Match score not available

SecOps Cyber Security Analyst

Remote: 
Full Remote
Salary: 
80 - 120K yearly
Experience: 
Senior (5-10 years)

Offer summary

Qualifications:

BA/BS degree or higher, 8+ years' experience in cybersecurity, 5+ years in incident Response/Cybersecurity operations center, Current security certifications like CISSP or CISA.

Key responsabilities:

  • Monitor and respond to security threats
  • Maintain the organization’s security strategies
Procare Solutions logo
Procare Solutions Computer Software / SaaS SME https://www.procaresoftware.com/
201 - 500 Employees
See all jobs

Job description

About Procare

Our mission is to simplify childcare operations and create meaningful connections by providing technology, expertise, and unparalleled service.

Procare Solutions is the #1 name in childcare software – used by more than 35,000 childcare businesses across the country. For over 30 years, childcare professionals have looked to Procare to provide real-time information for making critical decisions, maintaining compliance with local and state regulations, and adhering to business best practices.

We make childcare management run smoothly, so that our customers can spend more time focusing on the kiddos, not back office administrative duties.

A Little About the Role

The SecOps (Security Operations) Cybersecurity Analyst will report to the Director of Security and Compliance as part of the corporate cybersecurity team. This role is a matrixed position that will be aligned with the other business groups including Technology Infrastructure and Cloud teams on prioritization and implementation of Cybersecurity initiatives across the Procare organization and environments.

The SecOps Cybersecurity Analyst is responsible for monitoring, detecting, and responding to security threats and incidents within our organization. Maintaining the organization’s security strategies to respond to and protect against security breaches and vulnerabilities. This role will identify shortcomings in documented security standards, make recommendations of Industry best practices, support project leads during deployment of security enhancements, and automation improvements.

The SecOps Cybersecurity Analyst will verify adherence of corporate, network and cloud security controls, support implementing strategies to ensure that Procare’s applications and platform are compliant with security compliance and standards such as PCI-DSS, PCISAQ-D, SOC2 Type II, FERPA, NIST CSF. Additionally, this position will participate in bimonthly on-call rotation for security incidents.

The successful candidate will bring a strong passion for cybersecurity, teamwork and use prior experience, insights, and knowledge to help contribute to Procare’s cybersecurity objectives and directives.

What You Will Do

Perform hands on operational support of threat identification, monitoring of vulnerabilities and risks to Procare’s environments and applications

Utilize log ingestion platform(s) for security analytics & identification of tactics, techniques and patterns of attacks 

Monitor the threat landscape and advise on emerging security threats, attack vectors and methodology and risk to the organization 

Install, configure, and maintain security tools and technologies, such as security information and event management (SIEM) systems 

Manage the Cybersecurity Incident Response (CISRT) process, tickets, reports and root cause analysis (RCA) 

  • Investigate and respond to security incidents, analyzing the root cause, mitigating the impact, and coordinating implementing corrective measure 
  • Maintain accurate and detailed incident reports, security assessments, and other documentation related to security activities 
  • Work with other groups and teams to ensure effective security measures and incident response 

Monitor deployed system agents verifying adherence to corporate policies

Monitor patching of workstation, servers and infrastructure hardware and systems 

Monitoring of multiple environments including corporate, production, testing and development for new threats and risks 

Continuously monitor network traffic, system logs, and security alerts for suspicious activities or anomalies that may indicate a security incident

Manage corporate secure email gateway solution 

Manage secure email certificates 

Participate in deployment of proactive security monitoring and alerting capabilities 

Communicate insight into strategic security initiatives to improve capabilities through automation, process enhancement, and analyst 

Identify improvement opportunities and provide recommendations for best practice process improvements and process automation 

Validate security standards and benchmarks for hardware and Operating Systems

Update monthly security metrics for distribution to the leadership team 

Work with internal and external auditors during security audits and assessments to ensure compliance

Provide operational support, ensuring systems and devices are online and available which may include 24x7 on-call support rotation or as needed

Our Ideal Candidate Will Have

  • BA/BS degree or higher and 8+ years' of experience in cybersecurity or combination of education and relevant experience
  • 5+ years’ experience working in an incident Response/Cybersecurity operations center (in-house or outsourced), creating escalating, and managing security incidents and creating incident reports 
  • 3+ years' of working with security tools such as SIEM, Analytics & Intelligence, Malware detection, Data Loss Protection & Identity & Access Management 
  • Deep expertise in threat intelligence, incident response, SIEM, EDR/MDR, SOAR, Vulnerability Management
  • Currently hold one or more security certifications (CISSP, CISA, CRISC, CEH,SCS-C02, CSA, SSCP, CSOP) 
  • Solid understanding of system & security controls on at least two OS’s (Windows, Linux / Unix, and MacOS (Advantage), including host-based forensics and experience with analyzing OS artifacts 
  • Strong understanding of network security concepts, security protocols, and cybersecurity best practices 
  • Experience with security tools and technologies, such as firewalls, intrusion detection / prevention systems, and SIEM systems 
  • Experience with creation of management dashboards for leadership team 
  • Ability to analyze security logs, network traffic, and other data sources to identify security treats 
  • Strong problem-solving and analytical skills 
  • Hands on experience with cloud services, Kubernetes and Docker and the major cloud providers (AWS, Azure, GCP) 
  • Knowledge of implementation of the AWS architected framework with an emphasis on the security pillar 
  • Strong verbal and written communication skills; ability to drive discussions and influence decision making; strong presentation and reporting skills 
  • Participation in more than one full SOC2 and/or PCI-DSS audit cycle (Advantage) 
  • Experience in Agile development methodologies using JIRA 
  • Prior experience with security tools such as Qualys, Rapid7, Splunk, CrowdStrike Falcon, Nessus, Kali 
  • Understanding of cryptographic algorithm utilized by public blockchain networks & other cryptography-related topics (Advantage) 
  • Excellent communication and interpersonal skills 
  • Ability to excel in a rapidly changing environment 
  • Ability to multitask high priority projects 
  • Ability to work independently and as part of a team

Why Procare?

  • Excellent comprehensive benefits packages including: medical, dental, & vision plans
  • HSA option with employer contributions
  • Vacation time, holidays, sick days, volunteer & personal days
  • 401K Plan with employer match and immediate vesting
  • Employee Stock Purchase Plan
  • Employee Discount Program
  • Medical, Dependent Care, and Transportation FSA Plans
  • Company paid Short and Long-Term disability and Life Insurance
  • RTD EcoPass for all Denver employees
  • Tuition Reimbursement and continued Professional Development
  • Fast paced, high energy workplace environment in prime downtown location
  • Regular company provided meals

Salary

$80,000-$120,000/year DOE

Location

While our preference is a candidate located in Denver, CO, this role is open to remote candidates in the following states: AL, AZ, CA, CO, CT, FL, GA, ID, IL, IN, IA, KY, ME, MD, MA, MI, MN, MO, NV, NJ, NY, NC, OH, OR, PA, TN, TX, VA, WA, WI.

 

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Computer Software / SaaS
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Problem Solving
  • Communication
  • Analytical Skills
  • Time Management
  • Teamwork

Cybersecurity Analyst Related jobs