Responsibilities
PRIMARY FUNCTION :
Follows information security procedures in order to protect Jefferson’s information assets. Adds, removes, and changes user’s access to systems and applications.
ESSENTIAL FUNCTIONS:
- Reviews IT systems and business processes to identify information security risks and regulatory non-compliance.
- Assists with the creation, maintenance and auditing of user accounts.
- Assist the Identity Management team with daily projects and tasks
- Follows and audits compliance with information security procedures and requirements.
- Delivers training on Information Security.
- Maintains familiarity with HIPAA and other information security regulations
- Promoting enterprise adoption and consistent execution of Jefferson’s Identity and access management processes.
- Reviewing access requests and provisioning new-hire accounts.
- Gathering new user role onboarding requirements and approvals.
- Auditing and reviewing account lifecycle management; identifying and resolving inconsistencies.
- Interacts with co-workers, visitors, and other staff consistent with the iSCORE values of Jefferson .
OTHER FUNCTIONS AND COMPETENCIES:
- Facilitate audits and regulatory requests by gathering evidence, tracking progress, following up on outstanding items, and reporting
- Executes detailed tasks consistently and accurately
- Participates in off hours support upon request
- Generate information security metrics by collecting and reporting on data
- Understand Jefferson’s business and academic, medical, and educational mission
- Understand healthcare and academic technology systems and practices
- Manage deadlines, competing priorities, and tasks
- Supports other information security operations as required
- Communicate clearly, efficiently, and persuasively across multiple mediums, including email, phone calls, in person discussions, and in group meetings
Qualifications
EDUCATIONAL/TRAINING REQUIREMENTS :
Bachelor’s degree, with a preference for degrees in information technology, science or clinical disciplines preferred.
_________________________________________________________________________ CERTIFICATES, LICENSES, AND REGISTRATION :
Information Security or Information Technology certification such as SSCP, CISSP, or CISA prefered.
_________________________________________________________________________
EXPERIENCE REQUIREMENTS :
One or more years of experience in an IT, clinical, audit, or similar business environment.