CyberSecurity Analyst
Why join Stryker?
We are proud to be named one the World’s Best Workplaces and a Best Workplace for Diversity by Fortune Magazine! Learn more about our award-winning organization by visiting stryker.com
Our total rewards package offering includes bonuses, healthcare, insurance benefits, retirement programs, wellness programs, as well as service and performance awards – not to mention various social and recreational activities, all of which are location specific.
Know someone at Stryker?
Be sure to have them submit you as a referrral prior to applying for this position. Learn more about our employee referral program
The Security Operations Center (SOC) Security Analyst’s primary objective is to monitor and triage security incidents to assess their urgency and escalate incidents as necessary for the protection of the organization’s information data and assets. The Security Analyst is also responsible for managing and configuring security tools. Given that Information Security is a fast-developing and ever-changing field, it is difficult to predict all the future work this position will entail.
Essential duties & responsibilities:
Evaluate, respond, and help mitigate alerts that originate from the SIEM and other tools within the cybersecurity product suite.
Assist with administration of Stryker SIEM solution along with other security tools.
Provide data and reports as needed.
Participate in the day-to-day security operations monitoring and response from the Security Operations Center.
Assist in the development and implementation of policies, playbooks, for procedures for cybersecurity incident response in collaboration with other cybersecurity teams.
Develop content and action tuning requests to improve detection fidelity, reduce false positives, and reduce overall mean time to detect and respond.
Participate in the team culture built on collaboration, trust, appreciation, agility, and innovation supporting the integrity of the team for the main goal of protecting the organization’s information data and assets.
Education & special trainings:
Bachelor’s degree in computer science, Information Technology, or a related field is required.
CISSP or other Cyber Security certification advantageous.
Qualifications & experience:
0–1 year experience with basic understanding of SOC operations such as detection and incident response principles.
Basic understanding of computer operating systems and information technology.
Physical & mental requirements:
- Demonstrated ability to solve complex problems and identify Information Security solutions to challenging business problems.
- Demonstrated ability to manage/organize.
- Demonstrated strong analytical skills.
- Strong written and verbal communication at all levels.