Dignity Health, one of the nation’s largest health care systems, is a 22-state network of more than 9,000 physicians, 63,000 employees, and 400 care centers, including hospitals, urgent and occupational care, imaging and surgery centers, home health, and primary care clinics. Headquartered in San Francisco, Dignity Health is dedicated to providing compassionate, high-quality, and affordable patient-centered care with special attention to the poor and underserved. In FY17, Dignity Health provided $2.6 billion in charity care, community benefit, and unpaid cost of government programs. For more information, please visit our website at www.dignityhealth.org . You can also follow us on Twitter and Facebook .
Responsibilities Position Summary:
Processes Information Security, Identity Management access requests and/or operational incident tickets of high complexity.
Follows established process for common requests and issues. Determines course of action on uncommon/unique requests.
Performs complex operational and trouble-shooting tasks related to access control, provisioning requests, network & endpoint-security-systems, and/or Security Risk Management processes.
Proactively identifies and escalates incidents and operational performance concerns. May act as an escalation point for other InfoSec Analysts.
Provides assistance and support as requested to Security Engineering, IDM Engineering, Network Engineering, and/or the ISIRT SOC.
May include team-lead responsibilities.
This candidate will have ample opportunities to collaborate, support, and contribute to cybersecurity initiatives that affect the entire enterprise through secure use of technology, industry standards, and best practices.
Work in close coordination with the Sr. Manager of Enterprise Cybersecurity Incident Response to create and administer cybersecurity exercises across the enterprise
Provide detailed written reports on findings and recommended fix actions stemming from lessons learned in exercises and real-world events
Foster cross-functional relationships across all IT and Incident Response actors throughout the enterprise, enabling seamless incident response support
Ability to facilitate coordinated incident response actions in a dynamic and legally sensitive environment
Recommend program strategy and operational improvements related to cybersecurity enterprise incident response and recovery
Bachelor’s Degree in Computer Science, Information Security, Information Systems, or related field, or equivalent professional experience required.
Two or more relevant technical/professional security certifications (such as: COMP-TIA Network+ , Security+, SANS GIAC, CISSP, CRISC, CISA, or vendor-specific) required.
4+ years’ experience in related job area (information security, identity/access management, IT Audit, forensics/eDiscovery) required.
Experience in Windows Office (Work, Excel, etc.) required.
Ability to collaborate in a distributed work environment (Virtual and in-person)
Experience planning and facilitating cybersecurity exercises
E valuate and analyze alignment with cybersecurity frameworks and roadmap
Ability to manage multiple tasks with varied priorities, while delivering results on time
4+ years’ experience in programing or system/network operations and administration preferred.
Experience in UNIX/Linux OS and/or Cisco IOS preferred.
Functional understanding of regulatory and compliance mandates, including but not limited to HIPAA, HITECH, PCI, Sarbanes-Oxley preferred.
Strong knowledge of healthcare environments preferred.
Cybersecurity training/education (Examples: BA/BS in Information Technology or Cyber Security; Security+; SANS; CISSP or equivalents), or related discipline with 5+ years of experience in a related field.
Knowledge of the NIST Cybersecurity Framework
Knowledge of current and emerging security standards, privacy regulations and security requirements
Travel may be required: 10% during the normal course of business but may be required to travel more frequently during certain events.