Previous Job
Previous
IT Security Specialist - Spartanburg Regional Healthcare
Ref No.: 18-01435
Location: Spartanburg, South Carolina
Role: IT Security Specialist
Location: 700 N Pine St, Spartanburg, SC 29303
Duration: 3 Months CTH/Full Time

Job Description:
Focus to include Technical Analysis and Identity Access Management of information systems and business process workflows. The Information Security Engineer is an individual contributor role responsible for supporting a global program to identify, exploit, and communicate application and network layer vulnerabilities. In addition, the Engineer will identify gaps in process and administrative controls and assist in remediation. Core responsibilities include supporting in all Information Security incident response activities. The Engineer will need to develop strong relationships with business process owners in order to successfully execute security assessments and promote remediation. May be lead on care and feeding of key enterprise software packages. Additional responsibilities include participating in integration efforts within Security and with IT partners, tabletop exercises, and timely management reporting to ensure situational awareness across the security organization. Strong technical and analytical experience is a must.

Daily Responsibilities:
  • Execute incident response procedures
  • Work within the incident response team to mitigate threats and vulnerabilities
  • Understand and apply security and access frameworks (NIST, ISO, COBIT)
  • Must have experience troubleshooting Windows environments
  • Identify, document, and report on risks thresholds
  • Creating and maintain documentation of process workflows and network configurations
  • Perform routine maintenance of Information Security infrastructure systems
  • Post-deployment monitoring and testing
  • Performing intrusion detection analysis
  • Support security audits, risk analysis, and assessments
  • Making recommendations for enhancing data systems security
  • Implement security solutions within hardware and software processes
  • Analyzing process performance, identifying areas of concern
  • Identity Access Management process ownership
  • Monitoring and reporting of changes to key systems