Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cyber Security Analyst III, Incident Response image - Rise Careers
Job details

Cyber Security Analyst III, Incident Response

We are so glad you are interested in joining Sutter Health!Organization:SHSO-Sutter Health System Office-ValleyPosition Overview:Responsible for providing data security support and guidance to Sutter Health regions and affiliates. Is representative on projects, privacy investigation, and information security initiatives. Works with other IS operations support departments to identify and recommend solutions on security-related issues. Provides hands-on security administration of a broad range of security duties and requires a high level of technical experience. Duties and responsibilities include, but are not limited to, oversight of design, engineering, analysis, research, testing and monitoring.Job Description:EDUCATION:Equivalent experience will be accepted in lieu of the required degree or diploma.• Bachelor's in Business, Cybersecurity, Computer Science, Information Technology/Security, Risk Management, or related fieldTYPICAL EXPERIENCE:• 5 years recent relevant experience.• Experience providing cyber security support by planning, coordinating, integrating, and synchronizing cyber defense and prevention activities preferred.• Experience ensuring compliance with all applicable state and federal cyber laws and regulations preferred• Experience creating comprehensive and accurate reports that communicate risk profile impacts to peers and management preferred.SKILLS AND KNOWLEDGE:• In-depth understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment.• Technical skills in planning, administration, and management of information systems; operational and technical security controls; and security risk analysis and management, including end point security controls, such as access control lists (ACLS), host intrusion prevention system (HIPS), registry, logging, and forensics.• Comprehensive knowledge of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS), data loss prevention (DLP) methodologies, DLP technologies, current information security trends and practices including security processes, methods, and procedures.• Thorough knowledge of software, hardware, databases, networks, firewalls, encryption, and other systems security devices, including a good understanding of end point operating systems (Windows and Linux), internet technologies such as Domain Name System (DNS), routing, Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP), and familiarity in a command line environment.• Expert knowledge of state and federal information services (IS) security and privacy-related regulatory requirements and laws.• Detailed knowledge regarding National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health Act (HIPAA/HITECH), Federal Information Processing Standards (FIPS), and other related industry security standards, regulations, and best practices.• Superior business acumen and analytic skills, including the ability to analyze data and information, reach practical conclusions, recommend corrective actions, resolve conflicts, and institute effective changes.• Organizational and project management skills required, including the demonstrated ability to prioritize tasks, manage multiple projects simultaneously, and complete deliverables.• Exceptional attention to detail with time management and organization skills, including attention to detail, clear documentation, diagnostic capabilities and problem solving skills.• Communication (written/verbal), interpersonal, and presentation skills to explain complex technical or sensitive information clearly and professionally to diverse audiences and all levels of internal and external constituencies.• Robust computer skills, including advanced knowledge of Microsoft Office Suite (Word, Excel, Outlook, and Access), various database architectures and related security and assessment tools and applications.• Leverage vast detailed knowledge and familiarity with security disciplines effectively and convert highly complex technical topics into language and diagrams understandable to a wide audience.Job Shift:DaysSchedule:Full TimeDays of the Week:Monday - FridayWeekend Requirements:As NeededBenefits:YesUnions:NoPosition Status:ExemptWeekly Hours:40Employee Status:RegularSutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.Pay Range is $58.95 to $88.43 / hourThe salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package. ​
Sutter Health Glassdoor Company Review
3.8 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Sutter Health DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Sutter Health
Sutter Health CEO photo
Warner Thomas, President and CEO, Sutter Health
Approve of CEO

Average salary estimate

Estimate provided by employer
$111422 / ANNUAL (est.)
min
max
$97K
$126K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cyber Security Analyst III, Incident Response, Sutter Health

If you’re passionate about enhancing data security and have an analytical mindset, then the Cyber Security Analyst III, Incident Response position at Sutter Health in Sacramento, CA, might just be your perfect fit! As a member of our team, you’ll play a crucial role in offering top-notch data security support across various Sutter Health regions and affiliates. Your work will involve diving into projects related to privacy investigations and leading enhancements in our information security initiatives. With hands-on administration of an array of security duties, you’ll enjoy engaging with diverse IS operations and recommending solutions for security-related challenges. With at least five years of relevant experience under your belt, you’ll bring an in-depth understanding of the cyber threat lifecycle, operational security, and safety protocols specific to the healthcare sector. We value your expertise in cybersecurity support and compliance with federal laws, as crafting precise reports to communicate risk profiles is also part of your responsibilities. You’ll utilize your advanced technical skills, familiarity with security technologies, and thorough knowledge of state and federal regulations to defend against potential threats. If you are an organized and analytical problem-solver with stellar communication skills, we can’t wait to welcome you to our innovative security team at Sutter Health!

Frequently Asked Questions (FAQs) for Cyber Security Analyst III, Incident Response Role at Sutter Health
What responsibilities does a Cyber Security Analyst III, Incident Response at Sutter Health have?

As a Cyber Security Analyst III, Incident Response at Sutter Health, you will be responsible for providing critical data security support, guiding various regions, and collaborating on projects involving privacy investigations. Your role will require you to oversee security tasks, conduct risk assessments, and recommend security solutions while maintaining compliance with state and federal regulations.

Join Rise to see the full answer
What qualifications are needed for the Cyber Security Analyst III, Incident Response role at Sutter Health?

To be qualified for the Cyber Security Analyst III, Incident Response position at Sutter Health, you typically need a bachelor's degree in a relevant field such as Cybersecurity or Computer Science. Additionally, five years of relevant experience and proficiency in cybersecurity frameworks and compliance with regulatory requirements are essential for success in this role.

Join Rise to see the full answer
What skills should a candidate have for the Cyber Security Analyst III, Incident Response position at Sutter Health?

Candidates for the Cyber Security Analyst III, Incident Response role at Sutter Health should have advanced technical skills in network security, knowledge of endpoint security technologies, and the ability to analyze risks effectively. Strong problem-solving abilities and excellent communication skills are also crucial for effectively conveying complex information to diverse audiences.

Join Rise to see the full answer
Is experience in healthcare cybersecurity necessary for Sutter Health's Cyber Security Analyst III position?

Yes, experience in healthcare cybersecurity is highly preferred for the Cyber Security Analyst III, Incident Response role at Sutter Health. Understanding the unique challenges and compliance requirements within the healthcare industry, such as HIPAA and HITECH, is beneficial for effectively managing security risks.

Join Rise to see the full answer
What is the working environment for the Cyber Security Analyst III, Incident Response at Sutter Health?

The working environment for the Cyber Security Analyst III, Incident Response position at Sutter Health is dynamic and collaborative. You will engage with various departments, participate in critical projects, and contribute to a strong team focused on enhancing data security across the organization.

Join Rise to see the full answer
Common Interview Questions for Cyber Security Analyst III, Incident Response
What experience do you have in incident response as a Cyber Security Analyst?

When answering this question, highlight specific incidents you handled, the strategies you implemented, and the outcomes. Outline your role in identifying threats, coordinating responses, and ensuring compliance during the incident recovery process.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity trends?

Discuss your methods for staying informed about cybersecurity trends, such as attending conferences, participating in webinars, and reading industry publications. Mention any relevant certifications you pursue to enhance your knowledge continuously.

Join Rise to see the full answer
Can you describe a time you successfully mitigated a security threat?

Provide a detailed account of a specific threat you faced, the analysis you conducted, the steps you took to mitigate the risk, and the successful outcome. Emphasize your problem-solving skills and your ability to work under pressure.

Join Rise to see the full answer
What tools and technologies are you proficient with in cybersecurity?

Share the specific cybersecurity tools and technologies you have hands-on experience with, such as antivirus software, intrusion detection systems, and data loss prevention technologies. Highlight your proficiency in using these tools to improve security measures.

Join Rise to see the full answer
How do you approach compliance with cybersecurity regulations?

Explain your understanding of cybersecurity regulations like HIPAA and NIST, and describe your process for ensuring compliance. Discuss how you implement best practices and conduct regular audits to maintain adherence to regulatory requirements.

Join Rise to see the full answer
What is your process for conducting a risk assessment?

Outline your step-by-step process for conducting a risk assessment, including how you identify assets, threats, vulnerabilities, and their potential impact. Discuss how you prioritize risks and recommend appropriate mitigation strategies.

Join Rise to see the full answer
How do you handle conflicts within a team?

Describe your conflict resolution style and provide an example of a conflict you resolved in the past. Emphasize your communication and interpersonal skills and how you foster a positive team environment.

Join Rise to see the full answer
What would you do in the event of a data breach?

Discuss your immediate steps to take in the event of a data breach, including incident classification, alerting the appropriate stakeholders, and initiating a response plan. Emphasize the importance of communication and documentation throughout the process.

Join Rise to see the full answer
How do you communicate complex technical information to non-technical audiences?

Share strategies you use to break down complex technical concepts into understandable language, such as using analogies or visual aids. Highlight your experience in training or presenting to non-technical stakeholders.

Join Rise to see the full answer
What motivates you in the field of cybersecurity?

Articulate your passion for cybersecurity by discussing your desire to protect sensitive information, the thrill of staying ahead of cybercriminals, and your commitment to continuous learning and making a difference in data security.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 6 days ago
Photo of the Rise User
Posted 7 days ago
Inclusive & Diverse
Mission Driven
Diversity of Opinions
Growth & Learning
lastminute.com Remote Chiasso, Switzerland
Posted 2 days ago

We enhance the well-being of people in the communities we serve through a not-for-profit commitment to compassion and excellence in healthcare services.

86 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 21, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!