|Duties:||Responsible for providing direction and technical expertise needed to design implement and maintain the Information Systems security environment. This role includes responsibility for developing and implementing appropriate IS security policies and procedures configuring security software and implementing security administration functions across multiple operating systems and hardware platforms. The ability to effectively communicate with all levels of the business on security issues ensuring that the companies information assets are properly protected is essential. Other duties as assigned. Responsible for defining security frameworks for existing and new systems including designing security architecture integrating security products and developing and coordinating implementation plans. Develop techniques procedures and utilities for conducting security risk assessments. Assess and review current technology infrastructure to identify key risk areas and ensure adequate level of controls are in place to address those risks. Includes developing and performing "penetration" efforts to test network and system vulnerability to intrusion and ensure appropriate protection has been put in place. Responsible for system security planning developing and implementing security policies procedures and standards across multiple platforms. Ensuring compliance with regulatory requirements. Assists the Information Security Officer with investigating documenting and reporting any actual or potential information security violations breeches or inappropriate computer use. Ensures successful implementation and maintenance of the defined standards. Ensures compliance of IT Security Policies. Provide advice and assistance to IT project teams in the establishment of the authentication and authorization security requirements for applications and the design of security components. Manages security devices and tools such as IDS Vulnerability Scanners Event Management software Internet Monitoring Spam Filtering etc. Ensure that virus software is implemented and maintained on all systems throughout the enterprise. Installs and monitors status of security patches on all systems throughout the enterprise. Provides technical support and consultation for enhancement of and change to network security configuration. Evaluates security products and test security systems performance. Executes work plans for the design build and implementation of security tools and devices. Meets deadlines and quality requirements. Works closely with the IS Technical Team to develop implement and test the disaster recovery plan for the organizations network and data centers.
Must have IAM Experience
|Skills:||Experience in a hospital or healthcare setting - Highly desired. Two or more years of relevant security administration experience - Required: 2 Years
Must have IAM Experience
|Education:||Knowledge of computer principles acquired through completion of a Bachelor’s degree in technology field or through a combination of education & exp. - Required|