Sr Cybersecurity Fraud Analyst
About the position Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by diversity and inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health equity on a global scale. Join us to start Caring. Connecting. Growing together. Enterprise Information Security (EIS) is focused on improving security across the enterprise. Much of what our team does involves close collaboration with engineers, interface designers, infrastructure, cloud teams, newly acquired companies and clinical partners. Our mission is to Protect the confidentiality, integrity, and availability of UnitedHealth Group's Information assets through the implementation and management of an Enterprise Information Security Program. We are committed to building and maintaining the trust and confidence of our customers and our stakeholders. It is our duty to protect the information of those we serve and help fulfill our mission of making the health care system work better for everyone. The Senior Cybersecurity Fraud Analyst conducts in-depth analyses and correlation of data points to model Proactive Call Center Detection/Prevention and investigate risks to UHG. You'll enjoy the flexibility to work remotely from anywhere within the U.S. as you take on some tough challenges. Responsibilities • Review logs and indicators to identify, analyze, document, and report on actions or behaviors as observed by security logs that are risky, do not align to company policies, or are otherwise deemed suspicious • Correlate data points from various sources to support identification of anomalous behavior using critical thinking skills • Alert those that need to know by providing clear and detailed information to help address the perceived risk and drive corrective actions and resolution after reporting • Continually learn, adapt, and feed-forward those findings to what is and is not risky behavior based on prior notifications, changes in policies, and changes in security logs including applying lessons learned from past incidents • Translate business risks to threat monitoring use cases for alerting, including conducting risk assessments on data sources for ingestion into monitoring tools • Collaborate with partner teams to support investigations processes, provide technical expertise as needed, and communicate risks to the business • Mentor and train other analysts on investigative techniques and analytical and technical skills • May assist with sophisticated cybersecurity incidents, investigations, and maintaining chain of custody when needed to support legal requirements Requirements • Undergraduate degree or 3+ equivalent cyber experience • 4+ years of experience with Incident Response Platforms (IRP) • 3+ years of Proficiency in interpreting and analyzing data to uncover potential cyber threats • 3+ years of experience in Security Information and Event Management (SIEM) • 3+ years of In-depth understanding of cybersecurity principles, technologies, and tools • 1+ years ability to resolve security incidences efficiently • 1+ years of experience monitoring systems and analyzing data • 1+ years of experience working as an analyst working sensitive information ethically and responsibly Nice-to-haves • 2+ years of experience with General Forensic Toolsets • 1+ years of experience with User and Entity Behavioral Analytics (UEBA) • 1+ years of Pindrop experience Benefits • Comprehensive benefits package • Incentive and recognition programs • Equity stock purchase • 401k contribution Apply tot his job