Senior Cybersecurity Specialist - Red Team / Threat Simulation / Penetration Tester
Employment Type: Full-Time
Performs all necessary duties to ensure the safety of information technology and operational technology assets and to protect systems from intentional or inadvertent access. This position will frequently collaborate with Cybersecurity Management and provide guidance and direction for the Cybersecurity program. Provides best solutions to identified needs, meeting specific operational and business objectives, technology capabilities, and human resource requirements. Frequently collaborates with Cybersecurity leadership on projects and direction for the Cybersecurity program. Additionally, provides specialized technical expertise and support to clients, IT management, and staff in risk assessments, implementation and operational aspects of Cybersecurity procedures and products. Maintains and fosters the ongoing service relationships throughout the organization.
Job Responsibilities: Maintains baselines for the secure configuration and operations. Tracks all activity, ensuring timely resolution of problems. Leading the identification of advanced security systems and controls to ensure the monitoring and configuring of security appliances. Leads Cybersecurity projects, including planning, obtaining customer input and projecting resource requirements. Collaborates on IT projects to ensure that security issues are addressed throughout the project life cycle. Analyzes and integrates Security Solutions into multiple platforms, including Clinical and Financial Systems. Researches and assesses new threats and security alerts and recommends remedial action. Reviews security system requirements with customers and translates requirements into specific functions or deliverables. Analyzes flow chart processes and recommends ways to reduce steps and increase efficiency through use of technology. May coach or provide guidance to lower-level security professionals and supports the continuous process of optimizing department resources. Effectively communicates security procedures and policies with caregivers. Weighs business needs against security concerns and articulate issues to management. Provides after-hours support. Other duties as assigned.
Preferred Qualifications: Manual evaluation of security controls to identify gaps. Recommending security improvements and controls that may include technical, administrative, and physical measures. Use of offensive security tools and frameworks to validate security controls. Working closely with others on cross-functional teams and exposure to diverse security disciplines. Interacting with other stakeholders (such as information technology departments and business units) to understand the impact of security recommendations and improve security practices. Clear communication of vulnerabilities and associated risks in both written reports and verbal briefings. Ranking and prioritizing vulnerabilities according to risk or potential impact. Utilizing security tools such as Metasploit Framework, Cobalt Strike, BurpSuite and others to audit defensive posture. Assessing security in multiple domains, including network security, cloud environments, application security, wireless security, and physical security. Gathering open source intelligence (OSINT) to prioritize targeting. Familiarity with the MITRE ATT&CK framework to guide testing and reporting. Conducting realistic social engineering engagements to test user awareness. Secure engineering and administration of cloud architectures. Writing programs or scripts to automate routine tasks and facilitate security testing and reporting. Relevant languages include PowerShell, Python, C#, Golang, Ruby, and others. Maturing cybersecurity programs by identifying and documenting areas for improvement and developing and implementing plans
Education: Bachelor’s degree in Information Technology/Computer Science or related field preferred. A High School diploma/GED required.
Certifications: Certifications from SysAdmin, Audit, Network and Security Institute (SANS), International Information Systems Security Certification Consortium (ISC2) or Computing Technology Industry Association (CompTIA) preferred or other position related certifications. Offensive security certifications preferred, such as SANS GPEN, SANS GXPN, SANS GWAPT, OSCP, OSCE, OSWP, CEH. For Information Technology Division caregivers, ITIL Foundations certification is required within 6 months of position start date.
Complexity of Work: Understanding of networking/distributed computing environment concepts. Requires familiarity with complex domain structures, user authentication mechanisms and cryptography. Has in-depth knowledge of intrusion detection and data correlation. Practical knowledge of network topology and the underlying OSI model. Understands principles of client/server configuration. Excellent knowledge of security technology and strong analytical skills. Strong analytical, administrative, presentation, and project management skills are required. Must have strong communication skills (both written and verbal) and the ability to work independently.
Work Experience: High School Diploma/GED: A minimum of 9 years of Information, Clinical or Financial Systems experience required, including directing, planning and scheduling a major information system project, with at least 5 years of Cyber Security required. Bachelor’s Degree: A minimum of 7 years of Information, Cyber Security, Clinical or Financial Systems experience required, including directing, planning and scheduling a major information system project, with at least 5 years of Cyber Security required. Both Bachelor’s Degree and High School Diploma/GED: Experience in providing specialized technical expertise and support to clients, IT management, and staff in risk assessments, implementation and operational aspects of Cybersecurity procedures and products required.
Physical Requirements: Requires the ability to sit and be stationary for prolonged periods of time, normal or corrected vision and manual dexterity sufficient to perform work on a personal computer. Requires the ability to walk to various locations throughout the organization and to function in a stressful environment.
Personal Protective Equipment: Follows standard precautions using personal protective equipment as required.
Keywords: Cyber Security, Cyber, IT Security, Red Team, Threat Simulation, Penetration Tester, Pen Test, PowerShell, Python, C#, Golang, Ruby
The policy of Cleveland Clinic and its system hospitals (Cleveland Clinic) is to provide equal opportunity to all of our employees and applicants for employment in our tobacco free and drug free environment. All offers of employment are followed by testing for controlled substance and nicotine. Job offers will be rescinded for candidates for employment who test positive for nicotine. Candidates for employment who are impacted by Cleveland Clinic’s Smoking Policy will be permitted to reapply for open positions after 90 days. Decisions concerning employment, transfers and promotions are made upon the basis of the best qualified candidate without regard to color, race, religion, national origin, age, sex, sexual orientation, marital status, ancestry, status as a disabled or Vietnam era veteran or any other characteristic protected by law. Information provided on this application may be shared with any Cleveland Clinic facility.
Cleveland Clinic is pleased to be an equal employment employer: Women/Minorities/Veterans/Individuals with Disabilities
Loading some great jobs for you...