Walgreens Employee At Home (Remote Jobs)
Posted 2025-03-14Would you want to look at the effect of your work at the actual global? Is hands-on global elegance engineering and problem-fixing a part of your passion? Welcome to WBA Tech.
We are a group of technologists, below our visionary CEO Rosalind Brewer, running to convert fitness care thru improvements that make fine care extra accessible, affordable, less complicated to use, efficient, and patient-focused. Through the person of technology, we're pioneering a brand new technique to overall fitness that places human beings in the middle of the whole lot we do. You could be a part of a group with a view to constructing the destiny of a healthcare platform that connects clients with doctors? offices, hospitals, care centers, pharmacies, insurers and payors. Working for WBA Tech is profitable due to the fact your efforts will make a real distinction to clients and sufferers throughout the groups we serve withinside the U.S.
You could be concerned about a set of rules design, information shape at a petabyte scale, imaging and speech processing, synthetic intelligence and robotics, infrastructure and community designs at a big scale.
We search for leaders and character individuals in the front quit designers, backend Java programmers, Linux engineers, community engineers, software program and set of rules designers (don't forget the huge O notation?), AI implementers, photo processing engineers, database designers (SQL and NoSQL), messaging engineers and safety engineers with expertise at the protocol level.
WBA is #18 on the Fortune 500 listing and our organization's reason is extra happy lives thru higher fitness.
<strong>Job Summary</strong>
This position is liable for the early tiers of hazard detection via way of means of figuring out threats at the primary segment of an assault or compromise. Hunts for hidden and unidentified threats to the organization?s cyber environment. Detects hazard actor hobby which includes exploitation and hazard to crucial structures.
<strong>Job Responsibilities</strong>
<ul>
<li>Assesses and evaluates structures to pick out weaknesses and investigate hazards; plays vulnerability checking out.</li>
<li>Implements new or upgraded safety features or controls, and files machine or system changes.</li>
<li>Reviews safety violation reviews or logs, investigates feasible safety exceptions and coordinates with inner groups or outside companies as needed, which includes controlled provider providers.</li>
<li>Develops and executes safety controls, defenses and countermeasures to intercept and save you from inner or outside assaults or tries to infiltrate organization email, information, e-trade and web-primarily based totally structures. May recommend safety controls for tasks.</li>
<li>May recommend penetration checking out and vulnerability checks of applications, working structures and/or networks. May behavior complicated the cleanup of legacy environments</li>
<li>Researches and evaluates cybersecurity threats and plays root purpose analysis.</li>
<li>Assists withinside the advent and implementation of safety solutions, which can also additionally consist of engaging in dealer checks to make sure the dealer is complying with safety settlement language and WBA safety requirements.</li>
<li>May behavior settlement critiques for suitable safety language previous to a project/WBA signing</li>
<li>May behavior remediation control or governance and/or escalations on carriers or operations problems require a solution</li>
<li>May carry out as ?Level 3? help withinside the occasion Managed Service company is not able to remedy an issue.</li>
<li>May assess tasks to make sure alignment with Security Requirements and/or constitute information safety on tasks, whilst necessary. May behavior oversight of a selected location of Managed Service, whilst necessary</li>
<li>Provides data to control as required, which includes Producing and handing over diverse dashboards, metrics and different reviews, as required</li>
</ul>
<strong>Basic Qualifications</strong>
<ul>
<li>Bachelor?s Degree and a minimum of 1-year experience in IT safety OR High School/ GED and a minimum of four years of experience in IT safety.</li>
<li>Experience running in Security Engineering, Threat Response, Security Operations, IT Operations, IT Compliance and/or IT Governance</li>
<li>Willing to journey as much as 10% of the time for enterprise purposes (inside the nation and out of the nation).</li>
</ul>
<strong>Preferred Qualifications</strong>
<ul>
<li>BS/BA diploma awareness in pc science, Computer Engineering, Cybersecurity, Mathematics, and Physics.</li>
<li>Experience in huge business enterprise IT environments dealing with phishing & cyber incidents.</li>
<li>Experience the usage of MITRE ATT&CK Framework to map actor procedures and strategies for an incident.</li>
<li>Experience the usage of question languages (Splunk Processing Language (SPL), Kusto Query Language (KQL)) for investigating safety device alerts.</li>
</ul>
<strong>Pay Range:</strong> $35 - $55/Hour