
Security Operations Analyst | US he...
Qualifications & Requirements
Experience Level: Mid Level
Full Job Description
About Us
SpectraMedix is at the forefront of transforming healthcare, empowering health plans and health systems with the tools and insights they need to provide better, more cost-effective care to the communities they serve. Our cutting-edge platform delivers advanced analytics that help organizations excel in the transition to new value-based payment (VBP) models. By combining advanced technology with a team of seasoned experts, we provide a unique solution tailored to meet the needs of the healthcare industry during this critical phase of value-based care evolution. Our platform is strategically designed to guide health plans, accountable care organizations, and health systems in their journey toward achieving success in value-based payment initiatives.
Roles & Responsibilities
Security Monitoring & Incident Response
- Monitor, triage, and investigate security alerts generated by security tools (e.g., Sophos, Azure Monitor, Log360, server OS and application logs).
- Act as the first responder for confirmed security events, including malware detections, suspicious logins, anomalous system behaviour, and phishing reports.
- Perform containment actions (e.g., isolate endpoints, disable accounts, block indicators) following approved procedures.
- Escalate incidents to the IT Security Analyst or Incident Response team with documented findings and evidence.
- Maintain accurate incident records, timelines, and response actions in incident tracking systems.
Operational Security Tasks
- Execute daily, weekly, monthly, quarterly, and annual security operational tasks as defined in the System Security Plan and security runbooks.
- Review endpoint, server, and system logs for indicators of compromise or policy violations.
- Validate vulnerability scan results and assist with remediation tracking.
- Assist with access reviews, security control verification, and operational evidence collection.
Phishing & User-Reported Events
- Analyze reported phishing emails and user-submitted security issues or concerns.
- Determine legitimacy, remove malicious content, and take corrective action (e.g., user guidance, IOC blocking).
- Track phishing trends and recurring patterns for reporting to the security team.
Collaboration & Escalation
- Work closely with IT infrastructure, DevOps, data management and application development teams during incident investigations and remediation.
- Support the IT Security Analyst during audits, assessments, and tabletop exercises by providing operational evidence.
- Follow defined escalation paths and incident severity classifications.
Continuous Improvement
- Provide feedback on alert quality, false positives, and detection gaps.
- Contribute to improving SOC procedures and runbooks, incident response procedures, and alert tuning.
- Stay current on common attack techniques, indicators, and defensive best practices relevant to healthcare data environments.
Profile
- 2-4 years of experience in security operations, SOC, or incident response roles.
- Hands-on experience monitoring and responding to security alerts.
- Familiarity with endpoint detection and response (EDR), SIEM, and log monitoring tools.
- Working knowledge of:
- Networking items (TCP/IP, DNS, HTTPS, SSH, SFTP)
- Authentication and access control concepts
- Intrusion detection, malware, phishing, and common attack techniques
- Experience working within documented procedures and escalation models.
Preferred Certifications
- CompTIA Security+
- CompTIA CySA+
- Certified SOC Analyst (CSA)
- Equivalent entry-to-mid-level security certifications
Tools & Technologies
- Endpoint Protection / EDR: Sophos
- Logging & Monitoring: Azure Monitor, Qualys, ManageEngine Endpoint Central, Log360
- Infrastructure & OS: Windows Server, Linux
- Cloud Platforms: Microsoft Azure
- Ticketing / Incident Tracking Systems
Non-Technical / Behavioural competencies required
- Must have worked with US based clients in onsite/offshore delivery model.
- Strong verbal and written communication, technical articulation, listening, and presentation skills are essential.
- Should have proven analytical and problem-solving skills.
- Demonstrated expertise in prioritization, time management, and stakeholder management (both internal and external) is necessary.
- Should be a quick learner, self-starter, proactive, and an effective team player.
- Must have experience working under tight deadlines within a matrix organizational structure.
Company
Spectramedix
SpectraMedix is a leading innovator in healthcare technology, dedicated to equipping health plans and health systems with advanced tools and insights for delivering superior, cost-effective patient ca...