• Find preferred job with Jobstinger
  • ID
    #20184904
  • Job type
    Permanent
  • Salary
    TBD
  • Source
    Rose International
  • Date
    2021-09-23
  • Deadline
    2021-11-21
 
Permanent

Vacancy expired!

Only U.S. Citizens and those authorized to work in the U.S. can be considered as W2 candidates. Position: Information Security Analyst / Senior (CTH Role)Start Date: asapLocation: Indianapolis, IN-46204 Interview Process: Phone screen and onsite interview.

Essential Duties/Responsibilities•Directs the efforts of information security standards through the development stages for all information systems•Works with senior management to determine acceptable levels of security risk for the agency•Conduct investigations and coordinate remediation of suspected information security incidents.•Provides direction for the physical protection of information systems assets and responds in a timely manner to the misuse or loss of information assets.•Develop, review, and approve security polices and resource classification schemes.•Maintains all information security standards, procedures, and guidelines, including compliance monitoring, procedures, and documentation.•Communicate unresolved security exposures, misuse, and noncompliance situations to CIO and and CLIENT Privacy Officer•Directs the development, testing and implementation of information security software or devices; evaluate vendor services and products; manage information security relationships with the CLIENT.•Conduct technical risk assessments, application security reviews, and coordinate with the CLIENT on network penetration testing activities.•Manages the development of procedures for detecting, reporting and investigation breaches in security, and along with law enforcement directs the investigation of security breaches•Interface with project management teams to assess associated project risk exposures and communicate feedback to project teams and CIO regarding risk minimization solutions.•Provide yearly and on demand trainings to workforce members to ensure understanding of security requirements and exposures.•Analyze application security needs based on the sensitivity or confidential nature of the data and implement security structure to support the data security needs of systems being developed or enhanced.•Manages the development, implementation and testing of appropriate security plans and control techniques necessary to protect against error and omissions, natural disaster that are address in the agency''s disaster recovery and business continuity plans for information systems and tests readiness.•Monitors internal control systems to ensure that appropriate information access levels and security clearances are maintained.•Monitor's advancements in information security technologies.•Monitors changes in legislation and accreditation standards that affect information security.•Observe and monitor the security of websites, applications, computers, and databases.•Develop emergency procedures for handling security breaches, manage internal communication regarding security and provide estimates of budgetary requirements for security related items and upgrades.•Responsible for ensuring appropriate organizational policies procedures technical systems andworkforce training to maintain confidentiality integrity and compliance with all relevant laws and guidelines.•Ensure the ongoing integration of information security with business strategies and privacy requirements.•Develop and maintain an information security risk mitigation plan based on sound risk analysis.•Lead the security incident response team in prevention investigation mitigation and reporting activities. Works with Human Resources/Legal/ CLIENT Privacy Officer to ensure appropriateenforcement sanctions for information security breaches.•Perform and manage the security audit program to assess effectiveness of policies and procedures and systems security safeguards.•Oversee incident response planning as well as the investigation of security breaches and assist with disciplinary and legal matters associated with such breaches as necessary.•Oversees the selection, development, deployment, monitoring, maintenance, and enhancement of the organization's security technology.Job Requirements•Bachelor's degree in Computer Science or related discipline,•Security certification such as Certified Information System Security Professional (CISSP) Certified Information Systems Manager (CISM) or Certified in Healthcare Privacy and Security (CHPS)strongly preferred.•Eight to ten years of progressive experience in computing and security, including experience with Internet and cloud technology and related security issues•Thorough knowledge of current Federal and State information security laws and regulations as they pertain to safeguarding ePHI.•Experience in project management and change management.•Experience with disaster recovery planning, testing, auditing, risk analysis, business resumption planning and contingency planning•Extensive knowledge of network infrastructure and of database applications.•Ability to present to both large and small groups utilizing advanced oral and written communication skills.•Ability to implement processes and methods for auditing and addressing non-compliance to information security policies and standards.•Ability to conduct security investigations and provide data/information or internal investigations from an information systems perspective.•Ability to oversee or conduct internal risk and security assessments, as well as enterprise security management tool evaluations.•Ability to provide guidance and direction for HIPAA Security and IT security-related user training and development programs.•Ability to work well under difficult and varied conditions and without close supervision•Experience with TCP/IP firewalls, VPNs and other security devices•High degree of personal integrity and trust.•Ability to work with personnel at all organizational levels.•Strong customer service and problem-solving skills required. Requires occasional weekend and nighttime work•In-depth understanding of the technologies and architectures supporting information security protection.

Vacancy expired!

Report job

Related Jobs

Jobstinger