As the healthcare industry continues to rapidly transform, our IT team conceives, develops and delivers impactful technology solutions to support access to quality, affordable healthcare for our members. We are driven by our collective company purpose: To do everything in our power to stand with our members in sickness and in health . Our IT team unleashes the power of this purpose through technology. We come to work every day to make a difference, and we deliver the highest quality and best solutions to our members.
This position is responsible for the planning, design, enforcement and audit of information technology and information security policies, standards and procedures which safeguard the integrity of and access to the Security dataLake.n; approving the design, development and implementation of the big data platform within the Security department; including activities in terms of being accountable for the approval of the Hadoop HDP and HDF clusters and the user accounts accessing them, managing the internal assets of big data application tools, setting direction for operational / administration support in terms of patch and OS upgrades, setting the guidelines and criteria for monitoring the internal components of the SDL, ensure performance of the SDL delivers on data being ingested from NiagaraFiles (NIFI) scripts along with the systems and applications log data; ensuring the reports from HCSC infrastructure teams on capacity and performance for cpu, memory and throughput are delivered and acted upon in a timely manner; overseeing and approving all related change orders that are being submitted thru change management; implementing and administering the Security big data applications, e.g. Ranger, Interset, Firemon and managing the reporting and monitoring of these solutions as well.
* Responsible for the planning, design, enforcement of information technology and information security policies, standards and procedures which safeguard the confidentiality, integrity, availability and operations of the SDL enterprise technology assets and information.
* Maintains knowledge of changing technologies, and provides recommendations for adaptation of new technologies, processes or policies.
* Recognizes and identifies potential areas where existing information technology and information security policies, standards and procedures require change, or where new ones need to be developed, especially as a result of future business expansion and technology advances.
*Provides management with analysis via with risk assessments and briefings / reports to advise them of critical information technology / information security issues that may affect. The company's business objectives and / or compliance.
*Collaborates with and feeds IT risk information into the Enterprise Risk Management program.
*Implements the activities associated with the information technology and information security awareness programs and provides education and training on information technology and information security policies, standards and practices.
*Performs controls assessments and works with appropriate Subject Matter Experts to develop remediation plans
Required Job Qualifications:
*Bachelors Degree and 7 years of IT / IS work experience with a broad range of exposure to systems analysis, application development, database design and administration of the datalake technologies. Requires understanding of IT / IS concepts and how to artciulate those in terms of risk. Interprets internal or external business issues and concepts and and can translate those into IT concepts that must be addressed via policy.
*3 years of combined security Policy - Monitoring Technologies on Enterprise or cloud based systems.
*IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments.
*Requires knowledge of security issues, techniques and implications across all existing computer platforms.
*Uses best practices and knowledge of internal or external business issues to improve products or services
*Independently solves complex problems; takes a new perspective using existing solutions
*Works independently, receives minimal guidance
*Acts as a resource for colleagues with less experience;
*Has a thorough understanding of key IT / IS laws and regulations, such as the Health Insurance Portability and Accountability Act, as well as governance and compliance frameworks (e.g. NIST, COBIT, ITIL, HITRUST)
*Understanding of and experience with audit and compliance controls. This could include previous IT auditing experience and / or technical controls implementation, as well as the ability to respond apprpriately to audit and assessment findings.
*Takes initiative and invokes creativity to solve complex problems; takes an outside in perspective to identify innovative solutions as it pertains to identity managemnt principles.
*Collaborates well with individuals across the business and IT, as well as at all levels of the organization
*Excellent verbal and written communication skills, including the ability to articulate complex concepts to various technical and non-technical audiences
*Experience with and understanding of overall Security Datalake concepts. Experience with a SDL solution would be preferred.
*Works independently, with guidance in only the most complex situations
*May lead functional teams or projects
*Serves as a project lead and mentor to junior Information Cybersecurity analysts within the Operations
Preferred Job Qualifications:
*Bachelors Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience.
Location: IL - Chicago, IL - Downers Grove, IL - Naperville, IL - Waukegan, MT - Helena, OK - Tulsa, TX - Richardson
Activation Date: Wednesday, October 24, 2018
Expiration Date: Saturday, December 1, 2018
Associated topics: attack, identity, information assurance, leak, phish, security, security engineer, security officer, threat, vulnerability