Maintains systems to protect data from unauthorized users or access. Identifies, reports, and resolves information security violations.
Develops action plans and manages the associated remediation processes.
Evaluates information risk on a regular basis.
Establishes, plans and administers the overall policies, goals and procedures for the information security function. Identifies, reports, and resolves information security violations.
Maintains and monitors all vulnerability management systems, enterprise antivirus and overall patch management procedures.
Performs annual security audits and information security risk assessments.
Performs security analysis of information systems and applications.
Provides and promotes the information security training and awareness program within the organization.
Responsible for maintaining Information Systems security, including data backup, disaster recovery, database protection and software development in accordance with organizational information security standards.
Recommends, develops and implements security measures to protect information against unauthorized access, modification or loss.
Serves as the point of contact for information security related issues.
Bachelors Computer Science Preferred
5 years Computer Systems Required
4-6 years of experience in the field or in a related area.
Licenses and Certifications:
An IT security certification Required
Required Knowledge and Skills:
Must be knowledgeable of standard concepts, practices, and procedures within the information security field.
A certain degree of creativity and latitude is required.
Normal office environment with frequent visits to medical center departments and locations across the System or off-site.
No expected exposure to blood and/or body fluids.
Reaching above shoulder, at waist or below waist Rarely
Lifting/Pushing or Pulling up to 40 pounds Occasionally
Lifting/Pushing or Pulling over 40 pounds Rarely
Associated topics: cybersecurity, identity, identity access management, iam, information assurance, information security, phish, protect, security, violation
* The salary listed in the header is an estimate based on salary data for similar jobs in the same area. Salary or compensation data found in the job description is accurate.