Minimum of 7 years of experience in security operations and incident response., Hands-on experience leading incident management in multi-cloud environments like AWS, Azure, or GCP., Strong knowledge of adversary tactics, techniques, and procedures, with expertise in cyber investigations and cloud-native response., Bachelor's degree in a technical field or equivalent work experience..
Key responsibilities:
Lead and serve as the highest escalation point for technical analysis and incident response.
Manage complex incident response scenarios, guiding both technical and non-technical teams.
Collaborate with cross-functional stakeholders to address security challenges and enhance threat management programs.
Develop hypotheses, perform detection engineering, and recommend remediation strategies based on analysis.
Report this Job
Help us maintain the quality of our job listings. If you find any issues
with this job post, please let us know. Select the reason you're reporting
this job:
Ro Healthtech: Health + Technology Scaleuphttps://ro.co/
201 - 500
Employees
About Ro
Ro is a direct-to-patient healthcare company providing high-quality, affordable healthcare without the need for insurance. Ro is the only company to seamlessly connect telehealth and in-home care, diagnostics, labs, and pharmacy services nationwide. This is enabled by Ro’s vertically integrated platform that powers a personalized, end-to-end healthcare experience from diagnosis, to delivery of medication, to ongoing care. Since 2017, Ro has facilitated more than eight million digital healthcare visits in nearly every county in the United States, including 98% of primary care deserts. Ro also provides its patient-centric solutions including Workpath, its in-home care API, and Kit, its at-home diagnostic testing service, to other healthcare companies.
Ro is a directtopatient healthcare company with a mission of helping patients achieve their health goals by delivering the easiest, most effective care possible. Ro is the only company to offer nationwide telehealth, labs, and pharmacy services. This is enabled by Ros vertically integrated platform that helps patients achieve their goals through a convenient, endtoend healthcare experience spanning from diagnosis, to delivery of medication, to ongoing care. Since 2017, Ro has helped millions of patients, including one in every county in the United States, and in 98% of primary care deserts.
Ro has been recognized as a Fortune Best Workplace in New York and Health Care for four consecutive years (20212024). In 2023, Ro was also named Best Workplace for Parents for the third year in a row. In 2022, Ro was listed as a CNBC Disruptor 50.
The Role:
We are seeking a Staff Security Analyst with with demonstrable experience leading comprehensive incident response engagements, capable of developing innovative solutions to track and defend against sophisticated adversaries, and brings a broad vision and a deep understanding of the cybersecurity tradecraft.
Successful candidates will have successfully led complex incident response scenarios in a multicloud environment in the last 3 years. They will bring handson technical experience investigating adversary tactics, techniques, and procedures, and are fluent in interpretting complex events and anomalies as a seasoned security operations professional. The candidate will be comfortable navigating between strategic and task level discussions gracefully, collaborating with other crossfunctional experts, and representing the SOC as our subject matter expert.
Preferred candidates will be assertive but openminded critical thinkers with a high ownership mentality, understanding they own the goals and the outcomes. They’re comfortable displaying humility in an environment where it’s not about “being right”, rather we are all responsible for “getting it right”. They thrive working in challenging and hypermodern, multicloud, SAASnative environments with containerbased firstparty application architectures that are monitored with contemporary security controls.
What Youll Do:
Serve as the SOC’s highest point of escalation for technical analysis and response, shape program strategy as a trusted individual contributor, and mentor analyst teammates toward improvement.
Command incident response engagements as a handson crossfunctional expert, leading both technical and nontechnical colleagues, partners, and business leaders through complex scenarios.
Impact threat management program strategy across multiple competency domains including external threat, insider threat, threat intelligence, data security, fraud management, and physical security.
Work with stakeholders such as IT, Security Engineering, Product Security, Infrastructure, Privacy, and Legal teams to solve security challenges at scale, and enhance program capability.
Discover unknown technical risks, correlate disparate data sources to acquire evidence, and apply superior analytical techniques in pursuit of proposing your recommended remediation strategy.
Develop new hypotheses and perform detection engineering upon a rich dataset to discover adversary tactics, techniques and procedures aligned with our program’s threat intelligence.
What Youll Bring:
7 years of experience in a security operations and incident response role, with a bachelor’s degree in a technical field or equivalent work experience.
Real world experience in incident management, crisis management, andor breach response with an indepth knowledge of applying both manual and automated response procedures.
Handson experience performing complex investigations and leading incident responses in AWS, Azure, or GCP environments, with experience interpreting and securing multicloud architectures.
Seasoned SOCCIRT operator fluent in cyber investigations, cloud native response, networkhost intrusion analysis, with strong knowledge of adversary tactics, techniques, and procedures.
Broad understanding of the risks facing the security industry, current and emerging threats, and varied approaches to applying modern controls in order to mitigate enterprise risks.
Nice to have: certified GXIH, GCIH, GCFR, GCSA, GCTD, GCFA, GWEB, AWSSecurity or equivalents.
Weve Got You Covered:
Full medical, dental, and vision insurance + OneMedical membership
Healthcare and Dependent Care FSA
401(k) with company match
Flexible PTO
Wellbeing + Learning & Growth reimbursements
Paid parental leave + Fertility benefits
Pet insurance
Student loan refinancing
Virtual resources for mindfulness, counseling, and fitness
We welcome qualified candidates of all races, creeds, genders, and sexuality to apply.
The target base salary for this position ranges from $186,000 $227,000 in addition to a competitive equity and benefits package (as applicable). When determining compensation, we analyze and carefully consider several factors, including location, jobrelated knowledge, skills and experience. These considerations may cause your compensation to vary.
Ro recognizes the power of inperson collaboration, while supporting the flexibility to work anywhere in the United States. For our Ro’ers in the tristate (NY) area, you will join us at HQ on Tuesdays and Thursdays. For those outside of the tristate area, you will be able to join inperson collaborations throughout the year (i.e., during team onsites).
At Ro, we believe that our diverse perspectives are our biggest strengths — and that embracing them will create real change in healthcare. As an equal opportunity employer, we provide equal opportunity in all aspects of employment, including recruiting, hiring, compensation, training and promotion, termination, and any other terms and conditions of employment without regard to race, ethnicity, color, religion, sex, sexual orientation, gender identity, gender expression, familial status, age, disability andor any other legally protected classification protected by federal, state, or local law.