Collaborates across Sutter Health and affiliates to provide monitoring and analysis using the newest technology to manage security and privacy information. Develops an efficient and effective cyber security strategy that establishes and promotes consistent corporate policies, standards, processes, procedures, and operations. Provides hands-on administration over a broad range of cyber security activities, including endpoint security, data loss prevention, security program management, email secur... more details
Organization:
SHSO-Sutter Health System Office-Valley
Position Overview:
Collaborates across Sutter Health and affiliates to provide monitoring and analysis using the newest technology to manage security and privacy information. Develops an efficient and effective cyber security strategy that establishes and promotes consistent corporate policies, standards, processes, procedures, and operations. Provides hands-on administration over a broad range of cyber security activities, including endpoint security, data loss prevention, security program management, email security, and encryption protocols. Analyzes events, uncovers threats, as well as identifies and escalates gaps in visibility, intelligence, and technology. Recommends innovative solutions to security and privacy issues. Directs technical security-related research and analysis, and translates the results into meaningful input for Privacy and Information Security leadership to ensure effective coordination of privacy and security activities.
(Intended for use by SHSO only)
Job Description:
This is a work from home role and candidate must be able to come on site as needed for meetings, etc.
EDUCATION:
Equivalent experience will be accepted in lieu of the required degree or diploma.
Bachelor's: Business, Cybersecurity, Computer Science, Information Technology/Security, Risk Management, or related field or equivalent education/experience
CERTIFICATION & LICENSURE:
TYPICAL EXPERIENCE:
SKILLS AND KNOWLEDGE:
Detailed understanding of the anatomy of an attack and the lifecycle of a network threat and network vulnerability exploitation in a healthcare environment, especially data movement in a large healthcare system.
Technical skills in planning, administration, and management of information systems; operational and technical security controls; and security risk analysis and management, including end point security controls, such as access control lists (acls), host intrusion prevention system (hips), registry, logging, and forensics.
Comprehensive knowledge of end point security technologies (Antivirus, Forensics, Anti-malware, HIPS), data loss prevention (DLP) methodologies, DLP technologies, current information security trends and practices including security processes, methods, and procedures.
Thorough knowledge of software, hardware, databases, networks, firewalls, encryption, and other systems security devices, including a good understanding of end point operating systems (Windows, Unix, and Linux), internet technologies such as Domain Name System (DNS), routing, Simple Mail Transfer Protocol (SMTP), Hypertext Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and File Transfer Protocol (FTP), and familiarity in a command line environment.
Expert knowledge of state and federal information services (IS) security and privacy-related regulatory requirements and laws.
Developed understanding of National Institute of Standards and Technology (NIST), Health Insurance Portability and Accountability Act/Health Information Technology for Economic and Clinical Health Act (HIPAA/HITECH), Federal Information Procession Standards (FIPS), and other related industry security standards, regulations, and best practices.
Seasoned management and leadership skills reflecting business acumen with the ability to build high performing quality teams through mentoring and training.
Exceptional communication (written/verbal), interpersonal, and presentation skills to explain complex technical or sensitive information clearly and professionally to diverse audiences and all levels of internal and external constituencies.
Advanced computer skills, including expert knowledge of Microsoft Office Suite (Word, Excel, Outlook, and Access), scripting or development language(s), various database architectures and related security and assessment tools and applications.
Work independently, as well as part of a multidisciplinary team, while demonstrating organization skills to.
Maintain strict confidentiality and ensure the privacy of each patient’s protected health information (phi) as well as the confidentiality of all privacy and risk management data.
Build collaborative relationships with peers, other departments, stakeholders, and external agencies, to achieve regulatory and accreditation compliance.
Attention to detail, superior problem solving and strategic analytical skills with the ability to analyze data, identify trends, provide insights to staff and affiliates, and recommend creative and actionable solutions in challenging situations.
Job Shift:
Days
Schedule:
Full Time
Shift Hours:
8
Days of the Week:
Monday - Friday
Weekend Requirements:
As Needed
Benefits:
Yes
Unions:
No
This position is work from home eligible.
Position Status:
Exempt
Weekly Hours:
40
Employee Status:
Regular
Number of Openings:
1
Sutter Health is an equal opportunity employer EOE/M/F/Disability/Veterans.
Pay Range is $80.57 to $128.91 / hour
The salary range for this role may vary above or below the posted range as determined by location. This range has not been adjusted for any specific geographic differential applicable by area where the position may be filled. Compensation takes into account several factors including but not limited to a candidate’s experience, education, skills, licensure and certifications, department equity, training and organizational needs. Base pay is just one piece of the total rewards program offered by Sutter Health. Eligible roles also qualify for a comprehensive benefits package.
Qualified applicants with arrest and conviction records will be considered for employment. Applicants for specific positions are still required to disclose certain convictions during the application process, and those convictions may also be considered in determining eligibility for employment in accordance with applicable law.
Apply
Apply Later
Fraud Alert: Please be aware of scams involving fraudulent job postings ...Learn more