Touchette Regional Hospital · 1 month ago
Security Analyst II
Touchette Regional Hospital is a healthcare provider focused on security and network infrastructure. The Security Analyst II role involves monitoring cybersecurity threats, managing security protocols, and collaborating with the IS Security Officer to uphold compliance standards.
Health CareHome Health CareHospitalNon ProfitTherapeuticsWellness
Responsibilities
Monitors the health of Touchette Regional Hospital and SIHF Healthcare’s security threat posture and cybersecurity & network infrastructure
Develops a deep understanding of the threat landscape and ensures cybersecurity technology is monitored to detect threats
Works with the IS Security Officer and junior members of the team to ensure that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with Touchette Regional Hospital and SIHF Healthcare IT and cybersecurity standards
Develops, documents, maintains, and communicates Touchette Regional Hospital and SIHF Healthcare’s governance models and compliance codes and standards
Develop, provide, and maintain necessary documentation for all network applications and network systems
Assist with network security in a multi-hospital & multi-healthcare clinic environment
Monitors endpoint anti-virus & malware, content-filtering, data loss prevention solutions, multi factor authentication systems, device profiling systems, firewall rules, network ACLs, server configuration monitoring, network logging consolidation and event correlation systems
Analyze threat intelligence to anticipate and mitigate potential risks
Conduct root cause analysis of security incidents and recommend corrective actions
Conduct research on network products, services, protocols, and standards in support of network & security procurement and development efforts
Installs and maintains network & security operating systems; ensures that backup copies of all files are routinely made and securely stored at separate location; maintains system documentation
Develops vulnerability remediation documentation and assists in the remediation of vulnerabilities both on server and network systems both cloud and physical
Documents systems with vulnerability’s that are not able to be remediated, develops an action plan to secure those devices and communicates this information to stakeholder’s and the IS Security Officer
Develops the skills necessary to manage network security solutions
Develops expertise in scanning and monitoring networks or server systems for attacks, malicious software, intrusions, and threats
Develops an understanding of the organization’s current threat posture and uses a variety of tools to understand emerging threat patterns and gauge potential impacts to day-to-day business processes
Develops attack and penetration technologies to reduce threat landscape while looking for creative ways to save money and time where possible
Works with the IS Security Officer to develop policies and training to ensure employees are following and understanding security policies and procedures
Provides cybersecurity and network support for operational systems and assists in business planning, maintenance, and troubleshooting
Executes risk management initiatives to assess risk and gather information/data for defining/updating policy/standards
Researches and interprets risks and impacts of new technology, emerging patterns and trends in the cybersecurity landscape and provides updates/reports to the IS Security Officer on a regular basis
Develops monitoring use cases, tests, and assesses the effectiveness of Digital controls
Develops expertise in working with Network Packet Analyzers, Next-Generation Antivirus, Endpoint Detection and Response, Cyber Threat Intelligence and Threat Hunting Tools
Engages and communicates effectively with internal personnel, external vendors, or contacts in day-to-day activities and fosters positive business relationships
Educates the various business units on the different IT or cybersecurity strategies, policies, processes, and procedures
Executes projects and programs for the Network and Security team as required
Prepares and works with the different stakeholders to develop business continuity, disaster recovery and incident response plans
Develop methods or propose technologies to protect data at rest when required
Will be required to provide on-call support in rotating intervals and emergency support as needed
Ability to occasionally support routine or emergency network or security changes during normal business hours, after-hours, on weekends or during holidays is required. At the direction of your supervisor this may involve travel on-site to a pre-determined location to support these changes
Ability to participate in on-call rotation
Provides second-level technical support to users concerning network & security system operations
Performs all other duties as assigned
Qualification
Required
5-6 years of experience in information security, cybersecurity, or a related IT role
Fundamental knowledge of networking & security concepts
Understand the OSI model, well-known and reserved ports & network protocol specifications
Understand encryption methods used in securing network traffic transiting unsecured networks
Understand encryption methods to secure sensitive information stored digitally
Hands-on technical troubleshooting capabilities (physical, virtual, logical)
Ability to work independently under minimal supervision
Familiarity with network monitoring tools
Exceptional critical thinking and problem-solving ability
Strong interpersonal skills to assist non-technical individuals with complex technical issues
Ability to adapt and learn new skills rapidly in support of the IT organization across a variety of different operating systems, protocols, applications, or technologies
Enthusiasm
Teamworking skills
Attention to detail
Must be able to sit and/or stand for prolonged periods of time
Must be able to wear personal protective equipment (PPE) (mask, gown, gloves) when required
Must occasionally lift and/or move up to 50 pounds; 100 pounds with assistance
Preferred
Bachelor's degree preferred, preferably in computer science, cybersecurity, network engineering, engineering, mathematics, or equivalent work experience
Professional certifications preferred Cisco Certified CyberOps Professional (CCCP), Cisco Certified Network Professional – Security (CCNP Security), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), GIAC Certified Enterprise Defender (GCED)
Company
Touchette Regional Hospital
Touchette Regional Hospital specializes in wellness, physio therapy, surgical, emergency and medical services.
H1B Sponsorship
Touchette Regional Hospital has a track record of offering H1B sponsorships. Please note that this does not
guarantee sponsorship for this specific role. Below presents additional info for your
reference. (Data Powered by US Department of Labor)
Distribution of Different Job Fields Receiving Sponsorship
Represents job field similar to this job
Trends of Total Sponsorships
2024 (2)
2023 (1)
Funding
Current Stage
Late StageCompany data provided by crunchbase