IT Security Architect
DRG Professional Services is partnered with Oklahoma's premier academic healthcare institution offering unsurpassed care, teaching, research and technology. This "Not For Profit" hospital is beginning its Magnet journey and currently experiencing phenomenal growth. We are seeking an experienced health care information professional who will be responsible for the design, implementation, and support of various risk-based activities and IT security technologies and solutions for the hospital, remote clinics, and office buildings.
- Industry Leading Benefit Plan: The hospital offers a comprehensive benefits package, including PTO, 401(k) with match, medical and dental plans, but offerings go beyond traditional packages to include; Empower + Wellbeing programs, Childcare assistance, adoption assistance, financial support for continuing education, tuition reimbursement, and many others.
- Career Growth: Significant opportunity for advancing in your career. This Academic Teaching Hospital values education and upward mobility.
- Sign on bonus / relocation package eligibility
General Description: The IT Security Architect is responsible for the design, implementation, and support of various risk-based activities and IT security technologies and solutions for the hospital, remote clinics, and office buildings. This position will manage data collection, reporting, and trending for all critical systems components and services, and will require collaboration with other technical resources in the hospital to assess and take authorized action on anticipated improvements. The IT Security Architect assists and leads in the diagnosis and resolution of the most complex platform incidents and requests that require research and diagnosis, and recommends process changes that improve the implementation, maintenance, and support of systems security. This position actively participates in strategic planning and 24x7 on-call support with other members of IT staff.
The IT Security Architect provides leadership, coordination, and communication for projects involving security solutions. This includes, but may not be limited to, the design, implementation, and deployment of various security technologies within the enterprise. This position is responsible for defining scope of various projects, ensures that all deliverables are met, and adheres to and supports IT policies and procedures.
This position is responsible achieving alignment and continuity between enterprise, business and IT strategies, leveraging existing security investments and providing scalable options as business requirements necessitate a need for change. This requires the IT Security Architect to keep abreast of the latest security and risk management technologies, services, and components, actively facilitate communication between the business and IT, and provide coordination to a team of resources assigned to accomplish specific technical tasks.
Responsibilities listed in this section are core to the position. Inability to perform these responsibilities with or without an accommodation may result in disqualification from the position.
- Provides local leadership, subject matter knowledge, coordination, and communication for projects involving cyber security and information risk, including defining scope and ensuring deliverables are met.
- Ensures alignment and continuity between enterprise, business and IT strategies.
- Creates business case proposals, analysis of technologies, financials, and proposed project plans.
- Creates RFPs, conducts reviews/assessments, and makes vendor recommendations.
- Performs contract reviews and ensure risks are mitigated.
- Designs, implements, monitors and supports hardware and software related to the cyber security and information risk program.
- Conducts various security assessments and control reviews.
- Identifies gaps to security protocol in existing architecture.
- Provides security awareness training.
- Participates in strategic planning; creation and maintenance of standards, policies, and procedures.
- Manages data collection, reporting, and trending for critical risk and security devices and components.
- Proactively addresses a change in business requirements by leveraging existing risk and security investments.
- Provides 24x7 on-call support based on IT staff rotation and carries a phone as warranted, to assist with the most complex troubleshooting, coordination, escalation, and resolution of risk and security-based incidents, equipment failures, etc...
- Leads the build of technology operational models and work flows for the business.
- Provides strategic contingency planning from a security and risk perspective.
- Provides vendor management, service level definition and service level management for vendors of risk and security technologies and/or services.
- Coordinates and participates in regular business meetings and workshops with technical staff to ensure timely transfer of knowledge, which affects security architecture and security policies.
- Participates in meetings, committees and continuing education to improve individual, departmental and organizational performance.
- Aids and trains users on proper use of technology.
- Adheres to and supports the hospitals’ IT standards, policies and procedures.
- Maintains and protects confidentiality with regard to all aspects of patient care and employee information.
- Adheres to Code of Conduct and Mission & Value Statement.
- Bachelor’s degree in a computer science or information technology related subject is preferred.
- Eight plus (8+) years’ experience with complex system and security technologies and / or 8+ information risk experience.
- Candidate should have managed multiple high-risk projects, including projects involving external vendors and multiple business areas in the health care information field. Multiple entity experience is preferred.
- Demonstrated expertise in creating and maintaining project deliverables such as project charter, project plan, status reports, project timesheets, estimates, communication plan, change control reporting, risk management plan, technical release management plan, budget (work hours and cost), milestone/deliverable charts.
- CISSP or GSEC or CISM preferred.
- Current or previously held vendor, security, systems, architect, project, audit, or network certifications preferred examples include; Cisco security, Microsoft Security, CCNP, CCNA, MCSE, CISM, CISA, CEH etc.
- Current Driver’s License, proof of auto insurance, and reliable personal transportation capable of transporting both employee and standard work equipment.
Required Knowledge, Skills and Abilities:
Strong technical competencies in the following:
- In depth knowledge of supported operating systems (Windows server and VMware ESX) network technology (Route, Switch, Firewall, VPN), utilities, vendor products, applicable programming languages and scripting, diagnostic techniques, applicable communications protocols, applicable hardware configurations
- Must have 2 years’ experience in deploying technically complex infrastructure computing solutions across platforms and components.
- Must have security regulation and security framework knowledge. Examples include, HIPAA, HITECH, HITRUST, NIST, ISO, and COBIT.
- Must be able to demonstrate knowledge of the following topics: firewall management, content filtering, IDS/IPS management, DLP, Identity management, and cloud security management.
- Ability to work with IT technical resources and understand their requirements is necessary.
- Leadership skills to establish and maintain business relations with technical resources, customers, business partners, vendors, and other IT personnel
- Change Management - High tolerance for Change
- Political Judgment - Involves all relevant stakeholders in major decisions; Strong facilitation skills; Utilizes approaches that foster ownership and minimize resistance
- Hands-on Approach - Acts as a role model for other technical resources; maintains subject matter depth and breadth; knowledgeable of current issues
- Makes decisions which are in the best interests of the business without succumbing to pressures
- Is available and accessible; Maintains a positive attitude
- Organization - Proactively prioritizes needs; Effectively manages resources
- Communication - Communicates complicated technical scenarios in common terms; Communicates clearly across a wide audience (oral and written communications)
- Customer Orientation - Establishes and maintains long-term customer relationships, builds trusts and is respected by consistently meeting or exceeding expectations
- Motivate and challenge technical resources
- Problem Management
- Project Management
The Company is an equal opportunity employer and will consider all applications without regard to race, sex, age, color, religion, national origin, veteran status, disability, genetic information or any other characteristic protected by law.