Information Security Analyst - Security Operations Center

Requisition ID
Category (Portal Searching)
Information Technology


Inovalon is a leading technology company that combines advanced cloud-based data analytics and data-driven intervention platforms to achieve meaningful insight and impact in clinical and quality outcomes, utilization, and financial performance across the healthcare landscape. Inovalon's unique achievement of value is delivered through the effective progression of Turning Data into Insight, and Insight into Action.


The Information Security Analyst (SOC) is responsible for the monitoring of and response to security events within the Inovalon environment. The successful candidate will participate in continuous monitoring efforts, analyzing and prioritizing those events with security implications, while also responding to those events which rise to the level of incidents. Additionally, the successful candidate will assist in developing procedures and metrics while providing mentoring to junior team members. 


  • Develop and maintain Standard Operating Procedures for security analyst roles and responsibilities;
  • Maintain deployed security technologies providing accurate, detailed configurations, repeatable processes, all under change management control;
  • Provide analysis and trending of security log data from a large number of heterogeneous security devices and develop processes that analyze data and produce accurate, meaningful, easily interpreted results based on user requirements and use cases;
  • Conduct product evaluations of security technologies as directed. Develop product comparisons and detailed reports. Make recommendations to management appropriate to an organizations needs and requirements;
  • Develop policies, procedures and standards that meet existing and newly developed policy and regulatory requirements including SOX, PCI and HiTrust;
  • Responsible for working in a 24x7 Security Operation Center (SOC) environment;
  • Provide Incident Response (IR) support when analysis confirms actionable incident and respond to previously undisclosed software and hardware vulnerabilities; and
  • Provide 1st and 2nd -level troubleshooting support for security applications and appliances.


  • Minimum 5 years’ experience in the information security field and 3 years’ experience in an analysis and response role or security operation center environment;
  • Demonstrated experience in the monitoring, analysis and triage of network events in a high volume and fast paced environment;
  • Knowledge of various security methodologies and processes, and technical security solutions (firewall, intrusion prevention and intrusion detection systems);
  • Knowledge of TCP/IP Protocols, network analysis, and network/security applications;
  • In-depth experience reviewing raw log files and performing data correlation/analysis, such as firewall, IDS, and system logs;
  • Experience utilizing, tuning and developing procedures for SIEM tools (SPLUNK, SolarWinds LEM);
  • Experience with Data Loss Prevention (DLP) tools including; SourceFire, FireEye, Forcepoint (Websense), McAfee EPO
  • In-depth knowledge of current threat actors, techniques and trends in cyber security;
  • Knowledge and working experience as a user and/or admin of SIEM technology solutions;
  • Possession of industry certifications is preferred, examples include: CISSP, CEH, GCIH, GCIA or similar; and
  • Bachelor of Science in a technical discipline or equivalent demonstrated experience and knowledge.


Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed