In this role, the selected candidate will pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team.
Assist and advise Business Partners at all levels from Senior Management to end - users on Information Management policy, process, procedures and compliance; and use critical thinking and analysis to craft options and provide recommendations.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, the selected candidate must have an experience in Windows Office (Work, Excel, etc.) required; experience in UNIX/Linux OS and/or Cisco IOS preferred; experience responding to information security related incidents in an operations environment.
The IT Security Analyst supports operations of enterprise security through policy, architecture, training processes, selection and implementation of appropriate security solutions, vulnerability audits and assessments.
In this role, you will be responsible for conducting formal (classroom) training and informal (inservice, one-on-one, team meeting) training to Physician Business Services personnel in the usage of application systems and processes surrounding the system usage.
The Quality Assurance Analyst is responsible for developing manual and automated test plans, regression tests, load tests, integration tests, as well as employing issue resolution tracking and reporting for Court Technology Services projects.
In this role, you will be responsible for testing the database logic, quality, performance, workflows and reports ensuring they meet the business requirements and acceptance criteria prior to release and after release into user facing environments.
The Information Security Analyst performs three core functions for TEKsystems (TEK). The first is the identification, investigation and resolution of data security incidents that are caused at our clients by our consultants (these are usually carried out through abusing access rights, theft of data and mishandling physical devices.)
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.