Lead a small team of support engineers or application. Independently implements end user or enterprise infrastructure / application or services of moderate complexity as prepared by more senior technologist in support of more complex solutions.
Attend specification meeting with project team workers to determine scope and limitations of project; work closely with other team members, application developers, and business process owners throughout the organization.
This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
In this role, the selected candidate directly assists operators in performing their duties (troubleshooting user-report terminal or printer malfunctions, operations exceptions, recovering from system problems, etc.)
Establishment and maintenance of reporting systems to monitor and track financial and resource variance on a project and portfolio level; partner with other IT organizations for the purposes of intake, prioritization, and sequencing of work.
As an Information Security professional you will be a critical member of the IT Security team directly contributing to projects spanning multiple technical areas, including: cutting edge information security technologies, enterprise level architecture, security frameworks and security incident management.
In this role, the selected candidate performs expert level support and implementation and supporting EPIC Systems Beacon applications; supports business requirements and user needs for developing solutions.
Assists in the creation of comprehensive unit test plans and creates and executes test cases in line with test plans. Participates in design, coding, testing, implementation, and documentation of solutions.
In this role, the selected candidate will be responsible for maintaining all security documentation, document, and maintain the process and procedures, incorporating applicable policies and ensuring the process meets the needs of the IT security strategy, thereby ensuring the process is fit for purpose.
The successful candidate will have hands-on
experience in the IAM space, the IAM product, platform and business processes, the ability to participate in deployments and upgrades, and the desire to work accept challenges.