The IT Security Analyst is responsible for providing information security services to protect the confidentiality, integrity, and availability of information and technical environments and to support enterprise security goals and objectives.
The Business Analyst will be responsible for working closely with the project manager, core technical team members and other project stakeholders and assisting with all aspects of the System Development Life Cycle (SDLC).
In this role, the selected candidate must have a strong hands-on Business Analysis and Data skills: facilitation and gathering of user requirements development of business requirements and functional specifications documents, system and user acceptance testing (UAT), process mapping, data extraction and validation, data mapping, reporting development & automation, building of queries, experience working with data warehouses or databases.
In this role, the selected candidate will perform all job duties and responsibilities in a compliant and ethical manner and in accordance with all applicable healthcare laws, regulations and industry codes.
In this role, the selected candidate will participate in design and implementation of QA test strategies and protocols used in QA processes; ensures the full application of all relevant QA protocols, processes and procedures.
In this position, you will assisting in conducting investigations of suspected security and privacy incidents, whether internal or external to company and whether intentional or unintentional and organize, document and report investigation results within the organization.
In this role, the selected candidate will provide support and feedback on the due diligence questionnaires and process to ensure alignment with changes in regulations, changes in technology, and alignment with industry best practices and standards (i.e. HIPAA/HITECH, NIST, ISO, CoBIT, etc.).
In this role, you will be responsible for assisting other security department personnel in maintaining administrative, physical and technical information security safeguards that strengthen our information system posture.
The successful candidate is responsible for analyzing requirements, creating and executing end-to-end test plans; and managing testing activities to ensure all the objectives are met and the product works as expected. The product should be tested in terms of functionality, content delivery, performance, reliability, stability and compatibility .