Identify gaps or vulnerabilities in security systems, network devices, and controls to validate effectiveness and configuring of security devices and tools; assign appropriate SLAs to drive system compliance and remediation efforts
Identify, analyze, correlate, mitigate, track, and develop content for tools & processes related to indicators of comprise
Assist with execution of monitoring, incident response, and threat hunting efforts
Identify anomalous activity and potential insider threats by analyzing external and internal log sources to identify attack trends and threat tactics; create strategic threat intelligence reports and briefings
Collect and analyze post exploit data and leverage the results to prevent recurrences
Perform advanced analysis of adversary tactics, exploits, malicious code, and capabilities
Responsible for enterprise scale cyber threat intelligence, threat hunting, and vulnerability analysis
Perform advanced analysis of adversary tactics, exploits, and capabilities
Utilize a mixture of open source and subscription tools to conduct cyber threat and intelligence analysis, developing briefings and reports for all levels of leadership to aid in decision making and proactive mitigation efforts.
Possess a deep understanding of the cyber kill chain, existing network & host security controls, to conduct vulnerability assessments for new and emerging common vulnerabilities and exposures (CVEs)


Bachelor’s degree in Information Technology, Engineering, or Business Administration.
4+ years of experience with cyber security tools, network topologies, intrusion detection, defense, and secured networks.
Subject matter expertise in one or more of the following domains: Subject matter expert in Web Application Scanning.
Preferred Skills:

Highly preferred that candidates have Web Application Security Testing experience.

Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Pentester (GPEN) preferred

This position will be supporting a Federal government contract, therefore it requires U. S. citizenship and proof of favorable adjudication following submission of Department of Defense form SF86 or higher security.

About Centene

As we work to improve health outcomes around the world, technology will play a key role. That’s why we’ve made major investments in cutting-edge technology – and in people like you. Here, you’ll work in a fast-paced industry with lots of room for growth and innovation. This is a technology operation few can match in scope and none can match in impact. If you’re ready to develop and deliver solutions that can help millions of people, join Centene.