Centene Corporation Logo

Centene Corporation

Senior Incident Response Analyst

Posted Yesterday
Be an Early Applicant
Remote
14 Locations
85K-158K Annually
Mid level
Remote
14 Locations
85K-158K Annually
Mid level
The role involves resolving security incidents, implementing preventative measures, collaborating on threat detection, and preparing for security breaches. Involvement includes compliance reviews, incident management, and post-mortem analyses.
The summary above was generated by AI

You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world.  As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.
 

Position Purpose:
Resolves security incidents, recommending enhancements to improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team.

  • Reviews current configurations of Centene’s production information systems and networks against compliance standards
  • Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated
  • Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls
  • Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene’s systems has been detected
  • Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene
  • Notifies internal and/or external teams according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications
  • Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems
  • Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users
  • Performs other duties as assigned
  • Complies with all policies and standards

Education/Experience:
A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science) and Requires 4 – 6 years of related experience.
Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.
Technical Skills:

  • Knowledge of Tools, techniques and processes (TTP) used by threat actors
  • Knowledge of Indicators of compromise (IOC)
  • Experience with SOAR platforms (such as Splunk SOAR, Palo Alto Cortex XSOAR, Tines, Torq)
  • Experience with Endpoint protection and enterprise detection & response software (such as CrowdStrike or Carbon Black)
  • Knowledge of Network and infrastructure technologies including routers, switches, firewalls, etc.

Soft Skills:

  • Intermediate - Seeks to acquire knowledge in area of specialty
  • Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
  • Intermediate - Ability to work independently
  • Intermediate - Demonstrated analytical skills
  • Intermediate - Demonstrated project management skills
  • Intermediate - Demonstrates a high level of accuracy, even under pressure
  • Intermediate - Demonstrates excellent judgment and decision making skills

License/Certification:

  • CompTIA Cybersecurity Analyst (CySA+), CompTIA Advanced Security practitioner (CASP+), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), or equivalent recommended

Pay Range: $85,300.00 - $158,100.00 per year

Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules.  Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law.  Total compensation may also include additional forms of incentives.

Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.

Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act

Top Skills

Carbon Black
Crowdstrike
Endpoint Protection Software
Network Infrastructure Technologies
Soar Platforms

Similar Jobs

23 Days Ago
Remote
13 Locations
85K-158K Annually
Mid level
85K-158K Annually
Mid level
Healthtech
This role involves resolving security incidents, implementing security measures, and collaborating on threat detection and response efforts. Responsibilities include conducting audits, analyzing logs, and improving compliance against security standards.
Top Skills: AWSAzureCrowdstrikeMs DefenderWizWiz Defend
23 Days Ago
Remote
13 Locations
85K-158K Annually
Mid level
85K-158K Annually
Mid level
Healthtech
This role involves resolving security incidents, implementing security measures, and collaborating on threat detection and response efforts. Responsibilities include conducting audits, analyzing logs, and improving compliance against security standards.
Top Skills: AWSAzureCrowdstrikeMs DefenderWizWiz Defend
3 Days Ago
Remote
13 Locations
Senior level
Senior level
Healthtech
The Principal Incident Response Analyst (Cloud) responds to cybersecurity threats, enhances security measures, and collaborates with teams for incident response.
Top Skills: Cloud InfrastructureEndpoint ProtectionEnterprise Detection & Response SoftwareFirewallsIam In The CloudRoutersSwitches

What you need to know about the Boston Tech Scene

Boston is a powerhouse for technology innovation thanks to world-class research universities like MIT and Harvard and a robust pipeline of venture capital investment. Host to the first telephone call and one of the first general-purpose computers ever put into use, Boston is now a hub for biotechnology, robotics and artificial intelligence — though it’s also home to several B2B software giants. So it’s no surprise that the city consistently ranks among the greatest startup ecosystems in the world.

Key Facts About Boston Tech

  • Number of Tech Workers: 269,000; 9.4% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Thermo Fisher Scientific, Toast, Klaviyo, HubSpot, DraftKings
  • Key Industries: Artificial intelligence, biotechnology, robotics, software, aerospace
  • Funding Landscape: $15.7 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Summit Partners, Volition Capital, Bain Capital Ventures, MassVentures, Highland Capital Partners
  • Research Centers and Universities: MIT, Harvard University, Boston College, Tufts University, Boston University, Northeastern University, Smithsonian Astrophysical Observatory, National Bureau of Economic Research, Broad Institute, Lowell Center for Space Science & Technology, National Emerging Infectious Diseases Laboratories

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account