Information Security Technical Specialist

Company Name:
Ascension Health
Ascension Information Services, located at St. Mary''s of Michigan in Saginaw, is searching for an Information Security Technical Specialist. The Information Security Specialist will have technical expertise and serve as a Subject Matter Expert (SME) in one or more areas of IT security, has the ability to work independently on IT security projects, and has experience in customer service and end-user support in a Health Care environment.
Bachelor''s Degree in computer/information sciences, mathematics, business/MIS or related field from an accredited college is preferred - equivalent experience will be considered.
At least 2 years experience in Information Systems and/or Security.
Good understanding of security concepts.
Proficient in Microsoft Office- especially Excel and/or Access
Database, VB scripting, .NET coding experience preferred
Other Capabilities
Must be self motivated with ability to work independently
Good organizational skills and ability to prioritize
Good Interpersonal and Communication Skills
Ability to create effective documentation
Maintains the confidential nature of sensitive data
Ability to fulfill On Call rotation requirements.
Ascension Health ( ) is transforming healthcare by providing the highest quality care to all, with special attention to those who are poor and vulnerable. Ascension Health, which provided $1.1 billion in care of persons who are poor and community benefit last year, is the nation's largest Catholic and nonprofit health system. Our Mission-focused Health Ministries employ 113,000 associates serving in more than 500 locations in 20 states and the District of Columbia.
Ascension Health - IS (AHIS) is a subsidiary organization of Ascension Health. As one of the largest healthcare IT services organizations in North America, AHIS has more than 2,000 associates serving in IT applications, infrastructure and program management roles. AHIS was created in 2006 in response to the Empowering Knowledge component of Ascension Health's Strategic Direction. AHIS provides IT resources to each of Ascension Health's 34 Health Ministries, and is focused on strengthening the organization's IT capabilities and providing innovative solutions in the areas of business continuity and disaster recovery services, security, and clinical and business operations.
Equal Opportunity Employer M/F/D/V
Provide security-engineering services to new technology projects on a project-by-project basis.
Keep Security/Technology Profiles up-to-date for responsible ministries.
Conduct real-time security event monitoring consisting of consolidation and correlation of events from intrusion detection/prevention systems, firewalls, operating system and other logs and Anti-virus Software/Systems.
Provide forensic analysis in response to Information Security incidents.
Analyze and advise on security audits and test results.
Web content filtering solution management and reporting.
Assist with, manage, conduct and review risk assessments.
Assess security controls of new applications to establish compliance level and appropriate configuration.
Develop security evaluation plan and test procedures to assess physical, technical, and administrative safeguards and controls as appropriate.
Conduct independent vulnerability assessments and penetration studies.
Perform random as well as required IT General Controls security audits and report results.
Validation of desktop and server patches
Create, monitor and implement remediation plans
Compare and trend data
Process security related system access requests including vendor access and mobile devices
Participation in/Facilitate requirements related to Disaster Recovery Plans and Testing
Support requirements of the National Provisioning Tool and Processes
Review/revise/maintain security and security administration group documentation
Other duties as assigned

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.