Qureos

Find The RightJob.

Cybersecurity Analyst - Remote

Department and Name: Cyber – SecOps & BISO- Consolidated Hospital Support
Physical Location: Norfolk, VA
Location Type: Remote
Employment Status: Regular-Full time
Shift: First (Days)
Posted Date: March 11, 2026

Job Overview

Sentara is hiring for a Cybersecurity Analyst!

This position is fully remote!

Overview

Responsible for day-to-day support and optimization of software applications, including builds, upgrades, and system enhancements. Analyzes business / clinical needs, evaluate software releases and/or new products, and gives recommendations to optimize processes and decrease expenses. Possesses in-depth business / clinical and application knowledge and experience. Performs and documents workflow assessments to determine functional requirements for optimal utilization of applications. Develops system test plans and performs testing of software upgrades and patches. Maintains a record of test progress and test results. Responsible for problem, incident, and change management and service requests. Provides daily on-call support to the customer base for application-related issues. Works within a cross-functional team and with end-users to achieve application integration to meet business / clinical needs. Responsible for the communication of software issues, requirements, upgrades, and enhancements. Oversees smaller-sized projects or components of projects. Coordinates implementation or project planning around software application releases. Possesses a key certification(s) or other credential(s) which is determined central to the systems or applications supported.

An Experienced Professional applies practical knowledge of job areas typically obtained through advanced education and work experience.

Responsibilities typically include:

  • Works independently with general supervision.
  • Problems faced are difficult but typically not complex.
  • May influence others within the job area through explanation of facts, policies, and practices.

Position Summary:
Our Cybersecurity Analyst role specializes in Security Orchestration Automation & Response (SOAR), Incident Response, Endpoint Detection & Response (EDR), and Security Information and Event Management (SIEM). In this critical role, you will help protect sensitive patient and organizational data by proactively detecting, analyzing, and responding to cybersecurity threats, leading the development and implementation of a customized SOAR solution to automate and streamline security operations, while ensuring compliance with HIPAA and healthcare regulations. This position requires participation in a 24/7 on-call rotation to respond promptly to security incidents.

Key Responsibilities:

  • Design, develop, and maintain a customized SOAR solution that automates incident detection, analysis, triage, containment, and reporting.
  • Collaborate with stakeholders to identify repetitive security tasks suitable for SOAR automation, improving efficiency and consistency in security operations.
  • Integrate SOAR workflows with existing EDR, SIEM, and other critical platforms to enhance visibility and rapid response capabilities.
  • Continuously tune SOAR playbooks to adapt to emerging threats, regulatory changes, or improvements in threat intelligence.
  • Monitor all platforms for security incidents, leveraging SOAR for rapid, orchestrated response.
  • Lead and support incident response efforts—from identification and analysis to containment, eradication, and recovery—with a focus on safeguarding Protected Health Information (PHI) and ensuring minimal impact to patient care.
  • Analyze logs, forensic data, and network traffic across a complex healthcare IT environment.
  • Develop and tune SIEM correlation rules, alerts, and integrated SOAR workflows to detect and respond to threats.
  • Serve as part of a 24/7 on-call rotation, responding rapidly to incidents and escalations as they arise, including after-hours and weekends.
  • Ensure incident handling and SOAR-driven automation align with HIPAA and all relevant regulations; participate in incident debriefs and continuous improvement initiatives.
  • Collaborate with clinical, IT, compliance, and third-party vendors to assess risk and remediate vulnerabilities across critical systems and devices.
  • Document incident response and SOAR automation actions in detail, maintaining records for legal, compliance, and audit purposes.
  • Participate in healthcare-specific threat hunting, vulnerability assessments, and security exercises to strengthen organizational resilience.
  • Maintain current knowledge of emerging cyber threats, SOAR technologies, vulnerabilities, and regulatory changes that could impact healthcare operations.

Required Skills and Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, IT, or a related field; or equivalent experience.
  • 3+ years of experience in a SOC, incident response, health IT cybersecurity, or SOAR engineering role.
  • Excellent proficiency in Python
  • Proven experience with SOAR implementation, EDR tools, and SIEM solutions, with preference for healthcare environments.
  • Familiarity with HIPAA and healthcare risk management practices.
  • Strong communication, teamwork, and documentation skills; able to communicate effectively with technical and clinical stakeholders.
  • Availability to participate in a 24/7 on-call rotation and respond to security incidents outside of standard business hours.
  • Relevant certifications (CISSP, CEH) are preferred.

Minimum Education Qualifications

  • 3 years of relevant experience with a degree (Required)

or

  • 5+ years of relevant experience without a degree (Required)

  • Experience in lieu of a Bachelor’s Degree

Certification/Licensure

  • Relevant certifications (CISSP, CEH) are preferred.

Minimum Experience Qualifications

  • 3 to 5+ years of relevant experience

We provide market-competitive compensation packages, inclusive of base pay, incentives, and benefits. The base pay rate for Full Time employment is: $80,204.80 – $133,681.60. Additional compensation may be available for this role such as shift differentials, standby/on-call, overtime, premiums, extra shift incentives, or bonus opportunities.

Talroo-IT, #LI-DS1, #Indeed, #Dice, #Monster

Keywords: Incident response (SOC), end point detection (EDR), cybersecurity analyst, SIEM, CISSP, CEH, SOAR, Python, healthcare

About Us

Sentara Health, an integrated, not-for-profit health care delivery system, celebrates more than 135 years in pursuit of its mission – “we improve health every day.” Sentara is one of the largest health systems in the U.S. Mid-Atlantic and Southeast, and among the top 20 largest not-for-profit integrated health systems in the country, with 34,000 employees, 12 hospitals in Virginia and Northeastern North Carolina including 10 hospitals with the prestigious Magnet® recognition, and the Sentara Health Plans division which serves more than 1 million members in Virginia and Florida. Sentara is recognized nationally for clinical quality and safety, and is strategically focused on innovation and creating an extraordinary health care experience for our patients and members. Sentara was named a Health Quality Innovator of the Year (2024), was recognized by Forbes as “America’s Best-In-State Employer” (2024), “Best Employer for Veterans” (2022, 2023), and “Best Employer for Women” (2020), and named to IBM Watson Health’s “Top 15 Health Systems” (2021, 2018).

Learn more (Opens in a new tab)

© 2026 Qureos. All rights reserved.