Kansas Works Veterans Jobs

Kansas Works Logo

Job Information

Intermountain Healthcare CyberSecurity-Senior / Consultant in Topeka, Kansas

Job Description:

The Cybersecurity Architect is responsible for developing and maintaining cybersecurity standards, conducting threat assessments and threat modeling, providing expertise in support of cybersecurity and business goals, identifying emerging cybersecurity technologies, evaluating new threats and their potential impact on Intermountain’s mission and goals, and assisting with efforts to ensure the confidentiality, integrity, and availability of Intermountain data and IT/IS infrastructure and technologies. Senior-level professional experience with a broad range of information systems, cybersecurity technologies, and cybersecurity frameworks. Understands key regulatory requirements, such HIPAA/HITECH, and translates these requirements into cybersecurity controls and standards.

Functions both independently and within a collaborative team environment. Leads complex projects, as assigned. Identifies continuous improvement opportunities within the Cybersecurity Architecture team, as well as Intermountain’s overall cybersecurity capabilities. Participates in the design, implementation, and review of the cybersecurity tools and technologies strategy to ensure alignment with enterprise goals.

Remote/hybrid work - we may hire out of state workers where state laws allow.

We will hire at Senior or Consultant level based on qualifications (see below for details)

Job Essentials

  1. Leads in the planning and design of enterprise security architecture, under the direction of the I.S. Security Management (CISO, Director, Manager, Supervisor, or Team Lead), where appropriate.

  2. Leads in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the I.S. Security Management, where appropriate.

  3. Leads in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the I.S. Security Manager, where appropriate.

  4. Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors.

  5. Recommends additional security solutions or enhancements to existing security solutions to improve overall enterprise security.

  6. Performs the deployment, integration, and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise's security documents specifically.

  7. Maintains up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).

  8. Maintains operational configurations of all in-place security solutions as per the established baselines.

  9. Monitors all in-place security solutions for efficient and appropriate operations.

  10. Reviews logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interprets the implications of that activity and devises plans for appropriate resolution.

  11. Leads in the design and execution of vulnerability assessments, penetration tests, and security audits.

  12. Leads in incident investigations into suspicious or problematic activity.

  13. Provides on-call support for end users for all in-place security solutions.

Minimum Qualifications (Senior level)

Bachelor's degree in Computer Science, Information Systems, or technology related field. Degree must be obtained through an accredited institution. Education is verified.

Six years of related experience in information systems/security technologies and systems.

  • and -

Demonstrated understanding of the 10 Information System Security domains in the Common Body of Knowledge for CISSP and the 5 Information Security Practice areas and tasks for CISM.

  • and -

Demonstrated understanding of I.S. security methods and techniques of information systems.

Minimum Qualifications (Consultant level)

Bachelor's degree in Computer Science, Information Security, or Information Systems. Degree must be obtained through an accredited institution. Education is verified.

Possess CISA, CISSP or CISM industry certification.

Eight years of related experience in information systems/security technologies and systems.

  • and -

Demonstrated understanding of the 10 Information System Security domains in the Common Body of Knowledge for CISSP and the 5 Information Security Practice areas and tasks for CISM.

  • and -

Demonstrated understanding of I.S. security methods and techniques of information systems.

Preferred Qualifications

Master's degree in Business, Computer Science, Information Assurance, Information Security, or Information Systems. Degree must be obtained through an accredited institution. Education is verified.

Ten years of related experience in information systems/security technologies and systems.

  • and -

Demonstrated understanding and knowledge of information security related regulations (e.g. HIPAA / HITECH I.S. Security and Privacy regulations, and the I.S. Security aspects of other regulations including: PCI DSS, SOX (MAR FRC), FRCP, JCAHO and JCAHO Alert 42, GLBA, State Breach, FERPA, and FCRA, etc.)

  • and -

Demonstrated understanding and knowledge of I.S. security vulnerability assessment tools and techniques.

  • and -

Demonstrated strong analysis and attention to detail, problem resolution, judgment, and decision-making skills.

  • and -

Demonstrated ability to effectively prioritize and execute tasks in a high-pressure environment.

  • and -

Demonstrated effective leadership and communication skills.

  • and -

Demonstrated presentation skills and the ability to work well with others.

  • and -

Results oriented, self motivated and self directed professional.

  • and -

Demonstrated strong customer service orientation.

#LI-EXECRC

Physical Requirements:

Interact with others requiring the employee to communicate information.

  • and -

Operate computers and other IT equipment requiring the ability to move fingers and hands.

  • and -

See and read computer monitors and documents.

  • and -

Remain sitting or standing for long periods of time to perform work on a computer, telephone, or other equipment.

Location:

Lake Park Building

Work City:

West Valley City

Work State:

Utah

Scheduled Weekly Hours:

40

The hourly range for this position is listed below. Actual hourly rate dependent upon experience.

$41.39 - $63.33

For a description of Intermountain's employment benefits, click

HERE. (https://intermountainhealthcare.org/careers/working-for-intermountain/employee-benefits)

Equal Opportunity Employer

Intermountain Healthcare is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or protected veteran status.

The primary intent of this job description is to set a fair and equitable rate of pay for this classification. Only those key duties necessary for proper job evaluation and/or labor market analysis have been included. Other duties may be assigned by the supervisor.

All positions subject to close without notice. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, disability or protected veteran status. Women, minorities, individuals with disabilities, and veterans are encouraged to apply.

Thanks for your interest in continuing your career with our team!

DirectEmployers