Stryker is one of the world’s leading medical technology companies and, together with our customers, is driven to make healthcare better.
We offer innovative products and services in Orthopaedics, Medical and Surgical, and Neurotechnology and Spine that help improve patient and hospital outcomes.
We are proud to be named one of the World’s Best Workplaces and a Best Workplace for Diversity by Fortune Magazine. Learn more about our award-winning organization by visiting stryker.com
Position summary :
The Security Analyst is part of the automation team. The automation Analyst is a cross functional role responsible for gathering requirements, defining, deploying, and monitoring automation playbooks to automate various manual processes.
The incumbent will work with a team of automation specialist to identify manual processes that can be automated and use the automation or SOAR tool to fully automate processes.
Information Security is a fast developing and ever-changing field so it is hard to specifically predict all of the future work this position will be working on.
Essential duties & responsibilities : (detailed description)
Responsible for supporting and administering the SOAR tool.
Work directly with customers / prospects to validate use cases and integration requests.
Work with various groups within IT and Global Security Risk and Compliance team, to identify opportunities to automate manual process and reduce the amount of manual work.
Work with others to define playbook opportunities including detailed process flow, system integrations and permissions required, output of data, and audience of different portions of the data.
Build playbooks using out of the box automations and sub-playbooks as well as custom playbooks and Python automations.
Prioritization of playbooks based on hours saved and complexity will be needed. Delegation of build activity to team while gathering more playbooks is key.
Must be able to champion the system and benefits
Works closely with customers to provide secure solutions and service while accomplishing the project’s objectives and filling established requirements.
Identify and highlight conflicts which may derail progress towards strategy and establish mechanisms to resolve them.
Create and communicate metrics which describe progress
Drives the adherence to security policies; security programs and plans; and integrates and coordinates execution of security policies.
Education & special trainings :
BS in Computer Information Systems or equivalent
Security certifications such as CISSP, CISM or GIAC preferred
Qualifications & experience :
CISSP or other Cyber Security certification preferred, recent college graduate is acceptable
Be familiarized with cyber security and Information Technology principles
Physical & mental requirements :
Demonstrated ability to solve complex problems and identify Information Security solutions to challenging business problems
Demonstrated ability to manage / organize
Demonstrated strong analytical skills
Strong written and verbal communication at all levels