drjobs Security Analyst/Full Time Days (80 Hours Bi-Weekly)

Security Analyst/Full Time Days (80 Hours Bi-Weekly)

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Danville - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Summary :

This position will serve the needs of the organization including patients clinicians and operations through the enforcement of corporate regulatory and risk management policies. Assists in designing programs for user awareness compliance monitoring and security compliance. Implements upgrades repairs modifications and replacements of information with security devices or software. Creates and maintains logical security reporting that facilitates logical security monitoring. Provide input as needed to a variety of new technology implementations and existing technology upgrades. Provides education to IS associates as needed and serves as a positive role model in the department and the organization as well as adheres to organizational values.

Job Description

Essential Responsibilities:

*Note: While these are considered essential responsibilities of the position alternatives or accommodations may be considered if the situation requires.

Security Execution:

o Implements updates maintains and monitors the enterprise network and security operations infrastructure.
o Executes testing and configuration of security operations infrastructure support including user set up based on role-based needs and project initiatives.
o Provides reporting on internet use firewall and intrusion protection reporting.
o Performs analysis of security products tools and services.
o Performs all tasks necessary to ensure the protection of information systems assets from intentional or inadvertent access or destruction.
o Analyzes application security needs based on the sensitivity or proprietary nature of the data and ensures all systems are utilized for approved purposes only.
o Generates audit reports and performs testing of security modifications.
o Analyzes new/enhanced software application or tool implementations for implications to existing security software and devices.
o Provides expert working knowledge of the day-to-day operating environment available tools operating techniques and customer applications.

Provide support and oversight of the information security management program (ISMP).

Customer Service:
o Identifies and resolves security issues.
o Works within the guidelines and procedures established for the IS Security and Architecture Team.
o Works with all IS associates to deliver quality service.
o Provides Tier 1 support and for tickets and identifies work order patterns that signal a major issue and escalates as appropriate.
o Acts as an agent of change when needed to improve process and deliver new technologies.

Continuous Improvement:

o Assists in developing enterprise-level strategies and recommends standards for security.
o Communicates and educates on the use of sound security principles with others.
o Analyzes business processes functions and applications to evaluate for optimal efficiency and makes recommendations for improvements.
o Provides recommendations on security practices and the implementation of those practices.

Change Management:

o Follows established change management governance.
o Contributes to the Change Management Committee as needed by making decisions on changes that affect security and the overall infrastructure of the organization.


Skills and Abilities:
o Knowledge of security controls and best practices.
o Possess a high level of loyalty reliability tactfulness and discreetness and able to handle confidential information in a professional manner.

Supplemental Responsibilities:
o Participates in the IS on-call rotation.
o Meets on a regular basis with the IS Manager Security and Infrastructure and the entire Security and Infrastructure Team to discuss the status of current projects tasks and policy development.
o Works with the PMO on various projects as assigned.

Guest Relations:

o Exhibits excellent guest relations to patients visitors physicians and co-workers; shows courtesy compassion and respect; conforms to organizational policies and procedures.
o This position requires communication and interaction with co-workers other departments and vendors.

Please note this job description is not designed to cover or contain a comprehensive listing of activities duties or responsibilities that are required of the associate for this job. Duties responsibilities and activities may change at any time with or without notice.

Patient Data Protection
The Security Analyst may see confidential patient data and must follow HIPAA rules and regulations established by U.S. Department of Health and Human Services. The Security Analyst along with the Manager of Infrastructure and Security are responsible for confidentiality integrity and availability of patient data.

Vocational and Educational Preparation:

Bachelors degree in an IT related field preferred

A minimum of two (2) years of experience working in IT or quantitative business area with focus on data security and architecture is preferred but not required.

Licensure/Certifications

Desirable certifications in one or more of the following:

CompTIA Security

Certified Information Systems Security Professional (CISSP)

Certified Cloud Security Professional (CCSP)

Certified Information Systems Auditor (CISA)

Cisco CyberOps Associate

Security Certified Network Specialist (SCNS)

Systems Security Certified Practitioner (SSCP)

Work Shift :

1st Shift (United States of America)

Scheduled Weekly Hours :

40

Required Experience:

IC

Employment Type

Full-Time

Company Industry

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.