Your browser does not support javascript! Please enable it, otherwise web will not work for you.

Cybersecurity Operations @ Varian Medical Systems

Home > Marine Cybersecurity Technician

 Cybersecurity Operations

Job Description


Together, we can beat cancer.
At Varian, we bring together the world's best talent to realize our vision of a world without fear of cancer. Together, we work passionately to develop and deliver easy-to-use, efficient oncology solutions. If you want to be part of this important mission, we want to hear from you.
We are hiring Blue Team Specialist / Cybersecurity Operations
Overview
In our holistic view of Cybersecurity Operations, the Blue Team does not only detect and react to attacks but also strives to continuously improve the Cybersecurity posture and maturity of our organization. Blue Teamers are natural problem solvers and are personally satisfied with every step towards improvement.
In this function you support the continuous improvement of the defensive security (but also in a certain extent organizational and processual aspects) of the organization cybersecurity maturity levels. You are responsible for addressing findings from audits, pentests or cybersecurity incidents and turn those into actionable measures towards the sustainable improvement. Likewise, you also have the freedom to employ your technical abilities to find weaknesses on your own and propose the most-suitable measure to set issues straight.
Tasks and Responsibilities
The position will bring a mix of the following tasks and responsibilities
  • Coordinate the remediation of audit, pentest or red team findings developing a close collaboration with the respective teams and ensuring that the solutions are designed to be sustainable and scalable.
  • Coordinate and participate in Red Team-Blue Team exercises and derive learnings that turn into improvement of our defenses.
  • Proactive responsibility to ensure feedback from security architects, developers and operations teams to the suggested measures are properly incorporated in our architectures, control frameworks and incident response process.
  • Analyze currently existing security data sources and derive patterns and use-cases for the detection of incident or anomalies.
  • Expand detection coverage by including new data sources or by making recommendations on how to increase the value for incident detection and response
  • Standardize data source and data quality by creating standard configuration profiles and support partner teams in implementing those
  • Derive trends and insights from data sources, turn those into insights and knowledge to improve defense mechanisms and security architecture of systems and networks.
  • Develop and carry out proactive threat hunting activities, making sure that learnings are properly delivered and implemented to neighboring teams and functions.
  • Leverage threat hunting to create and maintain Situational Awareness for related company functions such IT operations, security architects, or service providers.
  • Assess newly arising vulnerabilities and Tactics, Techniques and Procedures (TTPs) to define defensive measures to detect and disrupt adversarial actions. Coordinate with neighboring functions to ensure those measures are turned into actionable changes.
  • Perform analysis of different log files and data sources to identify adversarial activity and anomalies.
  • Consider business aspects to support an adequate triage and prioritization of cybersecurity incidents, whilst ensuring that root causes are properly clarified and addressed. Communicate findings and possible improvement measures in an actionable way.
  • Understand and employ defense-in-depth principles and practices to create and maintain protection mechanisms.

Qualifications:
Experience: 3+ years of relevant work experience as
Education: Bachelor's Degree in computer science along with Relevant Industry Certifications such as SANS/GIAC (eg. GCIA, GCIH, GNFA, GCFA), CompTIA Security+ CISSP, CISA, CISM as well as vendor-related certifications are desirable.
Technology: Cybersecurity Operations
Knowledge of relevant technological aspects for this position. The ideal candidate should bring a mix of expertise in (a subset of) the following areas:
  • Computer networking concepts and protocols, and network security methodologies
  • Risk management processes and methods for assessing and mitigating risk.
  • Laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Cybersecurity and how it impacts privacy principles.
  • Knowledge of cyber threats and vulnerabilities: how to properly identify, triage, and remediate malware and threats based on threat intelligence as well as on analysis of log data and network traffic.
  • System administration, network, and operating system hardening techniques.
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Incident categories, incident responses, and timelines for responses.
  • System and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, code and command injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Experience with operating system security controls on common platforms such as Linux, Windows.
  • Experience with scripting languages (e.g., Python, Bash or PowerShell) and using REST API, as well as data processing, regular expressions, and console-based text processing tools (e.g., sed, awk, jq)
  • Cloud service models and how those models can limit incident response.

Personality Traits
  • Able to build long-lasting working relationships across different business areas and IT departments and foster technical collaboration and exchange.
  • Able to work on a very tight schedule, while keeping track of tasks progress and deadlines.
  • Able to structure complex problems and find practicable solutions to those.
  • Team player but also able to work on an individual basis.
  • Self-learning and curiosity to keep pace with the ever-evolving cybersecurity developments are highly appreciated.
  • Advanced English and Communication skills: clear and concise communication able to address stakeholders of different backgrounds and technical expertise.

Soft Skills Requirements
  • Collaboration & Customer Orientation (++)
  • Intercultural Sensitivity (+)
  • Team Development (+)
  • Ability to multi-task and handle multiple assignments simultaneously, while focusing on delivery quality (+)
  • Ability to use initiative when needed (self-motivation and proactive attitude) (++)
  • Excellent communication skills (both written and verbal) in English (++)
  • Quick learner and aptitude to get into new technologies and architectures (++)

Fighting cancer calls for big ideas.
We envision a world without fear of cancer. Achieving this vision takes dedication and commitment from all of us, every single day. That's why we celebrate and value the distinctly beautiful and intersectional identities of each of our employees. We are a mirror of our patient-base, which allows us to innovate. Big ideas come from everywhere, and the best ideas are fostered by our unique individual experiences. At Varian, we encourage you to bring your whole self to work and believe your bold and authentic perspective will help to power more victories over cancer.
#TogetherWeFight

Employement Category:

Employement Type: Full time
Industry: Medical Transcription
Functional Area: Marine Services
Role Category: Marine Cybersecurity Technician
Role/Responsibilies: Cybersecurity Operations

Contact Details:

Company: Varian Medical Systems
Location(s): Pune

+ View Contactajax loader


 Job seems aged, it may have been expired!
 Fraud Alert to job seekers!

₹ Not Specified

Varian Medical Systems

Our mission is to focus energy on saving lives. We equip the world with new tools for fighting cancer, taking X- ray images, and protecting our borders. Since the 1950s we have been producing tools that harness the power of X- ray energy to benefit humankind. In recent decades, we have pioneered ...