CaryRecruiter Since 2001
the smart solution for Cary jobs

HCS Information Security Analyst Senior - IT Security

Company: UNC Health Care
Location: Holly Springs
Posted on: January 16, 2022

Job Description:

Description Become part of an inclusive organization with over 30,000 diverse employees, whose mission is to improve the health and well-being of the unique communities we serve. This position may involve support of various hospitals and health care systems within the UNC Health Care System, but will be employed by Rex Hospital, Inc. (this includes, but is not limited to, for purposes of payroll, health benefits, retirement options, and applicable policies). Information Security Analyst Sr provides a high level of technical expertise of information security appliances, software and hardware which deliver defense in depth protection of information technology resources and confidential data across the health system. Performs project management, requirements analysis, security systems design, and implementation of security technologies. Translates data to information to support risk based decision making. Description of Job Responsibilities: 1. Vulnerability Management - Maintains inventories and inventory processes of information resources protected by security regulations so vulnerability assessments can be performed. Uses tools and processes to effectively carry out vulnerability testing. Monitors and improves vulnerability management processes and procedures. Interprets scanning or testing results and provides consultation to network, workstation, systems, or web-applications administrators regarding system and application weaknesses. Appropriately escalates issues presenting unacceptable risk to the institution. Monitors risk mitigation progress. 2. Security Architecture, Consulting and Evaluation - develops security architecture components for newly proposed information systems and technologies using diagrams and narratives. Assists in materializing security architecture into projects. Develops and maintains and applies tools, processes and procedures to evaluate suitability of security configuration and feature offerings of proposed systems. 3. Information Security Risk Analysis - Develops, maintains and applies tools, methods and processes to analyze risk from threats to confidential information. Writes appropriate recommendations that will bring risks to an acceptable level. Develops and delivers audience appropriate information security assessment and recommendation presentations and reports. Establishes and maintains sound metrics to track and demonstrate information security improvement and risk management. Prepares risk assessment reports for technical and executive audiences. 4. Security Incident Prevention, Detection and Handling - Develops, maintains, communicates and applies incident management policy, standards and procedures. Researches, evaluates, recommends, designs technical policies for and implements security technologies such as web content filtering systems, email filtering systems, end point protection systems, network firewall systems, intrusion prevention and detection systems (IDS/IPS), data loss protection (DLP) systems, security incident event management (SIEM) systems to prevent, detect and respond appropriately to threats to confidential information and information resources. Monitors security systems; recognizes anomalies of various systems, and handles or escalates appropriately. Writes professional and factual incident reports. Makes recommendations for recovery and prevention. 5. Data Analysis - Analyzes security threat intelligence, tunes and calibrates security systems to improve effectiveness. Analyzes and correlates network dataflow logs, web logs, computer and application user activity logs, and security incident logs for information relevant to a real or potential information security or privacy breach or to support decision making and risk mitigation. 6. Project Management - Lead discovery and information gathering sessions. Perform alternatives analysis documenting pros and cons, cost, feasibility, risk and other information to support a decision to select the best solution. Manage small to medium projects; assemble project participants to organize work to complete specific tasks on projects. Organize and facilitate meetings to identify and remove barriers, and to progress work. Follow-up with assignees on incomplete tasks and open issues. Provide detailed communication between disparate teams to keep project moving. 7. Other Trains and assists less experienced information security staff and IT staff regarding security methods for systems they support. Takes on-call for urgent security events. Other InformationOther information:
Education Requirements:
Bachelors degree in Computer Science, Information Systems Management or a related field (or an equivalent combination of education, training and experience) required.
Licensure/Certification Requirements:
No licensure or certification required.
Professional Experience Requirements:
If a Bachelor's degree: Eight (8) years in professional IT positions, with 4 years of experience in related job functions required.
If an Associate's degree: Twelve (12) years in professional IT positions, with 4 years of experience in related job functions required.
If a high school diploma or GED: Sixteen (16) years in professional IT positions, with 4 years of experience in related job functions required.
Knowledge/Skills/and Abilities Requirements:
#NAME?

Job DetailsLegal Employer:Entity: Shared Services
Organization Unit: Work Type: Full Time
Standard Hours Per Week: 40.00Work Schedule: Day JobLocation of Job: US:NC:MorrisvilleExempt From Overtime: Exempt: Not Applicable

Keywords: UNC Health Care, Cary , HCS Information Security Analyst Senior - IT Security, Professions , Holly Springs, North Carolina

Click here to apply!

Didn't find what you're looking for? Search again!

I'm looking for
in category
within


Log In or Create An Account

Get the latest North Carolina jobs by following @recnetNC on Twitter!

Cary RSS job feeds