In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
In this role, you will be responsible for
ongoing activities related to the development, implementation, maintenance of, and adherence to the companys policies and procedures regarding the privacy, governance and protecting company - related information.
This role is responsible for providing risk evaluation, threat modeling, and deep technical expertise on projects and technology products. This role will work closely with the Director of Threat and Vulnerability Management to identify, evaluate, and prioritize potential weaknesses in ESIs infrastructure and applications using both manual and automated methods.
In this role, the selected candidate will help businesses implement technology solutions in a cost-effective way by determining the requirements of a project or program, and communicating them clearly to stakeholders, facilitators and partners.
In this role, you will provide information security guidance for new projects and offer recommendations to ensure the selected business solutions are implemented using security industry best practices and in support of the organization's information security policies and standards.
In this role, you will be responsible for reducing risk to their organization by ensuring all employees, staff and Contractors know, understand and follow their security requirements in a secure manner.
In this role, the selected candidate will develop End User procedures for new business processes which includes documenting and validating with user community; document and perform periodic maintenance as required by business processes
The selected candidate will develop SOP and other technical documentation for the IDS infrastructure IAW with current government policy.
Consult with hardware, communications, database experts, and /or vendors to ensure system viability.
This role is responsible for providing risk evaluation, threat modeling, and deep technical expertise on projects and technology products. This role will work closely with the Director of Threat and Vulnerability Management to identify, evaluate, and prioritize potential weaknesses in ESIs infrastructure and applications using both manual and automated methods. This role is highly technical, requiring at least 4 years of experience in information security roles.
In this role, you must have the ability to form complex 'communications / messages' in a simple, clear and concise manner to the various communities within our organization. This can include different cultures, nationalities, international locations and languages.
In this role, you will coordinate with internal and external business managers and groups to ensure systems meet expectations and requirements; assist with server decommission process and server on boarding process.
The Analyst will analyze and evaluate the AD environments to create risk responses, recommend acceptance or mitigation for Sr. Management sign-off, and execute mitigation/remediation in response to identified security issues, with a focus on limiting end user/system impact.
The Data Operations Specialist is responsible for loading client data into processing software, filtering and culling data per client request and search terms, and exporting documents and metadata for review.
The selected candidate will be responsible for ensuring all clinical systems supported by SSM Health Clinical Engineering Services (CES) adhere to the Integrated Health Technologies (IHT) and CES Cyber Security policies.