Your expertise in digital forensics, threat hunting, malware analysis, and incident response tools will be essential in identifying and mitigating potential security threats. Perform digital forensics and malware analysis to understand attack vectors and methodologies. Utilize threat intelligence platforms to enhance our detection and response capabilities. Familiarity with threat intelligence platforms and their integration into incident response processes. Relevant security certifications (e.g., GCFA, GCIA, GCIH, CISSP) are a plus.
Ensure compliance with data protection regulations, cybersecurity policies, and audit requirements.. Establish and monitor procedures for data security, access control, encryption, and secure integration.. Support the setup of incident response processes and periodic security testing (e.g., penetration testing, vulnerability scans).. Denodo – data access control and security configuration. IAM, network security, encryption, endpoint security, and secure DevOps practices.
The role serves as the critical bridge between cybersecurity, enterprise technology, and enterprise risk management.. Assess and enhance recovery readiness for core technology services including (but not limited to) identity and access management (IAM), network, DNS, endpoint detection and response (EDR), and cloud platforms.. Define standards for cyber readiness, recovery point/time objectives (RPO/RTO) under attack conditions, and cyber crisis escalation in partnership with enterprise risk management.. Deep understanding and experience in cybersecurity operations, incident response, infrastructure resilience, and threat scenarios (e.g., ransomware, destructive malware).. Prior experience with disaster recovery tools (e.g., Cohesity, Dell Cyber Recovery, AWS/Azure/GCP disaster recovery solutions).
The Cyber Incident Response team provide detection and response to cybersecurity events, events of interest, and incidents for DOHMH. It also collects forensic user evidence requested by legal and investigative entities. Familiarity with cyber threat intelligence and MITRE's ATT&CK framework.. We provide a wide array of programs and services focused on food and nutrition, anti-tobacco support, chronic disease prevention, HIV/AIDS treatment, family and child health, environmental health, mental health, and social justice initiatives. Information Security Analyst (Application Security)Information Security and Compliance Analyst.. Endpoint Security and Identity and Access Management (IAM) Specialist for the Division of HPD TECH
CCSP, GIAC, CISSP, other security credentials or related experience. Experience with cloud environments, in particular Google Compute Platform (GCP), Amazon Web Service (AWS), and Microsoft Azure. Deep familiarity with cloud security platforms, such as Wiz, Orca Security, Divvycloud, Palo Alto Prisma Cloud, etc.. Additional understanding of other cybersecurity practices, such as encryption, identity and access management (IAM), network security, vulnerability management, and incident response. We place the highest value on creating a safe environment where our employees can grow and contribute, and refuse to discriminate on the basis of race, color, religious belief, sex, age, disability, national origin, alienage or citizenship status, marital status, partnership status, caregiver status, sexual and reproductive health decisions, gender identity or expression, sexual orientation, or any other protected characteristic.