What are the responsibilities and job description for the InfoSec Security Engineer position at Piper Companies?
Piper Companies is looking for a InfoSec Security Engineer to join a a premier healthcare organization in Columbia, Maryland. This is a long term opportunity with a great hybrid schedule!
Responsibilities for the InfoSec Security:
Keywords:
Access control, Authentication, Authorization, Biometrics, Breach notification, Business associate, Cloud security, Confidentiality, Cybersecurity, Data encryption, Data integrity, Data loss prevention, Data privacy, Digital forensics, Disaster recovery, Electronic health records (EHR), Endpoint security, Firewall, HIPAA compliance, Incident response, Intrusion detection, Malware, Multi-factor authentication (MFA), Network security, Patient data protection, Penetration testing, Phishing, Physical security, Privacy impact assessment, Risk assessment, Secure messaging, Security awareness training, Security policies, Security protocols, Threat intelligence, Two-factor authentication (2FA), Virtual private network (VPN), Vulnerability management, Wireless security, Advanced persistent threat (APT), Application security, Asset management, Audit logs, Backup and recovery, Behavioral analytics, Botnet, Cloud access security broker (CASB), Compliance auditing, Cryptographic key management, Cyber hygiene, Data anonymization, Data governance, Data masking, Data retention policies, Denial of service (DoS), Endpoint detection and response (EDR), Ethical hacking, Health information exchange (HIE), Identity and access management (IAM), Internet of Medical Things (IoMT), Intrusion prevention system (IPS), Mobile device management (MDM), Network segmentation, Patch management, Patient consent management, Public key infrastructure (PKI), Ransomware, Remote access security, Security information and event management (SIEM), Security operations center (SOC), Single sign-on (SSO), Social engineering, Software as a service (SaaS), Supply chain security, Telehealth security, Threat hunting, Tokenization, Zero trust architecture information assurance, information security, benefits, vacation, holiday, 401k
Responsibilities for the InfoSec Security:
- Performs security functions including IAM, vulnerability scanning, light pen testing, daily review of security reports and security systems
- Develops security countermeasures to detect malicious activity and creates operational and compliance dashboards & reporting
- Generates internal threat intelligence to feed back into the security stack
- Reviews system-related information security plans throughout the organization’s network and acts as a liaison to the Information Systems Department
- Bachelors/Masters degree is related field is preferred
- 6 - 8 years experience as an Information Security Analyst/Engineer with system design and security engineering experience implementing a wide range of security solutions both in cloud and on-prem
- Professional certifications in security; Security , CEH, CCSP, CISSP, CISM
- Extensive hands-on knowledge of IAM best practices, procedures, and software solutions
- Strong Azure experience is highly desired
- $120,000 - $135,000
- Comprehensive benefit package; Medical, Dental, Vision, 401k, and Paid Time Off
- Hybrid schedule (3x a week onsite)
Keywords:
Access control, Authentication, Authorization, Biometrics, Breach notification, Business associate, Cloud security, Confidentiality, Cybersecurity, Data encryption, Data integrity, Data loss prevention, Data privacy, Digital forensics, Disaster recovery, Electronic health records (EHR), Endpoint security, Firewall, HIPAA compliance, Incident response, Intrusion detection, Malware, Multi-factor authentication (MFA), Network security, Patient data protection, Penetration testing, Phishing, Physical security, Privacy impact assessment, Risk assessment, Secure messaging, Security awareness training, Security policies, Security protocols, Threat intelligence, Two-factor authentication (2FA), Virtual private network (VPN), Vulnerability management, Wireless security, Advanced persistent threat (APT), Application security, Asset management, Audit logs, Backup and recovery, Behavioral analytics, Botnet, Cloud access security broker (CASB), Compliance auditing, Cryptographic key management, Cyber hygiene, Data anonymization, Data governance, Data masking, Data retention policies, Denial of service (DoS), Endpoint detection and response (EDR), Ethical hacking, Health information exchange (HIE), Identity and access management (IAM), Internet of Medical Things (IoMT), Intrusion prevention system (IPS), Mobile device management (MDM), Network segmentation, Patch management, Patient consent management, Public key infrastructure (PKI), Ransomware, Remote access security, Security information and event management (SIEM), Security operations center (SOC), Single sign-on (SSO), Social engineering, Software as a service (SaaS), Supply chain security, Telehealth security, Threat hunting, Tokenization, Zero trust architecture information assurance, information security, benefits, vacation, holiday, 401k