Information Security Analyst

Sunnyvale, CA, United States

Company Description

At Intuitive, we are united behind our mission: we believe that minimally invasive care is life-enhancing care. Through ingenuity and intelligent technology, we expand the potential of physicians to heal without constraints.

As a pioneer and market leader in robotic-assisted surgery, we strive to foster an inclusive and diverse team, committed to making a difference. For more than 25 years, we have worked with hospitals and care teams around the world to help solve some of healthcare's hardest challenges and advance what is possible.

Intuitive has been built by the efforts of great people from diverse backgrounds. We believe great ideas can come from anywhere. We strive to foster an inclusive culture built around diversity of thought and mutual respect. We lead with inclusion and empower our team members to do their best work as their most authentic selves.

Passionate people who want to make a difference drive our culture. Our team members are grounded in integrity, have a strong capacity to learn, the energy to get things done, and bring diverse, real world experiences to help us think in new ways. We actively invest in our team members to support their long-term growth so they can continue to advance our mission and achieve their highest potential.

Join a team committed to taking big leaps forward for a global community of healthcare professionals and their patients. Together, let's advance the world of minimally invasive care.

Job Description

Primary Function of Position:

This position will report to Director, IT- Security and will work on IT Security projects involving administration and management of technology platforms and execution, analysis and troubleshooting of IT security issues and requests, primarily in the areas of:

  • Data Loss Prevention
  • Vulnerability Management (Infrastructure and Application Security)
  • Third Party Technical Security Review and Cloud Security Assessment
  • Enterprise Security Awareness and Security Training

Roles & Responsibilities:

  • Participate in ongoing IT Security projects and administration of technology platforms
  • Apply Information Technology and Systems knowledge into practical action while investigating information security events
  • Work on assigned service requests, authorized changes, security events and project tasks
  • Perform scheduled vulnerability scanning, report risks, and prioritize remediation actions.
  • Perform simulated phishing exercises, analyze, and report results and coordinate security awareness trainings.
  • Analyze, classify, and examine DLP events by criticality of risk to Intuitive resources and data.
  • Apply analytical thinking to recognize patterns, trends, or correlations between a wide range of activities and security events to identify immediate and potential threats.
  • Assist in the review of system configuration changes or policy exception requests.
  • Establish and maintain strong working relationship with cross functional IT teams

Qualifications

Skills, Experience, Education, & Training:

  • Minimum Bachelor’s degree in Computer Science, Information Security, Information Technology withminimum  2 years of relevant experience or Master’s degree in Cybersecurity
  • Experience with the operation, administration, and monitoring of security systems.
  • Knowledge of attack vectors and familiarity with data loss prevention, vulnerability management, network and email security platforms.
  • Technical education, formal training or demonstrated experience and competence in the function, operation and configuration of Windows and Linux Operating systems.
  • Strong understanding of computer data, networking, and telecommunications.
  • Possess relationship skills and cultural awareness required to work effectively in a large, highly matrixed organization.
  • Must be able to communicate with IT technicians, engineers as well as non-technical user community.

Additional Information

Due to the nature of our business and the role, please note that Intuitive and/or your customer(s) may require that you show current proof of vaccination against certain diseases including COVID-19.  Details can vary by role.

Intuitive is an Equal Employment Opportunity Employer. We provide equal employment opportunities to all qualified applicants and employees, and prohibit discrimination and harassment of any type, without regard to race, sex, pregnancy, sexual orientation, gender identity, national origin, color, age, religion, protected veteran or disability status, genetic information or any other status protected under federal, state, or local applicable laws.

We will consider for employment qualified applicants with arrest and conviction records in accordance with fair chance laws.

Preference will be given to qualified candidates who do not reside, or plan to reside, in Alabama, Arkansas, Delaware, Florida, Indiana, Iowa, Louisiana, Maryland, Mississippi, Missouri, Oklahoma, Pennsylvania, South Carolina, or Tennessee.

We provide market-competitive compensation packages, inclusive of base pay, incentives, benefits, and equity. It would not be typical for someone to be hired at the top end of range for the role, as actual pay will be determined based on several factors, including experience, skills, and qualifications. The target salary ranges are listed.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Application security Cloud Computer Science Linux Monitoring Security assessment Vulnerability management Windows

Perks/benefits: Competitive pay Equity Team events

Region: North America
Country: United States
Job stats:  20  5  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.