Information Security Analyst

Company Name:
Request Technology-Robyn Honquest
Information Security Analyst Looking for a candidate that has solid HIPPA and PCI documentation that wants to learn infrastructure and application and network security. You w ill focus on HIPAA and PCI compliance process and procedures. Must have a solid understanding of networking and infrastructure and want to learn deeper to backup the other security person who is more tools and infrastructure technical. There are eight people in IT. They outsource applications 3rd party. The keys to the position: - Solid HIPAA and PCI - Willing to create a lot of documentation to start - then be able to start administering our Security applications like - LogRhythm - Qualys - NetSpective - Microsoft System Center EndPoint Protection - We will be working on Creating/Updating - HIPAA documentation - Business Continuity Plan - Be willing to teach and talk about Security procedures - Knowledge of HIPAA/PCI Security laws, Standards, rules and regulations while administering overall HIPAA/PCI security program. - Write new policies and/or revise IT HIPAA/PCI Security manuals, policies and procedures. As well as annually update material as needed due to changes in regulations and procedures. - Participate in the deployment, testing, and security of new software/hardware implementation projects. - Ensure all IT systems, policies and procedures fully comply with HIPAA/PCI security laws, rules and regulations. - Monitor and evaluate security measures to protect against reasonably anticipated threats or hazards to the privacy, security or integrity of ePHI. QUALIFICATIONS- A four-year college degree in
Science or equivalent certification is required. - At least 3 years of information security work experience is required, with both public and private sector experience preferred. - The ability to work effectively in a health care setting, consensus driven organization is required, as are demonstrated personnel and information security program management skills. - A working knowledge of all aspects of information security is essential, as is the ability to apply this knowledge in an open network environment. MYK62683JR

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Sr Information Security Analyst
Chicago, IL Red Sky Consulting
Information Security Analyst - Splunk
Chicago, IL Revolution Technologies
Sr. Information Security Analyst - SAP
Chicago, IL Constellation Brands
Tier II Information Security Analyst
Chicago, IL PrivateBancorp, Inc.
Information Security Analyst
Chicago, IL Robert Half
Senior Information Security Engineer Analyst
Lincolnshire, IL Zebra Technologies