Medtronic Logo

Medtronic

Principle Cybersecurity Specialist

Reposted 5 Hours Ago
Be an Early Applicant
Remote
Hiring Remotely in Nānakrāmguda, Rangareddi, Telangāna
Expert/Leader
Remote
Hiring Remotely in Nānakrāmguda, Rangareddi, Telangāna
Expert/Leader
The Principle Cybersecurity Specialist is responsible for incident response, monitoring cyber threats, and enhancing security posture through analysis, reporting, and collaboration with internal teams.
The summary above was generated by AI

At Medtronic you can begin a life-long career of exploration and innovation, while helping champion healthcare access and equity for all. You’ll lead with purpose, breaking down barriers to innovation in a more connected, compassionate world.

A Day in the LifeWe are seeking a highly skilled Cyber Defense Specialist to join our dynamic cyber security team. In this role, you will be responsible for identifying, analyzing, and mitigating cyber threats to protect our organization’s assets and data. You will leverage your expertise in incident response to enhance our security posture and ensure the organization is well-prepared to respond to evolving threats. Key activities include:
Incident Response: Active incident response team member responsible for investigating and closing out security incidents.
Reporting: Create and present reports, dashboards, and briefings to stakeholders at various levels within the organization.
Threat Analysis: Monitor and analyze cyber threats and vulnerabilities from various sources, including open-source intelligence, industry reports, and dark web forums.

 

Responsibilities may include the following and other duties may be assigned:

  • Monitor security alerts and identify potential incidents in real time from various sources (SIEM, intrusion detection systems)
  • Participate in the full incident Response lifecycle.  Perform investigations on complex information security incidents,
  • including determining root cause and lessons learned.
  • Develop, implement, and review processes, procedures, and playbooks for Security Incident Response and Security
  • Incident Triage functions.
  • Apply Security Incident Response log analysis and forensic techniques (i.e. forensic timelining) on events and artifacts.
  • Participate in the development of custom detection rules, partnering with the Anomaly Detection Program Manager, for
  • both common and targeted threats.
  • Provide support during post-incident reviews and help identify areas for process improvement.
  • Stay current on the latest cybersecurity threats, vulnerabilities, and trends
  • Participate in incident response training and tabletop exercises to enhance skills and readiness
  • Analyze the collected data to identify trends, patterns, and potential threats specific to the organization. Create a summary report outlining actionable insights and recommended mitigation strategies for the security team and key stakeholders.
  • Meet with other incident response team to provide intelligence support for ongoing investigations. Share insights about threat actors, their methodologies, and potential indicators of compromise (IOCs) relevant to the current incidents
  • Collaborate with the vulnerability management team to review the latest vulnerability assessments. Discuss findings and recommend prioritization based on threat intelligence and potential impact on the organization.
  • Participate in on-call rotation for full coverage of incident response activities
  • Work effectively with third part SOC partners
  • Respond to potential incidents associated reputational risk associated with malicious domains
  • Effectively investigate organizational incidents such as account takeovers, zero-day attacks, phishing campaigns
  • Work with security awareness team and threat intelligence teams to provide develop organizational training
  • Document processes and playbooks
  • Partner with internal and external teams. Ability to negotiate with others to reach understanding or agreement.
  • Provide technical solutions to a wide range of difficult problems. Solutions are imaginative, thorough, and practicable,
  • and consistent with organization objectives.
  • Work on developing or refining threat models for the organization. This involves mapping out potential attack vectors, assessing the organization’s defenses, and recommending improvements based on intelligence findings.
  • Contribute to creating training materials for employees on current cyber threats and best practices for maintaining security hygiene. Plan upcoming awareness sessions to educate staff about recognizing phishing attempts and other social engineering tactics.
  • Formulate specific hypotheses about potential threats based on previous incidents, emerging trends, or known vulnerabilities.
  • Determine which systems, applications, or data sets will be the focus of the hunt, often based on risk assessments or threat intelligence.
  • Collect logs from various sources, such as SIEM (Security Information and Event Management) systems, firewalls, and endpoint detection and response (EDR) tools.
  • Foster a positive, engaging and challenging team-focused ‘global’ work environment to ensure high productivity, employee engagement, and optimal performance.
  • Proactively engage with Medtronic business and Global IT partners to identify and define opportunities where the application of information technology can advance the strategic goals and objectives of Medtronic.
  • Act as role model by “living” and demonstrating the Medtronic

Required Knowledge and Experience:

  • 12+ years of Information Security Experience + Bachelors Degree
  • Experience in a global enterprise on a defined cyber security team
  • Experience participating in incident response events and response
  • Experience briefing leadership and speaking to the organization broadly
  • Experience identifying key threats and vulnerabilities and reporting them out to the organization

NICE TO HAVE (Preferred Qualifications)

  • Familiarity with frameworks like MITRE ATT&CK, Diamond Model, or Cyber Kill Chain, which help in understanding and categorizing threats
  • Basic understanding of reverse engineering and static/dynamic analysis of malware to identify behaviors and capabilities.
  • Skills in evaluating risks and vulnerabilities to help prioritize threats based on potential impact and likelihood.
  • Familiarity with cloud environments (e.g., AWS, Azure, GCP) and the specific threats associated with cloud security.
  • Understanding of social engineering tactics to help recognize and counteract human-targeted threats.

Physical Job Requirements
The above statements are intended to describe the general nature and level of work being performed by employees assigned to this position, but they are not an exhaustive list of all the required responsibilities and skills of this position. 

Benefits & Compensation

Medtronic offers a competitive Salary and flexible Benefits Package
A commitment to our employees lives at the core of our values. We recognize their contributions. They share in the success they help to create.  We offer a wide range of benefits, resources, and competitive compensation plans designed to support you at every career and life stage.
 



This position is eligible for a short-term incentive called the Medtronic Incentive Plan (MIP).

About Medtronic

We lead global healthcare technology and boldly attack the most challenging health problems facing humanity by searching out and finding solutions.
Our Mission — to alleviate pain, restore health, and extend life — unites a global team of 95,000+ passionate people. 
We are engineers at heart— putting ambitious ideas to work to generate real solutions for real people. From the R&D lab, to the factory floor, to the conference room, every one of us experiments, creates, builds, improves and solves. We have the talent, diverse perspectives, and guts to engineer the extraordinary.

Learn more about our business, mission, and our commitment to diversity here  
 

Top Skills

AWS
Azure
Endpoint Detection And Response
GCP
Intrusion Detection Systems
SIEM

Similar Jobs

2 Hours Ago
Remote or Hybrid
India
Senior level
Senior level
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
As a Senior Information Security Analyst, you will investigate security incidents, enhance cybersecurity measures, mentor analysts, and lead incident response strategies.
Top Skills: AWSAzureCarbonblackCrowdstrikeCywareDefenderDlpEdrFirewallsGCPHumioIamIdsIpsO365 AtpProofpointProxiesSIEMSoarSplunkWafWeb Content FilteringXsoar
2 Hours Ago
Remote or Hybrid
India
Mid level
Mid level
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
The role involves enhancing security posture, incident response, communication with stakeholders, malware analysis, and continuous learning. It requires experience in cybersecurity concepts and tools and offers flexible remote work.
Top Skills: AWSAzureBashCC++CarbonblackCloud Computing ServicesComputer ScienceCrowdstrikeCybersecurityCywareDatabaseDefenderDlpEndpoint SecurityFirewallsForcepoint OneGCPHumioIamIdsInformation TechnologyIpsMitre Att&Ck FrameworkNistO365 AtpOrcaPowershellProofpointProxiesPythonSIEMSoarSplunkWafWeb Content FilteringWizXsoar
5 Hours Ago
Remote or Hybrid
India
Senior level
Senior level
Fintech • Information Technology • Insurance • Financial Services • Big Data Analytics
The Sr Technical Functional Analyst will engage with clients, gather and analyze requirements, recommend solutions, and provide support for COTS/SaaS implementations.
Top Skills: AgileDev OpsSafe For TeamsSafe Scrum MasterService Oriented Architecture

What you need to know about the Chennai Tech Scene

To locals, it's no secret that South India is leading the charge in big data infrastructure. While the environmental impact of data centers has long been a concern, emerging hubs like Chennai are favored by companies seeking ready access to renewable energy resources, which provide more sustainable and cost-effective solutions. As a result, Chennai, along with neighboring Bengaluru and Hyderabad, is poised for significant growth, with a projected 65 percent increase in data center capacity over the next decade.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account