IT Security Engineer Senior

OH, United States

The Christ Hospital Health Network

View company page

The Security Professional supports the Information Security department’s goals and objectives by performing multiple technical or functional roles. Information Security’s goals and objectives are to develop information, computer, network, product, application and related business security policies, and mandate minimum security standards for The Christ Hospital Health Network (TCHHN) and its associated businesses and or partners; facilitate or implement tasks or processes in support of security policies and standards; and assess compliance with such TCHHN Security policies. The security professional will actively promote awareness of these Security Policies and related security topics throughout TCHHN. Additionally the security professional will act as a subject matter expert for the CISO and perform governance, risk management and compliance (GRC) as required.

Risk Management / Compliance / Governance

• Tracks and manages information security risks and identifies information security vulnerabilities and facilitates required remediation activities

• Perform risk and security impact analysis to address compliance with applicable laws, regulations, requirements and to effect positive financial security investments

• Manage or facilitate compliance audits and or investigations

• Designs and implements internal controls/standards & procedures that ensure compliance with security standards that meet existing regulatory security requirements

• Contributes to the development of  policies and standards as needed to reflect evolving TCHHN needs

• Coordinates and conducts internal security audits to ensure the effectiveness of TCH’s security parameters

• Participates and   advises  in TCHHN risk programs.• 

 

IT Infrastructure & Security Operations and Support:

• Ensures the confidentiality, integrity and availability of current information systems appropriately utilizes resources to protect data (HIPAA/HITECH/PCI/PII, etc.)

• Implement commercially reasonable information security solutions in line with business goals and strategies

• Resolves operational conflicts that arise between projects and daily operations

• Manage stakeholder expectations, understand business priorities and communicate security approaches and or requirements appropriately

• Implement approved service requests according to standard procedures

• Review change requests with information security impact and provide direction

• Execute changes in a controlled, organized manner following established change management processes

• Manage, monitor, execute security operational tools to include (but not limited to):

• Intrusion Prevention Systems/next generation firewall

• Web Content Filter

• Advanced Persistent Threat systems and analysis

• Forensic toolsets

• Advanced next generation anti-virus & malware toolsets

• Email security virtual appliances

• Logging/Monitoring/Incident Detection systems

• Monitoring and executing routine information security processes and tickets

• Manage information security incidents and problems to agreed service levels

• Monitoring KPI’s on a continuous basis to ensure information security controls meet business needs

Ensures that technology projects are properly planned, managed, and executed

 

Operations:

• Mentoring security team members as assigned

• Ability to establish work standards, prioritize and deliver on key initiatives

• Assist in the development of awareness training and communication programs to effectively communicate company security and privacy policies

• Fosters a service oriented atmosphere of teamwork between the business and IT

• Must be a professional of unquestionable integrity, credibility, business ethics and character

• Must be self-directed, take ownership & responsibility and ensure high quality output 

• Outstanding communication skills with a demonstrated ability to connect with people on business needs, infrastructure issue resolution and projects 

 

Other

• Communicates with  team in order to convey risk related to specific lines of business within the Hospital and that deal with legal, compliance, personnel security, public relations and other issues directly tied to security risk

• Performs project management functions as needed or required

• Stays current on HIPAA, HITECH, PCI and other relevant security regulations 

• Performs other duties as necessary or assigned by the Chief Information Security Officer and Executive Management

Key Competencies

KNOWLEDGE AND SKILLS:

Please describe any specialized knowledge or skills, which are REQUIRED to perform the position duties.  Do not personalize the job description, credentials, or knowledge and skills based on the current associate.  List any special education required for this position.

 

EDUCATION:  Bachelor of Science degree in business/technical discipline  

          

YEARS OF EXPERIENCE:   Five (5) plus of related professional security experience

• Information Security

• Information Technology

• Project Management

• Business or Security Informatics

• Audit & Assurance

• Enterprise Risk Management

• Corporate Compliance

• Security Architecture/design strategy

• Compliance readiness assessments     

 

REQUIRED SKILLS AND KNOWLEDGE:         

Candidates for this role should possess experience and knowledge in most all of the below mentioned skills in the specific duties and responsibilities section, of this job description, and be willing to commit to additional training as needed:

  • Configuration Management
  • Change Management
  • Incident Management
  • Threat and Vulnerability Management
  • IT Security Management
  • Project Management

• Experience with IDR, Rapid7IDR a plus

• Experience managing Vulnerability Management, Nexpose a plus

• Experience with Microsegmentation, Cisco Secureworkload/Tetration a plus

• Experience with Windows system administration a plus

• Experience with Azure/AWS a plus

• Experience and working knowledge of NIST 800-53 (current revision), risk frameworks and risk analysis

• Experience implementing and monitoring Key Risk Indicators (KRI’s) and continuous process improvement methodologies 

• Experience in healthcare information technology delivery processes 

• The candidate must be business aligned in terms of their approach to IT strategy and operations  

• Thorough knowledge of multi-platform processing and health, availability and performance monitoring tools used for managing an IT infrastructure; including but not limited to: network components, distributed systems, storage area networks, security, asset configurations, applications, databases, etc.

• Ability to manage several projects and tasks simultaneously          

• Excellent communication, presentation and documentation skills required

 

 

LICENSES & CERTIFICATIONS:

• CISSP*

• CRISC**

• CISA**

• HCISSP or CHSP (or relevant healthcare security certification)**

*minimum requirement

**preferredValues Customer Insight, Collaboration Across Businesses and Borders, Initiates and Leads Change, Accountable for Driving Results, Makes Timely and Informed Decisions, and Ability to Take Risks

For more than 130 years, The Christ Hospital been the beacon for exceptional healthcare in the Greater Cincinnati community. We're industry pioneers, always pushing the boundaries and reimagining the future of healthcare.

Our culture promotes collaboration, diversity and innovation. Together, as a team, we work tirelessly to enhance healthcare quality, accessibility and safety. 


Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Audits AWS Azure CISA CISO CISSP Compliance CRISC Firewalls Governance HIPAA Intrusion prevention IT infrastructure KPIs Malware Monitoring NIST NIST 800-53 Privacy Risk analysis Risk management Security Impact Analysis Strategy Vulnerabilities Vulnerability management Windows

Region: North America
Country: United States
Job stats:  9  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.