Your responsibilities will include:
- Gather, analyze, and report on current cyber threats and indicators of compromise (IOCs).
- Monitor open-source and proprietary threat intelligence feeds to stay ahead of emerging threats.
- Develop and maintain threat profiles of relevant actors, malware, and TTPs (Tactics, Techniques, and Procedures).
- Provide actionable intelligence to inform detection and prevention strategies.
- Assist the Incident Response (IR) team with the detection, containment, and remediation of security incidents.
- Investigate alerts from security tools (e.g., SIEM, EDR, IDS) to determine their legitimacy and severity.
- Monitor user behaviors, access patterns, and data movements to identify suspicious activities that could indicate insider threats.
- Collaborate with HR, Legal, and Compliance teams to manage and investigate insider threat cases.
- Build policies and procedures related to insider threat detection and response, ensuring alignment with industry best practices.
- Actively monitor and analyze network traffic and security events for signs of malicious activity.
- Perform in-depth analysis of security alerts and incidents to identify trends and potential threats.
- Assist in the tuning and improvement of security detection tools to reduce false positives and enhance threat detection capabilities.
- Conduct forensic analysis of security incidents, including log analysis and endpoint investigations.
- Contribute to the development and enhancement of incident response playbooks and processes.
- Work with the team to automate common tasks and enhance the efficiency of the security operations.
- Collaborate with other teams (SOC, IT, Legal, etc.) during incidents and threat investigations.
- Participate in regular threat intelligence sharing with internal and external stakeholders.
Required qualifications:
- Bachelor’s degree in Cybersecurity, Information Technology, or related field
- 5+ years of experience in cybersecurity, with a strong emphasis on threat intelligence or incident response.
- Solid understanding of security technologies, including SIEM, EDR, IDS/IPS, and firewalls.
- Knowledge of malware analysis techniques and tools.
- Familiarity with network and endpoint security concepts, log analysis, and threat hunting techniques.
- Experience working with threat intelligence platforms and feeds.
- Strong analytical and critical thinking skills.
- Excellent communication skills, capable of conveying complex security topics to technical and non-technical audiences.
- Ability to work both independently and as part of a team in high-pressure situations.
Preferred qualifications:
- Certifications such as GCIH, GCIA, CEH, or equivalent
Please be advised that certain US based positions, including without limitation field sales and service positions that call on hospitals and/or health care centers, require acceptable proof of COVID-19 vaccination status. Candidates will be notified during the interview and selection process if the role(s) for which they have applied require proof of vaccination as a condition of employment. Boston Scientific continues to evaluate its policies and protocols regarding the COVID-19 vaccine and will comply with all applicable state and federal law and healthcare credentialing requirements. As employees of the Company, you will be expected to meet the ongoing requirements for your roles, including any new requirements, should the Company’s policies or protocols change with regard to COVID-19 vaccination.