Featured Health IT Job: IT Security Manager

We like to regularly feature a healthcare IT job that might be of interest to readers. Today, we’re featuring the
IT Security Manager
position that was recently posted on Healthcare IT Central. This position was posted by HealthTECH Resources and is available in Arizona.

Here’s a description of the position:

HealthTECH Resources is seeking an Epic Security Coordinator for a direct hire, FTE position at a renowned healthcare organization in AZ.

What are the duties of this Epic Security Coordinator job?

  • Fully accountable for the design, creation, and management of complex administrative and technical security controls for all applications.
  • Lead security meetings and develop implementation timelines and strategies relating to application security.
  • Partners with IT and business staff to define application security requirements, design, documentation and implements related policy and procedures.
  • Resolves all application security issues and ensures all changes to application security are approved and implemented within the established change control process.
  • Coordinates application risk assessments and audits including periodic review of existing users, roles, profiles and security role matrices.
  • Responsible for completing the security build, testing, user account provisioning and deprovisioning record creation.
  • Develops the application security support plan, related documentation, and trains all application support staff on applications security procedures and related industry best practices.
  • Note: we are only interested in candidates at this time that can commit to being hired into a permanent position for full-time, onsite work. This will require being local to, or relocation to, Phoenix, AZ.

What qualifications will the ideal candidate have?

Knowledge, Skills, and Abilities:

  • Must have in depth knowledge of data processing within various healthcare related applications (in particular, systems that contain Protected Health Information and patient financial data); HIPAA Privacy and security provisions and other applicable regulations; and role based security and how it’s applied to application security.
  • Must have a solid understanding of LDAP and how it relates to user provisioning and deprovisioning.
  • Requires thorough knowledge of information security practices as they relate to information technology.
  • Must have strong familiarity with risk analysis and risk management methodologies; and a solid understanding of application vulnerabilities and countermeasures.
  • Must be able to write intricate system and user documentation.
  • Must be able to provide and recommend remediation approach and not just provide vulnerability information.
  • A Master’s degree is preferred and may substitute for up to two (2) years of required experience; and a Doctorate degree may substitute for all required experience.Experience and education:
  • Requires current Epic Security certification.
  • Advanced understanding of Epic Data Courier functionality highly preferred.
  • Requires five (5) years of progressively responsible computer application security experience that demonstrates a thorough understanding of the required knowledge, skills, and abilities.
  • Prefer certifications (i.e. CISSP, CISA, etc.) in computer security.
  • Requires a Bachelor’s degree in Information Technology or related field; or an equivalent combination of training and progressively responsible experience.

Why work here?

  • They transform the lives of passionate professionals like you by offering opportunities for growth and providing you with the support you need to live well, be healthy, continue learning, develop skills, and grow professionally.
  • They foster a collaborative and compassionate team ethos to create an atmosphere of excellence, respect, education, and leadership.
  • Competitive wages, medical, dental and vision coverage, retirement system plan with a lifelong pension upon retirement, plus generous PTO and 10 holidays per year.

Looks like a great opportunity for those with experience with Epic security. If this looks like a position that would interest you, check out the full details for the job and how to apply.

As always, you can search our Health IT job board for a variety of jobs from leading companies in the industry. You can also register for free and post your resume where recruiters search for job candidates regularly.

About the author

John Lynn

John Lynn

John Lynn is the Founder of the HealthcareScene.com, a network of leading Healthcare IT resources. The flagship blog, Healthcare IT Today, contains over 13,000 articles with over half of the articles written by John. These EMR and Healthcare IT related articles have been viewed over 20 million times.

John manages Healthcare IT Central, the leading career Health IT job board. He also organizes the first of its kind conference and community focused on healthcare marketing, Healthcare and IT Marketing Conference, and a healthcare IT conference, EXPO.health, focused on practical healthcare IT innovation. John is an advisor to multiple healthcare IT companies. John is highly involved in social media, and in addition to his blogs can be found on Twitter: @techguy.