Security Analyst

Be among the first applicants.
eHealth Saskatchewan
Regina
CAD 60,000 - 80,000
Be among the first applicants.
4 days ago
Job description
Employment Type: Permanent Full-time
Location(s): SK-Rgna-Regina
Salary Range: $42.394- $51.582 Hourly
Salary Supplement: included in hourly salary range (in-scope)

Why eHealth?
We may be biased, but eHealth Saskatchewan is the place to be right now! As the result of a province wide consolidation of IT services in the health care sector, we have seen substantial growth in our organization that is only going to increase as we aim to meet our expanded mandate and the immense need for our support. This gives our people a unique opportunity to truly create, build, improve, and leave their mark on a growing organization.

A large and complex organization, eHealth is comprised of 30+ clinical and non-clinical program (service) areas that all work together to support health care providers and teams across the province in delivering the best possible care to patients, providers, citizens, and health system users.

The eHealth teams engage directly with health system partners and other stakeholders both provincially and federally to ensure all services are delivered efficiently and effectively.

About the Role:
This position will be responsible for performing all procedures necessary to ensure the safety of residents of Saskatchewan’s personal health information. This may include monitoring various eHealth systems, responding to security alerts and issues, and performing root cause analysis for security related incidents. In addition, a key aspect of this role will be performing vulnerability assessments and penetration testing, including infrastructure, web and application testing, using both manual and automated techniques.

A key to success in this role is building strong relationships, having a strong customer focus, a knack for solving complex problems, and making connections by knowing who else to involve and when. To make that happen, you will possess exceptional written and verbal communication skills and thrive in a dynamic, complex technology driven environment.

Typical Daily Duties:
  • Monitor and analyze NetFlow traffic on security technologies, Intrusion Detection Systems on NGFW, EDR, VMDR, email security alerts including security events and logs.
  • Lead incident response activities to swiftly and effectively investigate and address security events and incidents.
  • Automate and integrate various security technologies to enhance extended detection and response capabilities.
  • Conduct root cause analysis after incident recovery and provide suitable recommendations for prevention.
  • Evaluate, implement, and manage security tools and technologies to enhance the overall security posture.
  • Work together with cross-functional teams to ensure that security is incorporated into every facet of our business processes.
  • Stay up to date with the latest security trends, vulnerabilities, and threats specific to healthcare and make recommendations for security improvements.
  • Assist in implementing threat detection and response solutions to include intrusion detection systems, malicious code and program monitoring, unauthorized technology identification, and log activity monitoring via automation, programming, and scripting techniques.
  • Identify common false positives and make suggestions on tuning security technologies via automation capabilities where possible.
  • Lead forensics investigations and associated tracking related to information security concerns and incidents.
  • Use problem solving methodology for decision making and follow up.
  • Foster strong working relationships with internal clients and department leaders.
  • Assist in developing corporate security policies, standards, procedures, and plans, while identifying ways to enhance efficiency.
  • Potential On-Call after hours support.
What are we looking for?
  • Experience working in similar roles with programming capabilities to assist in automation, scripting, and cross technology security integrations.
  • Ability to code in PowerShell, Python, and Java. Experience with API’s and integrating security technologies for correlation of telemetry.
  • Confident “people person” that can casually establish and maintain productive working relationships.
  • Working knowledge of SOAR technologies and capability to create automated runbooks and playbooks.
  • Experience in multiple security domains such as vulnerability management, endpoint detection and response, email security, certificate management, etc.
  • Strong communication and presentation skills, knowledge of cyber security principles, and the ability to create documentation and reference guides.
  • Attentive, organized, and good attention to detail with quick learning & multitasking abilities.
  • Very good knowledge of Office 365 and related Microsoft Security products, such as Exchange Online Protection.
  • Knowledge of basic network security protocols and network security technologies (e.g. firewalls, routers, authentication mechanisms, IPSEC VPN) is preferred.
  • Security Certifications such as CISSP, CISA, or CISM is recommended.

The knowledge and skills required for this position would typically be attained through the completion of a post-secondary degree in Cyber Security, Engineering, Information Technology, Computer Science, or other relevant education. In addition to educational requirements, the successful candidate will have at least five years of experience working within a similar Security Analyst role. An equivalent combination of education and experience may be considered.

Competencies
Communication
  • Write a variety of detailed, accurate and clear (technical) material such as user, systems and requirements, documentation and procedures, project plans letters, requests for proposals, feasibility studies, recommendations and reports, at a level appropriate to the target groups.
  • Orally explain or present (technical) information to a wide variety of technical and non-technical individuals and/or groups in a clear, accurate and understandable manner.
  • Demonstrate and promote the use and value of new technology, programs and services in a manner that creates understanding, captures interest and enhances user’ computer skills.
Leadership
  • Facilitate a group process to successfully implement technological change and business transition within the organization.
Independence
  • Independently interpret, comprehend and apply technical instructions and concepts to successfully acquire, install, modify, configure and maintain hardware and software components and administer networks.
Problem Solving
  • Diagnose technical problems such as delays, malfunctions and errors in order to determine the true cause of the problem and provide a workable/reasonable/optimal solution in a reasonable timeframe.
  • Extract, recall, synthesize, conceptualize and apply ideas, processes and information to incorporate new technology and create new solutions in a constantly changing technological and business environment.
  • Identify and respond to issues and concerns of others who may be angry or frustrated to reach a mutual understanding.
Teamwork
  • Create an environment that recognizes, supports, respects and welcomes diversity of employees and clients.
  • Work independently and participate as a team member to meet the needs of clients and co-workers and to build productive, positive work relationships.
Organization
  • Independently prioritize and organize one’s own workload to meet tight deadlines and successfully complete projects in a changing environment.
Analytical
  • Gather, understand and synthesize specialized information in a way that can be applied to meet the needs of the organization and within given constraints.
Technical
  • Identify, explore and evaluate options on data, processes and methodologies, information technology and potential systems design to make feasible recommendations.
  • Design new or adapt existing systems/applications, taking into account design alternatives, business requirements and cost, resources and time constraints.
  • Create and or modify a sequence of computer instructions in order to compile, link, build and test computer executable that meet design requirements within established guidelines.

If you are looking for an opportunity to challenge yourself and showcase your abilities, we would love to hear from you!

Grade: SIT11
Anticipated start date: Dec, 2024
Location: Regina, SK (On-site)

Number of Openings: 1
Closing Date: Nov 24, 2024, 11:59:00 PM

We are committed to workplace diversity.

Contact Us: recruitment@eHealthSask.ca
Get a free, confidential resume review.
Select file or drag and drop it
Avatar
Free online coaching
Improve your chances of getting that interview invitation!
Be the first to explore new Security Analyst jobs in Regina