Title: Specialist Information Security
About Medline:
About Medline India:
Medline India was setup in 2010 in Pune, primarily as an offshore Development centre and to augment resources for Medline Industries LP headquartered in Chicago, USA. We are a 1500+ strong and growing team of technology, finance & and business support professionals who support our businesses worldwide towards a mission to make healthcare run better. We are an organization with a conducive work environment, ample opportunities to learn, contribute and grow with a highly empowered & engaged team. We encourage our people to share their best ideas and create new opportunities for our customers and ourselves to work together to solve today's toughest healthcare challenges.
About Medline Industries, LP:
Established in 1966, Medline Industries LP is a renowned global healthcare organization boasting 56 years of consecutive sales growth, exceeding $21 billion in annual sales. With a workforce of over 36,000 professionals spread across the globe, we operate in more than 125 countries and territories. As the largest privately held manufacturer and distributor of medical supplies in the United States, Medline is uniquely positioned to offer comprehensive products, education, and support across the continuum of care.At present, Medline Industries, LP holds the esteemed position as the #1 market leader, delivering an extensive portfolio of over 550,000 medical products and clinical solutions. Our clientele includes hospitals, extended care facilities, surgery centres, physician offices, home care agencies, providers, and retailers.We're proud to be recognized by Forbes as one of America's Best Large Employers and Best Employers for Women. Additionally, the Chicago Tribune has consistently named us a Top Workplace for the past 12 years.
Specialist Information Security
Overview:
The Information Security Specialist ensures the seamless functioning of security operations by emphasizing proactive incident management. This role requires a mix of technical expertise, analytical thinking, and a proactive approach to improve operational efficiency.
Key Responsibilities:
- Incident Identification and Escalation:
- Detect and log incidents with detailed and timely documentation.
- Analyze, assign, and escalate high-complexity tickets as needed.
- Problem Resolution:
- Investigate third-line support calls and determine root causes.
- Escalate unresolved issues to third-party vendors when necessary.
- Vulnerability Analysis and Risk Assessment
- Perform vulnerability analysis and asses the vulnerability risk by analyzing existing security controls
- Stakeholder Reporting:
- Prepare and deliver regular updates on security activities and incident reports to senior stakeholders.
- Collaboration:
- Partner with IT and security teams to create a cohesive security strategy.
- Ticket Queue Management:
- Monitor and action ticket queue, rapidly resolve technology incident issues for internal users.
- Security Platform Maintenance:
- Maintain/monitor security platforms and services, resolve issues and support SOC/IR (Incident Response) as needed.
- Provide analysis, review, and reporting of the operating state for security platforms, make recommendations for any environmental changes to reduce incident volumes and downtime.
- Maintain, test, and implement security policies and procedures to ensure compliance with company policy, industry standards, and regulatory requirements.
- Rapidly fulfill any SOC/IR requests in response to security incidents.
- Cross-Functional Collaboration:
- Collaborate with cross-functional teams to integrate security solutions into existing infrastructure and workflows.
- Mentorship:
- Mentor junior team members to enhance their skills.
- Continuous Learning:
- Stay up to date with the latest cybersecurity threats, trends, and technologies, and recommend appropriate security controls and countermeasures.
Experience Requirements:
- 4-6 years of experience with SIEM tools like MS Sentinel, Splunk, QRadar, or LogRhythm.
- Proficiency in, EDR tools, Email Security tools.
- Strong background in SOC analysis, including triage, alert investigation, and incident qualification.
- Demonstrated expertise in incident prioritization and in-depth analysis.
- In-depth knowledge of most of the following security technologies: Network DLP, IDS/IPS, Email Security, SWG/Proxy, CASB, CSPM, SASE, SSE, SIEM and forensic network
- Understanding of operating system technology, including Microsoft Windows, MacOS and various Linux distributions.
- Knowledge of virtualization platforms both centrally managed as well as locally managed as well as the means to provide visibility and control to guest systems.
- An understanding of cloud-based endpoint security solutions and experience with public cloud platforms such as AWS, Azure, or Google Cloud Platform.
- Excellent analytical and problem-solving skills, with the ability to troubleshoot complex network security issues.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams.
Skills and Competencies:
- Proficient in SIEM tool, Email Security Tool (ProofPoint, FireEye), Incident Response, and CrowdStrike EDR
- Strong leadership and stakeholder management skills.
- Ability to analyze and optimize SOC operations effectively.
- Proficiency in MS Office.
- CEH/Security+ certification.
Qualifications:
- Bachelor's degree in computer science, Information Security, Electronics & Communication or related field.
- 8+years of proven experience in operating and managing security solutions in enterprise environments.