Prime Healthcare Management Inc
Lewiston, Maine

Associate Cyber Security Analyst - Endpoint

OnsitePosted todayWebsiteLinkedIn

Skip the busywork

ApplyBolt rewrites your resume for this exact role and hits submit. You just pick the jobs.

Resume tailored to this roleApplied in secondsTrack every application
Download the app

About this role

Overview:

Prime Healthcare is an award-winning health system headquartered in Ontario, California. Prime Healthcare operates 54 hospitals and has more than 360 outpatient locations in 15 states providing more than 3.0million patient visits annually. It is one of the nation’s leading health systems with over 60,000 employees and physicians. Twenty-one of the Prime Healthcare hospitals are members of the Prime Healthcare Foundation, a 501(c)(3) not-for-profit public charity. Prime Healthcare is actively seeking new members to join our corporate team!

Responsibilities:

The Associate Cyber Security Analyst is an entry level position supporting the Endpoint Protection team, part of Prime’s Technical Risk Office (TRO).  The role of this position is to directly support the daily operational activities of the Endpoint Protection team.  Generally, the Endpoint Protection team is a team of cyber security experts that serve as a trusted and neutral coordination body, dedicated to Security, our environment, and providing practical guidance for PHS system administrators to build and maintain secure systems.

Qualifications:

EDUCATION, EXPERIENCE, TRAINING

 

Required qualifications:

 

1.    One to two years of experience in a Windows and Unix/Linux environment and be able to demonstrate substantial knowledge of at least four of the following:

2.    Various internet protocols, computer system and Internet security issues, various security technologies, software runtime analysis, debugging, and security testing techniques

3.    EPO Experience managing DLP, VSE, ENS, HIDS/HIPS, EEFF and other McAfee products. one or more programming or scripting languages (e.g., C/C++, Perl, Java, Bash, PowerShell, etc.) underlying software defects that routinely result in security vulnerabilities

4.    System, database, and/or network administration, Operational details of multiple operating systems, cryptographic principles/protocols, vulnerability management concepts and tools

5.    Understanding of intruder techniques and software exploitation methods.

 

Preferred qualifications:

 

1.    AA/AS or Bachelor of Science in Computer Science, Electrical or Computer Engineering, Information Science, Information Management or equivalent with one-year applicable experience applicable experience.

2.    Knowledge of healthcare industry and hospital operations preferred

3.    Can analyze software, networks, and scan to determine appropriate goals to address PHS security needs.

4.    Maintain composure while dealing with stressful situations, be able to develop and explain technical decisions, be able to separate fact from opinion and speculation

5.    Have great social skills and be able to convey ideas effectively with vulnerability reporters, system and network administrators, vendors, experts, Internet users, sponsors, policy makers, news reporters, managers, and staff (i.e., stakeholders in the vulnerability disclosure process)

6.    Have a great sense of work prioritization, planning, and organizational skills

7.    Have excellent analytical, reasoning, and creative problem-solving skills

8.    Have excellent written and oral communication skills

9.    Recognize and deal appropriately with confidential and sensitive information

Employment Status: Full Time Shift: Days Employment Status: Full Time Shift: Days Equal Employment Opportunity:

Company is an equal employment opportunity employer. Company prohibits discrimination against any applicant or employee based on race, color, sex, sexual orientation, gender identity, religion, national origin, age (subject to applicable law), disability, military status, genetic information or any other basis protected by applicable federal, state, or local laws. The Company also prohibits harassment of applicants or employees based on any of these protected categories. Know Your Rights: https://www.eeoc.gov/sites/default/files/2022-10/EEOC_KnowYourRights_screen_reader_10_20.pdf