Security Operations Specialist
Philadelphia, PA | contract-to-hire
Technology is the keystone of our client company’s business. A nationally-recognized academic healthcare system in the Delaware Valley, this company’s critical operations (and patients), rely upon it— from electronic medical records (EMRs) and telehealth services, to digital and wireless medical devices. Healthcare technologies are advancing as rapidly as the baby boom population is aging— making it one of the most viable, promising fields.
The candidate will be expected to possess solid IT technical experience, strong communication skills, and must be technically able to hit the ground running in most any back office environment. The candidate must be well-versed and capable of leading an engagement in at least 2 of our core offerings: PCI-related IR/Forensics investigations, Financial Services, Intellectual Property, Computer Security Incident Response Team (CSIRT), Expert Witness/Litigation Support, IR Training, eDiscovery, Mobile Phone Forensics.
The candidate must also be able to assist customers in responding rapidly and effectively to computer-related incidents and should consistently exceed expectations while working in a customer-facing setting. The capability to quickly identify the source of a security breach and move toward containment is essential. Proficiency in conducting live analysis on networks and across multiple platforms is desired. The candidate must possess the ability to articulate well in both written and oral communication. They must also be able to manage multiple projects on a daily basis. The successful candidate must be very detail-oriented and must be able to interact with other staff and customers effectively, in person or by phone. Critical thinking, problem solving and the ability to endure long working hours are vital.
The ability to work extremely well under pressure, while maintaining confidentiality, and a professional image and approach with customers is critical. This position requires competency in the tools, techniques, and methodologies surrounding incident response, computer forensics, and eDiscovery. The ideal candidate should have knowledge and experience in the following operating systems: UNIX, Linux, Windows, MacOS. The candidate must have understanding of information security; network architecture; general database concepts; document management; hardware and software troubleshooting; email systems, such as Microsoft Exchange and Lotus Notes; Microsoft Office applications; and computer forensic tools such as EnCase and FTK. Experience conducting security assessments, penetration testing, and ethical hacking are required.
Education: B. A. or B. S. degree and 4+ years of related industry experience. The successful candidate will have a combination of education and experience related to the essential duties and responsibilities of the position. Previous experience in a security professional services consulting firm is desirable. Demonstrated experience of managing the day-to-day aspects of protected customer relationships, as well as IT investigative cases and corporate security incidents is a must. A successful candidate should have experience in electronic crimes law enforcement, military intelligence, or with a security professional services organization.