Log in with
Don't have an account? Create an account
Need some help?
Talk to us at +91 7670800001
Log in with
Don't have an account? Create an account
Need some help?
Talk to us at +91 7670800001
Please enter the 4 digit OTP has been sent to your registered email
Sign up with
Already have an account? Log in here
Need some help?
Talk to us at +91 7670800001
Jobs Search
Start Date
Immediate
Expiry Date
19 Nov, 25
Salary
0.0
Posted On
20 Aug, 25
Experience
7 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Computer Science, Risk Analysis, Interpersonal Skills, Color, Information Security Management, Vendors, Disaster Recovery, Dignity, Cissp
Industry
Information Technology/IT
At Children’s Wisconsin, we believe kids deserve the best.
Children’s Wisconsin is a nationally recognized health system dedicated solely to the health and well-being of children. We provide primary care, specialty care, urgent care, emergency care, community health services, foster and adoption services, child and family counseling, child advocacy services and family resource centers. Our reputation draws patients and families from around the country.
We offer a wide variety of rewarding career opportunities and are seeking individuals dedicated to helping us achieve our vision of the healthiest kids in the country. If you want to work for an organization that makes a difference for children and families, and encourages you to be at your best every day, please apply today.
Please follow this link for a closer look at what it’s like to work at Children’s Wisconsin: https://www.instagram.com/lifeatcw/
Children’s Wisconsin is seeking a Senior Information Security Analyst- Epic to join our team!
MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
How To Apply:
Incase you would like to apply to this job directly from the source, please click here
WHAT YOU WILL DO:
The IS Security Analyst will perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Ensures that user community understands and adheres to necessary procedures to maintain security. Must be able to weigh business needs against security concerns and articulate issues to management. Primary EPIC security lead on Enterprise Information Security team responsible for management of Epic user records (EMP users, including background users) which includes the life cycle management of the records (creation, modification, inactivation) and auditing as appropriate. Collaborates with app analysts teams who manage the templates and sub templates. Participates in the development of workflows, system configuration, change documentation, optimization and support related to Epic security, while working with application teams to deploy functionality changes, new modules or departments, update security classes, modify provider records, conduct user analysis, and implement security enhancements. Leads and assists in the development of department and organization wide policies and procedures, while effectively communicating policies and procedures impacting Identity and Access management to end users, leadership, and peers to ensure compliant practices. Provides guidance on optimizing security build based on appropriate minimum necessary standards. Responsible for the on-going maintenance, testing, support and optimization of Epic user security and provider management, with focus on role based access. Epic certification is a requirement. Excellent organizational skills and ability to manage work load while assigned to multiple simultaneous projects with minimal supervision. Thorough understanding of user account administration in a network environment. Thorough understanding of security auditing principles. Familiarity with current common paradigms for violating system integrity. Top-tier security performance tuning skills and trouble-shooting required.
Works closely with all levels of the organization to ensure that security is consistent with organizational security standards, information access requirements and business strategies. Coordinates with IS entities regarding technical considerations (user rights/privileges, system access) to ensure proper implementation and provides on-going support for all security operations. Works collaboratively with Internal Audit, Corporate Compliance, Human Resources and other departments on security related issues and projects. Works with cross-functional teams to perform reviews and tests of IS internal controls to ensure existing systems are operating as designed and contain adequate controls. Monitors and analyzes technology security and recommends appropriate IS policies, procedures and practices to strengthen security operations. Provides consultation regarding audit, regulatory and security management activities across IS functional areas. Coordinates the IS component of both internal and external audits, federal and state examinations.
ESSENTIAL FUNCTIONS: