Sr. Security Analyst (Contract-to-hire)

Working at Netwoven

Employees Speak


Netwoven provides a competitive benefit program that includes:

  • Competitive Remuneration structure
  • Flexitime/Work From home facility
  • Training to develop specific skill sets
  • Flat organizational structure and open communication system
  • Mentoring and coaching to develop technical and managerial skills and vice versa
  • Employee Engagement Activities
  • Opportunity for Innovation and Encourage Autonomy
  • Onsite opportunities
If you think the way we do click to view our list of open positions in the USA and India. For more information, email us at

This is a technical position on the Information Security Team.  Provides data security support and guidance to client regions and affiliates.  Represents the Data Security Office on project teams and other IS initiatives and works with other IS operations support departments to identify and recommend solutions on security-related issues.  Provides hands-on security administration of a broad range of security duties and requires a high level of technical experience.  Duties and responsibilities include, but are not limited to oversight of design, engineering, analysis, research, testing and monitoring.  Serves as the Technical Analyst senior advisor to the Chief Data Security Officer, IT Security Operations Manager.   Experience with IT General Controls, Identity Access Management, process improvement and business analytics would be beneficial.

Senior analyst will work on the Cyber-security team, providing incident response investigation, containment, remediation, and reporting of major information security incidents supporting all business units. The team coordinates with IS, Legal, Privacy, and other appropriate business units to gather incident details, assess impact, and coordinate response.

The role is in a large environment of 5K+ Microsoft Windows servers and 60K+ Microsoft Windows 7 desktops. It will work closely with the Dell Security Operations Center, responding to and remediating tickets and driving follow up projects. They will develop close working relationships with departments impacted by tickets generated by SOC to aid in driving security initiatives forward and to allow for smooth incident response.

Health Care Industry experience is a plus.

Core Responsibilities:

  • Provide Incident Response, coordinating tasks and people, documenting and writing reports.
  • Respond to Dell Security Operations Center (SOC) notifications and work to resolve them.
  • Undertake complex project work that results from SOC incidents to troubleshoot root cause and drive solutions with other teams (Desktops, Servers (Windows and Unix), Network, others as needed).
  • Forensic work on servers and workstations (Encase, etc ).
  • Complex analysis of logs provided from various sources to pinpoint issues and drive resolution
  • Lead\support computer security incident outbreaks, resolutions and all phases in between.
  • Undertake problem ownership.
  • Manage vendor relationship and work to ensure timely resolution to enterprise platform issues.
  • Participate in On-Call rotation with other team members providing coverage 24×7
  • Form strong relationships with IS teams to aid in future initiatives and incident resolution
  • Provide architecture assurance on security platform initiatives
  • Maintain security infrastructure, providing stability by following and using the tools, policies, processes and procedures available
  • Provide a secure environment, managing and mitigating risks
  • Provide reporting and metrics
  • Resolve Incidents and/or outages impacting services provided by the team
  • Create, review, maintain and update documentation
  • Work with colleagues to provide consistent processes and procedures and provide innovative ideas
  • Escalate and liaise with additional internal/external groups when required, resulting in satisfactory resolution
  • Active & Constructive participation within and amongst teams and colleagues
  • Regularly re-evaluate processes and procedures and Instigate service improvement initiatives
  • Provide Input into Business Continuity Planning and Practices
  • Other Duties as Assigned
  • Two or more technical or security certifications strongly preferred (CISSP, SANS GIAC/GCIH, CISA/CISM vendor-specific, etc)
  • Special Knowledge, Skills, Abilities
  • Proven ability to drive all phases of the incident response process: Preparation, Detection, Analysis, Containment, Eradication, Recovery, and Post-Incident Activity (including Lessons Learned)
  • Preference may be given to candidates with a strong knowledge of healthcare environments
  • Exceptional ability to analyze and distill relevant findings and determine root cause
  • Understanding of forensic evidence practices and procedures
  • Excellent technical skills able to troubleshoot large difficult problems across multiple systems and platforms
  • Strong understanding of information systems security; network architecture; general database concepts; document management; hardware and software troubleshooting; electronic mail systems, such as Exchange; Microsoft Office applications; intrusion tools; and computer forensic tools.
  • Ability to envision solutions to complex deep rooted problems and drive them to resolution across multiple departments and teams
  • Knowledge and experience with the following operating systems: Windows, MacOS, UNIX/Linux/BSD, and MSDOS.
  • Strong documentation skills, able to develop\maintain procedure documents and run-books
  • Able to coordinate multiple IT resources effectively and document work done and present it.
  • Interpersonal Skills – Communication, flexibility, self-driven, team player, persistence
  • Extensive Windows Operating System knowledge (up to and including debugging)
  • Ability to work extremely well under pressure while maintaining a professional image and approach
  • Team player with proven ability to work effectively with other business units, IT management and staff, vendors and consultants
  • Ability to simultaneously manage multiple efforts
  • Ability to exercise discretion and maintain confidentiality
  • Ability to conduct investigations on compromised computers and servers
  • Proficiency in conducting live assessments on networks, and multiple platforms is desired
  • Must show demonstrable commitment to the Information Security profession, maintaining an expert knowledge of best practices and compliance requirements as well as the latest malware, attack vectors and security trends in the industry and have the ability and drive to translate into operational action items, policies, procedures, standards and guidelines.
  • 3+ years of progressive experience in information security, computer forensics and investigations, incident response, or related field.
  • One or more years of experience responding to information security related incidents such as but not limited to malware, privilege escalation, policy and standard violations, HIPAA and PCI issues including DLP, etc.
  • Bachelor’s Degree in Computer Science, Information Security, Information Systems, or related field, or equivalent professional experience required.
  • Post-graduate degrees, certificate programs in relevant areas, which demonstrate analytical writing will also be considered
Sacramento, CA