Jobing Beta

Cardinal Health

Job: Threat Management and Incident Response Engineer

This posting has expired and is no longer available.

Browse Similar Jobs: Engineering/Architecture IT - Computer Services & Support Management - Mid-Level (Manager, Director) IT - ALL CATEGORIES Management - ALL CATEGORIES

Jobing Description

Headquartered in Dublin, Ohio, Cardinal Health, Inc. (NYSE: CAH) is a global, integrated healthcare services and products company connecting patients, providers, payers, pharmacists and manufacturers for integrated care coordination and better patient management. Backed by nearly 100 years of experience, with more than 40,000 employees in nearly 60 countries, Cardinal Health ranks among the top 25 on the Fortune 500.

We currently have a full-time job opening for a Threat Management and Incident Response Engineer.

Department Overview

Information Security is responsible for managing Information Security Operations.  We exist to ensure availability, integrity and confidentiality of healthcare infrastructure that safeguards the patient.  We promote a culture that protects information assets, manages risk and embeds security in people, process and technology.  Overall, we define solutions that balance information security requirements against business needs.

Role Overview

As a P3 Information Security engineer, you will be specifically tasked with working incident response cases which are escalated from our Tier 1 support and require a more detailed approach and expertise for remediation.  This role will collaborate significantly with internal and external clients within a Sec Ops environment to further secure the Cardinal Health enterprise. May act as a mentor to less experienced colleagues

Additionally, you will be working with our current incident response and automation toolsets to further develop and mature these platforms. 

This role will also work with the following:

  • Cyber kill chain methodology
  • Incident Response case management
  • Incident Response toolsets
  • SIEM technologies and utilization within a Sec Ops environment
  • Logging/monitoring solutions and implementations
  • DevOps/automation
  • Provide an organized and risk based approach to remediation of sensitive assets in the enterprise
  • Present data findings and influence organizational partners at multiple levels in the organization.
  • Establish strong reporting metrics to support the program and influence behaviors.
  • Act a liaison with solution owners and IT groups to ensure alignment of our strategy.


  • Proven Incident Response security experience is a must.
  • Any DevOps experience is a major plus.
  • CISSP or equivalent certifications preferred, but not required
  • Bachelor's or Master’s degree in related field or equivalent work experience

Posted 30+ Days Ago

Full time


Skills / Requirements

Important Notes