IT Security Consultant - Hybrid at Genesis HealthCare System
Ohio, Ohio, USA -
Full Time


Start Date

Immediate

Expiry Date

05 Dec, 25

Salary

0.0

Posted On

05 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Disabilities, Communication Skills, Security Management, It, Computer Science, Unix, Facilitation, Decision Making, Conflict Resolution, Hipaa, Provisioning, Analytical Skills, Windows, Implementation Experience, Operating Systems, Mobile Computing, Auditing

Industry

Information Technology/IT

Description

GENESIS HEALTHCARE SYSTEM

In order to fill our Mission of serving our community by helping each person achieve optimal health and well-being by providing compassionate, exceptional, and affordable healthcare services, all employees of Genesis HealthCare System must be committed to living the Genesis Mission and Genesis values of Compassion, Excellence, Integrity, Team, and Innovation. All employees must regard themselves as an ‘owner’ of Genesis and keep our patients at the center of everything we do - always.
Position Details:
Work Shift:
Day Shift (United States of America)
Scheduled Weekly Hours:
40
Department:
IT Technical & Support Services
NOTE: Employee will need to be available to come onsite for onboarding & training activities.
Overview of Position:
Responsible for the design, implementation and management of computer system security structures and protocols, which safeguard access to computerized information in a large complex enterprise. Designs, configures and implements role based security for Epic and other clinical, financial and operational computer systems. Develops security architectures to support privacy and confidentiality regulations, including HIPAA. Implements and manages these architectures including access provisioning access modifications and access termination, Provides support for computer security assessments and audits and other security/privacy compliance related activities.

QUALIFICATIONS

  1. Associates degree in computer science, management or an IT-related discipline or equivalent experience required.
  2. Two years security administration, security management or project management experience in the field of systems analysis, system design, role based security deployment, security and/or computer system project management.
  3. Experience with computer system security management, provisioning and auditing.
  4. Experience with Microsoft Active Directory security environments.
  5. Epic certification, if required or Epic implementation experience.
  6. Understanding of security principles in large complex environments running Windows, Unix, Citrix and mobile computing operating systems.
  7. Knowledge of single sign-on technologies.
  8. Understanding of HIPAA and other privacy and confidentiality regulations.
  9. Ability to deal with a number of tasks simultaneously, with strong attention to detail.
  10. Excellent decision-making, facilitation, conflict resolution and analytical skills required.
  11. Pro-active problem-solver with excellent listening, verbal and written communication skills.
  12. Must possess strong organizational and project management skills.
  13. Working knowledge of mini-computers, client-server, personal computers and networks.
  14. Possesses interpersonal and team leadership abilities.
  15. Capable of working with cross-functional teams to accomplish overall project goals.
  16. Ability to work independently and under pressure in a complex and changing working environment.

WORKING CONDITIONS/PHYSICAL REQUIREMENTS

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. Works in an office environment.
2. Regularly lift or move up to 10 pounds, frequently lift or move up to 25 pounds, and occasionally lift or move up to 50 pounds.
3. Vision aptitude required: up close vision, peripheral vision, depth perception and the ability to adjust focus.
4. Answers phones, uses a personal computer, scanner, copier, and fax, which require finger dexterity.
5. May occasionally bend, reach, push, pull, stoop kneel, crouch or crawl.
6. Employee may be required to travel to other departments/floors or travel to other locations.
This description reflects in general terms the type and level of work performed. It is not intended to be all-inclusive, nor portray the specific duties of any one incumbent.
Thank you for your interest in employment at Genesis. Genesis is committed to being an equal opportunity employer. Selection of applicants for employment is based only on qualifications and the requirements of a specific job

Responsibilities
  1. Works with the project management office and management team to coordinate IT security activities and resources.
  2. Ensures all security environments are properly installed, configured, and tested to meet project and strategic requirements.
  3. Responsible for the project work plan for respective team and ensure milestones and deliverables are met.
  4. Plans and manages the day-to-day activities of team members including prioritization of work, coordination of resources, and meeting plans.
  5. Ensures completion and quality of deliverables assigned to the team including but not limited to design documentation, build audits, testing plans and scripts. Ensures deliverables are approved by the appropriate stakeholders and are completed in accordance with the plan.
  6. Ensures the design, development and recommendations to the security systems solutions that will ensure proprietary/confidential data and systems are protected.
  7. Oversees the day-to-day computer security activities.
  8. Advises IT management and project leaders on developing, implementing and maintaining security policies and procedures
  9. Participates with the client in the strategic design process to translate security and business requirements into processes and systems.
  10. Ensures baseline documentation is developed and is responsible for change management of assigned systems; develops regular status reports on system health.
  11. Reviews final product for identified functionality and completeness.
  12. Manages identified issues by the project team and bring to resolution, escalate non-resolved issues to the Project Manager.
  13. Reports completion of work plans for outstanding work, issues, and risks on a weekly basis to the Project Manager
  14. Ensures high quality of deliverables as identified through the DBV and in conjunction with the Project Quality Control Team. These include: Activities of one team do not adversely impact activities of another team, changes are combined when appropriate to avoid duplicate effort, thorough testing to minimize problems at go live, and quality deliverables are prepared.
  15. Works with other teams to coordinate team activities with other project teams to integrate work and system design, build, testing, training, and go-live.
  16. Ensures team decisions are made in a timely fashion.
  17. Evaluates the business procedures and analyzes business processes to ensure proper security configuration.
  18. Develops and maintains documentation and procedures and provides training to other IT staff and user clients as appropriate.
  19. Supports all project team and IT team members with application and information systems knowledge.
  20. Logs, tracks, and resolves issues as well as any security modifications or enhancements.
  21. Logs, tracks, analyzes, and coordinates security changes.
  22. Effectively utilizes project tools, technologies and methodologies to provide clear and concise documentation/communication (i.e. project tracking, weekly reports, etc.).
  23. Works with all vendors to resolve issues/problems in a timely manner.
  24. Provides on-call support and troubleshooting via phone, remote dial-in or on-site if necessary.
  25. Implements, maintains and follows established security measures and protocols.
  26. Performs the necessary investigation and analysis to determine project feasibility.
  27. Prioritizes and schedules projects and resources.
  28. Gives advice to clients on implications of a requested change and/or an alternative solution that may better address the requirement.
  29. Provides business/technical representation to the enterprise including future directions, how that direction impacts the enterprise, and how current and future security systems, policies and procedures can be utilized to maximize security/privacy while maximizing the customer experience.
  30. Utilizes and follows the project management methodologies and protocols established by IT.
  31. Participates with vendors in the assessment of new systems and technologies that meet security needs of the enterprise.
  32. Subscribes to relevant technology information channels to stay informed of security vulnerabilities.
  33. Proactively assesses potential items of risk and opportunities of vulnerability in the network.
Loading...