The SOC function is to provide customers with constant monitoring, protection, prevention, and detection services as well as reporting and incident analysis based on events collected from multiple sources.
A Sr. Health Systems Engineer provides end-to-end strategic business consulting and management engineering services at various levels of the Clinic organization, from departments and divisions to governance committees at an enterprise, site and region level.
Conducts detailed analysis and studies of customer requirements and needs for new or expanded use of existing capabilities and creates plan or participates in projects to determine feasibility, cost and time required, and compatibility with current systems and hardware capabilities.
Working closely with the Information Management analysts, business subject matter experts, business sponsors, and other IT teams, responsible for development, testing, and implementing Business Intelligence (BI) solutions.
Plan, coordinate, and manage cross-functional design activities. Assist project managers and design engineers to resolve technical challenges by providing technical guidance and systems engineering techniques to create robust, effective solutions.
Risk management activities to identify areas where a development project must implement specific security controls and recommendations for system wide security enhancements, risk assessment and mitigation plans for market released products.
The Senior Security Engineer - (Identity and Access Management) will support the Director of IT Security Engineering and Chief Information Security Officer (CISO) to provide the highest quality of information protection and assurance solutions.
Daily Operational work that includes security monitoring, working security tickets, security and data/logs analysis, forensic analysis, host configuration audits, vulnerability scans, FW rule reviews, and other security tasks.
Provide focused leadership across technology area to drive initiatives with virtual teams in Area. Map customer IT strategies to technical requirements and then to workable Symantec & Bluecoat solution architectures