• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Vulnerability Intelligence Analyst – Cigna

Vulnerability Intelligence Analyst – Cigna

2020-10-07 by Geo

Company Location: Bloomfield, CT

Seniority Level: Associate

Industry

  • Human Resources
  • Insurance
  • Financial Services

Employment Type: Full-time

 Job Functions

  • Other
  • Information Technology
  • Management

As a member of the Cyber Security Global Threat Management team, the Threat Intelligence and Analysis Information Protection Lead Analyst processes both internal and external Cyber Threat Vulnerability Intelligence for determination of impact, assessment of scope, and implementation of mitigations to defend Cigna’s enterprise through proactive research. They will support the curation and production of threat intelligence and provide critical support for the Vulnerability Management, Threat Hunting, Cyber Security Operations and Incident Response services globally for Cigna.

Motley Fool Stock Advisor
  • Conduct analysis on Vulnerability Intelligence to identify impacted assets or applications
  • Ability to translate intelligence analysis into written or verbal communications to share with senior management information systems professionals, and technical and non-technical users
  • Knowledge of security systems and understands the life cycle of network threats, attacks, attack vectors, and methods of exploitation; conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures
  • Identify threats, trends and new developments in exploits and exploit behavior by adversaries by analyzing raw intelligence and data
  • Able to provide recommendations of security improvements by assessing current efficacy of current capabilities/solutions, evaluating trends and anticipating requirements
  • Fundamental understanding of vulnerabilities, what causes them, how an attacker could leverage them to perform malicious activities and what organizations can do to mitigate them

Skills

  • Ability to quickly and effectively digest disparate data sources to determine security implications and risk levels
  • Able to provide recommendations of security improvements by assessing current efficacy of current capabilities/solutions, evaluating trends and anticipating requirements
  • Strong analytical skills and ability to creatively challenge current methods and procedures
  • Develop, create, and drive current and new reporting methods of Intelligence analysis to peers and leadership teams for purposes of situational awareness and ensuring Intelligence products are actionable
  • Assess identified vulnerabilities to understand their impact and potential mitigation
  • Conduct trending and correlation of cyber intelligence for the purposes of attribution and establish strategic countermeasures
  • Knowledge of virtual environments, Cloud platforms (IaaS), network operating systems, mobile device environments, and data encryption methods
  • Knowledge of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
  • Advanced knowledge of log analysis, traffic flow analysis and experience with associated infrastructure and systems to aid in the identification of malware or other malicious behavior
  • Strong knowledge of a broad array of security tools including Security Information and Event Management (SIEM) system, intrusion detection systems, web proxy systems, threat intelligence platforms and other tools used to assess network security
  • Strong knowledge of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols
  • Construct and exploit threat intelligence to detect, respond, and defeat threats
  • Manage, share, and receive intelligence on adversary groups
  • Leverage intelligence to better defend against and respond to future intrusions
  • Demonstrated ability to work in a team environment both in-person and remotely
  • Excellent written and verbal communication skills, analytical ability, and the ability to work effectively with peers, IT management and senior leaders
  • Must be able to multi-task and work independently on assignments using professional discretion and judgment as well as transition quickly between projects with limited supervision
  • Ability to participate in customer and partner facing meetings and projects, including those that involve technical topics or technical service delivery
  • Must be able to work well under pressure while maintaining a professional image and approach
  • Maintain partnership and memberships to coordinate with appropriate sources within the intelligence community regarding possible security incidents

Get Training!


  • Introduction to Cybersecurity Tools & Cyber Attacks by IBM
  • Financial Markets by Yale University
  • International Cyber Conflicts from the State University of New York
  • Business Foundations by University of Pennsylvania
  • (sponsored)

Education

  • Bachelor’s degree and 2 years of experience in information technology OR 5+ years of Cyber Security focused experience or related IT experience preferred

About Cigna

Cigna Corporation (NYSE: CI) is a global health service company dedicated to improving the health, well-being and peace of mind of those we serve. We offer an integrated suite of health services through Cigna, Express Scripts, and our affiliates including medical, dental, behavioral health, pharmacy, vision, supplemental benefits, and other related products. Together, with our 74,000 employees worldwide, we aspire to transform health services, making them more affordable and accessible to millions. Through our unmatched expertise, bold action, fresh ideas and an unwavering commitment to patient-centered care, we are a force of health services innovation.

When you work with Cigna, you’ll enjoy meaningful career experiences that enrich people’s lives while working together to make the world a healthier place. What difference will you make? To see our culture in action, search #TeamCigna on Instagram.

LinkedIn Apply
Apply on LinkedIn

Qualified applicants will be considered without regard to race, color, age, disability, sex, childbirth (including pregnancy) or related medical conditions including but not limited to lactation, sexual orientation, gender identity or expression, veteran or military status, religion, national origin, ancestry, marital or familial status, genetic information, status with regard to public assistance, citizenship status or any other characteristic protected by applicable equal employment opportunity laws.

If you require an accommodation based on your physical or mental disability please email: SeeYourself@cigna.com. Do not email SeeYourself@cigna.com for an update on your application or to provide your resume as you will not receive a response.

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version