We are so glad you are interested in joining Sutter Health!
Organization:
SHSO-Sutter Health System Office-ValleyPosition Overview:
We are seeking an experienced Cybersecurity Manager to lead and oversee Threat Detection, Threat Intelligence, and Red Team/Penetration Testing for our healthcare organization. This critical role will be responsible for ensuring the security of our systems, protecting patient data, and proactively identifying and mitigating cyber threats. The ideal candidate will have a strong background in security operations, offensive and defensive security, and cyber threat intelligence with experience in managing teams in a complex healthcare environment.Job Description:
EDUCATION:
Equivalent experience will be accepted in lieu of the required degree or diploma.
Bachelor's: Business, Cybersecurity, Computer Science, Information Technology/Security, Risk Management, or related field or equivalent education/experience
CERTIFICATION & LICENSURE:
CISSP-Certified Information Systems Security Professional within 1 Year of hire
TYPICAL EXPERIENCE:
8 years recent relevant experience
Cybersecurity Expertise – Experience in threat modeling, offensive security, or detection engineering, with 2+ years in a leadership role managing technical security teams.
Threat Detection & Adversary Tactics – Deep understanding of adversary TTPs (MITRE ATT&CK), developing threat models, and creating effective detection rules.
Technical Proficiency – Hands-on experience with SIEM, EDR, and threat hunting tools, plus strong scripting/programming skills (Python, PowerShell); familiarity with automated testing and red team methodologies.
Leadership & Collaboration – Proven ability to lead technical teams, foster collaboration, and provide constructive feedback while driving security initiatives.
Communication & Project Management – Skilled at conveying complex technical details to executives and business partners, with strong project management focus on timely delivery and measurable security improvements.
SKILLS AND KNOWLEDGE:
Detailed understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment, especially data movement in a large healthcare system.
Technical skills in planning, administration, and management of information systems; operational and technical security controls; and security risk analysis and management, including end point security controls, such as access control lists (acls), host intrusion prevention system (hips), registry, logging, and forensics.
Comprehensive knowledge of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS), data loss prevention (DLP) methodologies, DLP technologies, current information security trends and practices including security processes, methods, and procedures.
Thorough knowledge of software, hardware, databases, networks, firewalls, encryption, and other systems security devices, including a good understanding of end point operating systems (Windows, Unix, and Linux), internet technologies such as Domain Name System (DNS), routing, Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP), and familiarity in a command line environment.
Expert knowledge of state and federal information services (IS) security and privacy-related regulatory requirements and laws.
Developed understanding of National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health Act (HIPAA/HITECH), Federal Information Procession Standards (FIPS), and other related industry security standards, regulations, and best practices.
Seasoned management and leadership skills reflecting business acumen with the ability to build high performing quality teams through mentoring and training.
Exceptional communication (written/verbal), interpersonal, and presentation skills to explain complex technical or sensitive information clearly and professionally to diverse audiences and all levels of internal and external constituencies.
Advanced computer skills, including expert knowledge of Microsoft Office Suite (Word, Excel, Outlook, and Access), scripting or development language(s), various database architectures and related security and assessment tools and applications.
Work independently, as well as part of a multidisciplinary team, while demonstrating organization skills to.
Maintain strict confidentiality and ensure the privacy of each patient’s protected health information (phi) as well as the confidentiality of all privacy and risk management data.
Build collaborative relationships with peers, other departments, stakeholders, and external agencies, to achieve regulatory and accreditation compliance.
Attention to detail, superior problem solving and strategic analytical skills with the ability to analyze data, identify trends, provide insights to staff and affiliates, and recommend creative and actionable solutions in challenging situations.
Job Shift:
DaysSchedule:
Full TimeDays of the Week:
Monday - FridayWeekend Requirements:
As NeededBenefits:
YesUnions:
NoPosition Status:
ExemptWeekly Hours:
40Employee Status:
RegularSutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.
Pay Range is $83.00 to $132.80 / hourThe salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package.