IT Security Consultant - Hybrid page is loaded## IT Security Consultant - Hybridlocations : Northpointe Condo 4time type : Full timeposted on : Posted Todayjob requisition id : JR104812# GENESIS HEALTHCARE SYSTEM In order to fill our Mission of serving our community by helping each person achieve optimal health and well-being by providing compassionate, exceptional, and affordable healthcare services, all employees of Genesis HealthCare System must be committed to living the Genesis Mission and Genesis values of Compassion, Excellence, Integrity, Team, and Innovation. All employees must regard themselves as an 'owner' of Genesis and keep our patients at the center of everything we do - always. ## Position Details : Work Shift : Day Shift (United States of America)Scheduled Weekly Hours : 40Department : IT Technical & Support Services# NOTE : Employee will need to be available to come onsite for onboarding & training activities. ## Overview of Position : Responsible for the design, implementation and management of computer system security structures and protocols, which safeguard access to computerized information in a large complex enterprise. Designs, configures and implements role based security for Epic and other clinical, financial and operational computer systems. Develops security architectures to support privacy and confidentiality regulations, including HIPAA. Implements and manages these architectures including access provisioning access modifications and access termination, Provides support for computer security assessments and audits and other security / privacy compliance related activities. ESSENTIAL DUTIES 1. Works with the project management office and management team to coordinate IT security activities and resources. 2. Ensures all security environments are properly installed, configured, and tested to meet project and strategic requirements. 3. Responsible for the project work plan for respective team and ensure milestones and deliverables are met. 4. Plans and manages the day-to-day activities of team members including prioritization of work, coordination of resources, and meeting plans. 5. Ensures completion and quality of deliverables assigned to the team including but not limited to design documentation, build audits, testing plans and scripts. Ensures deliverables are approved by the appropriate stakeholders and are completed in accordance with the plan. 6. Ensures the design, development and recommendations to the security systems solutions that will ensure proprietary / confidential data and systems are protected. 7. Oversees the day-to-day computer security activities. 8. Advises IT management and project leaders on developing, implementing and maintaining security policies and procedures 9. Participates with the client in the strategic design process to translate security and business requirements into processes and systems. 10. Ensures baseline documentation is developed and is responsible for change management of assigned systems; develops regular status reports on system health. 11. Reviews final product for identified functionality and completeness. 12. Manages identified issues by the project team and bring to resolution, escalate non-resolved issues to the Project Manager. 13. Reports completion of work plans for outstanding work, issues, and risks on a weekly basis to the Project Manager 14. Ensures high quality of deliverables as identified through the DBV and in conjunction with the Project Quality Control Team. These include : Activities of one team do not adversely impact activities of another team, changes are combined when appropriate to avoid duplicate effort, thorough testing to minimize problems at go live, and quality deliverables are prepared. 15. Works with other teams to coordinate team activities with other project teams to integrate work and system design, build, testing, training, and go-live. 16. Ensures team decisions are made in a timely fashion. 17. Evaluates the business procedures and analyzes business processes to ensure proper security configuration. 18. Develops and maintains documentation and procedures and provides training to other IT staff and user clients as appropriate. 19. Supports all project team and IT team members with application and information systems knowledge. 20. Logs, tracks, and resolves issues as well as any security modifications or enhancements. 21. Logs, tracks, analyzes, and coordinates security changes. 22. Effectively utilizes project tools, technologies and methodologies to provide clear and concise documentation / communication (i.e. project tracking, weekly reports, etc.). 23. Works with all vendors to resolve issues / problems in a timely manner. 24. Provides on-call support and troubleshooting via phone, remote dial-in or on-site if necessary. 25. Implements, maintains and follows established security measures and protocols. 26. Performs the necessary investigation and analysis to determine project feasibility. 27. Prioritizes and schedules projects and resources. 28. Gives advice to clients on implications of a requested change and / or an alternative solution that may better address the requirement. 29. Provides business / technical representation to the enterprise including future directions, how that direction impacts the enterprise, and how current and future security systems, policies and procedures can be utilized to maximize security / privacy while maximizing the customer experience. 30. Utilizes and follows the project management methodologies and protocols established by IT. 31. Participates with vendors in the assessment of new systems and technologies that meet security needs of the enterprise. 32. Subscribes to relevant technology information channels to stay informed of security vulnerabilities. 33. Proactively assesses potential items of risk and opportunities of vulnerability in the network. QUALIFICATIONS 1. Associates degree in computer science, management or an IT-related discipline or equivalent experience required. 2. Two years security administration, security management or project management experience in the field of systems analysis, system design, role based security deployment, security and / or computer system project management. 3. Experience with computer system security management, provisioning and auditing. 4. Experience with Microsoft Active Directory security environments. 5. Epic certification, if required or Epic implementation experience. 6. Understanding of security principles in large complex environments running Windows, Unix, Citrix and mobile computing operating systems. 7. Knowledge of single sign-on technologies. 8. Understanding of HIPAA and other privacy and confidentiality regulations. 9. Ability to deal with a number of tasks simultaneously, with strong attention to detail. 10. Excellent decision-making, facilitation, conflict resolution and analytical skills required. 11. Pro-active problem-solver with excellent listening, verbal and written communication skills. 12. Must possess strong organizational and project management skills. 13. Working knowledge of mini-computers, client-server, personal computers and networks. 14. Possesses interpersonal and team leadership abilities. 15. Capable of working with cross-functional teams to accomplish overall project goals. 16. Ability to work independently and under pressure in a complex and changing working environment. PATIENT CENTERED CARE & BEHAVIORAL EXPECTATIONS 1. Living the Genesis Mission, Vision and Values :
J-18808-Ljbffr
Security Consultant • Coshocton, OH, US