• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
AskCyber Home » News » Jobs » Security Analyst – HealthVerity

Security Analyst – HealthVerity

2020-11-10 by Geo

Cyber Security Job Philadelphia

As a part of our SecOps team, you will be at the front line of our security monitoring, risk assessment, escalation, and remediation processes.

Company Location: Philadelphia, PA, US

How you will help

As a part of our SecOps team, you will be at the front line of our security monitoring, risk assessment, escalation, and remediation processes. You will deep dive on every security alert, help tune monitoring and alerting systems, and investigate all avenues of risk to our people, systems, and data.

What you will do

  • Manage and triage technical security issues and events
  • Handle day to day monitoring of compliance, vulnerability scanning, and network security scanning
  • Assist in policy maintenance and documentation of the environment
  • Research new InfoSec trends and analyze threat Intelligence reports through subscribed feeds
  • Maintain and/or create computer incident response documentation and methodology for responding to security events
  • Schedule and execute monthly, quarterly, and annual security tasks and follow up with staff on any issues found
  • Bolster existing SDLC processes through implementation of code scanning and reporting systems
  • Ensure DR/BC processes are validated and complete

You…

  • Are a careful listener who absorbs information well and takes the initiative to implement improvements
  • Make security a priority in everything you do
  • Have a basic familiarity with HIPAA, NIST CSF
  • Keep up to date on data science tools and distributed computing methodologies
  • Are familiar with scalable and/or cluster compute architectures
  • Know the relevance of monitoring and measuring systems to identify bottlenecks
  • Are comfortable with Shell scripting, Python, Ruby, or similar languages

See Cyber Security Training

Desired Skills And Experience

  • 3-5 years system administration experience under Linux focused on patching, configuration management, and vulnerability remediation
  • Comfortable with scripting in Python and Bash
  • Working knowledge of Nmap, Nessus, OpenVPN, tcpdump, OpenSSL and other security related tools
  • Understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, internet/intranet/extranet, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes

Our company challenges

  • Empowering clients with highly rewarding data discovery and licensing tools
  • Ingesting and managing billions of healthcare records from a wide variety of partners
  • Standardizing on common data models across data types
  • Orchestrating an industry-leading HIPAA privacy layer
  • Innovating our proprietary de-identification and data science algorithms
  • Building a culture that supports rapid iteration and new possibilities

The infrastructure and culture we are building will provide an environment that cultivates innovation. We want to move fast knowing we can fix anything we break along the way. If a new need arises, we want to turn around a solution quickly. We want to solve our challenges in ways that create even more possibilities. We’re creating a platform that lets us discover what else we might do.

We have big plans

We are building a platform that will scale to support an ever-growing array of data providers and innovative products. You must be able to think big while still delivering on near-term requirements.

HealthVerity, based in Center City Philadelphia, is a venture-backed technology company that is transforming the way data-led organizations make critical decisions. Our technology platform serves as the foundation for the rapid creation, exchange, and management of healthcare and consumer data in a fully-interoperable, privacy-protecting manner. Advantaged by highly sophisticated identity resolution and matching capabilities, HealthVerity is on a mission to increase transparency, forge interoperability and activate deeper insights.


HealthVerity is an equal opportunity employer.

Cyber Security training

(Sponsored)


Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Seniority Level: Associate

Industry

  • Information Technology & Services
  • Computer Software
  • Internet

Employment Type: Full-time

Job Functions

  • Information Technology
LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version