What are the responsibilities and job description for the It Security Manager position at Hospital for Special Care?
Position Location:
Hospital for Special Care
Scheduled Weekly Hours:
40
Work Shift:
Department:
Information Technology
We are dedicated to creating an environment of care and engagement that makes us one of the most desirable places to work, providing exceptional care to each patient each and every day!
***(6517) IT Security Manager
QUALIFICATIONS
Required: Bachelor’s degree (B.A./B.S.) or equivalent in computer science or equivalent discipline from an accredited college or university required.
Required: 5 years of experience in IT required or equivalent 2-5 years of experience in an information security role or experience with security and internetworking devices and software, including at least two years’ experience with mission-critical networks.
Required: Relevant information security and privacy certifications, such as CISSP, CISM, CISA, PCIP, GSEC, GCIH, GCFE, GCFA, CEH, and GPEN Knowledge of HIPAA, HITRUST, and other information security regulatory requirements for healthcare entities. Proven technical abilities administering and deploying multiple host operating systems including Microsoft Windows, Linux and UNIX. Experience with Intrusion Detections, Forensics, and security technologies. Experience with security policy and procedures
JOB SUMMARY
Responsible for day-to-day operations of information security at the organization.
- Configures, deploys, and manages the components supporting the Security Operations Center (Intrusion detection systems, Malware Analysis, Forensics toolkits, user tracking, etc.).
- Provides advanced handling of escalated security issues. Performs advanced interpretation of security issues as provided by management and diagnostic tools.
- Manages, and recommends improvements to, the organizational information security management program.
- Plans and executes responses to information security incidents.
- Recommends changes to information systems operating procedures to maximize information security.
- Reports regularly to the Organizational Ethics & Corporate Compliance Steering Committee on information security management activities.
PHYSICAL DEMANDS
This position requires the ability to sit, walk, and stand as needed. It also requires the ability to lift/carry 1-50 pounds occasionally. The ability to be flexible in body positioning as in bending, squatting, balancing, reaching, and twisting. This position also requires frequent keyboarding and telephone use.
COGNITIVE DEMANDS
This position requires high levels of problem-solving, written expression/communication, verbal expression/communication, reading/auditory comprehension to problem solve issues of a complex and sensitive nature. This position demands on a continual basis the ability to exhibit strong written and verbal communication skills.
WORK DEMANDS
The position requires extreme flexibility that is required for this type of independent work. The position requires attendance at outside meetings to represent HSC and affiliates. The position demands frequent schedule changes and also irregular working hours to accommodate fluctuations in business needs.
ESSENTIAL FUNCTIONS
Contribute as a member of the Information Technology department in the strategic planning for the department and hospital, and coordinate with the department regarding its activities related to information security and other projects, participates in appropriate on-call assignments, supports computer operations and data network activities that provide services to other departments, outside agencies, and vendors while meeting department objectives.
Develop tactical plans to implement the organization’s strategic information security and privacy program objectives across the organization.
Liaise, with and provide leadership to, the organization’s security operations, architecture, engineering, privacy, audit/compliance, vendor management, event management/ computer incident response/crisis response, fraud and other operational security/ privacy business units to periodically assess and monitor the performance of key functions and control processes a site and aggregate basis
Prepare and present reports on organizational and site specific progress, challenges, and performance periodically to CIO, CCO, Organizational Ethics & Corporate Compliance Steering Committee, and/or site leadership, as needed
Develop policies, procedures, and standards for approval and adoption by appropriate committees or executives which oversee information security and related compliance functions
Develop a comprehensive information and technology risk management framework which will drive the execution of risk assessment across the enterprise functions, business units, applications/data, and vendors and integrate cleanly into GRC Governance, risk management, and compliance, metrics, and site monitoring functions
Manage cybersecurity governance and effectuate improvements as needed and as requested by the compliance department
Manage day to day security team functions - annual / periodic performance reviews, objective settings, development plans
Assist in development of annual / monthly budget development and monitoring.
Develop a training and awareness needs strategy, oversee implementation at corporate functional and site levels.
Provide oversight of projects, where needed, but including GRC selection / implementation, identity management, data protection (inc. DLP Data Loss Prevention and similar policies / technologies which detect and stop data loss) and others
Responds to potential incidents as a member of the Health Information Security & Privacy (HISP) Committee.
Evaluates and oversees deployment and pre-deployment of security within information systems and recommends best practices for reduction of risk.
Manages monitoring by data owners of access to IT systems.
Performs annual, and as needed ongoing, risk analyses of the organization’s information security systems.
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a It Security Manager?
Sign up to receive alerts about other jobs on the It Security Manager career path by checking the boxes next to the positions that interest you.