Health Care Service Corporation-posted about 1 year ago
Full-time • Entry Level
Dallas, TX
Insurance Carriers and Related Activities

The position at HCSC is focused on monitoring and responding to cyber threats in a 24/7 environment. The role involves detecting, verifying, and addressing vulnerabilities and cyber-attacks while serving as a technical escalation resource for Tier 1 Security Operations Center (SOC) analysts. The position requires collaboration with various teams, participation in simulated attacks, and partnership with Security Design and Architecture Engineers to enhance SOC capabilities.

  • Monitor multiple feeds in a 24/7 environment to detect and respond to cyber threats.
  • Serve as a technical escalation resource for Tier 1 SOC analysts.
  • Mentor and train junior analysts in the SOC.
  • Collaborate with cyber threat hunters, threat intelligence analysts, and forensic investigators.
  • Participate in red-team/blue-team simulated attacks and tabletop exercises.
  • Partner with Security Design and Architecture Engineers to improve SOC monitoring and response capabilities.
  • Bachelor's Degree and 4 years' work experience in a relevant role (SOC Analyst, Incident Response, Cybersecurity Threat Analyst) or 8 years related work experience or military experience.
  • Problem solving and troubleshooting skills with mature judgment.
  • Strong oral and written communication skills.
  • Attention to detail in analysis and documentation.
  • Experience with event analysis using SIEM tools (e.g., Splunk, ArcSight).
  • Log parsing and analysis skills with experience in developing correlation rules.
  • Experience with NIDS/HIPS/EDR infrastructure and tools.
  • Experience with signature development/management (e.g., Snort rules, Yara rules).
  • Experience with protocol analysis tools (e.g., Wireshark, Gigastor).
  • Knowledge of the current cyber threat landscape.
  • Working knowledge of Windows and Unix/Linux systems.
  • Knowledge of Firewall and Proxy technology.
  • Understanding of malware operations and indicators.
  • Knowledge of Data Loss Prevention monitoring and forensic techniques.
  • Familiarity with networking fundamentals (TCP/IP, network layers, Ethernet, ARP).
  • Knowledge of penetration techniques and DDoS mitigation techniques.
  • Bachelor's Degree in Computer Science or Information Systems.
  • Experience in an enterprise environment with tools like ArcSight, Sourcefire, TrendMicro DDI, Splunk, Hadoop.
  • Experience in System or Network Administration, Penetration Testing, or Application Development.
  • Security certifications such as CSX Practitioner, GCIH, GIAC, OSCP, CEPT, CISSP, CCNA, or platform certifications.
  • Professional development opportunities
  • Inclusive workplace culture
  • Equal Opportunity Employment
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service