Description : Job Summary :
- Provides proactive monitoring and / or response to known or emerging threats against the KP network.
- Effectively communicates investigative findings to non-technical audiences.
- Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
- Identifies opportunities for cyber security improvements within assigned cyber defense domain.
- Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
- Participates in follow-up remediation design and review.
- Conducts investigation and triage of security events within assigned domain.
- Performs data analysis in support of security event management processes, including root cause analysis
This individual contributor is primarily responsible for supporting the protection and maintenance of integrity and reliability of the security of data, systems and networks, while resolving problems with tools, systems and procedures.
Essential Responsibilities :
Completes work assignments by applying up-to-date knowledge in subject area to meet deadlines; following procedures and policies, and applying data and resources to support projects or initiatives; collaborating with others, often cross-functionally, to solve business problems; supporting the completion of priorities, deadlines, and expectations; communicating progress and information; identifying and recommending ways to address improvement opportunities when possible; and escalating issues or risks as appropriate.Pursues self-development and effective relationships with others by sharing resources, information, and knowledge with coworkers and customers; listening, responding to, and seeking performance feedback; acknowledging strengths and weaknesses; assessing and responding to the needs of others; and adapting to and learning from change, difficulties, and feedback.Provides proactive monitoring and / or response to known or emerging threats against the KP network.Effectively communicates investigative findings to non-technical audiences.Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.Identifies opportunities for cyber security improvements within assigned cyber defense domain.Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.Participates in follow-up remediation design and review.Conducts investigation and triage of security events within assigned domain.Performs data analysis in support of security event management processes, including root cause analysis.Provides on-call duties and after hours support of incident management as required.Supports incident response plans which may include after-hours support and coordination among responsible teams.Assists in the execution of incident handling processes which may include containment, protection, and remediation activities.Minimum Qualifications :
Bachelors degree in Business Administration, Computer Science, Social Science, Mathematics, or related field and Minimum three (3) years experience in IT or a related field, including Minimum one (1) year in information security or network engineering. Additional equivalent work experience may be substituted for the degree requirement.Additional Requirements :
Preferred Qualifications :
Experience : 2-3 years of professional work in digital forensics, incident response, or a related cybersecurity discipline.Cloud & OS Expertise : Hands-on experience conducting forensic investigations and incident response in cloud environments (e.g., AWS, GCP, Azure) and across multiple operating systems, including Windows, Linux, and macOS.Endpoint Security : Practical experience with Endpoint Detection and Response (EDR / XDR) platforms for threat hunting, log analysis, and investigative support.Frameworks : Proficiency with the MITRE ATT&CK framework, including demonstrated application in digital forensic investigations.Security Platforms : Familiarity with SIEM and SOAR solutions (e.g., Splunk, PA XSOAR) for log correlation, alert management, and automated response workflows.Threat Knowledge : Understanding of cyber threats, attack vectors, and advanced mitigation strategies, with the ability to guide strategic response efforts.Forensic Skills : Exposure to network forensics, malware analysis, and forensic timeline reconstruction techniques.Primary Location : California,Corona,Corona Data Center Admin Additional Locations :
PleasantonLake OswegoGreenwood VillageAtlantaHyattsvilleRentonHonoluluScheduled Weekly Hours : 40
Shift : Day
Workdays : Mon, Tue, Wed, Thu, Fri
Working Hours Start : 08 : 00 AM
Working Hours End : 05 : 00 PM
Job Schedule : Full-time
Job Type : Standard
Worker Location : Flexible
Employee Status : Regular
Employee Group / Union Affiliation : NUE-IT-01|NUE|Non Union Employee
Job Level : Individual Contributor
Department : KPIT ADMIN - TRO CRDC - 9601
Pay Range : $120700 - $156200 / year Kaiser Permanente strives to offer a market competitive total rewards package and is committed to pay equity and transparency. The posted pay range is based on possible base salaries for the role and does not reflect the full value of our total rewards package. Actual base pay determined at offer will be based on labor market data and a candidate's years of relevant work experience, education, certifications, skills, and geographic location.
Travel : No
Flexible : Work location is on-site at a KP location, with the flexibility to work from home. Worker location must align with Kaiser Permanente's Authorized States policy. Kaiser Permanente is an equal opportunity employer committed to fair, respectful, and inclusive workplaces. Applicants will be considered for employment without regard to race, religion, sex, age, national origin, disability, veteran status, or any other protected characteristic or status.