Info Systems Security - Sr.

Employer
  • Parkland

Job Description

Interested in a career with both meaning and growth? Whether your abilities are in direct patient care or one of the many other areas of healthcare administration and support, everyone at Parkland works together to fulfill our mission: the health and well-being of individuals and communities entrusted to our care. By joining Parkland, you become part of a diverse healthcare legacy that’s served our community for more than 125 years. Put your skills to work with us, seek opportunities to learn and join a talented team where patient care is more than a job. It’s our passion.

Primary PurposeThe primary responsibility of this position is to ensure the confidentiality, availability and integrity of Parkland's data, computer systems and network devices by recommending, implementing and utilizing security defense systems to reduce the opportunity of cyber attacks.Minimum SpecificationsEducation¿Must have a Bachelor¿s degree in Management Information Systems.Experience¿Must have six years of experience in an information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cyber security domain.Equivalent Education and/or Experience¿May have an equivalent combination of education and experience to substitute for both the education and the experience requirements.Certification/Registration/Licensure¿Must have a current CompTIA Security+ Certification or equivalent in industry certification, background and knowledge within 6 months of placement into the position. CISSP Preferred.Required Tests for PlacementSkills or Special Abilities¿Knowledge of NIST, HITRUST, PCI, HIPAA Security Rule and associated common security frameworks¿Professional experience in a system administration role supporting multiple platforms and applications¿Must have the ability to perform complex research in order to determine industry standard products and solutions in response to security requirements¿Must have the ability to develop project plans, organize and monitor tasks, and be able to produce quality results in a timely manner.¿Must be able to perform technical risk assessments and implement corrective actions regarding the safeguarding of information systems.¿Must be able to independently implement and maintain complex information security tools and provide guidance to other technical staff on proper use of the tools.¿Must have superior writing skills and the ability to communicate effectively.¿Working knowledge of design, implementation, and maintenance of: Local area networks, Microsoft Active Directory / GPO, Data Loss Prevention, Encryption Technologies, Intrusion Detection Systems, Intrusion Prevention Virtual Private Network, Linux Operating Systems, Windows Operating Systems, Communication Protocols, Multi-factor authentication, Cloud Access Security Broker, Endpoint Detection and Response Technologies, Security Information and Event Management Tools¿Must have advanced working knowledge of network and vulnerability assessments, malware analysis, threat intelligence and vulnerability management.¿Must be able to listen and communicate effectively with executive level staff and leadership teams.¿Direct experience with anti-virus software, intrusion detection, firewalls and content filtering¿Experience with hacker techniques and network security principles.Responsibilities1.Research and investigate the potential impact of new threats and exploits. Conducts log analysis and other network forensic investigations.2.Identify, design and execute security projects that improve detection and response capabilities.3.Collect threat intelligence and automate systems to consume threat feeds and track adversaries.4.Develop alerting and detection strategies to investigate any unusual behavior.5.Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties.6.Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and operational support requirements are being met.7.Manages on-time delivery of assigned tasks against existing plans and schedules.8.Design, implement and support Information Security tools and infrastructure systems maintained by the Parkland Information Security Organization. Examples of such tools are web filtering technology, IDS/IPS appliances, SIEM tools, anti-spam/antivirus systems, data leakage appliances, content screening servers, VPN systems and firewalls.9.Maintains knowledge of applicable rules, regulations, policies, laws and guidelines that impact Parkland. Participates in the creation of effective security controls designed to promote adherence with applicable laws and accreditation agency requirements. Seeks advice and guidance as needed to ensure proper understanding.10.Stays abreast of new developments in the field of technology and security by attending seminars/workshops, reading professional journals, and actively participating in professional organizations. Integrates knowledge gained into current work practices.

Parkland Health and Hospital System prohibits discrimination based on age (40 or over), race, color, religion, sex (including pregnancy), sexual orientation, gender identity, gender expression, genetic information, disability, national origin, marital status, political belief, or veteran status.

more