Associate Cybersecurity Analyst

| Remote
Sorry, this job was removed at 12:36 p.m. (CST) on Tuesday, September 13, 2022
Find out who's hiring in Minneapolis, MN.
See all Cybersecurity + IT jobs in Minneapolis, MN
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

Combine two of the fastest-growing fields on the planet with a culture of performance, collaboration and opportunity and this is what you get. Leading edge technology in an industry that's improving the lives of millions. Here, innovation isn't about another gadget, it's about making health care data available wherever and whenever people need it, safely and reliably. There's no room for error. Join us and start doing your life's best work.(sm)
Schedule: First 2-3 months of training will be Monday - Friday, 8am - 5pm CST; Regular working schedule to be Monday - Friday 8am - 5pm CST
You'll enjoy the flexibility to telecommute* from anywhere within the U.S. as you take on some tough challenges.
Primary Responsibilities:

  • Perform incident response, with a primary focus of eliminating the threat to the network and determining the cause of the security incident while preserving evidence for further analysis
  • Ensure incidents are handed in a manner that is consistent with established playbooks
  • Monitors SIEM and logging for alerts of potential network threats, intrusions, and/or compromises
  • Responsible for understanding the global threat environment and general security best practices
  • Assists with triage of service requests from automated sensors and internal requests for assistance
  • Participates in active cyber hunting to identify and eliminate known and unknown network threats
  • Interface with technical personnel from various disciplines to rapidly resolve critical issues
  • Appropriately inform and advise leadership of incidents and propose effective response and/or countermeasures for containment
  • Participate in knowledge sharing with other security engineers and partner
  • Identify, document, and recommend new or revised incident response playbooks
  • Drive continuous improvement of processes and procedures to improve analysis, detection, and mitigation of incidents in support of the overall Cyber Defense mission
  • Create and drive action plans to address recurring or ongoing information security incidents
  • Develop and maintain reporting metrics used to measure team performance, ensure analyst adherence to processes/procedures for operational consistency, identify process improvements, coaching, training and professional development of the staff
  • Participate in the planning and implementation of information security technology projects. Serve as point-person and subject matter expert for issues and projects related Cyber Security Counter Threat Operations.
  • Ability to work either in-office or remotely with minimal supervision, prioritize intake via multiple methods that include SIEM's, email, chat, text messages, telephone calls and work queues
  • Collaboration as appropriate with leadership and other key stakeholders


You'll be rewarded and recognized for your performance in an environment that will challenge you and give you clear direction on what it takes to succeed in your role as well as provide development for other roles you may be interested in.
Required Qualifications:

  • Bachelor's Degree in Computer Science, Computer Engineering, CyberSecurity, or Digital Forensics OR 6+ months of equivalent cybersecurity work experience OR Certification in cybersecurity (e.g., Security+, CCNA Cyber Ops, CCSP, GCIA, GCIH, CEH, CySA+, OSCP, etc.)
  • 6+ months of experience in industry recognized analysis frameworks (Kill Chain, Diamond Model, MITRE ATT&CK, NIST Incident Response, etc.)
  • 6+ months of experience with fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)
  • Willing to work in a team-oriented 24/7 SOC environment; flexibility to work on a rotating schedule (including occasional shift work)


Preferred Qualifications:

  • Experience with network monitoring in a SOC environment
  • Security certifications (e.g. Security+, CCNA Cyber Ops, GCIA, GCIH, CEH, CySA+, OSCP, etc.)
  • Experience and knowledge conducting cyber threat analysis originating from phishing emails
  • Previous experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms
  • Efficient triage and documentation during incident response to effectively brief teammates, shift lead and supervisory levels
  • Bilingual Spanish/ English
  • Ability to achieve NAC clearance


To protect the health and safety of our workforce, patients and communities we serve, UnitedHealth Group and its affiliate companies require all employees to disclose COVID-19 vaccination status prior to beginning employment. In addition, some roles and locations require full COVID-19 vaccination, including boosters, as an essential job function. UnitedHealth Group adheres to all federal, state and local COVID-19 vaccination regulations as well as all client COVID-19 vaccination requirements and will obtain the necessary information from candidates prior to employment to ensure compliance. Candidates must be able to perform all essential job functions with or without reasonable accommodation. Failure to meet the vaccination requirement may result in rescission of an employment offer or termination of employment
Technology Careers with Optum. Information and technology have amazing power to transform the health care industry and improve people's lives. This is where it's happening. This is where you'll help solve the problems that have never been solved. We're freeing information so it can be used safely and securely wherever it's needed. We're creating the very best ideas that can most easily be put into action to help our clients improve the quality of care and lower costs for millions. This is where the best and the brightest work together to make positive change a reality. This is the place to do your life's best work.(sm)
*All Telecommuters will be required to adhere to UnitedHealth Group's Telecommuter Policy.
Colorado, Connecticut or Nevada Residents Only: The salary range for Colorado residents is $26.15 to $46.63. The salary range for Connecticut / Nevada residents is $28.85 to $51.30. Pay is based on several factors including but not limited to education, work experience, certifications, etc. In addition to your salary, UnitedHealth Group offers benefits such as, a comprehensive benefits package, incentive and recognition programs, equity stock purchase and 401k contribution (all benefits are subject to eligibility requirements). No matter where or when you begin a career with UnitedHealth Group, you'll find a far-reaching choice of benefits and incentives
Diversity creates a healthier atmosphere: UnitedHealth Group is an Equal Employment Opportunity/Affirmative Action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, age, national origin, protected veteran status, disability status, sexual orientation, gender identity or expression, marital status, genetic information, or any other characteristic protected by law.
UnitedHealth Group is a drug-free workplace. Candidates are required to pass a drug test before beginning employment.
Keywords: Optum, UnitedHealth, Associate CyberSecurity Analyst, Kill Chain, Diamond Model, MITRE ATT&CK, NIST Incident Response, Operating Systems, intrusion/detection, TCP/IP, Ports, Security+, CCNA Cyber Ops, GCIA, GCIH, CEH, CySA+, OSCP, Remote, Telecommute, WFH, WAH, Hiring Immediately, #RPO, #GREEN, #EISecurity

Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about OptumFind similar jobs