Help us maintain the quality of jobs posted on PowerToFly. Let us know if this job is closed.
Job Details
Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by diversity and inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health equity on a global scale. Join us to start Caring. Connecting. Growing together. Principal Cybersecurity Analyst, you will serve as team lead for CTI analysts, assist management with operational duties and serve as the escalation point for technical intelligence analysis. You will bring hands-on intelligence experience to provide analysis support working on CTI projects with large disparate data and systems with a sense of urgency to meet tight timelines for critical alerts and reports. Expertise in cyber intelligence, threat landscape and actor knowledge, intelligence platforms, vulnerability and risk analysis and writing reports are essential for success in this critical role. You will participate in information sharing and analysis groups that are located in the US and offshore resulting in travel and working across differing time zones. You’ll enjoy the flexibility to work remotely * from anywhere within the U.S. as you take on some tough challenges. Primary Responsibilities:
- Identify and track threat campaigns targeting the organization
- Develop and maintain threat actor profiles along with associated activity, trends, TTPS, etc. from all available sources
- Monitor threat landscape to identify new tactics, techniques and procedures employed by threat actors and update associated profiles
- Analyze malware and other threats to identify artifacts, behaviors and indicators
- Manage intelligence requirements from internal stakeholders across operations, engineering, risk management and others, soliciting feedback to continually drive improvements
- Perform research and collection across the intelligence spectrum to support requests for information from internal teams
- Conduct trending and correlation across threat intelligence data to establish patterns, identify proactive mitigations, and develop countermeasures
- Develop threat intelligence reporting based on research and analysis
- Develop, manage, optimize and continuously improve processes to enhance the overall cyber threat intelligence function
- Support Cyber Defense and Engineering teams during incidents and other threat monitoring activities providing intelligence context, remediation recommendations and expertise
- Maintain relationships with external partners such as the FBI, DHS, NH-ISAC, and other healthcare organizations
- Serve as mentor to other intelligence analysts and an escalation point for analysis related events
- Undergraduate degree or 5+ years of Cybersecurity experience
- 6+ years of combined experience in the following:
- Operational security techniques for techniques for conducting online research and analysis
- Analyzing, tracking, and reporting of common threats and malware
- Analyzing, tracking, and reporting of advanced threat actor groups and associated TTPs
- Using the Diamond Model for Intrusion Analysis to cluster, track, and group threat activities
- Lockheed Martin Cyber Kill Chain to depict and analyze discreet phases of adversary operations
- MITRE ATT&CK framework of adversary operational TTP’s
- Identifying connections between adversary tools, infrastructure, personas, and suspected affiliations using link analysis models
- Open and/or closed source intelligence gathering methods and processes
- 5+ years of experience managing threat intelligence platforms and associated threat feeds coupled with collecting, analyzing, interpreting, and reporting threat data
- 5+ years of experience independently leading multiple enterprise security projects
- 4+ years of experience with security technologies such as SIEM, IDS/IPS, Snort, Suricata, Bro, etc.
- 2+ years working with Linux, OS X, UNIX, and Windows operating systems
- 2+ years of experience mentoring and supporting junior analysts
- Security related certificates, such as: CISSP, GPEN, GCIH, GREM, GCTI
- Knowledge of cyber threat models such as the Diamond Model of Intrusion Analysis and Cyber Kill Chain
- Knowledge of various APT, cybercrime and other advanced threat actors
- Deep understanding of the current threat landscape and associated risks
- Understanding of conventions and models for intelligence attribution and intrusion clustering
- Knowledge of common intrusion tactics, techniques, and countermeasures
- Threat concepts and frameworks (CVSS, CVE, MITRE ATT&CK, STIX/TAXII, YARA, FAIR)
- Experience with security technologies such as firewalls, email inspection and sandboxing, intrusion detection and preventions systems, endpoint detection and response
- Experience with netflow data, network traffic and packet capture analysis
- Ability to write reports, business correspondence and procedure manuals
- Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures, or governmental regulations
- Ability to effectively present information and respond to questions from groups of employees, managers, clients, and customers
- Ability to interpret a variety of instructions furnished in written, oral, diagram or schedule form
About the Company
UnitedHealth Group
Minnetonka, MN, United States
UnitedHealth Group is a health care and well-being company that’s dedicated to improving the health outcomes of millions worldwide. We are... Read more