Carriers and Related Activities

About the position

The Cybersecurity Analyst at UnitedHealth Group plays a crucial role in enhancing the security of the organization's network and systems. This position involves conducting thorough investigations into cybersecurity incidents, performing cloud forensics, and analyzing logs to ensure the integrity and security of data. The analyst will also mentor junior team members and collaborate with various departments to improve incident response processes and implement effective security measures.

Responsibilities

  • Mentor analysts, providing training and guidance through complex incidents
  • Identify deficiencies in processes and tools, make corrective recommendations, and drive implementation of solutions and efficiencies
  • Monitor incident throughput and ensure team consistently follows established processes
  • Improve incident response times, establishing SLAs
  • Integrate and collaborate with other subject matter experts throughout the organization
  • Influence the creation and/or adoption of new standards and procedures
  • Perform host-based digital forensics on Microsoft Windows systems primarily and other operating systems and document findings in clear and concise language
  • Preserve evidence (both network and host) using forensically sound methods
  • Establish, evaluate, and implement performance metrics
  • Work with Security Architecture and Engineering teams to remain abreast of changes to IT infrastructure and business environments

Requirements

  • 4+ years of experience working in computer forensics, cybersecurity investigation and other related fields
  • 4+ years of experience conducting complex forensic investigations using industry standard forensic tools including but not limited to EnCase, FTK, F-Response or X-Ways
  • 1+ years of experience with cloud environments and Forensics techniques in Azure, AWS, and GCP cloud services providers
  • 3+ years enterprise level triage; collecting artifacts from endpoints, network sensors, and application logs and performing corresponding analysis
  • 4+ years working with and understanding enterprise-wide technology risks that are inherent to a business and an ability to effectively communicate those risks to stakeholders
  • U.S. Citizenship is required

Nice-to-haves

  • Undergraduate degree or 4 years equivalent experience
  • 1+ of the following certifications: QSA, CCFP, EnCE, X-Pert, GCFE, GCFA, GNFA, CISSP, and/or GREM Certification
  • Direct experience with current advanced persistent threats (APT)
  • Experience with NetWitness, FireEye, Splunk, and/or RSA Security Analytics
  • Deep expertise with EnCase
  • Knowledge of Volatility, Rekall and/or Mandiant Redline
  • Knowledge of Chain of Custody process and procedures
  • Network traffic knowledge

Benefits

  • Comprehensive benefits package
  • Incentive and recognition programs
  • Equity stock purchase
  • 401k contribution
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service