Cooper University Health Care, the leading academic health system in South Jersey, is growing- apply today!
The Security Engineer is a key member of the IT Department responsible for the protection and defense of the organization’s network. This role involves three components: Vulnerability Assessment and Management, Computer Network Defense, and Security Technical Architecture.
- Vulnerability Assessment and Management. The Security Engineer conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations or enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. Tasks include but are not limited to
- Conduct and/or support authorized penetration testing on enterprise network assets
- Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions
- Assist with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes)
- Computer Network Defense. The Security Engineer uses defensive measures and information collected from a variety of sources to identify, analyze, report, and remediate events that occur or might occur within the network in order to protect information, information systems, and networks from threats. Tasks include but are not limited to:
- Develop content for computer network defense tools
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Perform computer network defense trend analysis and reporting
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
- Recommend computing environment vulnerability corrections
- Use network monitoring tools to capture and analyze network traffic associated with malicious activity
Qualified applicants will have at least eight years of experience, or a Bachelor’s Degree with 6 years of experience, or a Master’s Degree with 4 years of experience in information technology. Degrees should be in Computer Science, Cyber Security, Information Assurance, Management Information Systems or closely related field.
For more information regarding the position and qualifications, and to apply, click here or visit jobs.cooperhealth.org and search requisition number 43680.
At Cooper University Health Care, our commitment to providing extraordinary health care begins with our team. Our extraordinary professionals are continuously discovering clinical innovations and enhanced access to the most up-to-date facilities, equipment, technologies, and research protocols. We have a commitment to our employees by providing competitive rates and compensation, comprehensive employee benefits programs, attractive working conditions, and the chance to build and explore a career opportunity by offering professional development.
Please feel free to refer a friend to these openings! To see additional opportunities available at Cooper and to apply, please visit jobs.cooperhealth.org.
Cooper University Health Care is an equal employment opportunity employer and does not discriminate on the basis of gender, race, age, religion, disabilities, marital status, protected Veteran status, national origin, or any other category protected by federal or state law.