Centene Corporation Logo

Centene Corporation

Senior Incident Response Analyst

Posted 24 Days Ago
Be an Early Applicant
Remote
13 Locations
85K-158K Annually
Mid level
Remote
13 Locations
85K-158K Annually
Mid level
This role involves resolving security incidents, implementing security measures, and collaborating on threat detection and response efforts. Responsibilities include conducting audits, analyzing logs, and improving compliance against security standards.
The summary above was generated by AI

You could be the one who changes everything for our 28 million members by using technology to improve health outcomes around the world.  As a diversified, national organization, Centene's technology professionals have access to competitive benefits including a fresh perspective on workplace flexibility.
 

Position Purpose:

Resolves security incidents, recommending enhancements to improve security, identifying common attack patterns to publicly exposed aspects of the organization's environment, and contributing to the implementation of scalable and preventative security measures. Executes enterprise-wide Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team.

  • Reviews current configurations of Centene’s production information systems and networks against compliance standards.
  • Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated.
  • Implements and discuss security service audit schedules, review access authorization, and perform the required access controls testing to identify security shortfalls.
  • Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene’s systems has been detected.
  • Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene.
  • Notifies internal and/or external teams according to agreed alert priority levels, escalation trees, triaging of security alerts, events, and notifications.
  • Ties third party attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems.
  • Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users.
  • Performs other duties as assigned.
  • Complies with all policies and standards.

Education/Experience:

A Bachelor's degree in a quantitative or business field (e.g., statistics, mathematics, engineering, computer science).
Requires 4 – 6 years of related experience.
Or equivalent experience acquired through accomplishments of applicable knowledge, duties, scope and skill reflective of the level of this position.
Technical Skills:

  • 4-6 years of Cloud cybersecurity experience performing incident triage and response
  • Intermediate-to-advanced understanding of AWS and Azure environments
  • Knowledge of tools, techniques, and processes (TTP) used by threat actors
  • Knowledge of Indicators of compromise (IOC)
  • Knowledge of Wiz & Wiz Defend
  • Experience with Endpoint protection and enterprise detection & response software (such as CrowdStrike, MS Defender, etc.)
  • Knowledge of Network and infrastructure technologies including routers, switches, firewalls, etc.

Soft Skills:

  • Intermediate - Seeks to acquire knowledge in area of specialty
  • Intermediate - Ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
  • Intermediate - Ability to work independently
  • Intermediate - Demonstrated analytical skills
  • Intermediate - Demonstrated project management skills
  • Intermediate - Demonstrates a high level of accuracy, even under pressure
  • Intermediate - Demonstrates excellent judgment and decision making skills

License/Certification:

  • SANS GIAC Security Essentials (GSEC), SANS GIAC Certified Intrusion Analyst (GCIA) or equivalent, SANS GIAC Certified Incident Handler (GCIH) or equivalent preferred

Pay Range: $85,300.00 - $158,100.00 per year

Centene offers a comprehensive benefits package including: competitive pay, health insurance, 401K and stock purchase plans, tuition reimbursement, paid time off plus holidays, and a flexible approach to work with remote, hybrid, field or office work schedules.  Actual pay will be adjusted based on an individual's skills, experience, education, and other job-related factors permitted by law.  Total compensation may also include additional forms of incentives.

Centene is an equal opportunity employer that is committed to diversity, and values the ways in which we are different. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or other characteristic protected by applicable law.

Qualified applicants with arrest or conviction records will be considered in accordance with the LA County Ordinance and the California Fair Chance Act

Top Skills

AWS
Azure
Crowdstrike
Ms Defender
Wiz
Wiz Defend

Similar Jobs

2 Days Ago
Remote
14 Locations
85K-158K Annually
Mid level
85K-158K Annually
Mid level
Healthtech
The role involves resolving security incidents, implementing preventative measures, collaborating on threat detection, and preparing for security breaches. Involvement includes compliance reviews, incident management, and post-mortem analyses.
Top Skills: Carbon BlackCrowdstrikeEndpoint Protection SoftwareNetwork Infrastructure TechnologiesSoar Platforms
4 Days Ago
Remote
13 Locations
Senior level
Senior level
Healthtech
The Principal Incident Response Analyst (Cloud) responds to cybersecurity threats, enhances security measures, and collaborates with teams for incident response.
Top Skills: Cloud InfrastructureEndpoint ProtectionEnterprise Detection & Response SoftwareFirewallsIam In The CloudRoutersSwitches
2 Days Ago
Remote
14 Locations
85K-158K Annually
Mid level
85K-158K Annually
Mid level
Healthtech
The role involves resolving security incidents, implementing preventative measures, collaborating on threat detection, and preparing for security breaches. Involvement includes compliance reviews, incident management, and post-mortem analyses.
Top Skills: Carbon BlackCrowdstrikeEndpoint Protection SoftwareNetwork Infrastructure TechnologiesSoar Platforms

What you need to know about the Los Angeles Tech Scene

Los Angeles is a global leader in entertainment, so it’s no surprise that many of the biggest players in streaming, digital media and game development call the city home. But the city boasts plenty of non-entertainment innovation as well, with tech companies spanning verticals like AI, fintech, e-commerce and biotech. With major universities like Caltech, UCLA, USC and the nearby UC Irvine, the city has a steady supply of top-flight tech and engineering talent — not counting the graduates flocking to Los Angeles from across the world to enjoy its beaches, culture and year-round temperate climate.

Key Facts About Los Angeles Tech

  • Number of Tech Workers: 375,800; 5.5% of overall workforce (2024 CompTIA survey)
  • Major Tech Employers: Snap, Netflix, SpaceX, Disney, Google
  • Key Industries: Artificial intelligence, adtech, media, software, game development
  • Funding Landscape: $11.6 billion in venture capital funding in 2024 (Pitchbook)
  • Notable Investors: Strong Ventures, Fifth Wall, Upfront Ventures, Mucker Capital, Kittyhawk Ventures
  • Research Centers and Universities: California Institute of Technology, UCLA, University of Southern California, UC Irvine, Pepperdine, California Institute for Immunology and Immunotherapy, Center for Quantum Science and Engineering

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account