What are the responsibilities and job description for the Cybersecurity Operations Specialist - Hybrid position at Cedars-Sinai Health System?
Grow your career at Cedars-Sinai!
We were recently named one of the "Best Places to Work in IT 2025" by Computerworld and ranked #2 among large organizations for hybrid work.
The organization’s Healthtech excellence was acknowledged again, this time by the esteemed “ CHIME Digital Health Most Wired “ recognition program. Cedars-Sinai was assigned a Level 10—the most prestigious level of certification—among more than 300 surveyed healthcare organizations. Cedars-Sinai netted high scores across multiple verticals and particularly excelled in areas of infrastructure, interoperability, and population health innovation.
Why work here?
Beyond an outstanding benefit package and competitive salaries, we take pride in hiring the best, most committed employees. Our staff reflects the culturally and ethnically diverse community we serve. They are proof of our dedication to creating a multifaceted, inclusive environment that fuels innovation and the gold standard of patient care we strive for.
What will you be doing in this role:
The Cybersecurity Operations Specialist is responsible for active monitoring, detection, analysis, and response to cybersecurity threats. This position plays a meaningful role in maintaining situational awareness and protecting enterprise systems, networks, and data from unauthorized access or disruption. The role involves working with various security tools and platforms to triage alerts, investigate incidents, and support containment and recovery efforts. Strong analytical skills, attention to detail, and the ability to recognize threat patterns are critical. This position also requires effective collaboration with multi-functional teams and the ability to detail findings and actions clearly.
- Versatility with a range of security tools and platforms (e.g., SIEM, EDR, firewall logs, threat intelligence feeds) to support alert triage and incident response.
- Strong analytical thinking skills with the ability to detect suspicious patterns, identify anomalies, and recognize emerging threats.
- Proficiency in reviewing logs across various systems (e.g., Windows, Linux, network devices) to identify anomalous or unauthorized activity.
- Ability to consistently meet response time expectations for alerts and incidents, maintaining a sense of urgency and accountability.
- Clear and structured documentation of investigation findings, remediation steps, and response actions for both technical and non-technical audiences.
Hybrid Remote = must currently live in Los Angeles area or willing to relocate to LA area for weekly onsite requirements