Security Operations Center - Chicago, United States - Tempus

    Default job background
    Description
    Passionate about precision medicine and advancing the healthcare industry?


    Recent advancements in underlying technology have finally made it possible for AI to impact clinical care in a meaningful way.

    Tempus' proprietary platform connects an entire ecosystem of real-world evidence to deliver real-time, actionable insights to physicians, providing critical information about the right treatments for the right patients, at the right time.


    About our teams:
    At Tempus, products are owned and developed by small, autonomous teams composed of developers, designers, scientists, and product managers.

    You and your team set the goals, build the software, deploy the code, and contribute to a growing software platform that will make a lasting impact in the field of cancer research and treatment.


    As the SOC Manager, you'll play a critical role in fulfilling the mission of Tempus by helping ensure we provide secure and private precision medicine methodologies for our clients and their patients.

    You will drive the team to succeed with ticket triage, incident response, event correlation and automation, and other security activities.


    Responsibilities:
    Assist in the triage, management, and execution of Tempus' Incident Response Process

    Drive the creation and improvement of processes and procedures to effectively monitor, detect and mitigate threats

    Guide threat modeling based on current events to ensure Tempus' security posture remains strong

    Develop incident triage and response playbooks and automation

    Utilize metrics continually improve SOC operations

    Work directly with MSSP to drive creation, escalation, and remediation of notable alerts and other SOC responsibilities

    Requirements :

    5+ years of experience working in a Security Operations Center including active participation in Incident Response

    2+ years of managing a team focused on monitoring, detecting, and mitigating threats

    Excellent written and oral communication skills

    In-depth understanding of incident response lifecycle, related processes, and frameworks (Cyber Kill Chain, MITRE ATT&CK)

    Stays calm, cool, and focused under pressure

    Knowledge of cyber security frameworks (ISO 27001, NIST 500-53, CIS Controls, PCI DSS)

    Relevant security certifications (such as:
    CISSP, GCIA, GCIH, GREM, CEH, or others)

    Experience in SIEM technologies

    Bachelor's degree or equivalent work experience and certifications

    Practical knowledge of Windows, LInux, or Mac systems

    Practical knowledge of networking technologies (TCP/IP, OSI layers, etc...)


    Bonus points for:
    Scripting/Development experience in tools like python or javascript

    Experience working with cloud technologies such as AWS and GCP

    Proficiency in using APIs with automation to complete tasks

    Experience working with MSSP

    Previous experience with vendor management and coordinating vendor activities

    Experience with HIPAA and data compliance

    #LI-EV1
    #J-18808-Ljbffr