CareFirst Careers

Cyber Security Specialist

Resp & Qualifications

Under the supervision of the Manager, Information Security or Senior / Lead Cyber Security Specialists, the incumbent’s accountabilities include, but are not limited to the following:

  • Monitor Security Operations Center (SOC) tools such as: IDS/IPS systems, SIEM (Security Incident and Event Management) tools and network scanners for alerts and determine when an alert triggers the Incident Response process.
  • Analyze, triage, and document security events as part of our Incident Response proces, ensuring that all relevant processes are followed and events are either resolved or escalated.
  • Provide appropriate training to other security specialists and external customers on developed standards, procedures and guidelines.
  • Assist in the configuration and installation of security products. Where possible, suggesting and implementing possibilities to automate manual operational activities.
  • Represent Information Security in disaster recovery procedures and exercises.

Apply technology and processes to ensure the enterprise is protected and secured in the following areas:

  • Implement necessary enhancements/updates/upgrades to existing security products.
  • Provide data protection (through the use of technologies such as whole disk encryption, end-to-end e-mail security, public and private key management, data leakage prevention, web applications and source code security, database security, etc.)
  • Network devices and infrastructure, desktop/mobile devices and remote access to the network,
  • Provide general support to the Information Security department in carrying out its’ assigned functions and responsibilities.
  • Provide off-hours support and problem resolution as directed by departmental requirements, service level agreements and internal support procedures.
  • Interact with other Information Security teams to develop tactical and strategic programs to address processes, controls, organization and infrastructure to manage information security related concerns and satisfy directives.
  • Assist with reviews of current and new CareFirst systems and applications, including changes to existing applications/systems, to assure compliance with Information Security policies and standards.
  • Apply creative thinking in problem solving and identifying opportunities for improvements in security.
  • Collaborate with other Cyber Security specialists, designers, developers, and architects. 
  • Work with other technical teams in the organization such as IT Operations and IT Applications. 
  • Share ideas, discuss alternatives, and seek input.  Suggest means to decrease vulnerability of systems, applications and processes.
  • Maintain familiarity with state of the art concepts, procedures, software and techniques in Information Security in order to be able to effectively assess and develop the CareFirst Information Security environment.


Required:  College Degree in an Information Security or Technology related field or equivalent experience plus 1 to 3 years related work experience in a SOC environment.   The incumbent will possess a basic aptitude in information security concepts, information security policies and system architecture concepts and have experience in process definition, workflow design, and process mapping.  A basic understanding in multiple areas of Information Security such as networking (TCP/IP, OSI model, network protocols), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, switches, routers, IPSEC, IDS/IPS, etc.), voice technologies (session border controllers, MPLS, VOIP, etc.), authentication technologies, (TACACS, RADIUS, etc.), wireless architectures, encryption key management, and mobile device technologies.  The incumbent must also have an ability to quickly and effectively learn Information Security tools in a large, complex multi-platform environment.

Abilities/Skills (candidate will possess some of these):

  • Ability to identify and resolve complex security issues in a multi-platform environment.
  • Knowledge of ethical hacking techniques and counter attack methodologies.
  • Strong written documentation skills and technical writing are required.
  • Excellent presentation and verbal communication skills.
  • Ability to effectively complete tasks with under some supervision.
  • Strong computer skills, including knowledge of Microsoft Windows,  various e-mail systems (Lotus Notes, Microsoft Exchange) and unified communication systems (Office Communication Server).
  • Possess a high level understanding of some of the following systems/skill sets:
  • IBM QRadar or similar SIEM tool 
  • System hardening concepts and techniques
  • Checkpoint technologies
  • Network and remote access controls
  • LDAP, Unix, Active Directory, Java, EJB, JSP, JDBC, JMS, Kerboros, PKI, XML, WSDL, Web Services, Ant, and Spring Framework
  • Unix, Linux, Web application servers (WebSphere, Apache)
  • Virtualization technologies (VMware, VLANS, Hypervisors)
  • Encryption technologies and key management
  • Familiarity with access control methodologies (MAC, DAC. RBAC)


  • Specific knowledge of the CareFirst corporate structure.
  • An understanding of the relationships among various units within the corporation.
  • Ability to understand and apply appropriate polices and procedures.
  • Web application servers
  • F5 LTMs / ASMs
  • Web application and IP firewalls
  • Familiarity with security tools such as wireless and network scanning applications, vulnerability assessment applications and concepts, IDS/IPS and other appropriate security related tools and capabilities.
  • Some experience working with Information Security tools in a large, complex, multi-platform environment.


Department: Security Operations Center

Equal Employment Opportunity

CareFirst BlueCross BlueShield is an Equal Opportunity (EEO) employer.  It is the policy of the Company to provide equal employment opportunities to all qualified applicants without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, protected veteran or disabled status, or genetic information.

Hire Range Disclaimer

Actual salary will be based on relevant job experience and work history.

Where To Apply

Please visit our website to apply:

Closing Date

Please apply before: 6/1/2018

Federal Disc/Physical Demand

Note:  The incumbent is required to immediately disclose any debarment, exclusion, or other event that makes him/her ineligible to perform work directly or indirectly on Federal health care programs.


The physical demands described here are representative of those that must be met by an employee to perform the essential duties and responsibilities of the position successfully.  Requirements may be modified to accommodate individuals with disabilities.

The employee is primarily seated while performing the duties of the position.  Occasional walking or standing is required.  The hands are regularly used to write, type, key and handle or feel small controls and objects.  The employee must frequently talk and hear.  Weights of up to 25 pounds are occasionally lifted.

Sponsorship in US

Must be eligible to work in the U.S. without Sponsorship

Learn more about Information Technology