By living according to a common set of values, we create a culture that unifies, embraces the uniqueness we all bring to the company, and positions Integer for long-term success.
At Integer, our values are embedded in everything we do.
Customer
We focus on our customers' success
Innovation
We create better solutions
Collaboration
We create success together
Inclusion
We always interact with others respectfully
Candor
We are open and honest with one another
Integrity
We do the right things and do things right
Accountabilities & Responsibilities:
- Adheres to Integer's Values and all safety, environmental, security and quality requirements including, but not limited to: Quality Management Systems (QMS), Safety, Environmental and Security Management Systems, U.S. Food and Drug Administration (FDA) regulations, company policies and operating procedures, and other regulatory requirements.
- Actively hunts for potential threats. Translates findings into an iterative process and deploys them in the SIEM and EDR solutions.
- Build, implement, and deploy detections, automations, and alerts using modern software engineering
- Review alerts generated by detection infrastructure for false positives and modify alerts as needed (Tuning)
- Develop, plan, lead and participate in Purple Team/Tabletop Exercises focusing on and discovering and mitigating emerging threats
- Analyze, Deploy and Prioritize new Threat Intel
- Design and implement Insider Threat program
- Develop and document new threat hunting strategies to increase our capabilities and find new threats
- Create detailed Incident Reports and contribute to lessons learned in collaboration with the appropriate team
- Keep up to date with information security news, techniques, and trends
- Collaborate with the SOC Team members to contain and investigate major incidents
- Provide simple and reusable hunt tactics and techniques to a team of security engineers and SOC analysts
- Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs (Tactics, Techniques, and Procedures)
- Responsible for continuously researching, assessing and prioritizing cyber threats based on internal and external relevance, and impact
- Other duties as assigned
Education & Experience:
- Minimum Education: Bachelor's Degree in Computer Science, or equivalent (6+ years) work experience.
- Minimum Experience: 4+ years of experience with IT Security; Experience in a publicly held IT organization preferred
- Requirement to speak, read AND write in English with a minimum of 85% proficiency
Knowledge & Skills:
- Special Skills:
- Able to use assessment tools and other security tools found in large network environments; along with the ability to work with Security Information and Event Management (SIEM) solutions.
- Must be able to work on-site
- Able to communicate security events, potential impacts, and actions taken to higher-tier resolvers and management team
- Very organized and detail oriented
- Outside of the box learning mindset
- Specialized Knowledge:
- CISSP or similar security certification recommended - In addition, CISSP-ISSEP, CISA, CRISC, and ITIL ITSM Foundation is desirable
- Working knowledge of the MITRE Attack framework
- Working knowledge security framework models such as ISO 27000 series, NIST CSF, COBIT, etc
- Other:
- Displays the highest standard of integrity (demonstrated by an unblemished career history, complete lack of criminal convictions etc.), and willing to undergo vetting and/or personality assessments to verify, if necessary.
U.S. Applicants: EOE/AA Disability/Veteran