Kaiser Permanente Header
This job is expired.

Cyber Risk Defense Consultant III

Corona, CA
Full-Time

Job Description

Job Summary:
  • Provides proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Identifies opportunities for cyber security improvements within assigned cyber defense domain.
  • Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Participates in follow-up remediation design and review.
  • Conducts investigation and triage of security events within assigned domain.
  • Performs data analysis in support of security event management processes, including root cause analysis

This individual contributor is primarily responsible for supporting the protection and maintenance of integrity and reliability of the security of data, systems and networks, while resolving problems with tools, systems and procedures.


Essential Responsibilities:
  • Completes work assignments by applying up-to-date knowledge in subject area to meet deadlines; following procedures and policies, and applying data and resources to support projects or initiatives; collaborating with others, often cross-functionally, to solve business problems; supporting the completion of priorities, deadlines, and expectations; communicating progress and information; identifying and recommending ways to address improvement opportunities when possible; and escalating issues or risks as appropriate.
  • Pursues self-development and effective relationships with others by sharing resources, information, and knowledge with coworkers and customers; listening, responding to, and seeking performance feedback; acknowledging strengths and weaknesses; assessing and responding to the needs of others; and adapting to and learning from change, difficulties, and feedback.
  • Provides proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Identifies opportunities for cyber security improvements within assigned cyber defense domain.
  • Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Participates in follow-up remediation design and review.
  • Conducts investigation and triage of security events within assigned domain.
  • Performs data analysis in support of security event management processes, including root cause analysis.
  • Provides on-call duties and after hours support of incident management as required.
  • Supports incident response plans which may include after-hours support and coordination among responsible teams.
  • Assists in the execution of incident handling processes which may include containment, protection, and remediation activities.

Minimum Qualifications:
  • Bachelors degree in Business Administration, Computer Science, Social Science, Mathematics, or related field and Minimum three (3) years experience in IT or a related field, including Minimum one (1) year in information security or network engineering. Additional equivalent work experience may be substituted for the degree requirement.
Additional Requirements:Preferred Qualifications:
  • Experience: 2-3 years of professional work in digital forensics, incident response, or a related cybersecurity discipline.
  • Cloud & OS Expertise: Hands-on experience conducting forensic investigations and incident response in cloud environments (e.g., AWS, GCP, Azure) and across multiple operating systems, including Windows, Linux, and macOS.
  • Endpoint Security: Practical experience with Endpoint Detection and Response (EDR/XDR) platforms for threat hunting, log analysis, and investigative support.
  • Frameworks: Proficiency with the MITRE ATT&CK framework, including demonstrated application in digital forensic investigations.
  • Security Platforms: Familiarity with SIEM and SOAR solutions (e.g., Splunk, PA XSOAR) for log correlation, alert management, and automated response workflows.
  • Threat Knowledge: Understanding of cyber threats, attack vectors, and advanced mitigation strategies, with the ability to guide strategic response efforts.
  • Forensic Skills: Exposure to network forensics, malware analysis, and forensic timeline reconstruction techniques.

PDN-a0683951-12d5-4618-b502-a9c5160b2731
Job Summary:
  • Provides proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Identifies opportunities for cyber security improvements within assigned cyber defense domain.
  • Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Participates in follow-up remediation design and review.
  • Conducts investigation and triage of security events within assigned domain.
  • Performs data analysis in support of security event management processes, including root cause analysis

This individual contributor is primarily responsible for supporting the protection and maintenance of integrity and reliability of the security of data, systems and networks, while resolving problems with tools, systems and procedures.


Essential Responsibilities:
  • Completes work assignments by applying up-to-date knowledge in subject area to meet deadlines; following procedures and policies, and applying data and resources to support projects or initiatives; collaborating with others, often cross-functionally, to solve business problems; supporting the completion of priorities, deadlines, and expectations; communicating progress and information; identifying and recommending ways to address improvement opportunities when possible; and escalating issues or risks as appropriate.
  • Pursues self-development and effective relationships with others by sharing resources, information, and knowledge with coworkers and customers; listening, responding to, and seeking performance feedback; acknowledging strengths and weaknesses; assessing and responding to the needs of others; and adapting to and learning from change, difficulties, and feedback.
  • Provides proactive monitoring and/or response to known or emerging threats against the KP network.
  • Effectively communicates investigative findings to non-technical audiences.
  • Participates in regular operations meeting with Cyber Risk Defense Center (CRDC) teams.
  • Identifies opportunities for cyber security improvements within assigned cyber defense domain.
  • Works with the CRDC Policy Engineers and Remediation teams to contain identified issues and determine the best approach for improving security posture.
  • Participates in follow-up remediation design and review.
  • Conducts investigation and triage of security events within assigned domain.
  • Performs data analysis in support of security event management processes, including root cause analysis.
  • Provides on-call duties and after hours support of incident management as required.
  • Supports incident response plans which may include after-hours support and coordination among responsible teams.
  • Assists in the execution of incident handling processes which may include containment, protection, and remediation activities.

Minimum Qualifications:
  • Bachelors degree in Business Administration, Computer Science, Social Science, Mathematics, or related field and Minimum three (3) years experience in IT or a related field, including Minimum one (1) year in information security or network engineering. Additional equivalent work experience may be substituted for the degree requirement.
Additional Requirements:Preferred Qualifications:
  • Experience: 2-3 years of professional work in digital forensics, incident response, or a related cybersecurity discipline.
  • Cloud & OS Expertise: Hands-on experience conducting forensic investigations and incident response in cloud environments (e.g., AWS, GCP, Azure) and across multiple operating systems, including Windows, Linux, and macOS.
  • Endpoint Security: Practical experience with Endpoint Detection and Response (EDR/XDR) platforms for threat hunting, log analysis, and investigative support.
  • Frameworks: Proficiency with the MITRE ATT&CK framework, including demonstrated application in digital forensic investigations.
  • Security Platforms: Familiarity with SIEM and SOAR solutions (e.g., Splunk, PA XSOAR) for log correlation, alert management, and automated response workflows.
  • Threat Knowledge: Understanding of cyber threats, attack vectors, and advanced mitigation strategies, with the ability to guide strategic response efforts.
  • Forensic Skills: Exposure to network forensics, malware analysis, and forensic timeline reconstruction techniques.

PDN-a0683951-12d5-4618-b502-a9c5160b2731

About Kaiser Permanente

At Kaiser Permanente, we’re all focused on helping people and providing high-quality, affordable health care services and to improve the health of our members and the communities we serve. Across our organization, we’re fiercely committed to our members, our mission, our communities, and each other. We know that each part of the Kaiser Permanente team is essential to our success. Together, we are more than 235,000 dedicated professionals working to advance Kaiser Permanente’s commitment to delivering a healthier tomorrow.

Driven by our collective passion at Kaiser Permanente, we strive to make health care more innovative and compassionate. With the wellness of our patients and our communities at heart, we work to revolutionize health and care from more than 650 locations in 8 states and D.C.

Related Jobs

Apply For This Job
Cyber Risk Defense Consultant III
Kaiser Permanente
Corona, CA
Nov 21, 2025
Full-time
Your Information
First Name *
Last Name *
Email Address *
This email belongs to another account. Please use a diferent email address or Sign In.
Zip Code *
Password *
Confirm Password *
Create your Profile from your Resume
By clicking the Apply button, you agree to the terms of use and privacy policy and consent to receive emails from us about job opportunities, career resources, and other relevant updates. You can unsubscribe at any time.
Supercharge Your Resume with AI

Boost your resume with AI-driven enhancements. The tool analyzes and refines your content, highlighting your strengths and tailoring it for maximum impact. Get personalized suggestions and apply improvements instantly to stand out in the job market.

©2025 International Association of Women.
Powered by TalentAlly.