StaffAttract
  • Login
  • Create Account
  • Products
    • Private Ad Placement
    • Reports Management
    • Publisher Monetization
    • Search Jobs
  • About Us
  • Contact Us
  • Unsubscribe

Login

Forgot Password?

Create Account

Job title, industry, keywords, etc.
City, State or Postcode

Cybersecurity Analyst

Intermountain Health - St Paul, MN

Apply Now

Job Description

Job Description:The Intermountain Cybersecurity Program is broken into four distinct functions: Governance Risk and Compliance, Cyber Solutions, Cyber Advisory and the Cyber Fusion Center. Cyber Caregivers within Intermountain will specialize in their specific area and function.The Cybersecurity-Staff is responsible for designing, engineering, analyzing and/or assessing key elements of Intermountain's cybersecurity program. Caregivers within this job code will support one of the following aspects of the cyber program: governance, risk and compliance activities, identity and access management, data, endpoint and application security, infrastructure and network security, cyber architecture and standards, reporting and analytics, project management and business liaising.Staff-level professionals are knowledgeable about aspects of cybersecurity and/or IT systems. Typically implements the designs and approaches provided by senior-level members of the team. Functions with oversight and direction from their supervisor.Please note that a video interview through Microsoft Teams will be required as well as potential onsite interviews and meetings.We are committed to offering flexible work options where approved and stated in the job posting. However, we are currently not considering candidates who reside or plan to reside in the following states: California, Connecticut, Hawaii, Illinois, New York, Pennsylvania, Rhode Island, Vermont, and Washington.This is for a Threat Hunting & Intelligence Analyst . The key skills would be a combination of these: Proficiency with SIEM Platforms and writing advanced searches Experience using advanced searches in Endpoint Detection & Response tools Network traffic analysis Familiarity with information sharing frameworks Understanding of MITRE ATT&CK & D3FEND frameworks Scripting/Automation Experience with Threat Intel Platforms Familiarity with Deep & Dark Web Monitoring Experience with OSINT tools and techniques Experience working in and developing a threat intelligence program Threat Intel Collection Management & Lifecycle Tracking Threat Groups Essential FunctionsKnowledgeable of cyber specific functions that could entail any one of the following: Technical configuration, engineering, management and monitoring Risk analysis, corrective action planning, policy development Cyber threat monitoring, prevention, remediation and incident response Policy, procedure and guidance development Architectural design, standards and documentation Server administration and scripting Data compiling, analytics and reporting Cloud operations, cloud security and DevSecOps Automation principles and how they can be applied in IT environments Conducts core incident and task management work for the delivery of cybersecurity services Acts as a primary member for project delivery tasks Knowledgeable of Cybersecurity industry practices Understands detailed IT principles and processes, such as networking, service management, ITIL and applications Receives and responds to incoming calls, pages and/or e-mails. Schedules and performs improvements, upgrades and repairs as assigned. Operational and Incident Response teams participate in 24/7 on-call rotation or work in a swing/night shift rotation Skills Communication Time management Accountability Reliability Professionalism Collaboration Critical thinking Problem solving Knowledgeable of cybersecurity technologies and information systems QualificationsMinimum Qualifications Bachelor's degree through an accredited institution or e ntry level cybersecurity certification, such as Security+ 3-5 years of related work experience Knowledgeable experience in cybersecurity technologies, systems and processes Troubleshooting skills Working skills in analysis, attention to detail, problem resolution, judgment, and decision-making Working communication, presentation, and collaboration skills Preferred Qualifications Intermediate level certifications, such as SANS (GSEC, GPEN, GCIH, etc), CISA, or CISM Working understanding of information security related regulations, such as HIPAA Privacy and Security, PCI-DSS, Depending on the roles focus: Working understanding of attestation and certification methodologies, such as SOC2 Working knowledge of scripting Working understanding of cybersecurity assessment tools/techniques Physical Requirements Interact with others requiring the employee to communicate information. Operate computers and other IT equipment requiring the ability to move fingers and hands. See and read computer monitors and documents. Remain sitting or standing for long periods of time to perform work on a computer, telephone, or other equipment. Location:Lake Park BuildingWork City:West Valley CityWork State:UtahScheduled Weekly Hours:40The hourly range for this position is listed below. Actual hourly rate dependent upon experience.$35.64 - $56.12We care about your well-being - mind, body, and spirit - which is why we provide our caregivers a generous benefits package that covers a wide range of programs to foster a sustainable culture of wellness that encompasses living healthy, happy, secure, connected, and engaged.Learn more about our comprehensive benefits package here (.Intermountain Health is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.At Intermountain Health, we use the artificial intelligence ("AI") platform, HiredScore to improve your job application experience. HiredScore helps match your skills and experiences to the best jobs for you. While HiredScore assists in reviewing applications, all final decisions are made by Intermountain personnel to ensure fairness. We protect your privacy and follow strict data protection rules. Your information is safe and used only for recruitment. Thank you for considering a career with us and experiencing our AI-enhanced recruitment process.All positions subject to close without notice.

Created: 2026-03-14

➤
Footer Logo
Privacy Policy | Terms & Conditions | Contact Us | About Us
Designed, Developed and Maintained by: NextGen TechEdge Solutions Pvt. Ltd.