Info Security & Cybersecurity Engineer I/II/III at Excellus BCBS (2024)

SummaryJob Description: The Information Security & Cybersecurity Engineer role develops, maintains, and coordinates the Organization’s information security activities in support of the Lifetime Healthcare Companies’ information security program. This position provides technical information security risk management and compliance services and support to the Organization’s lines of business and further provides information security consulting and support to all levels of the Organization’s management in support of the information security program. The cybersecurity disciplines range from Security Operations, Governance Risk and Compliance services, or Identity and Access Management.

Essential AccountabilitiesLevel I

  • Responsible for the design, implementation, and operation of Organization-wide security infrastructures. Evaluates and proposes new security solutions and advises and consults with the security manager and various levels of management regarding protection of computing resources and information assets.
  • Assists in the maintenance and operational support for security technologies in defense against modern cybersecurity threats
  • Delivers support for the Organization’s Information Security Framework and strives to improve maturity of the Information Security program in certain Framework domains.
  • Respond to requests within defined SLAs relating to various information security systems, programs, and processes.
  • Maintains risk management documentation to monitor lifecycle progress, track acceptance decisions, and catalog remediation actions. Utilizes automated Governance, Risk, and Compliance tools to track artifacts of the risk management lifecycle. Consults with information systems owners to categorize systems; select, implement, and assess controls; and frame, assess and monitor risk.
  • Enforces information security policies, standards, and procedures by administering and monitoring security reports; investigates possible security exceptions.
  • Delivers information risk management services for new and existing automation products and projects.
  • Participates in rotation of 24/7/365 on call coverage.
  • Assists in the execution of HIPAA, MAR, PCI, and COBIT compliance activities.
  • Integrates security tools and appropriate controls into new and existing systems and applications.
  • Assists in department self-audits, internal audits, external audit reviews, and risk assessments for the division and for end user departments.
  • Participates in security assessment of supplier and vendors develops recommendations to improve security and mitigate security risks.
  • Consistently demonstrates high standards of integrity by supporting the Lifetime Healthcare Companies’ mission and values, adhering to the Corporate Code of Conduct, and leading to the Lifetime Way values and beliefs.
  • Maintains high regard for member privacy in accordance with the corporate privacy policies and procedures.
  • Regular and reliable attendance is expected and required.
  • Performs other functions as assigned by management.

Level II (in addition to Level I Accountabilities)

  • Keeps abreast of cyber threat landscape and evolving mitigation approaches and techniques.
  • Performs as the Subject Matter Expert for at least one information security technology, processes, and practices internally to the Health Plan – including making recommendations relating to this technology.
  • Provides technical expertise and support to security administrators on distributed systems security and implements automated solutions for security administration requests.
  • Trains and provides technical support to Security Administrators and lower-level InfoSec & Cybersecurity Engineers on distributed system and application security.
  • Provides consultation and facilitation support services to the Organization and its subsidiaries in information security matters and ensures compliance with the Organization’s information security policies and standards.
  • Integrates security tools and appropriate controls into new systems and applications.
  • Acts as a security consultant for Organization’s IT platforms, databases, middle-wares, and messaging systems (with oversight from a more senior analyst).

Level III (in addition to Level II Accountabilities)

  • Performs as the Subject Matter Expert for at least two information security technology, processes, and practices internally to Health Plan.
  • Designs, develops, integrates, tests, evaluates, and maintains cybersecurity technology products.
  • Researches, engineers, and integrates new security solutions with an emphasis on solutions that aligns with overall cybersecurity strategy.
  • Performs cyber defense incident triage, including determining scope, urgency, and potential impact, and identifying the specific vulnerability.
  • Provides security consulting to business partners to ensure solution designs are aligned with security principles and cybersecurity frameworks.

Level IV (in addition to Level III Accountabilities)

  • Acts as Team Leader amongst the group of engineers.
  • Performs as the Subject Matter Expert for more than three information security technologies, processes, and practices internally to the Health Plan, and externally in the industry as a whole.

Minimum QualificationsNOTE: We include multiple levels of classification differentiated by demonstrated knowledge, skills, and the ability to manage increasingly independent and/or complex assignments, broader responsibility, additional decision making, and in some cases, becoming a resource to others. In addition to using this differentiated approach to place new hires, it also provides guideposts for employee development and promotional opportunities.

All Levels

  • Bachelor's degree in computer science, Information Technology, or relevant field. In lieu of degree, six (6) cumulative years of related experience required.
  • Hands on experience with the following operating systems preferred: mainframe, Windows, and UNIX (Linux, AIX, Solaris, etc.).
  • Basic knowledge of a minimum of one concept and/or tool listed below:
  • Encryption
  • PKI
  • Network and application security, and related firewalls (Palo Alto Networks, Imperva, etc.)
  • AD, LDAP, and various authentication implementations
  • Virus detection and end point security (McAfee preferred)
  • Vulnerability scanner and pen testing tools (e.g., Rapid 7, Nessus, Nexpose, Metasploit, Appscan, Burp suite, Ida Pro etc.)
  • IDS/IPS and related tools
  • SIEM and tools (e.g., ArcSight, Splunk, SolarWind LEM, QRadar, McAfee, etc.)
  • Common web application security vulnerabilities (e.g., OWASP top ten)
  • Excellent verbal communications skills and concise written communication skills.
  • Excellent organization and multi-tasking skills.

Level II (in Addition To Level I Qualifications)

  • Three (3) of related work experience, and basic knowledge of a minimum of two (2) concepts and/or tools listed above (under Level I).
  • Experience with security controls for operating systems, applications, and database management systems.
  • Experience in evaluating security software packages.
  • Experience with security automation, including associated reporting and notification.
  • Knowledge of network regulations, industry standards and operational constraints of networks systems.

Level III (in Addition To Level II Qualifications)

  • Five (5) years of related work experience, and basic knowledge of a minimum of three (3) concepts and/or tools listed above (under Level I).
  • CISSP, CISA, CISM or other relevant security certification, or equivalent experience, and knowledge preferred.
  • Experience providing work direction for one or more individual’s specific projects and initiatives.
  • Experience providing guidance and mentorship to more junior team members.
  • Knowledge of Security Frameworks and translating aspects into enhancing security postures.

Level IV (in Addition To Level III Qualifications)

  • Seven (7) years of related work experience, and basic knowledge of a minimum of four (4) concepts and/or tools listed above (under Level I).
  • Two (2) years demonstrated expertise in at least three (3) concentrations within information security technology.
  • Experience with creating and managing security architecture.

Physical Requirements

  • Ability to work prolonged periods sitting and/or standing at a workstation and working on a computer.
  • Ability to work while sitting and/or standing at a workstation viewing a computer and using a keyboard, mouse and/or phone for three (3) or more hours at a time.
  • Ability to travel across the Health Plan service region for meetings and/or trainings as needed.
  • Ability to work in a home office for continuous periods of time for business continuity.

One Mission. One Vision. One I.D.E.A. One you.

Together we can create a better I.D.E.A. for our communities.

At the Lifetime Healthcare Companies, we’re on a mission to make our communities healthier, and we can’t do it without you. We know diversity helps fuel our mission and that’s why we approach our work from an I.D.E.A. mindset (Inclusion, Diversity, Equity, and Access). By activating our employees' experiences, skills, and perspectives, we take action toward greater health equity.

We aspire to reflect the communities we live in and serve, and strongly encourage people of color, LGBTQ+ people, people with disabilities, veterans, and other underrepresented groups to apply.

Our Company CultureEmployees are united by our Lifetime Way Values & Behaviors that include compassion, pride, excellence, innovation and having fun! We aim to be an employer of choice by valuing workforce diversity, innovative thinking, employee development, and by offering competitive compensation and benefits.

In support of the Americans with Disabilities Act, this job description lists only those responsibilities and qualifications deemed essential to the position.

Equal Opportunity Employer

Equal Opportunity Employer

Compensation Range(s)Grade 208 Minimum: $67,538 Maximum: $124,925

Grade 209 Minimum: $75,816 Maximum: $140,254

Grade 210 Minimum: $85,446 Maximum: $158,080

The salary range indicated in this posting represents the minimum and maximum of the salary range for this position. Actual salary will vary depending on factors including, but not limited to, budget available, prior experience, knowledge, skill and education as they relate to the position’s minimum qualifications, in addition to internal equity. The posted salary range reflects just one component of our total rewards package. Other components of the total rewards package may include participation in group health and/or dental insurance, retirement plan, wellness program, paid time away from work, and paid holidays.

Please note: There may be opportunity for remote work within all jobs posted by the Excellus Talent Acquisition team. This decision is made on a case-by-case basis.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.

Info Security & Cybersecurity Engineer I/II/III at Excellus BCBS (2024)

FAQs

What does a cyber security engineer do? ›

Cybersecurity engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime.

Is cyber security engineer hard? ›

Although degrees in cyber security are typically not as tough as those in research- or lab-intensive fields like science and engineering, they are generally more challenging than non-research degrees like those in the humanities or business.

What skills do you need to be a cyber security engineer? ›

Knowledge of Operating Systems

According to experts, here are the top skills most FAANG companies look for in a cyber security engineer are: Foundational Coding: C++, Python, PHP/Hack, Golang, and Java. Data science. Data structures.

How to become a security engineer? ›

Most employers require at least a bachelor's degree for security engineers. However, other combinations such as an associate degree and extensive experience or an advanced degree may also enable you to become a security engineer.

What is the salary of a cyber security engineer? ›

Cyber Security Engineer Salaries in India

The average salary for Cyber Security Engineer is ₹7,50,000 per year in the India. The average additional cash compensation for a Cyber Security Engineer in the India is ₹1,00,000, with a range from ₹50,000 - ₹1,80,000.

What is the difference between cyber security and cyber security engineer? ›

But the differences are there, and they are important. The main difference is that cybersecurity analysts oversee the network to identify and prevent data breaches, whereas cybersecurity engineers design and implement security architecture and solutions.

Is cybersecurity high paying? ›

A cybersecurity career can be well paid, with salaries ranging from entry-level positions starting at $50,000 and quickly reaching six figures as you gain experience.

Is cybersecurity a stressful job? ›

Cybersecurity professionals navigate a world filled with evolving challenges. The responsibility of protecting crucial data can add to stress and pressure. Understanding the factors contributing to this stress is essential for finding possible solutions and supporting those in the field.

Is cyber security math heavy? ›

Cybersecurity majors with a computer science focus often need a strong background in math, particularly in areas like calculus, discrete mathematics, and statistics. On the other hand, cybersecurity-focused degrees like information technology may have fewer math requirements, occasionally skipping advanced calculus.

Do you need to code to become a cyber security engineer? ›

Aspiring cybersecurity professionals don't need programming skills to work in the field, but those skills could make them more competitive for the best cybersecurity jobs. The good news is that many resources are available for independently learning computer programming.

Do you need a degree to be a cyber security engineer? ›

While most employers require a relevant bachelor's degree for a cybersecurity position, getting into the field with a bachelor's in another field by completing an online cybersecurity bootcamp is still possible. Bootcamps feature shorter, focused online coursework.

How long does it take to become a cyber security engineer? ›

It usually takes several years to become a cybersecurity engineer. The largest chunk of time is often dedicated to earning an appropriate degree. For example, if you pursue a bachelor's degree full-time, that will take about 4 years, and a master's degree could take 6 years.

Do security engineers make a lot of money? ›

The average annual salary for a security engineer was $95,770 as of February 2022, according to Payscale. This makes security engineering a solid career choice for many people. Security engineers' salaries vary based on experience, education, and location. Industry and specialization can also impact typical earnings.

What is the highest salary for a security engineer? ›

Cyber Security Engineer Salary

The Cybersecurity Engineer position also nets one of the highest salaries, coming in #2 for the security industry, with average cybersecurity salaries ranging from $116,000 to $208,000.

Do security engineers work from home? ›

Like other jobs in computer & IT, cybersecurity jobs are well-suited for remote work.

Does cyber security engineer do coding? ›

Some cybersecurity professionals use programming skills frequently, but others never write a line of code in their whole careers. That's because cybersecurity professionals do different types of work. Some monitor network and computer activity, watching for security breaches in intrusion detection.

What is the typical day of a cyber security engineer? ›

A typical day in the life of a cybersecurity engineer varies according to their employer's priorities. Sometimes, they focus on threat research and policy development. Others' daily tasks include finding vulnerabilities and implementing solutions. A cybersecurity engineer's day-to-day activities change constantly.

Do I need to be good at math to be a cyber security engineer? ›

An understanding of binary numbers, Boolean and linear algebra, and cryptography can help you in your pursuit of a cybersecurity career. These are also the math skills you'll need if you want to work toward different cybersecurity certifications, which employers may look for from entry-level candidates.

Can you become a cybersecurity engineer without a degree? ›

You can work in the cybersecurity field without a degree. That said, you will need to gain some experience through educational courses and certifications.

References

Top Articles
Latest Posts
Article information

Author: Lidia Grady

Last Updated:

Views: 5871

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lidia Grady

Birthday: 1992-01-22

Address: Suite 493 356 Dale Fall, New Wanda, RI 52485

Phone: +29914464387516

Job: Customer Engineer

Hobby: Cryptography, Writing, Dowsing, Stand-up comedy, Calligraphy, Web surfing, Ghost hunting

Introduction: My name is Lidia Grady, I am a thankful, fine, glamorous, lucky, lively, pleasant, shiny person who loves writing and wants to share my knowledge and understanding with you.